Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Abercrombie, Robert K
2014-01-01
Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies tomore » SCADA systems; our metric is a specialization of the generic measure of mean failure cost.« less
Review of Supervisory Control and Data Acquisition (SCADA) Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Reva Nickelson; Briam Johnson; Ken Barnes
2004-01-01
A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.
Design and Development of Layered Security: Future Enhancements and Directions in Transmission
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-01
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443
Design and Development of Layered Security: Future Enhancements and Directions in Transmission.
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-06
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Igure, V. M.; Williams, R. D.
2006-07-01
Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less
Security Engineering and Educational Initiatives for Critical Information Infrastructures
2013-06-01
standard for cryptographic protection of SCADA communications. The United Kingdom’s National Infrastructure Security Co-ordination Centre (NISCC...has released a good practice guide on firewall deployment for SCADA systems and process control networks [17]. Meanwhile, National Institute for ...report. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED 18 The SCADA gateway collects the data gathered by sensors, translates them from
Towards a Standard for Highly Secure SCADA Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carlson, R.
1998-09-25
The critical energy inkstructures include gas, OL and electric power. These Mrastructures are complex and interdependent nmvorks that are vital to the national secwiy and social well being of our nation. Many electric power systems depend upon gas and oil, while fossil energy delive~ systems depend upon elecnic power. The control mechanisms for these Mrastructures are often referred to as SCADA (Supmivry CkmdandDaU Ac@itz&z) systems. SCADA systems provide remote monitoring and centralized control for a distributed tmnsportation infmsmucture in order to facilitate delivery of a commodi~. AIthough many of the SCADA concepts developed in this paper can be applied tomore » automotive mmsponation systems, we will use transportation to refer to the movement of electrici~, gas, and oil. \\ Recently, there have been seveml reports suggesting that the widespread and increasing use of SCADA for control of energy systems provides an increasing opportuni~ for an advers~ to cause serious darnage to the energy inbstmcturei~. This damage could arise through cyber infiltration of the SCADA networks, by physically tampering with the control networks, or through a combination of both means. SCADA system threats decompose into cyber and physical threats. One solution to the SCADA security problem is to design a standard for a highly secure KA.DA system that is both cyber, and physdly secure. Not all-physical threats are possible to guard again% but of those threats that are, high security SCADA provides confidence that the system will continue to operate in their presence. One of the most important problems in SCADA securi~ is the relationship between the cyber and physical vulnerabilities. Cyber intrusion increases physical Vulnerabilities, while in the dual problem physical tampering increases cyber vulnerabilit.ies. There is potential for feedback and the precise dynamics need to be understood. As a first step towards a stan~ the goal of this paper is to facilitate a discussion of the requirements analysis for a highly secure SCADA system. The fi-arnework for the discussion consists of the identification of SCADA security investment areas coupled with the tradeoffs that will force compromises in the solution. For example, computational and bandwidth requirements of a security standard could force the replacement of entire SCADA systems. The requirements for a real-time response in a cascading electric power failure could pose limitations on authentication and encryption mechanisms. The shortest path to the development of a high securi~ SC.ADA standard will be achieved by leveraging existing standards efforts and ensuring that security is being properly addressed in those standards. The Utility Communications Architecture 2.o (UC@, for real-time utili~ decision control, represents one such standard. The development of a SCADA secwiy specification is a complex task that will benefit from a systems engineering approach.« less
The Commanding Officer’s Perspective on Protecting Shipboard IT Networks
2014-09-01
potential checklist for protecting Supervisory Control and Data Acquisition ( SCADA ) systems. “A SCADA system is the software that controls networks such as...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited THE COMMANDING... for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data
Application of the SCADA system in wastewater treatment plants.
Dieu, B
2001-01-01
The implementation of the SCADA system has a positive impact on the operations, maintenance, process improvement and savings for the City of Houston's Wastewater Operations branch. This paper will discuss the system's evolvement, the external/internal architecture, and the human-machine-interface graphical design. Finally, it will demonstrate the system's successes in monitoring the City's sewage and sludge collection/distribution systems, wet-weather facilities and wastewater treatment plants, complying with the USEPA requirements on the discharge, and effectively reducing the operations and maintenance costs.
Anomaly-based intrusion detection for SCADA systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, D.; Usynin, A.; Hines, J. W.
2006-07-01
Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper willmore » briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)« less
Power System Information Delivering System Based on Distributed Object
NASA Astrophysics Data System (ADS)
Tanaka, Tatsuji; Tsuchiya, Takehiko; Tamura, Setsuo; Seki, Tomomichi; Kubota, Kenji
In recent years, improvement in computer performance and development of computer network technology or the distributed information processing technology has a remarkable thing. Moreover, the deregulation is starting and will be spreading in the electric power industry in Japan. Consequently, power suppliers are required to supply low cost power with high quality services to customers. Corresponding to these movements the authors have been proposed SCOPE (System Configuration Of PowEr control system) architecture for distributed EMS/SCADA (Energy Management Systems / Supervisory Control and Data Acquisition) system based on distributed object technology, which offers the flexibility and expandability adapting those movements. In this paper, the authors introduce a prototype of the power system information delivering system, which was developed based on SCOPE architecture. This paper describes the architecture and the evaluation results of this prototype system. The power system information delivering system supplies useful power systems information such as electric power failures to the customers using Internet and distributed object technology. This system is new type of SCADA system which monitors failure of power transmission system and power distribution system with geographic information integrated way.
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps.
Moya, José M; Araujo, Alvaro; Banković, Zorana; de Goyeneche, Juan-Mariano; Vallejo, Juan Carlos; Malagón, Pedro; Villanueva, Daniel; Fraga, David; Romero, Elena; Blesa, Javier
2009-01-01
The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals.
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps
Moya, José M.; Araujo, Álvaro; Banković, Zorana; de Goyeneche, Juan-Mariano; Vallejo, Juan Carlos; Malagón, Pedro; Villanueva, Daniel; Fraga, David; Romero, Elena; Blesa, Javier
2009-01-01
The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals. PMID:22291569
Providing Situational Awareness for Pipeline Control Operations
NASA Astrophysics Data System (ADS)
Butts, Jonathan; Kleinhans, Hugo; Chandia, Rodrigo; Papa, Mauricio; Shenoi, Sujeet
A SCADA system for a single 3,000-mile-long strand of oil or gas pipeline may employ several thousand field devices to measure process parameters and operate equipment. Because of the vital tasks performed by these sensors and actuators, pipeline operators need accurate and timely information about their status and integrity. This paper describes a realtime scanner that provides situational awareness about SCADA devices and control operations. The scanner, with the assistance of lightweight, distributed sensors, analyzes SCADA network traffic, verifies the operational status and integrity of field devices, and identifies anomalous activity. Experimental results obtained using real pipeline control traffic demonstrate the utility of the scanner in industrial settings.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pollet, J.
2006-07-01
This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-criticalmore » networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)« less
An Encryption Scheme for Communication Internet SCADA Components
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network. SCADA is considered a critical infrastructure, and connecting to the internet is putting the society on jeopardy, some operators hold back on connecting it to the internet. But since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Supervisory Control and Data Acquisition Systems (SCADA) through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
Wang, Hao; Lau, Nathan; Gerdes, Ryan M
2018-04-01
The aim of this study was to apply work domain analysis for cybersecurity assessment and design of supervisory control and data acquisition (SCADA) systems. Adoption of information and communication technology in cyberphysical systems (CPSs) for critical infrastructures enables automated and distributed control but introduces cybersecurity risk. Many CPSs employ SCADA industrial control systems that have become the target of cyberattacks, which inflict physical damage without use of force. Given that absolute security is not feasible for complex systems, cyberintrusions that introduce unanticipated events will occur; a proper response will in turn require human adaptive ability. Therefore, analysis techniques that can support security assessment and human factors engineering are invaluable for defending CPSs. We conducted work domain analysis using the abstraction hierarchy (AH) to model a generic SCADA implementation to identify the functional structures and means-ends relations. We then adopted a case study approach examining the Stuxnet cyberattack by developing and integrating AHs for the uranium enrichment process, SCADA implementation, and malware to investigate the interactions between the three aspects of cybersecurity in CPSs. The AHs for modeling a generic SCADA implementation and studying the Stuxnet cyberattack are useful for mapping attack vectors, identifying deficiencies in security processes and features, and evaluating proposed security solutions with respect to system objectives. Work domain analysis is an effective analytical method for studying cybersecurity of CPSs for critical infrastructures in a psychologically relevant manner. Work domain analysis should be applied to assess cybersecurity risk and inform engineering and user interface design.
Quantifying the Impact of Unavailability in Cyber-Physical Environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Federick T.
2014-01-01
The Supervisory Control and Data Acquisition (SCADA) system discussed in this work manages a distributed control network for the Tunisian Electric & Gas Utility. The network is dispersed over a large geographic area that monitors and controls the flow of electricity/gas from both remote and centralized locations. The availability of the SCADA system in this context is critical to ensuring the uninterrupted delivery of energy, including safety, security, continuity of operations and revenue. Such SCADA systems are the backbone of national critical cyber-physical infrastructures. Herein, we propose adapting the Mean Failure Cost (MFC) metric for quantifying the cost of unavailability.more » This new metric combines the classic availability formulation with MFC. The resulting metric, so-called Econometric Availability (EA), offers a computational basis to evaluate a system in terms of the gain/loss ($/hour of operation) that affects each stakeholder due to unavailability.« less
Cyber security risk assessment for SCADA and DCS networks.
Ralston, P A S; Graham, J H; Hieb, J L
2007-10-01
The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.
Security Encryption Scheme for Communication of Web Based Control Systems
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
Wind Power Plant SCADA and Controls
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badrzadeh, Babak; Castillo, Nestor; Bradt, M.
2011-01-01
Modern Wind Power Plants (WPPs) contain a variety of intelligent electronic devices (IEDs), Supervisory Control and Data Acquisition (SCADA) and communication systems. This paper discusses the issues related to a typical WPP's SCADA and Control. Presentation topics are: (1) Wind Turbine Controls; (2) Wind Plant SCADA, OEM SCADA Solutions, Third-Party SCADA Solutions; (3) Wind Plant Control; and (4) Security and Reliability Compliance.
2014-06-16
SCADA systems. These professionals should be aware of the vulnerabilities so they can take intelligent precautions to mitigate attacks. SCADA...vulnerabilities • Describe mitigation options for protecting a system from SCADA attacks For students that go on to pursue a degree in Computer...from SCADA attacks For students who do not remain in the IT realm, this introduction provides an awareness to help them mitigate threats for their
Study on the Future Internet System through Analysis of SCADA Systems
NASA Astrophysics Data System (ADS)
Song, Jae-Gu; Jung, Sungmo; Kim, Seoksoo
Research on the future Internet is focused on establishing standards by solving problems through various projects and accepting various requirements. In this study, the SCADA (Supervisory Control And Data Acquisition) environment, closely related with national infrastructure, is analyzed in order to explore requirements of the future Internet and then those of the SCADA network. Also, this study provides SCADA system environments for the future Internet.
An Architecture for SCADA Network Forensics
NASA Astrophysics Data System (ADS)
Kilpatrick, Tim; Gonzalez, Jesus; Chandia, Rodrigo; Papa, Mauricio; Shenoi, Sujeet
Supervisory control and data acquisition (SCADA) systems are widely used in industrial control and automation. Modern SCADA protocols often employ TCP/IP to transport sensor data and control signals. Meanwhile, corporate IT infrastructures are interconnecting with previously isolated SCADA networks. The use of TCP/IP as a carrier protocol and the interconnection of IT and SCADA networks raise serious security issues. This paper describes an architecture for SCADA network forensics. In addition to supporting forensic investigations of SCADA network incidents, the architecture incorporates mechanisms for monitoring process behavior, analyzing trends and optimizing plant performance.
Development of a novel SCADA system for laboratory testing.
Patel, M; Cole, G R; Pryor, T L; Wilmot, N A
2004-07-01
This document summarizes the supervisory control and data acquisition (SCADA) system that allows communication with, and controlling the output of, various I/O devices in the renewable energy systems and components test facility RESLab. This SCADA system differs from traditional SCADA systems in that it supports a continuously changing operating environment depending on the test to be performed. The SCADA System is based on the concept of having one Master I/O Server and multiple client computer systems. This paper describes the main features and advantages of this dynamic SCADA system, the connections of various field devices to the master I/O server, the device servers, and numerous software features used in the system. The system is based on the graphical programming language "LabVIEW" and its "Datalogging and Supervisory Control" (DSC) module. The DSC module supports a real-time database called the "tag engine," which performs the I/O operations with all field devices attached to the master I/O server and communications with the other tag engines running on the client computers connected via a local area network. Generic and detailed communication block diagrams illustrating the hierarchical structure of this SCADA system are presented. The flow diagram outlining a complete test performed using this system in one of its standard configurations is described.
Architecture and Methods for Substation SCADA Cybersecurity: Best Practices
DOE Office of Scientific and Technical Information (OSTI.GOV)
Albunashee, Hamdi; Al Sarray, Muthanna; McCann, Roy
There are over 3000 electricity providers in the United States, encompassing investor and publicly owned utilities as well as electric cooperatives. There has been ongoing trends to increasingly automate and provide remote control and monitoring of electric energy delivery systems. The deployment of computer network technologies has increased the efficiency and reliability of electric power infrastructure. However, the increased use of digital communications has also increased the vulnerability to malicious cyber attacks [1]. In 2004 the National Research Councils (National Academies) formed a committee of specialists to address these vulnerabilities and propose possible solutions with an objective to prioritize themore » R&D needs for developing countermeasures. The committee addressed many potential concerns in the electric power delivery system and classified them based upon different criteria and presented recommendations to minimize the gap between the academic research directions and the needs of the electric utility industry. The complexity and diversity of the electric power delivery system in the U.S. has opened many ports for attackers and intruders [1]. This complexity and diversity is attributed to the fact that power delivery system is a network of substations, transmission and distribution lines, sub-networks of controlling, sensing and monitoring units, and human operator involvement for running the system [1]. Accordingly, any incident such as the occurrence of a fault or disturbance in this complex network cannot be deferred and should be resolved within an order of milliseconds, otherwise there is risk of large-scale outages similar to the occurrences in India and the U.S. in 2003 [2]. There are three main vulnerabilities in supervisory control and data acquisition (SCADA) systems commonly identified—physical vulnerability, cyber vulnerability and personal vulnerability [1]. In terms of cyber threats, SCADA systems are the most critical elements in the electric power grid in the U.S. Unauthorized access to a SCADA system could enable/disable unexpected equipment (such as disable the protection system or a circuit breaker) which could cause large scale disruptions of electric power delivery. This paper provides an overview of power system SCADA technologies in transmission substations (Section 2) and summarizes the best practices for implementing a cyber security program. After introducing SCADA system operations in Section 2, a description of the security challenges for SCADA systems is presented in Section 3. In Section 4, NECRC Critical Infrastructure Protection standards CIP-002 through CIP-009 are summarized. An overview of industry best practices is presented in Section 5.« less
Communication Security for Control Systems in Smart Grid
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.
Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems
NASA Astrophysics Data System (ADS)
Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.
2017-01-01
The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.
Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hernandez Jimenez, Jarilyn M; Chen, Qian; Nichols, Jeff A.
Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report bymore » Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.« less
Access Control Management for SCADA Systems
NASA Astrophysics Data System (ADS)
Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan
The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.
ERIC Educational Resources Information Center
Morsey, Christopher
2017-01-01
In the critical infrastructure world, many critical infrastructure sectors use a Supervisory Control and Data Acquisition (SCADA) system. The sectors that use SCADA systems are the electric power, nuclear power and water. These systems are used to control, monitor and extract data from the systems that give us all the ability to light our homes…
Mobile phone based SCADA for industrial automation.
Ozdemir, Engin; Karacor, Mevlut
2006-01-01
SCADA is the acronym for "Supervisory Control And Data Acquisition." SCADA systems are widely used in industry for supervisory control and data acquisition of industrial processes. Conventional SCADA systems use PC, notebook, thin client, and PDA as a client. In this paper, a Java-enabled mobile phone has been used as a client in a sample SCADA application in order to display and supervise the position of a sample prototype crane. The paper presents an actual implementation of the on-line controlling of the prototype crane via mobile phone. The wireless communication between the mobile phone and the SCADA server is performed by means of a base station via general packet radio service (GPRS) and wireless application protocol (WAP). Test results have indicated that the mobile phone based SCADA integration using the GPRS or WAP transfer scheme could enhance the performance of the crane in a day without causing an increase in the response times of SCADA functions. The operator can visualize and modify the plant parameters using his mobile phone, without reaching the site. In this way maintenance costs are reduced and productivity is increased.
Detecting Peer-to-Peer Botnets in SCADA Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Huan; Cheng, Liang; Chuah, Mooi Choo
Supervisory Control and Data Acquisition (SCADA) systems monitor and control critical infrastructure such as the smart grid. As SCADA systems become increasingly interconnected and adopt more and more cyber-enabled components, the risks of cyber attacks become a major concern. Due to their decentralized organization, peer-to-peer (P2P) botnets are resilient to many existing takedown measures and can be exploited as an effective way to launch cyber attacks on SCADA systems. However, little work has been done to detect P2P botnets in SCADA systems, which carry traffic flows with characteristics significantly different from the Internet. In this paper, we design a P2P-botnetmore » detection method for SCADA systems, leveraging built-in traffic monitoring capabilities of SCADA networking devices. The proposed method consists of two stages. In the first stage, we design a simple feature test to filter out non-P2P hosts, which significantly reduces the data volume for P2P-botnet identification. In the second stage, we jointly consider flow-based and connectivity-based features that effectively set apart bots from benign hosts. We propose to use unsupervised learning for P2P-botnet identification, which not only identifies known P2P botnets but also captures newly emerged ones. Our simulation results show that the proposed system achieves high detection rates with very few false positives. Furthermore, our evaluation shows that the proposed method can detect hosts running P2P SCADA applications that are infected by P2P bots.« less
SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gordon Rueff; Lyle Roybal; Denis Vollmer
2013-01-01
There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on howmore » to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.« less
Earthquake Risk Reduction to Istanbul Natural Gas Distribution Network
NASA Astrophysics Data System (ADS)
Zulfikar, Can; Kariptas, Cagatay; Biyikoglu, Hikmet; Ozarpa, Cevat
2017-04-01
Earthquake Risk Reduction to Istanbul Natural Gas Distribution Network Istanbul Natural Gas Distribution Corporation (IGDAS) is one of the end users of the Istanbul Earthquake Early Warning (EEW) signal. IGDAS, the primary natural gas provider in Istanbul, operates an extensive system 9,867km of gas lines with 750 district regulators and 474,000 service boxes. The natural gas comes to Istanbul city borders with 70bar in 30inch diameter steel pipeline. The gas pressure is reduced to 20bar in RMS stations and distributed to district regulators inside the city. 110 of 750 district regulators are instrumented with strong motion accelerometers in order to cut gas flow during an earthquake event in the case of ground motion parameters exceeds the certain threshold levels. Also, state of-the-art protection systems automatically cut natural gas flow when breaks in the gas pipelines are detected. IGDAS uses a sophisticated SCADA (supervisory control and data acquisition) system to monitor the state-of-health of its pipeline network. This system provides real-time information about quantities related to pipeline monitoring, including input-output pressure, drawing information, positions of station and RTU (remote terminal unit) gates, slum shut mechanism status at 750 district regulator sites. IGDAS Real-time Earthquake Risk Reduction algorithm follows 4 stages as below: 1) Real-time ground motion data transmitted from 110 IGDAS and 110 KOERI (Kandilli Observatory and Earthquake Research Institute) acceleration stations to the IGDAS Scada Center and KOERI data center. 2) During an earthquake event EEW information is sent from IGDAS Scada Center to the IGDAS stations. 3) Automatic Shut-Off is applied at IGDAS district regulators, and calculated parameters are sent from stations to the IGDAS Scada Center and KOERI. 4) Integrated building and gas pipeline damage maps are prepared immediately after the earthquake event. The today's technology allows to rapidly estimate the expected level of shaking when an earthquake starts to occur. However, in Istanbul case for a potential Marmara Sea Earthquake, the time is very limited even to estimate the level of shaking. The robust threshold based EEW system is only algorithm for such a near source event to activate automatic shut-off mechanism in the critical infrastructures before the damaging waves arrive. This safety measure even with a few seconds of early warning time will help to mitigate potential damages and secondary hazards.
Using SCADA Data, Field Studies, and Real-Time Modeling to ...
EPA has been providing technical assistance to the City of Flint and the State of Michigan in response to the drinking water lead contamination incident. Responders quickly recognized the need for a water distribution system hydraulic model to provide insight on flow patterns and water quality as well as to evaluate changes being made to the system operation to enhance corrosion control and improve chlorine residuals. EPA partnered with the City of Flint and the Michigan Department of Environmental Quality to update and calibrate an existing hydraulic model. The City provided SCADA data, GIS data, customer billing data, valve status data, design diagrams, and information on operations. Team members visited all facilities and updated pump and valve types, sizes, settings, elevations, and pump discharge curves. Several technologies were used to support this work including the EPANET-RTX based Polaris real-time modeling software, WaterGEMS, ArcGIS, EPANET, and RTX:LINK. Field studies were conducted to collect pressure and flow data from more than 25 locations throughout the distribution system. An assessment of the model performance compared model predictions for flow, pressure, and tank levels to SCADA and field data, resulting in error measurements for each data stream over the time period analyzed. Now, the calibrated model can be used with a known confidence in its performance to evaluate hydraulic and water quality problems, and the model can be easily
Drainpipe network management information system design based on GIS and SCADA technique
NASA Astrophysics Data System (ADS)
Gu, Ze-Yu; Zhao, De-An
2011-02-01
Achieving urban drainpipe network integration of geographical information system (GIS) and supervisory control and data acquisition (SCADA) technology is described in this paper. The system design's plans are put forward, which have realized GIS and SCADA system supplementary in the technology and strengthened the model visible analysis ability. It is verified by practical cases that the system has more practical values and a good prospect.
Cybersecurity of Critical Control Networks
2015-07-14
project are included below. The tasks include work in link encryption for existing legacy SCADA equipment, where we continue to develop lightweight...language for authoring and monitoring compliance of SCADA systems, including technologies for a “policy monitor” which reports out on any observance issues...Acquisition ( SCADA ). Details of each project are included below. The tasks include work in link encryption for existing legacy SCADA equipment
Using State Estimation Residuals to Detect Abnormal SCADA Data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ma, Jian; Chen, Yousu; Huang, Zhenyu
2010-04-30
Detection of abnormal supervisory control and data acquisition (SCADA) data is critically important for safe and secure operation of modern power systems. In this paper, a methodology of abnormal SCADA data detection based on state estimation residuals is presented. Preceded with a brief overview of outlier detection methods and bad SCADA data detection for state estimation, the framework of the proposed methodology is described. Instead of using original SCADA measurements as the bad data sources, the residuals calculated based on the results of the state estimator are used as the input for the outlier detection algorithm. The BACON algorithm ismore » applied to the outlier detection task. The IEEE 118-bus system is used as a test base to evaluate the effectiveness of the proposed methodology. The accuracy of the BACON method is compared with that of the 3-σ method for the simulated SCADA measurements and residuals.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marco Carvalho; Richard Ford
2012-05-14
Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-criticalmore » monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).« less
Susceptibility of SCADA systems and the energy sector
NASA Astrophysics Data System (ADS)
Goike, Lindsay
The research in this paper focused on analyzing SCADA systems in the energy sector for susceptibility to cyber attacks, in furtherance of providing suggestions to mitigate current and future cyber attacks. The research will be addressing the questions: how are SCADA systems susceptible to cyber attacks, and what are the suggested ways to mitigate both current and future cyber attacks. The five main categories of security vulnerabilities facing current SCADA systems were found to be: connectivity to the Internet, failure to plan, interdependency of sectors, numerous different types of threats, and outdated software. Some of the recommendations mentioned to mitigate current and future risks were: virtual private networks, risk assessments, increased physical security, updating of software, and firewalls.
Applying New Network Security Technologies to SCADA Systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P
2006-11-01
Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators.more » 4This page intentionally left blank.« less
2011-03-01
Byres, E. J., Lowe, J. (2004). The Myths and facts behind cyber security risks for industrial control systems . Berlin, Germany: VDE 2004 Congress...ACQUISITION (SCADA) SYSTEM THESIS Jason R. Nielsen, Major, USAF AFIT/GCO/ENG/11-10 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE...DATA ACQUISITION (SCADA) SYSTEM THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of
Internet SCADA Utilizing API's as Data Source
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Haeng-Kon; Kim, Tai-Hoon
An Application programming interface or API is an interface implemented by a software program that enables it to interact with other software. Many companies provide free API services which can be utilized in Control Systems. SCADA is an example of a control system and it is a system that collects data from various sensors at a factory, plant or in other remote locations and then sends this data to a central computer which then manages and controls the data. In this paper, we designed a scheme for Weather Condition in Internet SCADA Environment utilizing data from external API services. The scheme was designed to double check the weather information in SCADA.
Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research
NASA Astrophysics Data System (ADS)
Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne
This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.
Methods and tools for profiling and control of distributed systems
NASA Astrophysics Data System (ADS)
Sukharev, R.; Lukyanchikov, O.; Nikulchev, E.; Biryukov, D.; Ryadchikov, I.
2018-02-01
This article is devoted to the topic of profiling and control of distributed systems. Distributed systems have a complex architecture, applications are distributed among various computing nodes, and many network operations are performed. Therefore, today it is important to develop methods and tools for profiling distributed systems. The article analyzes and standardizes methods for profiling distributed systems that focus on simulation to conduct experiments and build a graph model of the system. The theory of queueing networks is used for simulation modeling of distributed systems, receiving and processing user requests. To automate the above method of profiling distributed systems the software application was developed with a modular structure and similar to a SCADA-system.
7 CFR 1726.176 - Communications and control facilities.
Code of Federal Regulations, 2012 CFR
2012-01-01
... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...
7 CFR 1726.176 - Communications and control facilities.
Code of Federal Regulations, 2014 CFR
2014-01-01
... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...
7 CFR 1726.176 - Communications and control facilities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...
7 CFR 1726.176 - Communications and control facilities.
Code of Federal Regulations, 2013 CFR
2013-01-01
... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...
Design of virtual SCADA simulation system for pressurized water reactor
NASA Astrophysics Data System (ADS)
Wijaksono, Umar; Abdullah, Ade Gafar; Hakim, Dadang Lukman
2016-02-01
The Virtual SCADA system is a software-based Human-Machine Interface that can visualize the process of a plant. This paper described the results of the virtual SCADA system design that aims to recognize the principle of the Nuclear Power Plant type Pressurized Water Reactor. This simulation uses technical data of the Nuclear Power Plant Unit Olkiluoto 3 in Finland. This device was developed using Wonderware Intouch, which is equipped with manual books for each component, animation links, alarm systems, real time and historical trending, and security system. The results showed that in general this device can demonstrate clearly the principles of energy flow and energy conversion processes in Pressurized Water Reactors. This virtual SCADA simulation system can be used as instructional media to recognize the principle of Pressurized Water Reactor.
Using Physical Models for Anomaly Detection in Control Systems
NASA Astrophysics Data System (ADS)
Svendsen, Nils; Wolthusen, Stephen
Supervisory control and data acquisition (SCADA) systems are increasingly used to operate critical infrastructure assets. However, the inclusion of advanced information technology and communications components and elaborate control strategies in SCADA systems increase the threat surface for external and subversion-type attacks. The problems are exacerbated by site-specific properties of SCADA environments that make subversion detection impractical; and by sensor noise and feedback characteristics that degrade conventional anomaly detection systems. Moreover, potential attack mechanisms are ill-defined and may include both physical and logical aspects.
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept
NASA Astrophysics Data System (ADS)
Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto
We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere with the correct behavior of the system. The proposed IDS detects such attacks thanks to an internal representation of the controlled SCADA system and a corresponding rule language, powerful enough to express the system's critical states. Furthermore, we detail the implementation and provide experimental comparative results.
SCADA OPERATOR TRAINING TOOL APPLIED TO THE CENTRAL ARIZONA IRRIGATION AND DRAINAGE DISTRICT
USDA-ARS?s Scientific Manuscript database
Many irrigation districts use Supervisory Control and Data Acquisition (SCADA) software to manage their canal systems. Whether homegrown or commercial, these programs require a significant amount of training for new operators. While some SCADA operators are hired with extensive field experience, o...
Design of virtual SCADA simulation system for pressurized water reactor
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wijaksono, Umar, E-mail: umar.wijaksono@student.upi.edu; Abdullah, Ade Gafar; Hakim, Dadang Lukman
The Virtual SCADA system is a software-based Human-Machine Interface that can visualize the process of a plant. This paper described the results of the virtual SCADA system design that aims to recognize the principle of the Nuclear Power Plant type Pressurized Water Reactor. This simulation uses technical data of the Nuclear Power Plant Unit Olkiluoto 3 in Finland. This device was developed using Wonderware Intouch, which is equipped with manual books for each component, animation links, alarm systems, real time and historical trending, and security system. The results showed that in general this device can demonstrate clearly the principles ofmore » energy flow and energy conversion processes in Pressurized Water Reactors. This virtual SCADA simulation system can be used as instructional media to recognize the principle of Pressurized Water Reactor.« less
Using State Estimation Residuals to Detect Abnormal SCADA Data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ma, Jian; Chen, Yousu; Huang, Zhenyu
2010-06-14
Detection of manipulated supervisory control and data acquisition (SCADA) data is critically important for the safe and secure operation of modern power systems. In this paper, a methodology of detecting manipulated SCADA data based on state estimation residuals is presented. A framework of the proposed methodology is described. Instead of using original SCADA measurements as the bad data sources, the residuals calculated based on the results of the state estimator are used as the input for the outlier detection process. The BACON algorithm is applied to detect outliers in the state estimation residuals. The IEEE 118-bus system is used asmore » a test case to evaluate the effectiveness of the proposed methodology. The accuracy of the BACON method is compared with that of the 3-σ method for the simulated SCADA measurements and residuals.« less
Real-Time SCADA Cyber Protection Using Compression Techniques
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lyle G. Roybal; Gordon H Rueff
2013-11-01
The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welchmore » (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.« less
Anomaly Detection in Power Quality at Data Centers
NASA Technical Reports Server (NTRS)
Grichine, Art; Solano, Wanda M.
2015-01-01
The goal during my internship at the National Center for Critical Information Processing and Storage (NCCIPS) is to implement an anomaly detection method through the StruxureWare SCADA Power Monitoring system. The benefit of the anomaly detection mechanism is to provide the capability to detect and anticipate equipment degradation by monitoring power quality prior to equipment failure. First, a study is conducted that examines the existing techniques of power quality management. Based on these findings, and the capabilities of the existing SCADA resources, recommendations are presented for implementing effective anomaly detection. Since voltage, current, and total harmonic distortion demonstrate Gaussian distributions, effective set-points are computed using this model, while maintaining a low false positive count.
Designing a SCADA system simulator for fast breeder reactor
NASA Astrophysics Data System (ADS)
Nugraha, E.; Abdullah, A. G.; Hakim, D. L.
2016-04-01
SCADA (Supervisory Control and Data Acquisition) system simulator is a Human Machine Interface-based software that is able to visualize the process of a plant. This study describes the results of the process of designing a SCADA system simulator that aims to facilitate the operator in monitoring, controlling, handling the alarm, accessing historical data and historical trend in Nuclear Power Plant (NPP) type Fast Breeder Reactor (FBR). This research used simulation to simulate NPP type FBR Kalpakkam in India. This simulator was developed using Wonderware Intouch software 10 and is equipped with main menu, plant overview, area graphics, control display, set point display, alarm system, real-time trending, historical trending and security system. This simulator can properly simulate the principle of energy flow and energy conversion process on NPP type FBR. This SCADA system simulator can be used as training media for NPP type FBR prospective operators.
Kerman Photovoltaic Power Plant R&D data collection computer system operations and maintenance
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rosen, P.B.
1994-06-01
The Supervisory Control and Data Acquisition (SCADA) system at the Kerman PV Plant monitors 52 analog, 44 status, 13 control, and 4 accumulator data points in real-time. A Remote Terminal Unit (RTU) polls 7 peripheral data acquisition units that are distributed throughout the plant once every second, and stores all analog, status, and accumulator points that have changed since the last scan. The R&D Computer, which is connected to the SCADA RTU via a RS-232 serial link, polls the RTU once every 5-7 seconds and records any values that have changed since the last scan. A SCADA software package calledmore » RealFlex runs on the R&D computer and stores all updated data values taken from the RTU, along with a time-stamp for each, in a historical real-time database. From this database, averages of all analog data points and snapshots of all status points are generated every 10 minutes and appended to a daily file. These files are downloaded via modem by PVUSA/Davis staff every day, and the data is placed into the PVUSA database.« less
Supervisory Control and Data Acquisition System | Energy Systems
Integration Facility | NREL Supervisory Control and Data Acquisition System Supervisory Control supervisory control and data acquisition (SCADA) system monitors and controls safety systems and gathers real Energy Systems Integration Facility control room. The Energy Systems Integration Facility's SCADA system
Production Facility SCADA Design Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dale, Gregory E.; Holloway, Michael Andrew; Baily, Scott A.
2015-03-23
The following report covers FY 14 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production facility. The goal of this effort is to provide Northstar with a baseline system design.
Using SCADA Data, Field Studies, and Real-Time Modeling to Calibrate Flint's Hydraulic Model
EPA has been providing technical assistance to the City of Flint and the State of Michigan in response to the drinking water lead contamination incident. Responders quickly recognized the need for a water distribution system hydraulic model to provide insight on flow patterns an...
Sandia SCADA Program -- High Surety SCADA LDRD Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
CARLSON, ROLF E.
2002-04-01
Supervisory Control and Data Acquisition (SCADA) systems are a part of the nation's critical infrastructure that is especially vulnerable to attack or disruption. Sandia National Laboratories is developing a high-security SCADA specification to increase the national security posture of the U.S. Because SCADA security is an international problem and is shaped by foreign and multinational interests, Sandia is working to develop a standards-based solution through committees such as the IEC TC 57 WG 15, the IEEE Substation Committee, and the IEEE P1547-related activity on communications and controls. The accepted standards are anticipated to take the form of a Common Criteriamore » Protection Profile. This report provides the status of work completed and discusses several challenges ahead.« less
Pipeline scada upgrade uses satellite terminal system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Conrad, W.; Skovrinski, J.R.
In the recent automation of its supervisory control and data acquisition (scada) system, Transwestern Pipeline Co. has become the first to use very small aperture satellite terminals (VSAT's) for scada. A subsidiary of Enron Interstate Pipeline, Houston, Transwestern moves natural gas through a 4,400-mile system from West Texas, New Mexico, and Oklahoma to southern California markets. Transwestern's modernization, begun in November 1985, addressed problems associated with its aging control equipment which had been installed when the compressor stations were built in 1960. Over the years a combination of three different systems had been added. All were cumbersome to maintain andmore » utilized outdated technology. Problems with reliability, high maintenance time, and difficulty in getting new parts were determining factors in Transwestern's decision to modernize its scada system. In addition, the pipeline was anticipating moving its control center from Roswell, N.M., to Houston and believed it would be impossible to marry the old system with the new computer equipment in Houston.« less
Industrial Control Systems/SCADA systems risk assessment in the energy sector
NASA Astrophysics Data System (ADS)
Falodun, Babatunde
The energy sector is one of the most critical components of our national infrastructure. It not only provides the electrical power and petroleum required to run day-to-day operations and mechanisms in society, it's also an important element that directly impacts the economy with regard to growth and stability. Industrial Control Systems (ICS) /Supervisory Control and Data Acquisition Systems (SCADA) are computerized mechanisms, they are both software and hardware that are used to control real time processes and operations in power plants and oil production facilities. A significant attack on these control systems that leads to widespread disruption of energy could result in catastrophic consequences for any major city and even the nation. This research paper explores cyber threats and vulnerabilities faced by ICS/SCADA systems in the energy sector and also highlights possible outcomes of a successful breach. Furthermore, the research underscores mitigation strategies that could be used to prevent and respond to an attack. Keywords: Cybersecurity, SCADA, Cyber Attacks, Threats, Vulnerabilities, Risk Assessment, Dr. Albert Orbinati.
NASA Astrophysics Data System (ADS)
Yu, Zhang; Xiaohui, Song; Jianfang, Li; Fei, Gao
2017-05-01
Cable overheating will lead to the cable insulation level reducing, speed up the cable insulation aging, even easy to cause short circuit faults. Cable overheating risk identification and warning is nessesary for distribution network operators. Cable overheating risk warning method based on impedance parameter estimation is proposed in the paper to improve the safty and reliability operation of distribution network. Firstly, cable impedance estimation model is established by using least square method based on the data from distribiton SCADA system to improve the impedance parameter estimation accuracy. Secondly, calculate the threshold value of cable impedance based on the historical data and the forecast value of cable impedance based on the forecasting data in future from distribiton SCADA system. Thirdly, establish risks warning rules library of cable overheating, calculate the cable impedance forecast value and analysis the change rate of impedance, and then warn the overheating risk of cable line based on the overheating risk warning rules library according to the variation relationship between impedance and line temperature rise. Overheating risk warning method is simulated in the paper. The simulation results shows that the method can identify the imedance and forecast the temperature rise of cable line in distribution network accurately. The result of overheating risk warning can provide decision basis for operation maintenance and repair.
ADMS State of the Industry and Gap Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Agalgaonkar, Yashodhan P.; Marinovici, Maria C.; Vadari, Subramanian V.
2016-03-31
An Advanced distribution management system (ADMS) is a platform for optimized distribution system operational management. This platform comprises of distribution management system (DMS) applications, supervisory control and data acquisition (SCADA), outage management system (OMS), and distributed energy resource management system (DERMS). One of the primary objectives of this work is to study and analyze several ADMS component and auxiliary systems. All the important component and auxiliary systems, SCADA, GISs, DMSs, AMRs/AMIs, OMSs, and DERMS, are discussed in this report. Their current generation technologies are analyzed, and their integration (or evolution) with an ADMS technology is discussed. An ADMS technology statemore » of the art and gap analysis is also presented. There are two technical gaps observed. The integration challenge between the component operational systems is the single largest challenge for ADMS design and deployment. Another significant challenge noted is concerning essential ADMS applications, for instance, fault location, isolation, and service restoration (FLISR), volt-var optimization (VVO), etc. There are a relatively small number of ADMS application developers as ADMS software platform is not open source. There is another critical gap and while not being technical in nature (when compared the two above) is still important to consider. The data models currently residing in utility GIS systems are either incomplete or inaccurate or both. This data is essential for planning and operations because it is typically one of the primary sources from which power system model are created. To achieve the full potential of ADMS, the ability to execute acute Power Flow solution is an important pre-requisite. These critical gaps are hindering wider Utility adoption of an ADMS technology. The development of an open architecture platform can eliminate many of these barriers and also aid seamless integration of distribution Utility legacy systems with an ADMS.« less
Fundamentals of SCADA and automated meter reading
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kwok, A.
1992-02-01
This paper discusses SCADA systems allow users to control and acquire data from remote facilities such as compressors, pressure-regulating stations, control valves and measurement stations. In general, a SCADA system performs functions in sequential control, continuous control, supervisory setpoint control and data acquisitions. AMR systems allow users to obtain up-to-date information on their gas demand. When AMR was in its infancy, equipment was designed only to read and record gas consumption values. The basic function of an early AMR system was to read gas volume at a fixed interval and record the data in its memory until it communicated withmore » a central receiving facility.« less
Superstorm Sandy: Implications For Designing A PostCyber Attack Power Restoration System
2016-03-31
for such progress. Phillip Allison, “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems: Building Security into Your Industrial...TechSvcs/Multi-stateFleetResponseWorkshopReport-02-21-13.pdf. Allison, Phillip. “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems
Real-Time Monitoring of Scada Based Control System for Filling Process
NASA Astrophysics Data System (ADS)
Soe, Aung Kyaw; Myint, Aung Naing; Latt, Maung Maung; Theingi
2008-10-01
This paper is a design of real-time monitoring for filling system using Supervisory Control and Data Acquisition (SCADA). The monitoring of production process is described in real-time using Visual Basic.Net programming under Visual Studio 2005 software without SCADA software. The software integrators are programmed to get the required information for the configuration screens. Simulation of components is expressed on the computer screen using parallel port between computers and filling devices. The programs of real-time simulation for the filling process from the pure drinking water industry are provided.
Design and Implementation of a Secure Modbus Protocol
NASA Astrophysics Data System (ADS)
Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto
The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.
NASA Astrophysics Data System (ADS)
Topolskiy, D.; Topolskiy, N.; Solomin, E.; Topolskaya, I.
2016-04-01
In the present paper the authors discuss some ways of solving energy saving problems in mechanical engineering. In authors' opinion one of the ways of solving this problem is integrated modernization of power engineering objects of mechanical engineering companies, which should be intended for the energy supply control efficiency increase and electric energy commercial accounting improvement. The author have proposed the usage of digital current and voltage transformers for these purposes. To check the compliance of this equipment with the IEC 61850 International Standard, we have built a mathematic model of the data exchange process between measuring transformers and a universal SCADA-system. The results of modeling show that the discussed equipment corresponds to the mentioned Standard requirements and the usage of the universal SCADA-system for these purposes is preferable and economically reasonable. In modeling the authors have used the following software: MasterScada, Master OPC_DI_61850, OPNET.
Analysis of a SCADA System Anomaly Detection Model Based on Information Entropy
2014-03-27
20 Intrusion Detection...alarms ( Rem ). ............................................................................................................. 86 Figure 25. TP% for...literature concerning the focus areas of this research. The focus areas include SCADA vulnerabilities, information theory, and intrusion detection
Prediction of contaminant fate and transport in potable water systems using H2OFate
NASA Astrophysics Data System (ADS)
Devarakonda, Venkat; Manickavasagam, Sivakumar; VanBlaricum, Vicki; Ginsberg, Mark
2009-05-01
BlazeTech has recently developed a software called H2OFate to predict the fate and transport of chemical and biological contaminants in water distribution systems. This software includes models for the reactions of these contaminants with residual disinfectant in bulk water and at the pipe wall, and their adhesion/reactions with the pipe walls. This software can be interfaced with sensors through SCADA systems to monitor water distribution networks for contamination events and activate countermeasures, as needed. This paper presents results from parametric calculations carried out using H2OFate for a simulated contaminant release into a sample water distribution network.
NASA Technical Reports Server (NTRS)
Beach, R. F.; Kimnach, G. L.; Jett, T. A.; Trash, L. M.
1989-01-01
The Lewis Research Center's Power Management and Distribution (PMAD) System testbed and its use in the evaluation of control concepts applicable to the NASA Space Station Freedom electric power system (EPS) are described. The facility was constructed to allow testing of control hardware and software in an environment functionally similar to the space station electric power system. Control hardware and software have been developed to allow operation of the testbed power system in a manner similar to a supervisory control and data acquisition (SCADA) system employed by utility power systems for control. The system hardware and software are described.
Smith, P J; Vigneswaran, S; Ngo, H H; Nguyen, H T; Ben-Aim, R
2006-01-01
The application of automation and supervisory control and data acquisition (SCADA) systems to municipal water and wastewater treatment plants is rapidly increasing. However, the application of these systems is less frequent in the research and development phases of emerging treatment technologies used in these industries. This study involved the implementation of automation and a SCADA system to the submerged membrane adsorption hybrid system for use in a semi-pilot scale research project. An incremental approach was used in the development of the automation and SCADA systems, leading to the development of two new control systems. The first system developed involved closed loop control of the backwash initiation, based upon a pressure increase, leading to productivity improvements as the backwash is only activated when required, not at a fixed time. This system resulted in a 40% reduction in the number of backwashes required and also enabled optimised operations under unsteady concentrations of wastewater. The second system developed involved closed loop control of the backwash duration, whereby the backwash was terminated when the pressure reached a steady state. This system resulted in a reduction of the duration of the backwash of up to 25% and enabled optimised operations as the foulant build-up within the reactor increased.
NASA Astrophysics Data System (ADS)
Leahy, Kevin; Gallagher, Colm; Bruton, Ken; O'Donovan, Peter; O'Sullivan, Dominic T. J.
2017-11-01
Using 10-minute wind turbine SCADA data for fault prediction offers an attractive way of gaining additional prognostic capabilities without needing to invest in extra hardware. To use these data-driven methods effectively, the historical SCADA data must be labelled with the periods when the turbine was in faulty operation as well the sub-system the fault was attributed to. Manually identifying faults using maintenance logs can be effective, but is also highly time consuming and tedious due to the disparate nature of these logs across manufacturers, operators and even individual maintenance events. Turbine alarm systems can help to identify these periods, but the sheer volume of alarms and false positives generated makes analysing them on an individual basis ineffective. In this work, we present a new method for automatically identifying historical stoppages on the turbine using SCADA and alarms data. Each stoppage is associated with either a fault in one of the turbine’s sub-systems, a routine maintenance activity, a grid-related event or a number of other categories. This is then checked against maintenance logs for accuracy and the labelled data fed into a classifier for predicting when these stoppages will occur. Results show that the automated labelling process correctly identifies each type of stoppage, and can be effectively used for SCADA-based prediction of turbine faults.
NASA Astrophysics Data System (ADS)
Adrian-Lucian, Cococeanu; Ioana-Alina, Cretan; Ivona, Cojocinescu Mihaela; Teodor Eugen, Man; Narcis, Pelea George
2017-10-01
The water supply system in Timisoara Municipality is insured with about 25-30 % of the water demand from wells. The underground water headed to the water treatment plant in order to ensure equal distribution and pressure to consumers. The treatment plants used are Urseni and Ronaţ, near Timisoara, in Timis County. In Timisoara groundwater represents an alternative source for water supply and complementary to the surface water source. The present paper presents a case study with proposal and solutions for rehabilitation /equipment /modernization/ automation of water drilling in order to ensure that the entire system can be monitored and controlled remotely through SCADA (Supervisory control and data acquisition) system. The data collected from the field are designed for online efficiency monitoring regarding the energy consumption and water flow intake, performance indicators such as specific energy consumption KW/m3 and also in order to create a hydraulically system of the operating area to track the behavior of aquifers in time regarding the quality and quantity aspects.
A Taxonomy of Attacks on the DNP3 Protocol
NASA Astrophysics Data System (ADS)
East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet
Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.
Multiple Flow Loop SCADA System Implemented on the Production Prototype Loop
DOE Office of Scientific and Technical Information (OSTI.GOV)
Baily, Scott A.; Dalmas, Dale Allen; Wheat, Robert Mitchell
2015-11-16
The following report covers FY 15 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production prototype gas flow loop. The goal of this effort is to expand the existing system to include a second flow loop with a larger production-sized blower. Besides testing the larger blower, this system will demonstrate the scalability of our solution to multiple flow loops.
SCADA Application for ACTS Technology
NASA Technical Reports Server (NTRS)
Fairbanks, Barry
1992-01-01
The results of a system level study done by Hughes Network Systems for NASA are presented. For the supervisory control and data acquisition (SCADA) application, use of Ka-band spot beam satellite technology associated with NASA's Advanced Communication Technology Satellite (ACTS) offers a reduction in Earth station antenna size and transmitter power that may translate into lower system costs. The approaches taken to determine commercial potential of the system are described.
Automated turn pike using PLC and SCADA
NASA Astrophysics Data System (ADS)
Silpa Sreedhar, P.; Aiswarya, P.; Kathirvelan, J.
2017-11-01
We propose a smart turnpike based on Programmable Logic Controller (PLC) and Supervisory Control and Data Acquisition Systems (SCADA) in this paper. In this work, the basic idea is to measure the weight of the vehicles and classify them according to its weight to the respective lanes. It is difficult for the turnpike people to monitor the whole process all the time. So, this PLC based diversion system can be implemented in turnpikes to reduce the difficulties. This method will work based on weight sensors (piezo-resistive) whose output will be fed to a PLC, which will control the vehicle diversion. Using SCADA software, the whole process can be monitored from a remote area. The algorithm developed in this successfully installed in real time system.
Online location of a break in water distribution systems
NASA Astrophysics Data System (ADS)
Liang, Jianwen; Xiao, Di; Zhao, Xinhua; Zhang, Hongwei
2003-08-01
Breaks often occur to urban water distribution systems under severely cold weather, or due to corrosion of pipes, deformation of ground, etc., and the breaks cannot easily be located, especially immediately after the events. This paper develops a methodology to locate a break in a water distribution system by monitoring water pressure online at some nodes in the water distribution system. For the purpose of online monitoring, supervisory control and data acquisition (SCADA) technology can well be used. A neural network-based inverse analysis method is constructed for locating the break based on the variation of water pressure. The neural network is trained by using analytically simulated data from the water distribution system, and validated by using a set of data that have never been used in the training. It is found that the methodology provides a quick, effective, and practical way in which a break in a water distribution system can be located.
Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yan, Guanhua; Nicol, David M; Jin, Dong
2010-12-16
The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relaymore » is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.« less
NASA Astrophysics Data System (ADS)
Dulǎu, Lucian Ioan
2015-12-01
This paper describes the simulation of a microgrid system with storage technologies. The microgrid comprises 6 distributed generators (DGs), 3 loads and a 150 kW storage unit. The installed capacity of the generators is 1100 kW, while the total load demand is 900 kW. The simulation is performed by using a SCADA software, considering the power generation costs, the loads demand and the system's power losses. The generators access the system in order of their power generation cost. The simulation is performed for the entire day.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jared Verba; Michael Milvich
2008-05-01
Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting maliciousmore » activity.« less
2010-03-01
CODIFYING INFORMATION ASSURANCE CONTROLS FOR DEPARTMENT OF DEFENSE (DOD) SUPERVISORY CONTROL AND DATA...Force, Department of Defense, or the U.S. Government. AFIT/GCO/ENG/10-13 CODIFYING INFORMATION ASSURANCE CONTROLS FOR DEPARTMENT OF...DEFENSE (DOD) SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) SYSTEMS THESIS Presented to the Faculty Department of Electrical and Computer
Expanding Combat Power Through Military Cyberpower Theory
2015-04-02
systems (ICS) and supervisory control and data acquisition systems ( SCADA ) are public-facing, providing more avenues of approach for an adversary. ICS...and SCADA are the two primary means for cyber adversaries to achieve direct physical effects through cyberspace. Strategic Attribution. From a...REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to
Resilient Control and Intrusion Detection for SCADA Systems
2014-05-01
Control. McGraw-Hill, 1996. [89] L. Greenemeier. Robots arrive at fukushima nuclear site with unclear mission. Scientific American, 2011. [90] M. Grimes...security engineering task. SCADA systems are hard real-time systems [251] because the completion of an operation after its deadline is considered useless and...that the attacker, after gaining unauthenticated access, could change the operator display values so that when an alarm actually goes off, the human
Renewable Energy SCADA/Training Using NASA's Advanced Technology Communication Satellite
NASA Technical Reports Server (NTRS)
Kalu, A.; Emrich, C.; Ventre, G.; Wilson, W.; Acosta, Roberto (Technical Monitor)
2000-01-01
The lack of electrical energy in the rural communities of developing countries is well known, as is the economic unfeasibility of providing much needed energy to these regions via electric grids. Renewable energy (RE) can provide an economic advantage over conventional forms in meeting some of these energy needs. The use of a Supervisory Control and Data Acquisition (SCADA) arrangement via satellite could enable experts at remote locations to provide technical assistance to local trainees while they acquire a measure of proficiency with a newly installed RE system through hands-on training programs using the same communications link. Upon full mastery of the technologies, indigenous personnel could also employ similar SCADA arrangements to remotely monitor and control their constellation of RE systems. Two separate ACTS technology verification experiments (TVEs) have demonstrated that the portability of the Ultra Small Aperture Terminal (USAT) and the versatility of NASA's Advanced Communications Technology Satellite (ACTS), as well as the advantages of Ka band satellites, can be invaluable in providing energy training via distance education (DE), and for implementing renewable energy system SCADA. What has not been tested is the capabilities of these technologies for a simultaneous implementation of renewable energy DE and SCADA. Such concurrent implementations will be useful for preparing trainees in developing countries for their eventual SCADA operations. The project described in this correspondence is the first effort, to our knowledge, in this specific TVE. The setup for this experiment consists of a one-Watt USAT located at Florida Solar Energy Center (FSEC) connected to two satellite modems tuned to different frequencies to establish two duplex ACTS Ka-band communication channels. A short training program on operation and maintenance of the system will be delivered while simultaneously monitoring and controlling the hybrid using the same satellite communications link. The trainees will include faculty and students from Savannah State University, and staff from FSEC. An interactive internet link will be used to allow faculty from the University of West Indies to participate in the training session.
A Survey of Research in Supervisory Control and Data Acquisition (SCADA)
2014-09-01
distance learning .2 The data acquired may be operationally oriented and used to better run the system, or it could be strategic in nature and used to...Technically the SCADA system is composed of the information technology (IT) that provides the human- machine interface (HMI) and stores and analyzes the data...systems work by learning what normal or benign traffic is and reporting on any abnormal traffic. These systems have the potential to detect zero-day
Programmable Logic Controller Modification Attacks for use in Detection Analysis
2014-03-27
and J. Lowe, “The Myths and Facts Behind Cyber Security Risks for Industrial Control Systems ,” in Proceedings of the VDE Kongress, vol. 116, 2004. [13...Feb 2014 Date 20 Feb 2014 Date 20 Feb 2014 Date AFIT-ENG-14-M-66 Abstract Unprotected Supervisory Control and Data Acquisition (SCADA) systems offer...control and monitor physical industrial processes. Although attacks targeting SCADA systems have increased, there has been little work exploring the
Testbeds for Assessing Critical Scenarios in Power Control Systems
NASA Astrophysics Data System (ADS)
Dondossola, Giovanna; Deconinck, Geert; Garrone, Fabrizio; Beitollahi, Hakem
The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility InfrastructurAL Resilience. The selected scenarios refer to power control systems encompassing information and communication security of SCADA systems for grid teleoperation, impact of attacks on inter-operator communications in power emergency conditions, impact of intentional faults on the secondary and tertiary control in power grids with distributed generators. Two testbeds have been developed for assessing the effect of the attacks and prototyping resilient architectures.
Online monitoring of seismic damage in water distribution systems
NASA Astrophysics Data System (ADS)
Liang, Jianwen; Xiao, Di; Zhao, Xinhua; Zhang, Hongwei
2004-07-01
It is shown that water distribution systems can be damaged by earthquakes, and the seismic damages cannot easily be located, especially immediately after the events. Earthquake experiences show that accurate and quick location of seismic damage is critical to emergency response of water distribution systems. This paper develops a methodology to locate seismic damage -- multiple breaks in a water distribution system by monitoring water pressure online at limited positions in the water distribution system. For the purpose of online monitoring, supervisory control and data acquisition (SCADA) technology can well be used. A neural network-based inverse analysis method is constructed for locating the seismic damage based on the variation of water pressure. The neural network is trained by using analytically simulated data from the water distribution system, and validated by using a set of data that have never been used in the training. It is found that the methodology provides an effective and practical way in which seismic damage in a water distribution system can be accurately and quickly located.
Parris Island Wastewater Treatment Plant SCADA Upgrades Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meador, Richard J.; Hatley, Darrel D.
2004-03-18
Marine Corp Recruit Depot (MCRD), Parris Island, SC, home of the Easter Recruiting Region Marine Corp Boot Camp, found itself in a situation common to Department of Defense (DOD) facilities. It had to deal with several different types of installed energy-related control systems that could not talk to each other. This situation was being exacerbated by the installation of a new and/or unique type of control system for every new building being constructed or older facility that was being upgraded. The Wastewater Treatment Facility (WWTF) and lift station controls were badly in need of a thorough inspection and a newmore » Supervisory Control and Data Acquisition (SCADA) system upgrade to meet environmental, safety, manpower, and maintenance concerns. A project was recently completed to implement such a wastewater treatment SCADA upgrade, which is compatible with other upgrades to the energy monitoring and control systems for Parris Island buildings and the Pacific Northwest National Laboratory (PNNL) Decision Support for Operations and Maintenance (DSOM) system installed at the Central Energy Plant (CEP). This project included design, specification, procurement, installation, and testing an upgraded SCADA alarm, process monitoring, and display system; and training WWTF operators in its operation. The ultimate goal of this and the other PNNL projects at Parris Island is to allow monitoring and control of energy and environmental components from a central location.« less
Zhao, Junbo; Wang, Shaobu; Mili, Lamine; ...
2018-01-08
Here, this paper develops a robust power system state estimation framework with the consideration of measurement correlations and imperfect synchronization. In the framework, correlations of SCADA and Phasor Measurements (PMUs) are calculated separately through unscented transformation and a Vector Auto-Regression (VAR) model. In particular, PMU measurements during the waiting period of two SCADA measurement scans are buffered to develop the VAR model with robustly estimated parameters using projection statistics approach. The latter takes into account the temporal and spatial correlations of PMU measurements and provides redundant measurements to suppress bad data and mitigate imperfect synchronization. In case where the SCADAmore » and PMU measurements are not time synchronized, either the forecasted PMU measurements or the prior SCADA measurements from the last estimation run are leveraged to restore system observability. Then, a robust generalized maximum-likelihood (GM)-estimator is extended to integrate measurement error correlations and to handle the outliers in the SCADA and PMU measurements. Simulation results that stem from a comprehensive comparison with other alternatives under various conditions demonstrate the benefits of the proposed framework.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhao, Junbo; Wang, Shaobu; Mili, Lamine
Here, this paper develops a robust power system state estimation framework with the consideration of measurement correlations and imperfect synchronization. In the framework, correlations of SCADA and Phasor Measurements (PMUs) are calculated separately through unscented transformation and a Vector Auto-Regression (VAR) model. In particular, PMU measurements during the waiting period of two SCADA measurement scans are buffered to develop the VAR model with robustly estimated parameters using projection statistics approach. The latter takes into account the temporal and spatial correlations of PMU measurements and provides redundant measurements to suppress bad data and mitigate imperfect synchronization. In case where the SCADAmore » and PMU measurements are not time synchronized, either the forecasted PMU measurements or the prior SCADA measurements from the last estimation run are leveraged to restore system observability. Then, a robust generalized maximum-likelihood (GM)-estimator is extended to integrate measurement error correlations and to handle the outliers in the SCADA and PMU measurements. Simulation results that stem from a comprehensive comparison with other alternatives under various conditions demonstrate the benefits of the proposed framework.« less
Acceptance Testing of a Satellite SCADA Photovoltaic-Diesel Hybrid System
NASA Technical Reports Server (NTRS)
Kalu, Alex; Acosta, R.; Durand, S.; Emrich, Carol; Ventre, G.; Wilson, W.
1999-01-01
Savannah State University (SSU) and the Florida Solar Energy Center (FSEC) have been participating in the NASA Advanced Communications Technology Satellite (ACTS) program for the last five years. This program was designed by NASA to help maintain U.S. leadership in commercial space communications by funding high-risk research, and to flight-test next-generation digital satellite components. Launched in 1993, ACTS is an U.S. government funded technology test-bed that incorporates high power Ka-band transponders, small spot beams, and on-board digital storage and switching technology. Associated with the spacecraft, is a prototype satellite control center that supports various application experiments. The SSU/FSEC application experiment is to developing a Photovoltaic-Diesel Hybrid Power system complete with satellite Supervisory Control and Data Acquisition (SCADA). The hybrid system was design to demonstrate the feasibility of using SCADA to maintain and operate remote village power systems. This configuration would enable experts at a central location to provide technical assistance to local technicians while they acquire a measure of proficiency with the hybrid system operation and maintenance. Upon full mastery of the technology, similar SCADA arrangement are planned to remotely monitor and control constellation of hybrid systems scattered overlarge rural areas. Two Orion Energy APEX-1000 hybrid systems were delivered in 1998, one was installed at SSU in eastern Georgia and the other was installed at FSEC in Central Florida. The project was designed to: (1) evaluate the performance of ACTS in a SCADA arrangement, (2) monitor the health and performance of all major hybrid subsystems, (3) investigate load control and battery charging strategies to maximize battery capacity and lifetime, and (4) develop satellite communication protocol. Preliminary results indicate that the hybrid design is suitable for satellite Supervisory Control and Data Acquisition. A modification to the controller software has produced a robust communication link capable of real time control and long term data collection.
NASA Astrophysics Data System (ADS)
Robertson, Jamie; Shinozuka, Masanobu; Wu, Felix
2011-04-01
When a lifeline system such as a water delivery network is damaged due to a severe earthquake, it is critical to identify its location and extent of the damage in real time in order to minimize the potentially disastrous consequence such damage could otherwise entail. This paper demonstrates how the degree of such minimization can be estimated qualitatively by using the water delivery system of Irvine Water Ranch District (IRWD) as testbed, when it is subjected to magnitude 6.6 San Joaquin Hills Earthquake. In this demonstration, we consider two cases when the IRWD system is equipped or not equipped with a next generation SCADA which consists of a network of MEMS acceleration sensors densely populated and optimally located. These sensors are capable of identifying the location and extent of the damage as well as transmitting the data to the SCADA center for monitoring and control.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lelic, Muhidin; Avramovic, Bozidar; Jiang, Tony
The objective of this project was to demonstrate functionality and performance of a Direct Non-iterative State Estimator (DNSE) integrated with NYPA’s Energy Management System (EMS) and with enhanced Real Time Dynamics Monitoring System (RTDMS) synchrophasor platform from Electric Power Group (EPG). DNSE is designed to overcome a major obstacle to operational use of Synchro-Phasor Management Systems (SPMS) by providing to synchrophasor management systems (SPMS) applications a consistent and a complete synchrophasor data foundation in the same way that a traditional EMS State Estimator (SE) provides to EMS applications. Specifically, DNSE is designed to use synchrophasor measurements collected by a centralmore » PDC, Supervisory Control and Data Acquisition (SCADA) measurements, and Energy Management System (EMS) network model, to obtain the complete state of the utility’s operating model at rates that are close to the synchrophasor data rates. In this way, the system is comprehensive in that it does not only cover the part of the network that is “visible” via synchrophasors, but also the part that is only “visible” through the SCADA measurements. Visualization needs associated with the use of DNSE results are fulfilled through suitably enhanced Real Time Dynamics Monitoring System (RTDMS), with the enhancements implemented by EPG. This project had the following goals in mind: To advance the deployment of commercial grade DNSE software application that relies on synchrophasor and SCADA data ; Apply DNSE at other utilities, to address a generic and fundamental need for “clean” operational data for synchrophasor applications; Provide means for “live” estimated data access by control system operators; Enhance potential for situational awareness through full system operational model coverage; Sub-second execution rate of the Direct Non-iterative State Estimator, eventually at a near-phasor data rate execution speed, i.e. < 0.1 sec. Anticipated benefits from this projects are: Enhanced reliability and improvements in the economic efficiency of bulk power system planning and operations; Providing “clean” data to other synchrophasor applications; Enhancement of situational awareness by providing the full operational model updated at near synchrophasor rate; A production-grade software tool that incorporate synchrophasor and SCADA data; Provides a basis for development of next generation monitoring and control applications, based on both SCADA and PMU data. Quanta Technology (QT) team worked in collaboration with Electric Power Group (EPG) whose team has enhanced its commercial Real Time Dynamics Monitoring System (RTDMS) to accommodate the requirements posed by DNSE application. EPG also provided its ePDC and Model-less Data Conditioning (PDVC) software for integration with DNSE+. QT developed the system requirements for DNSE; developed system architecture and defined interfaces between internal DNSE components. The core DNSE algorithm with all surrounding interfaces was named DNSE+. Since the DNSE development was done in a simulated system environment, QT used its PMU simulator that was enhanced during this project for development and factory acceptance testing (FAT). SCADA data in this stage was simulated by commercial PSS/e software. The output of DNSE are estimates of System states in C37.118-2 format, sent to RTDMS for further processing and display. As the number of these states is large, it was necessary to expand the C37.111-2 standard to accommodate large data sets. This enhancement was implemented in RTDMS. The demonstration of pre-production DNSE technology was done at NYPA using streaming field data from NYPA PMUs and from its RTUs through their SCADA system. NYPA provided ICCP interface as well as Common Information Model (CIM). The relevance of the DNSE+ application is that it provides state estimation of the power system based on hybrid set of data, consisting of both available PMU data and SCADA measurements. As this is a direct, non-iterative method of calculation of the system states, if does not suffer from convergence issues which is potential problem for conventional state estimators. Also, it can take any available PMU measurements, so it does not need to have a high percentage of PMU coverage needed in the case of Linear State Estimator. As the DNSE calculates synchrophasors of the system states (both phase and absolute value) as sub-second rate, this application can provide a basis for development of next generation of applications based both on SCADA and PMU data.« less
SCADA data and the quantification of hazardous events for QMRA.
Nilsson, P; Roser, D; Thorwaldsdotter, R; Petterson, S; Davies, C; Signor, R; Bergstedt, O; Ashbolt, N
2007-01-01
The objective of this study was to assess the use of on-line monitoring to support the QMRA at water treatment plants studied in the EU MicroRisk project. SCADA data were obtained from three Catchment-to-Tap Systems (CTS) along with system descriptions, diary records, grab sample data and deviation reports. Particular attention was paid to estimating hazardous event frequency, duration and magnitude. Using Shewart and CUSUM we identified 'change-points' corresponding to events of between 10 min and >1 month duration in timeseries data. Our analysis confirmed it is possible to quantify hazardous event durations from turbidity, chlorine residual and pH records and distinguish them from non-hazardous variability in the timeseries dataset. The durations of most 'events' were short-term (0.5-2.3 h). These data were combined with QMRA to estimate pathogen infection risk arising from such events as chlorination failure. While analysis of SCADA data alone could identify events provisionally, its interpretation was severely constrained in the absence of diary records and other system information. SCADA data analysis should only complement traditional water sampling, rather than replace it. More work on on-line data management, quality control and interpretation is needed before it can be used routinely for event characterization.
Integrity Verification for SCADA Devices Using Bloom Filters and Deep Packet Inspection
2014-03-27
prevent intrusions in smart grids [PK12]. Parthasarathy proposed an anomaly detection based IDS that takes into account system state. In his implementation...Security, 25(7):498–506, 10 2006. [LMV12] O. Linda, M. Manic, and T. Vollmer. Improving cyber-security of smart grid systems via anomaly detection and...6 2012. 114 [PK12] S. Parthasarathy and D. Kundur. Bloom filter based intrusion detection for smart grid SCADA. In Electrical & Computer Engineering
Modeling And Detecting Anomalies In Scada Systems
NASA Astrophysics Data System (ADS)
Svendsen, Nils; Wolthusen, Stephen
The detection of attacks and intrusions based on anomalies is hampered by the limits of specificity underlying the detection techniques. However, in the case of many critical infrastructure systems, domain-specific knowledge and models can impose constraints that potentially reduce error rates. At the same time, attackers can use their knowledge of system behavior to mask their manipulations, causing adverse effects to observed only after a significant period of time. This paper describes elementary statistical techniques that can be applied to detect anomalies in critical infrastructure networks. A SCADA system employed in liquefied natural gas (LNG) production is used as a case study.
SCADA alarms processing for wind turbine component failure detection
NASA Astrophysics Data System (ADS)
Gonzalez, E.; Reder, M.; Melero, J. J.
2016-09-01
Wind turbine failure and downtime can often compromise the profitability of a wind farm due to their high impact on the operation and maintenance (O&M) costs. Early detection of failures can facilitate the changeover from corrective maintenance towards a predictive approach. This paper presents a cost-effective methodology to combine various alarm analysis techniques, using data from the Supervisory Control and Data Acquisition (SCADA) system, in order to detect component failures. The approach categorises the alarms according to a reviewed taxonomy, turning overwhelming data into valuable information to assess component status. Then, different alarms analysis techniques are applied for two purposes: the evaluation of the SCADA alarm system capability to detect failures, and the investigation of the relation between components faults being followed by failure occurrences in others. Various case studies are presented and discussed. The study highlights the relationship between faulty behaviour in different components and between failures and adverse environmental conditions.
Automatic Generation of Supervisory Control System Software Using Graph Composition
NASA Astrophysics Data System (ADS)
Nakata, Hideo; Sano, Tatsuro; Kojima, Taizo; Seo, Kazuo; Uchida, Tomoyuki; Nakamura, Yasuaki
This paper describes the automatic generation of system descriptions for SCADA (Supervisory Control And Data Acquisition) systems. The proposed method produces various types of data and programs for SCADA systems from equipment definitions using conversion rules. At first, this method makes directed graphs, which represent connections between the equipment, from equipment definitions. System descriptions are generated using the conversion rules, by analyzing these directed graphs, and finding the groups of equipment that involve similar operations. This method can make the conversion rules multi levels by using the composition of graphs, and can reduce the number of rules. The developer can define and manage these rules efficiently.
Critical Infrastructure: Control Systems and the Terrorist Threat
2004-01-20
Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL31534 Critical...http://www.pnl.gov/main/sectors/homeland.html]. 68 Rolf Carlson, “Sandia SCADA Program High-Security SCADA LDRD Final Report ,” Sandia Report SAND2002...and Industry Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to
Critical Infrastructure: Control Systems and the Terrorist Threat
2003-07-14
Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL31534 Critical...available online at [http://www.pnl.gov/main/sectors/homeland.html]. 56 Rolf Carlson, “Sandia SCADA Program High-Security SCADA LDRD Final Report ...Industry Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to
Development and Demonstration of a Security Core Component
DOE Office of Scientific and Technical Information (OSTI.GOV)
Turke, Andy
In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more datamore » about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from “normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.« less
Carrasco, Juan A; Dormido, Sebastián
2006-04-01
The use of industrial control systems in simulators facilitates the execution of engineering activities related with the installation and the optimization of the control systems in real plants. "Industrial control system" intends to be a valid term that would represent all the control systems which can be installed in an industrial plant, ranging from complex distributed control systems and SCADA packages to small single control devices. This paper summarizes the current alternatives for the development of simulators of industrial plants and presents an analysis of the process of integrating an industrial control system into a simulator, with the aim of helping in the installation of real control systems in simulators.
Behavioral Profiling of Scada Network Traffic Using Machine Learning Algorithms
2014-03-27
BEHAVIORAL PROFILING OF SCADA NETWORK TRAFFIC USING MACHINE LEARNING ALGORITHMS THESIS Jessica R. Werling, Captain, USAF AFIT-ENG-14-M-81 DEPARTMENT...subject to copyright protection in the United States. AFIT-ENG-14-M-81 BEHAVIORAL PROFILING OF SCADA NETWORK TRAFFIC USING MACHINE LEARNING ...AFIT-ENG-14-M-81 BEHAVIORAL PROFILING OF SCADA NETWORK TRAFFIC USING MACHINE LEARNING ALGORITHMS Jessica R. Werling, B.S.C.S. Captain, USAF Approved
NASA Astrophysics Data System (ADS)
Hanai, Yuji; Hayashi, Yasuhiro; Matsuki, Junya
The line voltage control in a distribution network is one of the most important issues for a penetration of Renewable Energy Sources (RES). A loop distribution network configuration is an effective solution to resolve voltage and distribution loss issues concerned about a penetration of RES. In this paper, for a loop distribution network, the authors propose a voltage control method based on tap change control of LRT and active/reactive power control of RES. The tap change control of LRT takes a major role of the proposed voltage control. Additionally the active/reactive power control of RES supports the voltage control when voltage deviation from the upper or lower voltage limit is unavoidable. The proposed method adopts SCADA system based on measured data from IT switches, which are sectionalizing switch with sensor installed in distribution feeder. In order to check the validity of the proposed voltage control method, experimental simulations using a distribution system analog simulator “ANSWER” are carried out. In the simulations, the voltage maintenance capability in the normal and the emergency is evaluated.
Control of Smart Building Using Advanced SCADA
NASA Astrophysics Data System (ADS)
Samuel, Vivin Thomas
For complete control of the building, a proper SCADA implementation and the optimization strategy has to be build. For better communication and efficiency a proper channel between the Communication protocol and SCADA has to be designed. This paper concentrate mainly between the communication protocol, and the SCADA implementation, for a better optimization and energy savings is derived to large scale industrial buildings. The communication channel used in order to completely control the building remotely from a distant place. For an efficient result we consider the temperature values and the power ratings of the equipment so that while controlling the equipment, we are setting a threshold values for FDD technique implementation. Building management system became a vital source for any building to maintain it and for safety purpose. Smart buildings, refers to various distinct features, where the complete automation system, office building controls, data center controls. ELC's are used to communicate the load values of the building to the remote server from a far location with the help of an Ethernet communication channel. Based on the demand fluctuation and the peak voltage, the loads operate differently increasing the consumption rate thus results in the increase in the annual consumption bill. In modern days, saving energy and reducing the consumption bill is most essential for any building for a better and long operation. The equipment - monitored regularly and optimization strategy is implemented for cost reduction automation system. Thus results in the reduction of annual cost reduction and load lifetime increase.
Long-term monitoring of a cable stayed bridge using a SCADA system
NASA Astrophysics Data System (ADS)
Torbol, Marco; Kim, Sehwan; Shinozuka, Masanobu
2012-04-01
DuraMote is a MEMS-based remote sensing system, which is developed for the NIST TIP project, Next Generation SCADA for Prevention and Mitigation of Water System Infrastructure Disaster. It is designed for supervisory control and data acquisition (SCADA) of pipe ruptures in water distribution systems. In this project, a method is developed to detect the pipe ruptures by analyzing the acceleration data gathered by DuraMote which consists of two primary components; the first, "Gopher" contains the accelerometers and are attached to the water pipe surface noninvasively, and the second, "Roocas" is placed above ground supplying the power to, and retrieving the data from the multiple Gophers, and then transmit the data through Wi-Fi to a base station. The relays support the Wi-Fi network to facilitate the transmission. A large scale bridge provides an ideal test-bet to validate the performance of such a complex monitoring system as DuraMote for its accuracy, reliability, robustness, and user friendliness. This is because a large bridge is most of the time subjected to susceptible level of ambient vibration due to passing loads, wind, etc. DuraMote can record the acceleration time history arising from the vibration making it possible to estimate the frequency values of various bridge vibration modes. These estimated frequency values are then compared with the values computed from analytical model of the bridge for the verification of the accuracy of DuraMote. It is noted that such a verification method cannot be used practically by deploying DuraMote on a water distribution network since the dynamic behavior of a pipe network, either above or underground, is too complex to model analytically for this purpose, and in addition, the network generally lacks conveniently recordable ambient vibration. In this experiment, the performance of DuraMote system was tested being installed on the Hwamyung Bridge, a 500 m long RC cable stayed bridge in Korea for long term monitoring. In total, the system consisted of 24 accelerometers, 13 Gophers, 10 Roocas, 5 relays, and 1 base station. As it happened, the bridge was subjected to heavy rain, winds, and a typhoon during the experiment allowing the DuraMote to demonstrate extra ordinary robustness and durability. Indeed, in spite of the rough weather, acceleration data was continuously recorded from which natural frequencies, mode shapes, and other structural parameters were calculated. This opportunity would not have happened if the experiment was planned for a shorter duration.
Design and development of an IoT-based web application for an intelligent remote SCADA system
NASA Astrophysics Data System (ADS)
Kao, Kuang-Chi; Chieng, Wei-Hua; Jeng, Shyr-Long
2018-03-01
This paper presents a design of an intelligent remote electrical power supervisory control and data acquisition (SCADA) system based on the Internet of Things (IoT), with Internet Information Services (IIS) for setting up web servers, an ASP.NET model-view- controller (MVC) for establishing a remote electrical power monitoring and control system by using responsive web design (RWD), and a Microsoft SQL Server as the database. With the web browser connected to the Internet, the sensing data is sent to the client by using the TCP/IP protocol, which supports mobile devices with different screen sizes. The users can provide instructions immediately without being present to check the conditions, which considerably reduces labor and time costs. The developed system incorporates a remote measuring function by using a wireless sensor network and utilizes a visual interface to make the human-machine interface (HMI) more instinctive. Moreover, it contains an analog input/output and a basic digital input/output that can be applied to a motor driver and an inverter for integration with a remote SCADA system based on IoT, and thus achieve efficient power management.
NASA Astrophysics Data System (ADS)
McEvoy, Thomas Richard; Wolthusen, Stephen D.
Recent research on intrusion detection in supervisory data acquisition and control (SCADA) and DCS systems has focused on anomaly detection at protocol level based on the well-defined nature of traffic on such networks. Here, we consider attacks which compromise sensors or actuators (including physical manipulation), where intrusion may not be readily apparent as data and computational states can be controlled to give an appearance of normality, and sensor and control systems have limited accuracy. To counter these, we propose to consider indirect relations between sensor readings to detect such attacks through concurrent observations as determined by control laws and constraints.
Adopting Industry Standards for Control Systems Within Advanced Life Support
NASA Technical Reports Server (NTRS)
Young, James Scott; Boulanger, Richard
2002-01-01
This paper gives a description of OPC (Object Linking and Embedding for Process Control) standards for process control and outlines the experiences at JSC with using these standards to interface with I/O hardware from three independent vendors. The I/O hardware was integrated with a commercially available SCADA/HMI software package to make up the control and monitoring system for the Environmental Systems Test Stand (ESTS). OPC standards were utilized for communicating with I/O hardware and the software was used for implementing monitoring, PC-based distributed control, and redundant data storage over an Ethernet physical layer using an embedded din-rail mounted PC.
Model-based approach for cyber-physical attack detection in water distribution systems.
Housh, Mashor; Ohar, Ziv
2018-08-01
Modern Water Distribution Systems (WDSs) are often controlled by Supervisory Control and Data Acquisition (SCADA) systems and Programmable Logic Controllers (PLCs) which manage their operation and maintain a reliable water supply. As such, and with the cyber layer becoming a central component of WDS operations, these systems are at a greater risk of being subjected to cyberattacks. This paper offers a model-based methodology based on a detailed hydraulic understanding of WDSs combined with an anomaly detection algorithm for the identification of complex cyberattacks that cannot be fully identified by hydraulically based rules alone. The results show that the proposed algorithm is capable of achieving the best-known performance when tested on the data published in the BATtle of the Attack Detection ALgorithms (BATADAL) competition (http://www.batadal.net). Copyright © 2018. Published by Elsevier Ltd.
Modeling DNP3 Traffic Characteristics of Field Devices in SCADA Systems of the Smart Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Huan; Cheng, Liang; Chuah, Mooi Choo
In the generation, transmission, and distribution sectors of the smart grid, intelligence of field devices is realized by programmable logic controllers (PLCs). Many smart-grid subsystems are essentially cyber-physical energy systems (CPES): For instance, the power system process (i.e., the physical part) within a substation is monitored and controlled by a SCADA network with hosts running miscellaneous applications (i.e., the cyber part). To study the interactions between the cyber and physical components of a CPES, several co-simulation platforms have been proposed. However, the network simulators/emulators of these platforms do not include a detailed traffic model that takes into account the impactsmore » of the execution model of PLCs on traffic characteristics. As a result, network traces generated by co-simulation only reveal the impacts of the physical process on the contents of the traffic generated by SCADA hosts, whereas the distinction between PLCs and computing nodes (e.g., a hardened computer running a process visualization application) has been overlooked. To generate realistic network traces using co-simulation for the design and evaluation of applications relying on accurate traffic profiles, it is necessary to establish a traffic model for PLCs. In this work, we propose a parameterized model for PLCs that can be incorporated into existing co-simulation platforms. We focus on the DNP3 subsystem of slave PLCs, which automates the processing of packets from the DNP3 master. To validate our approach, we extract model parameters from both the configuration and network traces of real PLCs. Simulated network traces are generated and compared against those from PLCs. Our evaluation shows that our proposed model captures the essential traffic characteristics of DNP3 slave PLCs, which can be used to extend existing co-simulation platforms and gain further insights into the behaviors of CPES.« less
Analysis of data throughput in communication between PLCs and HMI/SCADA systems
NASA Astrophysics Data System (ADS)
Mikolajek, Martin; Koziorek, Jiri
2016-09-01
This paper is focused on Analysis of data throughout in communication between PLCs and HMI/SCADA systems. The first part of paper discusses basic problematic communication between PLC and HMI systems. Next part is about specific types of communications PLC - HMI requests. For those cases paper is talking about response and data throughput1-3 . Subsequent section of this article contains practical parts with various data exchanges between PLC Siemens and HMI. The possibilities of communication that are described in this article are focused on using OPC server for visualization software, custom HMI system and own application created by using .NET with Technology. The last part of this article contains some communication solutions.
SCADA-based Operator Support System for Power Plant Equipment Fault Forecasting
NASA Astrophysics Data System (ADS)
Mayadevi, N.; Ushakumari, S. S.; Vinodchandra, S. S.
2014-12-01
Power plant equipment must be monitored closely to prevent failures from disrupting plant availability. Online monitoring technology integrated with hybrid forecasting techniques can be used to prevent plant equipment faults. A self learning rule-based expert system is proposed in this paper for fault forecasting in power plants controlled by supervisory control and data acquisition (SCADA) system. Self-learning utilizes associative data mining algorithms on the SCADA history database to form new rules that can dynamically update the knowledge base of the rule-based expert system. In this study, a number of popular associative learning algorithms are considered for rule formation. Data mining results show that the Tertius algorithm is best suited for developing a learning engine for power plants. For real-time monitoring of the plant condition, graphical models are constructed by K-means clustering. To build a time-series forecasting model, a multi layer preceptron (MLP) is used. Once created, the models are updated in the model library to provide an adaptive environment for the proposed system. Graphical user interface (GUI) illustrates the variation of all sensor values affecting a particular alarm/fault, as well as the step-by-step procedure for avoiding critical situations and consequent plant shutdown. The forecasting performance is evaluated by computing the mean absolute error and root mean square error of the predictions.
Remote Supervision and Control of Air Conditioning Systems in Different Modes
NASA Astrophysics Data System (ADS)
Rafeeq, Mohammed; Afzal, Asif; Rajendra, Sree
2018-01-01
In the era of automation, most of the application of engineering and science are interrelated with system for optimal operation. To get the efficient result of an operation and desired response, interconnected systems should be controlled by directing, regulating and commanding. Here, air conditioning (AC) system is considered for experimentation, to supervise and control its functioning in both, automated and manual mode. This paper reports the work intended to design and develop an automated and manual AC system working in remote and local mode, to increase the level of comfort, easy operation, reducing human intervention and faults occurring in the system. The Programmable Logical Controller (PLC) and Supervisory Control and Data Acquisition (SCADA) system were used for remote supervision and monitoring of AC systems using series ninety protocol and remote terminal unit modbus protocol as communication module to operate in remote mode. PLC was used as remote terminal for continuous supervision and control of AC system. SCADA software was used as a tool for designing user friendly graphical user interface. The proposed SCADA AC system successfully monitors and controls in accordance within the parameter limits like temperature, pressure, humidity and voltage. With all the features, this designed system is capable of efficient handling of the resources like the compressor, humidifier etc., with all the levels of safety and durability. This system also maintains the temperature and controls the humidity of the remote location and also looks after the health of the compressor.
Acceptance Testing of a Satellite SCADA Photovoltaic-Diesel Hybrid System
NASA Technical Reports Server (NTRS)
Kalu, A.; Emrich, C.; Ventre, G.; Wilson, W.; Acosta, Roberto (Technical Monitor)
2000-01-01
Satellite Supervisory Control and Data Acquisition (SCADA) of a Photovoltaic (PV)/diesel hybrid system was tested using NASA's Advanced Communication Technology Satellite (ACTS) and Ultra Small Aperture Terminal (USAT) ground stations. The setup consisted of a custom-designed PV/diesel hybrid system, located at the Florida Solar Energy Center (FSEC), which was controlled and monitored at a "remote" hub via Ka-band satellite link connecting two 1/4 Watt USATs in a SCADA arrangement. The robustness of the communications link was tested for remote monitoring of the health and performance of a PV/diesel hybrid system, and for investigating load control and battery charging strategies to maximize battery capacity and lifetime, and minimize loss of critical load probability. Baseline hardware performance test results demonstrated that continuous two-second data transfers can be accomplished under clear sky conditions with an error rate of less than 1%. The delay introduced by the satellite (1/4 sec) was transparent to synchronization of satellite modem as well as to the PV/diesel-hybrid computer. End-to-end communications link recovery times were less than 36 seconds for loss of power and less than one second for loss of link. The system recovered by resuming operation without any manual intervention, which is important since the 4 dB margin is not sufficient to prevent loss of the satellite link during moderate to heavy rain. Hybrid operations during loss of communications link continued seamlessly but real-time monitoring was interrupted. For this sub-tropical region, the estimated amount of time that the signal fade will exceed the 4 dB margin is about 10%. These results suggest that data rates of 4800 bps and a link margin of 4 dB with a 1/4 Watt transmitter are sufficient for end-to-end operation in this SCADA application.
Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar
2016-01-01
In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design. PMID:26950129
Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar
2016-03-03
In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.
FDI and Accommodation Using NN Based Techniques
NASA Astrophysics Data System (ADS)
Garcia, Ramon Ferreiro; de Miguel Catoira, Alberto; Sanz, Beatriz Ferreiro
Massive application of dynamic backpropagation neural networks is used on closed loop control FDI (fault detection and isolation) tasks. The process dynamics is mapped by means of a trained backpropagation NN to be applied on residual generation. Process supervision is then applied to discriminate faults on process sensors, and process plant parameters. A rule based expert system is used to implement the decision making task and the corresponding solution in terms of faults accommodation and/or reconfiguration. Results show an efficient and robust FDI system which could be used as the core of an SCADA or alternatively as a complement supervision tool operating in parallel with the SCADA when applied on a heat exchanger.
Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon
2016-01-01
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351
Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon
2016-06-14
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.
LIDAR wind speed measurements at a Taiwan onshore wind park
NASA Astrophysics Data System (ADS)
Wu, Yu-Ting; Lin, Ta-Hui; Hsuan, Chung-Yao; Li, Yu-Cheng; Yang, Ya-Fei; Tai, Tzy-Hwan; Huang, Chien-Cheng
2016-04-01
Measurements of wind speed and wind direction were carried out using a Leosphere Windcube LIDAR system at a Taiwan onshore wind park. The Lidar shot a total of five laser beams to the atmosphere to collect the light-of-sight (LOS) velocity. Four beams were sent successively in four cardinal directions along a 28° scanning cone angle, followed by a fifth, vertical beam. An unchangeable sampling rate of approximately 1.2 Hz was set in the LIDAR system to collect the LOS velocity. The supervisory control and data acquisition (SCADA) data from two GE 1.5 MW wind turbines near the LIDAR deployment site were acquired for the whole measuring period from February 4 to February 16 of 2015. The SCADA data include the blade angular velocity, the wind velocity measured at hub height from an anemometer mounted on the nacelle, the wind turbine yaw angle, and power production; each parameter was recorded as averages over 1-min periods. The data analysis involving the LIDAR measurements and the SCADA data were performed to obtain the turbulent flow statistics. The results show that the turbine power production has significant dependence to the wind speed, wind direction, turbulence intensity and wind shear.
Metrics for the National SCADA Test Bed Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.
2008-12-05
The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.
Evaluation of Traditional Security Solutions in the SCADA Environment
2012-03-01
Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Robert D. Larkin, Captain, USAF AFIT/GCO/ENG/12-06 DEPARTMENT OF THE AIR...views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, Department...United States. AFIT/GCO/ENG/12-06 Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Presented to the Faculty Department of
Code of Federal Regulations, 2014 CFR
2014-01-01
... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...
Code of Federal Regulations, 2012 CFR
2012-01-01
... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...
Code of Federal Regulations, 2011 CFR
2011-01-01
... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...
Code of Federal Regulations, 2013 CFR
2013-01-01
... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...
Industrial Control System Process-Oriented Intrusion Detection (iPoid) Algorithm
2016-08-01
inspection rules using an intrusion-detection system (IDS) sensor, a simulated Programmable Logic Controller (PLC), and a Modbus client operating...operating system PLC Programmable Logic Controller SCADA supervisory control and data acquisition SIGHUP signal hangup SPAN Switched Port Analyzer
NASA Astrophysics Data System (ADS)
Gu, Fei; Brouwer, Jack; Samuelsen, Scott
2013-09-01
Recent advances in inverter technology have enabled ancillary services such as volt/VAR regulation, SCADA communications, and active power filtering. Smart inverters can not only provide real power, but can be controlled to use excess capacity to provide reactive power compensation, power flow control, and active power filtering without supplementary inverter hardware. A transient level inverter model based on the Solectria 7700 inverter is developed and used to assess these control strategies using field data from an existing branch circuit containing two Amonix 68kW CPV-7700 systems installed at the University of California, Irvine.
Collegiate Cyber Defense Competition Effort
2018-03-01
Energy – an electrical utility company. • 2016 : ODIN Security – a small aerospace and defense contracting firm Approved for Public Release...to secure supervisory control and data acquisition (SCADA) networks. Approved for Public Release; Distribution Unlimited 7 During the 2016 NCCDC...COLLEGIATE CYBER DEFENSE COMPETITION EFFORT UNIVERSITY OF TEXAS AT SAN ANTONIO MARCH 2018 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE
RivGen, Igiugig Deployment, Control System Specifications and Models
Forbush, Dominic; Cavagnaro, Robert J.; Guerra, Maricarmen; Donegan, James; McEntee, Jarlath; Thomson, Jim; Polagye, Brian; Fabien, Brian; Kilcher, Levi
2016-03-21
Control System simulation models, case studies, and processing codes for analyzing field data. Raw data files included from VFD and SCADA. MatLab and Simulink are required to open some data files and all model files.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beaver, Justin M; Borges, Raymond Charles; Buckner, Mark A
Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in amore » critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.« less
Object-Oriented Technology-Based Software Library for Operations of Water Reclamation Centers
NASA Astrophysics Data System (ADS)
Otani, Tetsuo; Shimada, Takehiro; Yoshida, Norio; Abe, Wataru
SCADA systems in water reclamation centers have been constructed based on hardware and software that each manufacturer produced according to their design. Even though this approach used to be effective to realize real-time and reliable execution, it is an obstacle to cost reduction about system construction and maintenance. A promising solution to address the problem is to set specifications that can be used commonly. In terms of software, information model approach has been adopted in SCADA systems in other field, such as telecommunications and power systems. An information model is a piece of software specification that describes a physical or logical object to be monitored. In this paper, we propose information models for operations of water reclamation centers, which have not ever existed. In addition, we show the feasibility of the information model in terms of common use and processing performance.
Secure VM for Monitoring Industrial Process Controllers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dasgupta, Dipankar; Ali, Mohammad Hassan; Abercrombie, Robert K
2011-01-01
In this paper, we examine the biological immune system as an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning, testing, tuning and optimization process. The powerful information processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors for its artificial counterpart. Our study focuses on building an autonomic defense system, using some immunological metaphors for information gathering, analyzing, decision making and launching threat and attack responses. In order to detection Stuxnet like malware, we propose to include a secure VM (or dedicatedmore » host) to the SCADA Network to monitor behavior and all software updates. This on-going research effort is not to mimic the nature but to explore and learn valuable lessons useful for self-adaptive cyber defense systems.« less
NASA Astrophysics Data System (ADS)
Ginsberg, Mark D.; Smith, Eddy D.; VanBlaricum, Vicki; Hock, Vincent F.; Kroll, Dan; Russell, Kevin J.
2010-04-01
Both real events and models have proven that drinking water systems are vulnerable to deliberate and/or accidental contamination. Additionally, homeland security initiatives and modeling efforts have determined that it is relatively easy to orchestrate the contamination of potable water supplies. Such contamination can be accomplished with classic and non-traditional chemical agents, toxic industrial chemicals (TICs), and/or toxic industrial materials (TIMs). Subsequent research and testing has developed a proven network for detection and response to these threats. The method uses offthe- shelf, broad-spectrum analytical instruments coupled with advanced interpretive algorithms. The system detects and characterizes any backflow events involving toxic contaminants by employing unique chemical signature (fingerprint) response data. This instrumentation has been certified by the Office of Homeland Security for detecting deliberate and/or accidental contamination of critical water infrastructure. The system involves integration of several mature technologies (sensors, SCADA, dynamic models, and the HACH HST Guardian Blue instrumentation) into a complete, real-time, management system that also can be used to address other water distribution concerns, such as corrosion. This paper summarizes the reasons and results for installing such a distribution-based detection and protection system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meador, Richard J.; Hatley, Darrel D.
2004-06-01
PNNL DSOM technology coordinates efficient steam plant operation with EMCS and SCADA systems, providing generation support and automated load shedding to meet peak demand limits saving over $1M in two years.
On the use of high-frequency SCADA data for improved wind turbine performance monitoring
NASA Astrophysics Data System (ADS)
Gonzalez, E.; Stephen, B.; Infield, D.; Melero, J. J.
2017-11-01
SCADA-based condition monitoring of wind turbines facilitates the move from costly corrective repairs towards more proactive maintenance strategies. In this work, we advocate the use of high-frequency SCADA data and quantile regression to build a cost effective performance monitoring tool. The benefits of the approach are demonstrated through the comparison between state-of-the-art deterministic power curve modelling techniques and the suggested probabilistic model. Detection capabilities are compared for low and high-frequency SCADA data, providing evidence for monitoring at higher resolutions. Operational data from healthy and faulty turbines are used to provide a practical example of usage with the proposed tool, effectively achieving the detection of an incipient gearbox malfunction at a time horizon of more than one month prior to the actual occurrence of the failure.
NASA Astrophysics Data System (ADS)
Kochukov, O.; Briņķis, K.; Mutule, A.
2013-08-01
The paper describes the algorithm for distributed state estimation (SE) and is focused on its testing and validation. For this purpose, different events in the modeled power system of the 330-750 kV electrical ring Latvia - Lithuania - Belarus - Smolensk - Moscow - St. Petersburg - Estonia - Latvia were considered. The methods for testing the Inter-TSO SE prototype and dynamic network monitoring & modeling are based on comparison of the available SCADA data about real events with those of SE calculation. In total, four operational states were studied, including initial, accident and two post-accident operational states Rakstā tiek aprakstīti, testēti un novērtēti izkliedēta stāvokļa novērtēšanas algoritmi. Testēšanas nolūkos tika izmantoti dažādi 330-750 kV elektriskā loka Latvija - Lietuva - Baltkrievija - Smoļenska - Maskava - Pēterburga - Igaunija - Latvija modelēti scenāriji. Prototipa testēšanas metodoloģija balstīta uz pieejamo SCADA datu salīdzināšanu ar stāvokļa novērtēšanas prototipa aprēķina rezultātiem. Kopumā apskatīti sākotnējais, avārijas un divi pēcavārijas režīmi
NASA Astrophysics Data System (ADS)
Zulfikar, Can; Pinar, Ali; Tunc, Suleyman; Erdik, Mustafa
2014-05-01
The Istanbul EEW network consisting of 10 inland and 5 OBS strong motion stations located close to the Main Marmara Fault zone is operated by KOERI. Data transmission between the remote stations and the base station at KOERI is provided both with satellite and fiber optic cable systems. The continuous on-line data from these stations is used to provide real time warning for emerging potentially disastrous earthquakes. The data transmission time from the remote stations to the KOERI data center is a few milliseconds through fiber optic lines and less than a second via satellites. The early warning signal (consisting three alarm levels) is communicated to the appropriate servo shut-down systems of the receipent facilities, that automatically decide proper action based on the alarm level. Istanbul Gas Distribution Corporation (IGDAS) is one of the end users of the EEW signal. IGDAS, the primary natural gas provider in Istanbul, operates an extensive system 9,867 km of gas lines with 550 district regulators and 474,000 service boxes. State of-the-art protection systems automatically cut natural gas flow when breaks in the pipelines are detected. Since 2005, buildings in Istanbul using natural gas are required to install seismometers that automatically cut natural gas flow when certain thresholds are exceeded. IGDAS uses a sophisticated SCADA (supervisory control and data acquisition) system to monitor the state-of-health of its pipeline network. This system provides real-time information about quantities related to pipeline monitoring, including input-output pressure, drawing information, positions of station and RTU (remote terminal unit) gates, slum shut mechanism status at 581 district regulator sites. The SCADA system of IGDAŞ receives the EEW signal from KOERI and decide the proper actions according to the previously specified ground acceleration levels. Presently, KOERI sends EEW signal to the SCADA system of IGDAS Natural Gas Network of Istanbul. The EEW signal of KOERI is also transmitted to the serve shut down system of the Marmaray Rail Tube Tunnel and Commuter Rail Mass Transit System in Istanbul. The Marmaray system includes an undersea railway tunnel under the Bosphorus Strait. Several strong motion instruments are installed within the tunnel for taking measurements against strong ground shaking and early warning purposes. This system is integrated with the KOERI EEW System. KOERI sends the EEW signal to the command center of Marmaray. Having received the signal, the command center put into action the previously defined measurements. For example, the trains within the tunnel will be stopped at the nearest station, no access to the tunnel will be allowed to the trains approaching the tunnel, water protective caps will be closed to protect flood closing the connection between the onshore and offshore tunnels.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thaule, S.B.; Postvoll, W.
Installation by den norske stats oljeselskap A.S. (Statoil) of a powerful pipeline-modeling system on Zeepipe has allowed this major North Sea gas pipeline to meet the growing demands and seasonal variations of the European gas market. The Troll gas-sales agreement (TGSA) in 1986 called for large volumes of Norwegian gas to begin arriving from the North Sea Sleipner East field in october 1993. It is important to Statoil to maintain regular gas delivers from its integrated transport network. In addition, high utilization of transport capacity maximizes profits. In advance of operations, Statoil realized that state-of-the-art supervisory control and data acquisitionmore » (scada) and pipeline-modeling systems (PMS) would be necessary to meet its goals and to remain the most efficient North Sea operator. The paper describes the linking of Troll and Zeebrugge, contractual issues, the supervisory system, the scada module, pipeline modeling, real-time model, look-ahead model, predictive model, and model performance.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barnes, G.A.
1998-03-11
This document defines the requirements applicable to the operation, maintenance and storage of the Supervisory Control and Data Acquisition System (SCADAS) and Control Network in support of the Light Duty Utility Arm (LDUA) operations.
Infrastructure Vulnerability Assessment Model (I-VAM).
Ezell, Barry Charles
2007-06-01
Quantifying vulnerability to critical infrastructure has not been adequately addressed in the literature. Thus, the purpose of this article is to present a model that quantifies vulnerability. Vulnerability is defined as a measure of system susceptibility to threat scenarios. This article asserts that vulnerability is a condition of the system and it can be quantified using the Infrastructure Vulnerability Assessment Model (I-VAM). The model is presented and then applied to a medium-sized clean water system. The model requires subject matter experts (SMEs) to establish value functions and weights, and to assess protection measures of the system. Simulation is used to account for uncertainty in measurement, aggregate expert assessment, and to yield a vulnerability (Omega) density function. Results demonstrate that I-VAM is useful to decisionmakers who prefer quantification to qualitative treatment of vulnerability. I-VAM can be used to quantify vulnerability to other infrastructures, supervisory control and data acquisition systems (SCADA), and distributed control systems (DCS).
Development of Solar Powered Irrigation System
NASA Astrophysics Data System (ADS)
Abdelkerim, A. I.; Sami Eusuf, M. M. R.; Salami, M. J. E.; Aibinu, A.; Eusuf, M. A.
2013-12-01
Development of a solar powered irrigation system has been discussed in this paper. This system would be SCADA-based and quite useful in areas where there is plenty of sunshine but insufficient water to carry out farming activities, such as rubber plantation, strawberry plantation, or any plantation, that requires frequent watering. The system is powered by solar system as a renewable energy which uses solar panel module to convert Sunlight into electricity. The development and implementation of an automated SCADA controlled system that uses PLC as a controller is significant to agricultural, oil and gas monitoring and control purpose purposes. In addition, the system is powered by an intelligent solar system in which solar panel targets the radiation from the Sun. Other than that, the solar system has reduced energy cost as well as pollution. The system is equipped with four input sensors; two soil moisture sensors, two level detection sensors. Soil moisture sensor measures the humidity of the soil, whereas the level detection sensors detect the level of water in the tank. The output sides consist of two solenoid valves, which are controlled respectively by two moistures sensors.
Recent Experience with a Hybrid SCADA/PMU On-Line State Estimator
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rizy, D Tom
2009-01-01
PMU devices are expected to grow in number from a few to several hundreds in the next five years. Some relays are already global positioning system-capable and could provide the same type of data as any PMU. This introduces a new paradigm of very fast accurate synchrophasor measurements from across the grid in real-time that augment and parallel existing slower SCADA measurements. Control center applications will benefit from this PMU data; for example, use of PMU data in state estimation is expected to improve accuracy and robustness, which in turn will result in more timely and accurate N-1 security analysis,more » resulting in an overall improvement of grid system reliability and security. This paper describes results from a recent implementation of this technology, the benefits and future work.« less
Cetinceviz, Yucel; Bayindir, Ramazan
2012-05-01
The network requirements of control systems in industrial applications increase day by day. The Internet based control system and various fieldbus systems have been designed in order to meet these requirements. This paper describes an Internet based control system with wireless fieldbus communication designed for distributed processes. The system was implemented as an experimental setup in a laboratory. In industrial facilities, the process control layer and the distance connection of the distributed control devices in the lowest levels of the industrial production environment are provided with fieldbus networks. In this paper, the Internet based control system that will be able to meet the system requirements with a new-generation communication structure, which is called wired/wireless hybrid system, has been designed on field level and carried out to cover all sectors of distributed automation, from process control, to distributed input/output (I/O). The system has been accomplished by hardware structure with a programmable logic controller (PLC), a communication processor (CP) module, two industrial wireless modules and a distributed I/O module, Motor Protection Package (MPP) and software structure with WinCC flexible program used for the screen of Scada (Supervisory Control And Data Acquisition), SIMATIC MANAGER package program ("STEP7") used for the hardware and network configuration and also for downloading control program to PLC. Copyright © 2012 ISA. Published by Elsevier Ltd. All rights reserved.
Energy Systems Integration Laboratory | Energy Systems Integration Facility
systems test hub includes a Class 1, Division 2 space for performing tests of high-pressure hydrogen Laboratory offers the following capabilities. High-Pressure Hydrogen Systems The high-pressure hydrogen infrastructure. Key Infrastructure Robotic arm; high-pressure hydrogen; natural gas supply; standalone SCADA
Managing RFID sensors networks with a general purpose RFID middleware.
Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A; Heradio, Rubén; Valero, Enrique
2012-01-01
RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster).
Upgrade of U.S. EPA's Experimental Stream Facility Supervisory Control and Data Acquisition System
The Supervisory control and data acquisition (SCADA) system for the U.S. EPA’s Experimental Stream Facility (ESF) was upgraded using Camile hardware and software in 2015. The upgrade added additional hardwired connections, new wireless capabilities, and included a complete rewrit...
Application of Canal Automation at the Central Arizona Irrigation and Drainage District
USDA-ARS?s Scientific Manuscript database
The Central Arizona Irrigation and Drainage District (CAIDD) began delivering water to users in 1987. Although designed for automatic control, the system was run manually until a homemade SCADA (Supervisory Control and Data Acquisition) system was developed by a district employee. In 2002, problem...
7 CFR 1724.54 - Requirements for RUS approval of plans and specifications.
Code of Federal Regulations, 2012 CFR
2012-01-01
... specifications for transmission construction projects which are not based on RUS approved line design data or do...) Communications and control facilities. (1) This paragraph (g) covers microwave and powerline carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. (2) The...
7 CFR 1724.54 - Requirements for RUS approval of plans and specifications.
Code of Federal Regulations, 2014 CFR
2014-01-01
... specifications for transmission construction projects which are not based on RUS approved line design data or do...) Communications and control facilities. (1) This paragraph (g) covers microwave and powerline carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. (2) The...
7 CFR 1724.54 - Requirements for RUS approval of plans and specifications.
Code of Federal Regulations, 2013 CFR
2013-01-01
... specifications for transmission construction projects which are not based on RUS approved line design data or do...) Communications and control facilities. (1) This paragraph (g) covers microwave and powerline carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. (2) The...
A storage scheme for the real-time database supporting the on-line commitment
NASA Astrophysics Data System (ADS)
Dai, Hong-bin; Jing, Yu-jian; Wang, Hui
2013-07-01
The modern SCADA (Supervisory Control and Data acquisition) systems have been applied to various aspects of everyday life. As the time goes on, the requirements of the applications of the systems vary. Thus the data structure of the real-time database, which is the core of a SCADA system, often needs modification. As a result, the commitment consisting of a sequence of configuration operations modifying the data structure of the real-time database is performed from time to time. Though it is simple to perform the off-line commitment by first stopping and then restarting the system, during which all the data in the real-time database are reconstructed. It is much more preferred or in some cases even necessary to perform the on-line commitment, during which the real-time database can still provide real-time service and the system continues working normally. In this paper, a storage scheme of the data in the real-time database is proposed. It helps the real-time database support its on-line commitment, during which real-time service is still available.
Refurbishment and Automation of the Thermal/Vacuum Facilities at the Goddard Space Flight Center
NASA Technical Reports Server (NTRS)
Donohue, John T.; Johnson, Chris; Ogden, Rick; Sushon, Janet
1998-01-01
The thermal/vacuum facilities located at the Goddard Space Flight Center (GSFC) have supported both manned and unmanned space flight since the 1960s. Of the 11 facilities, currently 10 of the systems are scheduled for refurbishment and/or replacement as part of a 5-year implementation. Expected return on investment includes the reduction in test schedules, improvements in the safety of facility operations, reduction in the complexity of a test and the reduction in personnel support required for a test. Additionally, GSFC will become a global resource renowned for expertise in thermal engineering, mechanical engineering and for the automation of thermal/vacuum facilities and thermal/vacuum tests. Automation of the thermal/vacuum facilities includes the utilization of Programmable Logic Controllers (PLCs) and the use of Supervisory Control and Data Acquisition (SCADA) systems. These components allow the computer control and automation of mechanical components such as valves and pumps. In some cases, the chamber and chamber shroud require complete replacement while others require only mechanical component retrofit or replacement. The project of refurbishment and automation began in 1996 and has resulted in the computer control of one Facility (Facility #225) and the integration of electronically controlled devices and PLCs within several other facilities. Facility 225 has been successfully controlled by PLC and SCADA for over one year. Insignificant anomalies have occurred and were resolved with minimal impact to testing and operations. The amount of work remaining to be performed will occur over the next four to five years. Fiscal year 1998 includes the complete refurbishment of one facility, computer control of the thermal systems in two facilities, implementation of SCADA and PLC systems to support multiple facilities and the implementation of a Database server to allow efficient test management and data analysis.
Commissioning and Operational Experience with 1 kW Class Helium Refrigerator/Liquefier for SST-1
NASA Astrophysics Data System (ADS)
Dhard, C. P.; Sarkar, B.; Misra, Ruchi; Sahu, A. K.; Tanna, V. L.; Tank, J.; Panchal, P.; Patel, J. C.; Phadke, G. D.; Saxena, Y. C.
2004-06-01
The helium refrigerator/liquefier (R/L) for the Steady State Super conducting Tokamak (SST-1) has been developed with very stringent specifications for the different operational modes. The total refrigeration capacity is 650 W at 4.5 K and liquefaction capacity of 200 l/h. A cold circulation pump is used for the forced flow cooling of 300 g/s supercritical helium (SHe) for the magnet system (SCMS). The R/L has been designed also to absorb a 200 W transient heat load of the SCMS. The plant consists of a compressor station, oil removal system, on-line purifier, Main Control Dewar (MCD) with associated heat exchangers, cold circulation pump and warm gas management system. An Integrated Flow Control and Distribution System (IFDCS) has been designed, fabricated and installed for distribution of SHe in the toroidal and poloidal field coils as well as liquid helium for cooling of 10 pairs of current leads. A SCADA based control system has been designed using PLC for R/L as well as IFDCS. The R/L has been commissioned and required parameters were achieved confirming to the process. All the test results and commissioning experiences are discussed in this paper.
The inherent weaknesses in industrial control systems devices; hacking and defending SCADA systems
NASA Astrophysics Data System (ADS)
Bianco, Louis J.
The North American Electric Reliability Corporation (NERC) is about to enforce their NERC Critical Infrastructure Protection (CIP) Version Five and Six requirements on July 1st 2016. The NERC CIP requirements are a set of cyber security standards designed to protect cyber assets essential the reliable operation of the electric grid. The new Version Five and Six requirements are a major revision to the Version Three (currently enforced) requirements. The new requirements also bring substations into scope alongside Energy Control Centers. When the Version Five requirements were originally drafted they were vague, causing in depth discussions throughout the industry. The ramifications of these requirements has made owners look at their systems in depth, questioning how much money it will take to meet these requirements. Some owners saw backing down from routable networks to non-routable as a means to save money as they would be held to less requirements within the standards. Some owners saw removing routable connections as a proper security move. The purpose of this research was to uncover the inherent weaknesses in Industrial Control Systems (ICS) devices; to show how ICS devices can be hacked and figure out potential protections for these Critical Infrastructure devices. In addition, this research also aimed to validate the decision to move from External Routable connectivity to Non-Routable connectivity, as a security measure and not as a means of savings. The results reveal in order to ultimately protect Industrial Control Systems they must be removed from the Internet and all bi-directional external routable connections must be removed. Furthermore; non-routable serial connections should be utilized, and these non-routable serial connections should be encrypted on different layers of the OSI model. The research concluded that most weaknesses in SCADA systems are due to the inherent weaknesses in ICS devices and because of these weaknesses, human intervention is the biggest threat to SCADA systems.
A Web-Based Remote Access Laboratory Using SCADA
ERIC Educational Resources Information Center
Aydogmus, Z.; Aydogmus, O.
2009-01-01
The Internet provides an opportunity for students to access laboratories from outside the campus. This paper presents a Web-based remote access real-time laboratory using SCADA (supervisory control and data acquisition) control. The control of an induction motor is used as an example to demonstrate the effectiveness of this remote laboratory,…
Cryogenic Controls for Fermilab's Srf Cavities and Test Facility
NASA Astrophysics Data System (ADS)
Norris, B.; Bossert, R.; Klebaner, A.; Lackey, S.; Martinez, A.; Pei, L.; Soyars, W.; Sirotenko, V.
2008-03-01
A new superconducting radio frequency (SRF) cavities test facility is now operational at Fermilab's Meson Detector Building (MDB). The Cryogenic Test Facility (CTF), located in a separate building 500 m away, supplies the facility with cryogens. The design incorporates ambient temperature pumping for superfluid helium production, as well as three 0.6 kW at 4.5 K refrigerators, five screw compressors, a helium purifier, helium and nitrogen inventory, cryogenic distribution system, and a variety of test cryostats. To control and monitor the vastly distributed cryogenic system, a flexible scheme has been developed. Both commercial and experimental physics tools are used. APACS+™, a process automation control system from Siemens-Moore, is at the heart of the design. APACS+™ allows engineers to configure an ever evolving test facility while maintaining control over the plant and distribution system. APACS+™ nodes at CTF and MDB are coupled by a fiber optic network. DirectLogic205 PLCs by KOYO® are used as the field level interface to most I/O. The top layer of this system uses EPICS (Experimental Physics and Industrial Control System) as a SCADA/HMI. Utilities for graphical display, control loop setting, real time/historical plotting and alarming have been implemented by using the world-wide library of applications for EPICS. OPC client/server technology is used to bridge across each different platform. This paper presents this design and its successful implementation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Huan; Cheng, Liang; Chuah, Mooi Choo
In the generation, transmission, and distribution sectors of the smart grid, intelligence of field devices is realized by programmable logic controllers (PLCs). Many smart-grid subsystems are essentially cyber-physical energy systems (CPES): For instance, the power system process (i.e., the physical part) within a substation is monitored and controlled by a SCADA network with hosts running miscellaneous applications (i.e., the cyber part). To study the interactions between the cyber and physical components of a CPES, several co-simulation platforms have been proposed. However, the network simulators/emulators of these platforms do not include a detailed traffic model that takes into account the impactsmore » of the execution model of PLCs on traffic characteristics. As a result, network traces generated by co-simulation only reveal the impacts of the physical process on the contents of the traffic generated by SCADA hosts, whereas the distinction between PLCs and computing nodes (e.g., a hardened computer running a process visualization application) has been overlooked. To generate realistic network traces using co-simulation for the design and evaluation of applications relying on accurate traffic profiles, it is necessary to establish a traffic model for PLCs. In this work, we propose a parameterized model for PLCs that can be incorporated into existing co-simulation platforms. We focus on the DNP3 subsystem of slave PLCs, which automates the processing of packets from the DNP3 master. To validate our approach, we extract model parameters from both the configuration and network traces of real PLCs. Simulated network traces are generated and compared against those from PLCs. Our evaluation shows that our proposed model captures the essential traffic characteristics of DNP3 slave PLCs, which can be used to extend existing co-simulation platforms and gain further insights into the behaviors of CPES.« less
Cell-phone based assistance for waterworks/sewage plant maintenance.
Kawada, T; Nakamichi, K; Hisano, N; Kitamura, M; Miyahara, K
2006-01-01
Cell-phones are now incorporating the functions necessary for them to be used as mobile IT devices. In this paper, we present our results of the evaluation of cell-phones as the mobile IT device to assist workers in industrial plants. We use waterworks and sewage plants as examples. By employing techniques to squeeze the SCADA screen on CRT into a small cell-phone LCD, we have made it easier for a plant's field workers to access the information needed for effective maintenance, regardless of location. An idea to link SCADA information and the plant facility information on the cell-phone is also presented. Should an accident or emergency situation arise, these cell-phone-based IT systems can efficiently deliver the latest plant information, thus the worker out in the field can respond to and resolve the emergency.
A Novel Degradation Identification Method for Wind Turbine Pitch System
NASA Astrophysics Data System (ADS)
Guo, Hui-Dong
2018-04-01
It’s difficult for traditional threshold value method to identify degradation of operating equipment accurately. An novel degradation evaluation method suitable for wind turbine condition maintenance strategy implementation was proposed in this paper. Based on the analysis of typical variable-speed pitch-to-feather control principle and monitoring parameters for pitch system, a multi input multi output (MIMO) regression model was applied to pitch system, where wind speed, power generation regarding as input parameters, wheel rotation speed, pitch angle and motor driving currency for three blades as output parameters. Then, the difference between the on-line measurement and the calculated value from the MIMO regression model applying least square support vector machines (LSSVM) method was defined as the Observed Vector of the system. The Gaussian mixture model (GMM) was applied to fitting the distribution of the multi dimension Observed Vectors. Applying the model established, the Degradation Index was calculated using the SCADA data of a wind turbine damaged its pitch bearing retainer and rolling body, which illustrated the feasibility of the provided method.
Managing RFID Sensors Networks with a General Purpose RFID Middleware
Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A.; Heradio, Rubén; Valero, Enrique
2012-01-01
RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barker, Alan M; Killough, Stephen M; Bigelow, Tim S
2011-01-01
Power Supply Controls are being developed at Oak Ridge National Laboratory (ORNL) to test transmission line components of the Electron Cyclotron Heating (ECH) system, with a focus on gyrotrons and waveguides, in support of the International Thermonuclear Experimental Reactor (ITER). The control is performed by several Programmable Logic Controllers (PLC s) located near the different equipment. A technique of Supervisory Control and Data Acquisition (SCADA) is presented to monitor, control, and log actions of the PLC s on a PC through use of Allen Bradley s Remote I/O communication interface coupled with an Open Process Control/Object Linking and Embedding [OLE]more » for Process Control (OPC) Server/Client architecture. The OPC data is then linked to a National Instruments (NI) LabVIEW system for monitoring and control. Details of the architecture and insight into applicability to other systems are presented in the rest of this paper. Future integration with an EPICS (Experimental Physics Industrial Control System) based mini-CODAC (Control, Data Access and Communication) SCADA system is under consideration, and integration considerations will be briefly introduced.« less
A Measurement and Power Line Communication System Design for Renewable Smart Grids
NASA Astrophysics Data System (ADS)
Kabalci, E.; Kabalci, Y.
2013-10-01
The data communication over the electric power lines can be managed easily and economically since the grid connections are already spread around all over the world. This paper investigates the applicability of Power Line Communication (PLC) in an energy generation system that is based on photovoltaic (PV) panels with the modeling study in Matlab/Simulink. The Simulink model covers the designed PV panels, boost converter with Perturb and Observe (P&O) control algorithm, full bridge inverter, and the binary phase shift keying (BPSK) modem that is utilized to transfer the measured data over the power lines. This study proposes a novel method to use the electrical power lines not only for carrying the line voltage but also to transmit the measurements of the renewable energy generation plants. Hence, it is aimed at minimizing the additional monitoring costs such as SCADA, Ethernet-based or GSM based systems by using the proposed technique. Although this study is performed with solar power plants, the proposed model can be applied to other renewable generation systems. Consequently, the usage of the proposed technique instead of SCADA or Ethernet-based systems eliminates additional monitoring costs.
Algorithmic network monitoring for a modern water utility: a case study in Jerusalem.
Armon, A; Gutner, S; Rosenberg, A; Scolnicov, H
2011-01-01
We report on the design, deployment, and use of TaKaDu, a real-time algorithmic Water Infrastructure Monitoring solution, with a strong focus on water loss reduction and control. TaKaDu is provided as a commercial service to several customers worldwide. It has been in use at HaGihon, the Jerusalem utility, since mid 2009. Water utilities collect considerable real-time data from their networks, e.g. by means of a SCADA system and sensors measuring flow, pressure, and other data. We discuss how an algorithmic statistical solution analyses this wealth of raw data, flexibly using many types of input and picking out and reporting significant events and failures in the network. Of particular interest to most water utilities is the early detection capability for invisible leaks, also a means for preventing large visible bursts. The system also detects sensor and SCADA failures, various water quality issues, DMA boundary breaches, unrecorded or unintended network changes (like a valve or pump state change), and other events, including types unforeseen during system design. We discuss results from use at HaGihon, showing clear operational value.
Code of Federal Regulations, 2011 CFR
2011-10-01
... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...
Code of Federal Regulations, 2010 CFR
2010-10-01
... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...
Code of Federal Regulations, 2013 CFR
2013-10-01
... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...
Code of Federal Regulations, 2014 CFR
2014-10-01
... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...
Code of Federal Regulations, 2012 CFR
2012-10-01
... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...
Changing the Lines in the Coloring Book
2004-05-18
multitude of SCADA programmers creates a multitude of idiosyncratic programs, making it very difficult to know how to hack into large numbers of them...an observed pattern of hacking that would alert authorities seems not to have been discussed.) However, some SCADAs are not physically connected to the...normal hacking . Simultaneously, it would identify software vulnerabilities in other products and design viruses and worms for attacking them. (The
An ethernet/IP security review with intrusion detection applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Laughter, S. A.; Williams, R. D.
2006-07-01
Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IPmore » networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)« less
Applying Water-Level Difference Control to Central Arizona Project
USDA-ARS?s Scientific Manuscript database
The Central Arizona Project (CAP) has been supplying Colorado River water to Central Arizona for roughly 25 years. The CAP canal is operated remotely with a Supervisory Control and Data Acquisition (SCADA) System. Gate position changes are made either manually or through the use of automatic control...
Secure SCADA communication by using a modified key management scheme.
Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra
2013-07-01
This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.
Combating Memory Corruption Attacks On Scada Devices
NASA Astrophysics Data System (ADS)
Bellettini, Carlo; Rrushi, Julian
Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.
Improvement of the linear polarization resistance method for testing steel corrosion inhibitors
NASA Astrophysics Data System (ADS)
Faritov, A. T.; Rozhdestvenskii, Yu. G.; Yamshchikova, S. A.; Minnikhanova, E. R.; Tyusenkov, A. S.
2016-11-01
The linear polarization resistance method is used to improve the technique of corrosion control in liquid conducting according to GOST 9.514-99 (General Corrosion and Aging Protection System. Corrosion Inhibitors for Metals in Water Systems. Electrochemical Method of Determining the Protective Ability). Corrosion monitoring is shown to be performed by electronic devices with real-time data transfer to industrial controllers and SCADA systems.
Wake losses from averaged and time-resolved power measurements at full scale wind turbines
NASA Astrophysics Data System (ADS)
Castellani, Francesco; Astolfi, Davide; Mana, Matteo; Becchetti, Matteo; Segalini, Antonio
2017-05-01
This work deals with the experimental analysis of wake losses fluctuations at full-scale wind turbines. The test case is a wind farm sited on a moderately complex terrain: 4 turbines are installed, having 2 MW of rated power each. The sources of information are the time-resolved data, as collected from the OPC server, and the 10-minutes averaged SCADA data. The objective is to compare the statistical distributions of wake losses for far and middle wakes, as can be observed through the “fast” lens of time-resolved data, for certain selected test-case time series, and through the “slow” lens of SCADA data, on a much longer time basis that allow to set the standards of the mean wake losses along the wind farm. Further, time-resolved data are used for an insight into the spectral properties of wake fluctuations, highlighting the role of the wind turbine as low-pass filter. Summarizing, the wind rose, the layout of the site and the structure of the data sets at disposal allow to study middle and far wake behavior, with a “slow” and “fast” perspective.
A convergent model for distributed processing of Big Sensor Data in urban engineering networks
NASA Astrophysics Data System (ADS)
Parygin, D. S.; Finogeev, A. G.; Kamaev, V. A.; Finogeev, A. A.; Gnedkova, E. P.; Tyukov, A. P.
2017-01-01
The problems of development and research of a convergent model of the grid, cloud, fog and mobile computing for analytical Big Sensor Data processing are reviewed. The model is meant to create monitoring systems of spatially distributed objects of urban engineering networks and processes. The proposed approach is the convergence model of the distributed data processing organization. The fog computing model is used for the processing and aggregation of sensor data at the network nodes and/or industrial controllers. The program agents are loaded to perform computing tasks for the primary processing and data aggregation. The grid and the cloud computing models are used for integral indicators mining and accumulating. A computing cluster has a three-tier architecture, which includes the main server at the first level, a cluster of SCADA system servers at the second level, a lot of GPU video cards with the support for the Compute Unified Device Architecture at the third level. The mobile computing model is applied to visualize the results of intellectual analysis with the elements of augmented reality and geo-information technologies. The integrated indicators are transferred to the data center for accumulation in a multidimensional storage for the purpose of data mining and knowledge gaining.
The CMS tracker control system
NASA Astrophysics Data System (ADS)
Dierlamm, A.; Dirkes, G. H.; Fahrer, M.; Frey, M.; Hartmann, F.; Masetti, L.; Militaru, O.; Shah, S. Y.; Stringer, R.; Tsirou, A.
2008-07-01
The Tracker Control System (TCS) is a distributed control software to operate about 2000 power supplies for the silicon modules of the CMS Tracker and monitor its environmental sensors. TCS must thus be able to handle about 104 power supply parameters, about 103 environmental probes from the Programmable Logic Controllers of the Tracker Safety System (TSS), about 105 parameters read via DAQ from the DCUs in all front end hybrids and from CCUs in all control groups. TCS is built on top of an industrial SCADA program (PVSS) extended with a framework developed at CERN (JCOP) and used by all LHC experiments. The logical partitioning of the detector is reflected in the hierarchical structure of the TCS, where commands move down to the individual hardware devices, while states are reported up to the root which is interfaced to the broader CMS control system. The system computes and continuously monitors the mean and maximum values of critical parameters and updates the percentage of currently operating hardware. Automatic procedures switch off selected parts of the detector using detailed granularity and avoiding widespread TSS intervention.
Chen, Qian; Abercrombie, Robert K; Sheldon, Frederick T.
2015-09-23
Industrial Control Systems (ICS) are commonly used in industries such as oil and natural gas, transportation, electric, water and wastewater, chemical, pharmaceutical, pulp and paper, food and beverage, as well as discrete manufacturing (e.g., automotive, aerospace, and durable goods.) SCADA systems are generally used to control dispersed assets using centralized data acquisition and supervisory control.Originally, ICS implementations were susceptible primarily to local threats because most of their components were located in physically secure areas (i.e., ICS components were not connected to IT networks or systems). The trend toward integrating ICS systems with IT networks (e.g., efficiency and the Internet ofmore » Things) provides significantly less isolation for ICS from the outside world thus creating greater risk due to external threats. Albeit, the availability of ICS/SCADA systems is critical to assuring safety, security and profitability. Such systems form the backbone of our national cyber-physical infrastructure.Herein, we extend the concept of mean failure cost (MFC) to address quantifying availability to harmonize well with ICS security risk assessment. This new measure is based on the classic formulation of Availability combined with Mean Failure Cost (MFC). Finally, the metric offers a computational basis to estimate the availability of a system in terms of the loss that each stakeholder stands to sustain as a result of security violations or breakdowns (e.g., deliberate malicious failures).« less
Enhancing the cyber-security of smart grids with applications to synchrophasor data
NASA Astrophysics Data System (ADS)
Pal, Seemita
In the power grids, Supervisory Control and Data Acquisition (SCADA) systems are used as part of the Energy Management System (EMS) for enabling grid monitoring, control and protection. In recent times, with the ongoing installation of thousands of Phasor Measurement Units (PMUs), system operators are becoming increasingly reliant on PMU-generated synchrophasor measurements for executing wide-area monitoring and real-time control. The availability of PMU data facilitates dynamic state estimation of the system, thus improving the efficiency and resiliency of the grid. Since the SCADA and PMU data are used to make critical control decisions including actuation of physical systems, the timely availability and integrity of this networked data is of paramount importance. Absence or wrong control actions can potentially lead to disruption of operations, monetary loss, damage to equipments or surroundings or even blackout. This has posed new challenges to information security especially in this age of ever-increasing cyber-attacks. In this thesis, potential cyber-attacks on smart grids are presented and effective and implementable schemes are proposed for detecting them. The focus is mainly on three kinds of cyber-attacks and their detection: (i) gray-hole attacks on synchrophasor systems, (ii) PMU data manipulation attacks and (iii) data integrity attacks on SCADA systems. In the case of gray-hole attacks, also known as packet-drop attacks, the adversary may arbitrarily drop PMU data packets as they traverse the network, resulting in unavailability of time-sensitive data for the various critical power system applications. The fundamental challenge is to distinguish packets dropped by the adversary from those that occur naturally due to network congestion.The proposed gray-hole attack detection technique is based on exploiting the inherent timing information in the GPS time-stamped PMU data packets and using the temporal trends of the latencies to classify the cause of packet-drops and finally detect attacks, if any. In the case of PMU data manipulation attacks, the attacker may modify the data in the PMU packets in order to bias the system states and influence the control center into taking wrong decisions. The proposed detection technique is based on evaluating the equivalent impedances of the transmission lines and classifying the observed anomalies to determine the presence of attack and its location. The scheme for detecting data integrity attacks on SCADA systems is based on utilizing synchrophasor measurements from available PMUs in the grid. The proposed method uses a difference measure, developed in this thesis, to determine the relative divergence and mis-correlation between the datasets. Based on the estimated difference measure, tampered and genuine data can be distinguished. The proposed detection mechanisms have demonstrated high accuracy in real-time detection of attacks of various magnitudes, simulated on real PMU data obtained from the NY grid. By performing alarm clustering, the occurrence of false alarms has been reduced to almost zero. The solutions are computationally inexpensive, low on cost, do not add any overhead, and do not require any feedback from the network.
Application of Synchrophasor Measurements for Improving Situational Awareness of the Power System
NASA Astrophysics Data System (ADS)
Obushevs, A.; Mutule, A.
2018-04-01
The paper focuses on the application of synchrophasor measurements that present unprecedented benefits compared to SCADA systems in order to facilitate the successful transformation of the Nordic-Baltic-and-European electric power system to operate with large amounts of renewable energy sources and improve situational awareness of the power system. The article describes new functionalities of visualisation tools to estimate a grid inertia level in real time with monitoring results between Nordic and Baltic power systems.
2014-09-01
executable that is setuid root.4 fingerd The Morris worm exploited a buffer overflow in the fingerd program to gain unauthorized access to computer...in other taxonomies. There are still holes ; in fact, none of the vulnerabilities that Bishop discussed have a clear place in this taxonomy until a
2015-09-17
network intrusion detection systems NIST National Institute of Standards and Technology p-tree protocol tree PI protocol informatics PLC programmable logic...electrical, water, oil , natural gas, manufacturing, and pharmaceutical industries, to name a few. The differences between SCADA and DCS systems are often... Oil Company, also known as Saudi Aramco, suffered huge data loss that resulted in the disruption of daily operations for nearly two weeks [BTR13]. As it
Secure Control Systems for the Energy Sector
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Rhett; Campbell, Jack; Hadley, Mark
2012-03-31
Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use thismore » technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.« less
Simulation of wake effects between two wind farms
NASA Astrophysics Data System (ADS)
Hansen, K. S.; Réthoré, P.-E.; Palma, J.; Hevia, B. G.; Prospathopoulos, J.; Peña, A.; Ott, S.; Schepers, G.; Palomares, A.; van der Laan, M. P.; Volker, P.
2015-06-01
SCADA data, recorded on the downstream wind farm, has been used to identify flow cases with visible clustering effects. The inflow condition is derived from a partly undisturbed wind turbine, due to lack of mast measurements. The SCADA data analysis concludes that centre of the deficit for the downstream wind farm with disturbed inflow has a distinct visible maximum deficit zone located only 5-10D downstream from the entrance. This zone, representing 20-30% speed reduction, increases and moves downstream for increasing cluster effect and is not visible outside a flow sector of 20-30°. The eight flow models represented in this benchmark include both RANS models, mesoscale models and engineering models. The flow cases, identified according to the wind speed level and inflow sector, have been simulated and validated with the SCADA results. The model validation concludes that all models more or less are able to predict the location and size of the deficit zone inside the downwind wind farm.
Rotary Kiln Gasification of Solid Waste for Base Camps
2017-10-02
cup after full day run 3.3 Feedstock Handling System Garbage bags containing waste feedstock are placed into feed bin FB-101. Ram feeder RF-102...Environmental Science and Technology using the Factory Talk SCADA software running on a laptop computer. A wireless Ethernet router that is located within the...pyrolysis oil produced required consistent draining from the system during operation and became a liquid waste disposal problem. A 5-hour test run could
2006-09-01
and other forms of Internet research were used to confirm the relevance of the OUI to control system reconnaissance. I assigned a subjective level...equipment 4 = Confirmed with Internet research 5 = Suspected with Internet research OUI Organization Confidence Notes 00:00:0A Omron Tateisi...IP Vendor List 2 = Cross Referenced with IANA port list 3 = Confirmed with lab equipment 4 = Confirmed with Internet research 5 = Suspected with
Programmable logic controller optical fibre sensor interface module
NASA Astrophysics Data System (ADS)
Allwood, Gary; Wild, Graham; Hinckley, Steven
2011-12-01
Most automated industrial processes use Distributed Control Systems (DCSs) or Programmable Logic Controllers (PLCs) for automated control. PLCs tend to be more common as they have much of the functionality of DCSs, although they are generally cheaper to install and maintain. PLCs in conjunction with a human machine interface form the basis of Supervisory Control And Data Acquisition (SCADA) systems, combined with communication infrastructure and Remote Terminal Units (RTUs). RTU's basically convert different sensor measurands in to digital data that is sent back to the PLC or supervisory system. Optical fibre sensors are becoming more common in industrial processes because of their many advantageous properties. Being small, lightweight, highly sensitive, and immune to electromagnetic interference, means they are an ideal solution for a variety of diverse sensing applications. Here, we have developed a PLC Optical Fibre Sensor Interface Module (OFSIM), in which an optical fibre is connected directly to the OFSIM located next to the PLC. The embedded fibre Bragg grating sensors, are highly sensitive and can detect a number of different measurands such as temperature, pressure and strain without the need for a power supply.
2013-12-01
21 a. Siberian Pipeline Explosion (1982) ............................21 b. Chevron Emergency Alert...the fifth domain: Are the mouse and keyboard the new weapons of conflict?,” The Economist, July 1, 2010, http://www.economist.com/node/16478792. 15...a. Siberian Pipeline Explosion (1982) In 1982, intruders planted a Trojan horse in the SCADA system that controls the Siberian Pipeline. This is the
NASA Astrophysics Data System (ADS)
Varela Rodriguez, F.
2011-12-01
The control system of each of the four major Experiments at the CERN Large Hadron Collider (LHC) is distributed over up to 160 computers running either Linux or Microsoft Windows. A quick response to abnormal situations of the computer infrastructure is crucial to maximize the physics usage. For this reason, a tool was developed to supervise, identify errors and troubleshoot such a large system. Although the monitoring of the performance of the Linux computers and their processes was available since the first versions of the tool, it is only recently that the software package has been extended to provide similar functionality for the nodes running Microsoft Windows as this platform is the most commonly used in the LHC detector control systems. In this paper, the architecture and the functionality of the Windows Management Instrumentation (WMI) client developed to provide centralized monitoring of the nodes running different flavour of the Microsoft platform, as well as the interface to the SCADA software of the control systems are presented. The tool is currently being commissioned by the Experiments and it has already proven to be very efficient optimize the running systems and to detect misbehaving processes or nodes.
2015-05-01
application ,1 while the simulated PLC software is the open source ModbusPal Java application . When queried using the Modbus TCP protocol, ModbusPal reports...and programmable logic controller ( PLC ) components. The HMI and PLC components were instantiated with software and installed in multiple virtual...creating and capturing HMI– PLC network traffic over a 24-h period in the virtualized network and inspect the packets for errors. Test the
An Architectural Framework for Describing Supervisory Control and Data Acquisition (SCADA) Systems
2004-09-01
having one of two possible values, described as 0 or 1. Boundary A logical segregation of related components in a system. The segregation may be based ...Depending on the sophistication of the microcontroller in the RTU, it can be configured to act as a relay station for other RTUs which cannot...communicate directly with a master station, or the microcontroller can communicate on a peer-to-peer basis with other RTUs. RTUs are generally remotely
Hailey, P A; Doherty, P; Tapsell, P; Oliver, T; Aldridge, P K
1996-03-01
An automated system for the on-line monitoring of powder blending processes is described. The system employs near-infrared (NIR) spectroscopy using fibre-optics and a graphical user interface (GUI) developed in the LabVIEW environment. The complete supervisory control and data analysis (SCADA) software controls blender and spectrophotometer operation and performs statistical spectral data analysis in real time. A data analysis routine using standard deviation is described to demonstrate an approach to the real-time determination of blend homogeneity.
Cyber Security Testing and Training Programs for Industrial Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Daniel Noyes
2012-03-01
Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less
Terra Defender Cyber-Physical Wargame
2017-04-01
Army position unless so designated by other authorized documents. Citation of manufacturer’s or trade names does not constitute an official...person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control ...helped to achieve a better understanding of how Army supervisory control and data acquisition (SCADA) system and device security can be modeled and
2013-01-01
tremendously dangerous and sophisticated virus that successfully attacked a SCADA system is now available for free on the Internet, where one can find...security for the public and private sectors. To develop this capability, the Nation needs to undergo a paradigm shift on how it views the cyber... for communications and trade were extraordinarily important for the security and prosperity of Britain. Today, the security and prosperity of the
Analysis of synchronous and induction generators used at hydroelectric power plant
NASA Astrophysics Data System (ADS)
Diniş, C. M.; Popa, G. N.; lagăr, A.
2017-01-01
In this paper is presented an analysis of the operating electric generators (synchronous and induction) within a small capacity hydroelectric power plant. Such is treated the problem of monitoring and control hydropower plant using SCADA systems. Have been carried an experimental measurements in small hydropower plant for different levels of water in the lake and various settings of the operating parameters.
Including operational data in QMRA model: development and impact of model inputs.
Jaidi, Kenza; Barbeau, Benoit; Carrière, Annie; Desjardins, Raymond; Prévost, Michèle
2009-03-01
A Monte Carlo model, based on the Quantitative Microbial Risk Analysis approach (QMRA), has been developed to assess the relative risks of infection associated with the presence of Cryptosporidium and Giardia in drinking water. The impact of various approaches for modelling the initial parameters of the model on the final risk assessments is evaluated. The Monte Carlo simulations that we performed showed that the occurrence of parasites in raw water was best described by a mixed distribution: log-Normal for concentrations > detection limit (DL), and a uniform distribution for concentrations < DL. The selection of process performance distributions for modelling the performance of treatment (filtration and ozonation) influences the estimated risks significantly. The mean annual risks for conventional treatment are: 1.97E-03 (removal credit adjusted by log parasite = log spores), 1.58E-05 (log parasite = 1.7 x log spores) or 9.33E-03 (regulatory credits based on the turbidity measurement in filtered water). Using full scale validated SCADA data, the simplified calculation of CT performed at the plant was shown to largely underestimate the risk relative to a more detailed CT calculation, which takes into consideration the downtime and system failure events identified at the plant (1.46E-03 vs. 3.93E-02 for the mean risk).
Hacker tracking Security system for HMI
NASA Astrophysics Data System (ADS)
Chauhan, Rajeev Kumar
2011-12-01
Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.
Cyber: A Flexible Deterrent Option
2013-02-14
to come on when they throw a switch and other electrical appliances throughout the house to work without any commercial power interruption. For...power plants this means maintaining the electrical grid and the supervisory control and data acquisition (SCADA) systems at a reliable rate of “99.99999...on the grid.”36 The researchers “simply instructed it to make rapid changes in the electricity cycles that powered the equipment: fast, slow, fast
External Verification of SCADA System Embedded Controller Firmware
2012-03-01
microprocessor and read-only memory (ROM) or flash memory for storing firmware and control logic [5],[8]. A PLC typically has three software levels as shown in...implementing different firmware. Because PLCs are in effect a microprocessor device, an analysis of the current research on embedded devices is important...Electronics Engineers (IEEE) published a 15 best practices guide for firmware control on microprocessors [44]. IEEE suggests that microprocessors
2014-06-01
SCADA / ICS Cyber Test Lab initiated in 2013 Psychosocial – academic research exists,; opportunity for sharing and developing impact assessment...ecosystems and species at risk), accidents / system failure (rail; pipelines ; ferries CSSP strategy for the North Focus on regional l(and local) problem...Guidance; business planning; environmental scan; proposal evaluation; and performance measurement Program Risk Management – Guidelines for project
Towards A Taxonomy Of Attacks Against Energy Control Systems
NASA Astrophysics Data System (ADS)
Fleury, Terry; Khurana, Himanshu; Welch, Von
Control systems in the energy sector (e.g., supervisory control and data acquisition (SCADA) systems) involve a hierarchy of sensing, monitoring and control devices connected to centralized control stations or centers. The incorporation of commercial off-the-shelf technologies in energy control systems makes them vulnerable to cyber attacks. A taxonomy of cyber attacks against control systems can assist the energy sector in managing the cyber threat. This paper takes the first step towards a taxonomy by presenting a comprehensive model of attacks, vulnerabilities and damage related to control systems. The model is populated based on a survey of the technical literature from industry, academia and national laboratories.
Application of PMU-Based Information in the Indian Power System
NASA Astrophysics Data System (ADS)
Agarwal, P. K.; Agarwal, V. K.; Rathour, Harish
2013-05-01
SCADA/EMS system has been the most commonly used tool for real-time power system operation and control throughout the world. This system has been found to be very useful in steady-state analysis of the power system. The ever-increasing dependence of human society and every country's economy on electrical energy calls for reliable power delivery. In order to meet these expectations, engineers across the globe have been exploring such new technologies that can improve upon the limitations of SCADA and provide dynamic visibility of the power system. A breakthrough has now been achieved in the form of synchrophasor technology. Synchrophasor measurements using phasor measurement units (PMUs) deployed over a wide area, facilitate dynamic state measurement and visualization of a power system, which are useful in monitoring safety and security of the grid. The Power System Operation Corporation (POSOCO) has taken initiative and implemented a pilot project wherein nine phasor measurement units (PMUs) along with one phasor data concentrator (PDC) were commissioned in the Northern Region (NR) of India. The primary objective of this pilot project was to comprehend the synchrophasor technology and its applications in power system operation. The data received and information derived from the pilot project have been found to be very useful and helped in improving the performance of the grid operation in several ways. The pilot project is operational for the last two years; in the meanwhile, many other initiatives have also been taken in other regions by POSOCO. This article details the utilization of the data collected from the pilot projects and the application of the data in the improvement of Indian power grid.
NASA Astrophysics Data System (ADS)
Bazhin, V. Yu; Danilov, I. V.; Petrov, P. A.
2018-05-01
During the casting of light alloys and ligatures based on aluminum and magnesium, problems of the qualitative distribution of the metal and its crystallization in the mold arise. To monitor the defects of molds on the casting conveyor, a camera with a resolution of 780 x 580 pixels and a shooting rate of 75 frames per second was selected. Images of molds from casting machines were used as input data for neural network algorithm. On the preparation of a digital database and its analytical evaluation stage, the architecture of the convolutional neural network was chosen for the algorithm. The information flow from the local controller is transferred to the OPC server and then to the SCADA system of foundry. After the training, accuracy of neural network defect recognition was about 95.1% on a validation split. After the training, weight coefficients of the neural network were used on testing split and algorithm had identical accuracy with validation images. The proposed technical solutions make it possible to increase the efficiency of the automated process control system in the foundry by expanding the digital database.
A computer network with scada and case tools for on-line process control in greenhouses
NASA Astrophysics Data System (ADS)
Gieling, Th. H.; van Meurs, W. Th. M.; Janssen, H. J. J.
Climate control computers in greenhouses are used to control heating and ventilation, supply water and dilute and dispense nutrients. They integrate models into optimally controlled systems. This paper describes how information technology, as in use in other sectors of industry, is applied to greenhouse control. The introduction of modern software and hardware concepts in horticulture adds power and extra opportunities to climate control in greenhouses.
A computer network with SCADA and case tools for on-line process control in greenhouses.
Gieling ThH; van Meurs WTh; Janssen, H J
1996-01-01
Climate control computers in greenhouses are used to control heating and ventilation, supply water and dilute and dispense nutrients. They integrate models into optimally controlled systems. This paper describes how information technology, as in use in other sectors of industry, is applied to greenhouse control. The introduction of modern software and hardware concepts in horticulture adds power and extra oppurtunities to climate contol in greenhouses.
America’s Achilles Heel: Defense Against High-altitude Electromagnetic Pulse-policy vs. Practice
2014-12-12
Directives SCADA Supervisory Control and Data Acquisition Systems SHIELD Act Secure High-voltage Infrastructure for Electricity from Lethal Damage Act...take place, it is important to understand the effects of the components of EMP from a high-altitude nuclear detonation. The requirements for shielding ...Mass Ejection (CME). A massive, bubble-shaped burst of plasma expanding outward from the Sun’s corona, in which large amounts of superheated
PV-Diesel Hybrid SCADA Experiment Network Design
NASA Technical Reports Server (NTRS)
Kalu, Alex; Durand, S.; Emrich, Carol; Ventre, G.; Wilson, W.; Acosta, R.
1999-01-01
The essential features of an experimental network for renewable power system satellite based supervisory, control and data acquisition (SCADA) are communication links, controllers, diagnostic equipment and a hybrid power system. Required components for implementing the network consist of two satellite ground stations, to satellite modems, two 486 PCs, two telephone receivers, two telephone modems, two analog telephone lines, one digital telephone line, a hybrid-power system equipped with controller and a satellite spacecraft. In the technology verification experiment (TVE) conducted by Savannah State University and Florida Solar Energy Center, the renewable energy hybrid system is the Apex-1000 Mini-Hybrid which is equipped with NGC3188 for user interface and remote control and the NGC2010 for monitoring and basic control tasks. This power system is connected to a satellite modem via a smart interface, RS232. Commands are sent to the power system control unit through a control PC designed as PC1. PC1 is thus connected to a satellite model through RS232. A second PC, designated PC2, the diagnostic PC is connected to both satellite modems via separate analog telephone lines for checking modems'health. PC2 is also connected to PC1 via a telephone line. Due to the unavailability of a second ground station for the ACTS, one ground station is used to serve both the sending and receiving functions in this experiment. Signal is sent from the control PC to the Hybrid system at a frequency f(sub 1), different from f(sub 2), the signal from the hybrid system to the control PC. f(sub l) and f(sub 2) are sufficiently separated to avoid interference.
A project of upgrading the operations control system of the Hungarian electric power system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Oroszki, L.; Kovacs, G.
About 20 years ago an on-line EMS/SCADA system replaced the previously used off-line control system in the Hungarian power system. The system that has met the technological requirements of that time now became obsolete. A project started in 1995 by the Hungarian Power Companies, Ltd. (MVM Rt.), the regional utility companies and the power plant companies, with funding through a World Bank loan to cover international procurement, aims to upgrade that system into a complex, intelligent and state-of-the-art process control system. The new hierarchical system will rely on a distributed computer network structure, universally accepted hardware/software interface standards and communicationmore » protocols and use hardware platform independent software. The automatic generation control, performed from the National Dispatch Centre, will have expanded functionality, the most important single item of this will be the inclusion of automatic voltage/var control. The upgrading project includes the replacement of the substation and power plant remote terminal units and the installation of a telecommunication network to provide this telecontrol system with the necessary communications links. The supply contracts for both the master station and the remote terminal unit parts were awarded to the winners of open international bidding processes. In the project implementation MVM has the overall responsibility and works with assistance from international and Hungarian engineering firms.« less
Wei, Yawei; Venayagamoorthy, Ganesh Kumar
2017-09-01
To prevent large interconnected power system from a cascading failure, brownout or even blackout, grid operators require access to faster than real-time information to make appropriate just-in-time control decisions. However, the communication and computational system limitations of currently used supervisory control and data acquisition (SCADA) system can only deliver delayed information. However, the deployment of synchrophasor measurement devices makes it possible to capture and visualize, in near-real-time, grid operational data with extra granularity. In this paper, a cellular computational network (CCN) approach for frequency situational intelligence (FSI) in a power system is presented. The distributed and scalable computing unit of the CCN framework makes it particularly flexible for customization for a particular set of prediction requirements. Two soft-computing algorithms have been implemented in the CCN framework: a cellular generalized neuron network (CCGNN) and a cellular multi-layer perceptron network (CCMLPN), for purposes of providing multi-timescale frequency predictions, ranging from 16.67 ms to 2 s. These two developed CCGNN and CCMLPN systems were then implemented on two different scales of power systems, one of which installed a large photovoltaic plant. A real-time power system simulator at weather station within the Real-Time Power and Intelligent Systems (RTPIS) laboratory at Clemson, SC, was then used to derive typical FSI results. Copyright © 2017 Elsevier Ltd. All rights reserved.
Full load estimation of an offshore wind turbine based on SCADA and accelerometer data
NASA Astrophysics Data System (ADS)
Noppe, N.; Iliopoulos, A.; Weijtjens, W.; Devriendt, C.
2016-09-01
As offshore wind farms (OWFs) grow older, the optimal use of the actual fatigue lifetime of an offshore wind turbine (OWT) and predominantly its foundation will get more important. In case of OWTs, both quasi-static wind/thrust loads and dynamic loads, as induced by turbulence, waves and the turbine's dynamics, contribute to its fatigue life progression. To estimate the remaining useful life of an OWT, the stresses acting on the fatigue critical locations within the structure should be monitored continuously. Unfortunately, in case of the most common monopile foundations these locations are often situated below sea-level and near the mud line and thus difficult or even impossible to access for existing OWTs. Actual strain measurements taken at accessible locations above the sea level show a correlation between thrust load and several SCADA parameters. Therefore a model is created to estimate the thrust load using SCADA data and strain measurements. Afterwards the thrust load acting on the OWT is estimated using the created model and SCADA data only. From this model the quasi static loads on the foundation can be estimated over the lifetime of the OWT. To estimate the contribution of the dynamic loads a modal decomposition and expansion based virtual sensing technique is applied. This method only uses acceleration measurements recorded at accessible locations on the tower. Superimposing both contributions leads to a so-called multi-band virtual sensing. The result is a method that allows to estimate the strain history at any location on the foundation and thus the full load, being a combination of both quasi-static and dynamic loads, acting on the entire structure. This approach is validated using data from an operating Belgian OWF. An initial good match between measured and predicted strains for a short period of time proofs the concept.
Dynamic online sewer modelling in Helsingborg.
Hernebring, C; Jönsson, L E; Thorén, U B; Møller, A
2002-01-01
Within the last decade, the sewer system in Helsingborg, Sweden has been rehabilitated in many ways along with the reconstruction of the WWTP Oresundsverket in order to obtain a high degree of nitrogen and phosphorus removal. In that context a holistic view has been applied in order to optimise the corrective measures as seen from the effects in the receiving waters. A sewer catchment model has been used to evaluate several operation strategies and the effect of introducing RTC. Recently, a MOUSE ONLINE system was installed. In this phase the objective is to establish a stable communication with the SCADA system and to generate short-term flow forecasts.
Descriptive Model of Generic WAMS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hauer, John F.; DeSteese, John G.
The Department of Energy’s (DOE) Transmission Reliability Program is supporting the research, deployment, and demonstration of various wide area measurement system (WAMS) technologies to enhance the reliability of the Nation’s electrical power grid. Pacific Northwest National Laboratory (PNNL) was tasked by the DOE National SCADA Test Bed Program to conduct a study of WAMS security. This report represents achievement of the milestone to develop a generic WAMS model description that will provide a basis for the security analysis planned in the next phase of this study.
NASA Astrophysics Data System (ADS)
Iungo, Giacomo Valerio; Camarri, Simone; Ciri, Umberto; El-Asha, Said; Leonardi, Stefano; Rotea, Mario A.; Santhanagopalan, Vignesh; Viola, Francesco; Zhan, Lu
2016-11-01
Site conditions, such as topography and local climate, as well as wind farm layout strongly affect performance of a wind power plant. Therefore, predictions of wake interactions and their effects on power production still remain a great challenge in wind energy. For this study, an onshore wind turbine array was monitored through lidar measurements, SCADA and met-tower data. Power losses due to wake interactions were estimated to be approximately 4% and 2% of the total power production under stable and convective conditions, respectively. This dataset was then leveraged for the calibration of a data driven RANS (DDRANS) solver, which is a compelling tool for prediction of wind turbine wakes and power production. DDRANS is characterized by a computational cost as low as that for engineering wake models, and adequate accuracy achieved through data-driven tuning of the turbulence closure model. DDRANS is based on a parabolic formulation, axisymmetry and boundary layer approximations, which allow achieving low computational costs. The turbulence closure model consists in a mixing length model, which is optimally calibrated with the experimental dataset. Assessment of DDRANS is then performed through lidar and SCADA data for different atmospheric conditions. This material is based upon work supported by the National Science Foundation under the I/UCRC WindSTAR, NSF Award IIP 1362033.
Tappura, K
2001-08-15
An adjustable-barrier dihedral angle potential was added as an extension to a novel, previously presented soft-core potential to study its contribution to the efficacy of the search of the conformational space in molecular dynamics. As opposed to the conventional soft-core potential functions, the leading principle in the design of the new soft-core potential, as well as of its extension, the soft-core and adjustable-barrier dihedral angle (SCADA) potential (referred as the SCADA potential), was to maintain the main equilibrium properties of the original force field. This qualifies the methods for a variety of a priori modeling problems without need for additional restraints typically required with the conventional soft-core potentials. In the present study, the different potential energy functions are applied to the problem of predicting loop conformations in proteins. Comparison of the performance of the soft-core and SCADA potential showed that the main hurdles for the efficient sampling of the conformational space of (loops in) proteins are related to the high-energy barriers caused by the Lennard-Jones and Coulombic energy terms, and not to the rotational barriers, although the conformational search can be further enhanced by lowering the rotational barriers of the dihedral angles. Finally, different evaluation methods were studied and a few promising criteria found to distinguish the near-native loop conformations from the wrong ones.
Providing security for automated process control systems at hydropower engineering facilities
NASA Astrophysics Data System (ADS)
Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.
2016-12-01
This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
2012-08-09
Sophia Daemon Version 12 contains the code that is exclusively used by the sophiad application. It runs as a service on a Linux host and analyzes network traffic obtained from libpcap and produces a network fingerprint based on hosts and channels. Sophia Daemon Version 12 can, if desired by the user, produce alerts when its fingerprint changes. Sophia Daemon Version 12 can receive data from another Sophia Daemon or raw packet data. It can output data to another Sophia Daemon Version 12, OglNet Version 12 or MySQL. Sophia Daemon Version 12 runs in a passive real-time manner that allows itmore » to be used on a SCADA network. Its network fingerprint is designed to be applicable to SCADA networks rather than general IT networks.« less
Optimization of the central automatic control of a small Dutch sewer system
NASA Astrophysics Data System (ADS)
Kolechkina, A. G.; Hoes, O. A. C.
2012-04-01
A sewer control system was developed in the context of a subsidized project aiming at improvement of surface water quality by control of sewer systems and surface water systems. The project was coordinated by the local water board, "Waterschap Hollandse Delta". Other participants were Delft University of Technology, Deltares and the municipalities Strijen, Cromstrijen, Westmaas, Oud Beijerland and Piershil. As part of the project there were two pilot implementations where a central automatic controller was coupled to the existing SCADA system. For these two pilots the system is now operational. A Dutch urban area in the western part of the Netherlands is usually part of a polder, which is effectively an artificially drained catchment. The urban area itself is split into small subcatchments that manage runoff in different ways. In all cases a large fraction goes into the natural hydrological cycle, but, depending on the design of the local sewer system, a larger or smaller part finds its way into the sewer system. Proper control of this flow is necessary to control surface water quality and to avoid health risks from flow from the sewer into the streets. At each time step the controller switches pumps to distribute the remaining water in the system at the end of the time step over the different subcatchments. The distribution is created based on expert judgment of the relative vulnerability and subcatchment sewer system water quality. It is implemented in terms curves of total system stored volume versus subcatchment stored volume. We describe the process of the adaptation of a controller to two different sewer systems and the understanding of the artificial part of the catchment we gained during this process. In the process of adaptation the type of sewer system (combined foul water and storm water transport or separate foul water and storm water transport) played a major role.
LHCb Online event processing and filtering
NASA Astrophysics Data System (ADS)
Alessio, F.; Barandela, C.; Brarda, L.; Frank, M.; Franek, B.; Galli, D.; Gaspar, C.; Herwijnen, E. v.; Jacobsson, R.; Jost, B.; Köstner, S.; Moine, G.; Neufeld, N.; Somogyi, P.; Stoica, R.; Suman, S.
2008-07-01
The first level trigger of LHCb accepts one million events per second. After preprocessing in custom FPGA-based boards these events are distributed to a large farm of PC-servers using a high-speed Gigabit Ethernet network. Synchronisation and event management is achieved by the Timing and Trigger system of LHCb. Due to the complex nature of the selection of B-events, which are the main interest of LHCb, a full event-readout is required. Event processing on the servers is parallelised on an event basis. The reduction factor is typically 1/500. The remaining events are forwarded to a formatting layer, where the raw data files are formed and temporarily stored. A small part of the events is also forwarded to a dedicated farm for calibration and monitoring. The files are subsequently shipped to the CERN Tier0 facility for permanent storage and from there to the various Tier1 sites for reconstruction. In parallel files are used by various monitoring and calibration processes running within the LHCb Online system. The entire data-flow is controlled and configured by means of a SCADA system and several databases. After an overview of the LHCb data acquisition and its design principles this paper will emphasize the LHCb event filter system, which is now implemented using the final hardware and will be ready for data-taking for the LHC startup. Control, configuration and security aspects will also be discussed.
Study on Cyber Security and Threat Evaluation in SCADA Systems
2012-03-01
la sécurité de l’infrastructure essentielle du Canada. DRDC CSS CR 2012-06 vii • Les cadres de gestion des cybermenaces et des ...Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2012 DRDC CSS CR 2012-06 i Abstract …….. This...ii DRDC CSS CR 2012-06 Résumé …..... Le présent rapport fait la synthèse des résultats du projet PTSP 02-0347eSec
Wind turbine wake measurement in complex terrain
NASA Astrophysics Data System (ADS)
Hansen, KS; Larsen, GC; Menke, R.; Vasiljevic, N.; Angelou, N.; Feng, J.; Zhu, WJ; Vignaroli, A.; W, W. Liu; Xu, C.; Shen, WZ
2016-09-01
SCADA data from a wind farm and high frequency time series measurements obtained with remote scanning systems have been analysed with focus on identification of wind turbine wake properties in complex terrain. The analysis indicates that within the flow regime characterized by medium to large downstream distances (more than 5 diameters) from the wake generating turbine, the wake changes according to local atmospheric conditions e.g. vertical wind speed. In very complex terrain the wake effects are often “overruled” by distortion effects due to the terrain complexity or topology.
NASA Astrophysics Data System (ADS)
Yakunin, A. G.; Hussein, H. M.
2017-08-01
An example of information-measuring systems for climate monitoring and operational control of energy resources consumption of the university campus that is functioning in the Altai State Technical University since 2009. The advantages of using such systems for studying various physical processes are discussed. General principles of construction of similar systems, their software, hardware and algorithmic support are considered. It is shown that their fundamental difference from traditional SCADA - systems is the use of databases for storing the results of the observation with a specialized data structure, and by preprocessing of the input signal for its compression. Another difference is the absence of clear criteria for detecting the anomalies in the time series of the observed process. The examples of algorithms that solve this problem are given.
Joseph, Leena; Das, A P; Ravindra, Anuradha; Kulkarni, D B; Kulkarni, M S
2018-07-01
4πβ-γ coincidence method is a powerful and widely used method to determine the absolute activity concentration of radioactive solutions. A new automated liquid scintillator based coincidence system has been designed, developed, tested and established as absolute standard for radioactivity measurements. The automation is achieved using PLC (programmable logic controller) and SCADA (supervisory control and data acquisition). Radioactive solution of 60 Co was standardized to compare the performance of the automated system with proportional counter based absolute standard maintained in the laboratory. The activity concentrations determined using these two systems were in very good agreement; the new automated system can be used for absolute measurement of activity concentration of radioactive solutions. Copyright © 2018. Published by Elsevier Ltd.
Scada Malware, a Proof of Concept
NASA Astrophysics Data System (ADS)
Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto
Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Network technologies into such complex critical systems. Of particular interest are the set of vulnerabilities related to the class of communication protocols normally known as “SCADA” protocols, under which fall all the communication protocols used to remotely control the RTU devices of an industrial system. In this paper we present a proof of concept of the potential effects of a set of computer malware specifically designed and created in order to impact, by taking advantage of some vulnerabilities of the ModBUS protocol, on a typical Supervisory Control and Data Acquisition system.
How Accurate Is A Hydraulic Model? | Science Inventory | US ...
Symposium paper Network hydraulic models are widely used, but their overall accuracy is often unknown. Models are developed to give utilities better insight into system hydraulic behavior, and increasingly the ability to predict the fate and transport of chemicals. Without an accessible and consistent means of validating a given model against the system it is meant to represent, the value of those supposed benefits should be questioned. Supervisory Control And Data Acquisition (SCADA) databases, though ubiquitous, are underused data sources for this type of task. Integrating a network model with a measurement database would offer professionals the ability to assess the model’s assumptions in an automated fashion by leveraging enormous amounts of data.
Visually enhanced CCTV digital surveillance utilizing Intranet and Internet.
Ozaki, Nobuyuki
2002-07-01
This paper describes a solution for integrated plant supervision utilizing closed circuit television (CCTV) digital surveillance. Three basic requirements are first addressed as the platform of the system, with discussion on the suitable video compression. The system configuration is described in blocks. The system provides surveillance functionality: real-time monitoring, and process analysis functionality: a troubleshooting tool. This paper describes the formulation of practical performance design for determining various encoder parameters. It also introduces image processing techniques for enhancing the original CCTV digital image to lessen the burden on operators. Some screenshots are listed for the surveillance functionality. For the process analysis, an image searching filter supported by image processing techniques is explained with screenshots. Multimedia surveillance, which is the merger with process data surveillance, or the SCADA system, is also explained.
Development of an automatic subsea blowout preventer stack control system using PLC based SCADA.
Cai, Baoping; Liu, Yonghong; Liu, Zengkai; Wang, Fei; Tian, Xiaojie; Zhang, Yanzhen
2012-01-01
An extremely reliable remote control system for subsea blowout preventer stack is developed based on the off-the-shelf triple modular redundancy system. To meet a high reliability requirement, various redundancy techniques such as controller redundancy, bus redundancy and network redundancy are used to design the system hardware architecture. The control logic, human-machine interface graphical design and redundant databases are developed by using the off-the-shelf software. A series of experiments were performed in laboratory to test the subsea blowout preventer stack control system. The results showed that the tested subsea blowout preventer functions could be executed successfully. For the faults of programmable logic controllers, discrete input groups and analog input groups, the control system could give correct alarms in the human-machine interface. Copyright © 2011 ISA. Published by Elsevier Ltd. All rights reserved.
Key management schemes using routing information frames in secure wireless sensor networks
NASA Astrophysics Data System (ADS)
Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.
2017-01-01
The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.
Use of Fuzzy Logic Systems for Assessment of Primary Faults
NASA Astrophysics Data System (ADS)
Petrović, Ivica; Jozsa, Lajos; Baus, Zoran
2015-09-01
In electric power systems, grid elements are often subjected to very complex and demanding disturbances or dangerous operating conditions. Determining initial fault or cause of those states is a difficult task. When fault occurs, often it is an imperative to disconnect affected grid element from the grid. This paper contains an overview of possibilities for using fuzzy logic in an assessment of primary faults in the transmission grid. The tool for this task is SCADA system, which is based on information of currents, voltages, events of protection devices and status of circuit breakers in the grid. The function model described with the membership function and fuzzy logic systems will be presented in the paper. For input data, diagnostics system uses information of protection devices tripping, states of circuit breakers and measurements of currents and voltages before and after faults.
External access to ALICE controls conditions data
NASA Astrophysics Data System (ADS)
Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.
2014-06-01
ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.
Brazil upgrades microwave system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Newman, H.S.; Gomes, H.P.
1979-02-01
To provide communications facilities necessary during major construction projects, and for the operation and control of the expanding electric-power network, in 1967 Furnas-Centrais Eletricas SA, Brazil, started installing the first 22 links of its microwave system, from the Botafogo plant in Rio de Janeiro to the Furnas hydro station, and from the Furnas hydro station, southwest, to the Guarulhos plant in Sao Paulo and northwest to the Estreito hydro plant. To accommodate the construction of additional hydroelectric facilities, the second and third microwave-system expansions added nine links from Estreito hydro, northwest, to Marimbondo hydro and 7 links to Itumbiara. Themore » fourth expansion included two links to connect with the Angra dos Reis nuclear generating plant. A modern SCADA system replaced an earlier fault-reporting method, and a means of monitoring performance communications was established.« less
An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems
NASA Astrophysics Data System (ADS)
Hieb, Jeffrey; Graham, James; Guan, Jian
This paper presents an ontological framework that permits formal representations of process control systems, including elements of the process being controlled and the control system itself. A fault diagnosis algorithm based on the ontological model is also presented. The algorithm can identify traditional process elements as well as control system elements (e.g., IP network and SCADA protocol) as fault sources. When these elements are identified as a likely fault source, the possibility exists that the process fault is induced by a cyber intrusion. A laboratory-scale distillation column is used to illustrate the model and the algorithm. Coupled with a well-defined statistical process model, this fault diagnosis approach provides cyber security enhanced fault diagnosis information to plant operators and can help identify that a cyber attack is underway before a major process failure is experienced.
Cryogenic Control System Migration and Developments towards the UNICOS CERN Standard at INFN
NASA Astrophysics Data System (ADS)
Modanese, Paolo; Calore, Andrea; Contran, Tiziano; Friso, Alessandro; Pengo, Marco; Canella, Stefania; Burioli, Sergio; Gallese, Benedetto; Inglese, Vitaliano; Pezzetti, Marco; Pengo, Ruggero
The cryogenic control systems at Laboratori Nazionali di Legnaro (LNL) are undergoing an important and radical modernization, allowing all the plants controls and supervision systems to be renewed in a homogeneous way towards the CERN-UNICOS standard. Before the UNICOS migration project started there were as many as 7 different types of PLC and 7 different types of SCADA, each one requiring its own particular programming language. In these conditions, even a simple modification and/or integration on the program or on the supervision, required the intervention of a system integrator company, specialized in its specific control system. Furthermore it implied that the operators have to be trained to learn the different types of control systems. The CERN-UNICOS invented for LHC [1] has been chosen due to its reliability and planned to run and be maintained for decades on. The complete migration is part of an agreement between CERN and INFN.
Operational uses of ACTS technology
NASA Astrophysics Data System (ADS)
Gedney, Richard T.; Wright, David L.; Balombin, Joseph L.; Sohn, Philip Y.; Cashman, William F.; Stern, Alan L.; Golding, Len; Palmer, Larry
1992-03-01
The NASA Advanced Communications Technology Satellite (ACTS) provides the technologies for very high gain hopping spot beam antennas, on-board baseband routing and processing, and wideband (1 GHz) Ka-band transponders. A number of studies have recently been completed using the experience gained in developing the actual ACTS system hardware to quantify how well the ACTS technology can be used in future operational systems. This paper provides a summary of these study results including the spacecraft (S/C) weight per unit circuit for providing services by ACTS technologies as compared to present-day satellites. The uses of the ACTS technology discussed are for providing T1 VSAT mesh networks, aeronautical mobile communications, supervisory control and data acquisition (SCADA) services, and high data rate networks for supercomputer and other applications.
NASA Astrophysics Data System (ADS)
Koestner, Stefan
2009-09-01
With the increasing size and degree of complexity of today's experiments in high energy physics the required amount of work and complexity to integrate a complete subdetector into an experiment control system is often underestimated. We report here on the layered software structure and protocols used by the LHCb experiment to control its detectors and readout boards. The experiment control system of LHCb is based on the commercial SCADA system PVSS II. Readout boards which are outside the radiation area are accessed via embedded credit card sized PCs which are connected to a large local area network. The SPECS protocol is used for control of the front end electronics. Finite state machines are introduced to facilitate the control of a large number of electronic devices and to model the whole experiment at the level of an expert system.
NASA Astrophysics Data System (ADS)
Dobra, R.; Pasculescu, D.; Marc, G.; Risteiu, M.; Antonov, A.
2017-06-01
Insulation resistance measurement is one of the most important tests required by standards and regulations in terms of electrical safety. Why these tests are is to prevent possible accidents caused by electric shock, damage to equipment or outbreak of fire in normal operating conditions of electrical cables. The insulation resistance experiment refers to the testing of electrical cable insulation, which has a measured resistance that must be below the imposed regulations. Using a microcontroller system data regarding the insulation resistance of the power cables is acquired and with SCADA software the test results are displayed.
NASA Astrophysics Data System (ADS)
Mittelmeier, N.; Blodau, T.; Steinfeld, G.; Rott, A.; Kühn, M.
2016-09-01
Atmospheric conditions have a clear influence on wake effects. Stability classification is usually based on wind speed, turbulence intensity, shear and temperature gradients measured partly at met masts, buoys or LiDARs. The objective of this paper is to find a classification for stability based on wind turbine Supervisory Control and Data Acquisition (SCADA) measurements in order to fit engineering wake models better to the current ambient conditions. Two offshore wind farms with met masts have been used to establish a correlation between met mast stability classification and new aggregated statistical signals based on multiple measurement devices. The significance of these new signals on power production is demonstrated for two wind farms with met masts and validated against data from one further wind farm without a met mast. We found a good correlation between the standard deviation of active power divided by the average power of wind turbines in free flow with the ambient turbulence intensity when the wind turbines were operating in partial load.
Protecting drinking water utilities from cyberthreats
Clark, Robert M.; Panguluri, Srinivas; Nelson, Trent D.; ...
2017-02-01
Cyber-security challenges have the potential for becoming one of the defining issues of our time. Cyber-attacks have become an ever-increasing threat and the United States (US) Federal Bureau of Investigation (FBI) now ranks cyber-crime as one of its most important law enforcement activities. In addition to the general problems associated with cyber-crime, critical infrastructure (CI) related to energy production, manufacturing, water supply and other systems have come under attack. For example, drinking water utilities are increasingly incorporating computer technology into their routine operations and are therefore increasingly vulnerable to cyber- threats. Systems control and data acquisition (SCADA) systems used tomore » manage automated physical processes essential to water treatment and distribution systems have become standard in medium to large drinking water utilities and in many small water systems. However, even with the application of standard information technology cybersecurity best practices these types of systems have proven to be vulnerable to cyber-attacks. In 2015, the US Department of Homeland Security (DHS) responded to 25 cybersecurity incidents in the Water Sector and to 46 incidents in the Energy Sector. Comparatively, between 2014 and 2015, the reported number of Water Sector incidents actually increased by 78.6% (from 14 to 25). The DHS is in a collaborative partnership with the US Environmental Protection Agency to ensure cybersecurity in the Water Sector. As a result of this partnership a number of guidance documents and techniques have been developed to counter cyber-attacks and minimize cyber vulnerability. These approaches are documented along with a summary of common vulnerabilities. However, a new approach which has great promise in protecting drinking water systems against hacking and cyber-attacks, based on the concept of unidirectional gateways, is presented and discussed.« less
Protecting drinking water utilities from cyberthreats
DOE Office of Scientific and Technical Information (OSTI.GOV)
Clark, Robert M.; Panguluri, Srinivas; Nelson, Trent D.
Cyber-security challenges have the potential for becoming one of the defining issues of our time. Cyber-attacks have become an ever-increasing threat and the United States (US) Federal Bureau of Investigation (FBI) now ranks cyber-crime as one of its most important law enforcement activities. In addition to the general problems associated with cyber-crime, critical infrastructure (CI) related to energy production, manufacturing, water supply and other systems have come under attack. For example, drinking water utilities are increasingly incorporating computer technology into their routine operations and are therefore increasingly vulnerable to cyber- threats. Systems control and data acquisition (SCADA) systems used tomore » manage automated physical processes essential to water treatment and distribution systems have become standard in medium to large drinking water utilities and in many small water systems. However, even with the application of standard information technology cybersecurity best practices these types of systems have proven to be vulnerable to cyber-attacks. In 2015, the US Department of Homeland Security (DHS) responded to 25 cybersecurity incidents in the Water Sector and to 46 incidents in the Energy Sector. Comparatively, between 2014 and 2015, the reported number of Water Sector incidents actually increased by 78.6% (from 14 to 25). The DHS is in a collaborative partnership with the US Environmental Protection Agency to ensure cybersecurity in the Water Sector. As a result of this partnership a number of guidance documents and techniques have been developed to counter cyber-attacks and minimize cyber vulnerability. These approaches are documented along with a summary of common vulnerabilities. However, a new approach which has great promise in protecting drinking water systems against hacking and cyber-attacks, based on the concept of unidirectional gateways, is presented and discussed.« less
NASA Astrophysics Data System (ADS)
Hao, Xuejun; An, Xaioran; Wu, Bo; He, Shaoping
2018-02-01
In the gas pipeline system, safe operation of a gas regulator determines the stability of the fuel gas supply, and the medium-low pressure gas regulator of the safety precaution system is not perfect at the present stage in the Beijing Gas Group; therefore, safety precaution technique optimization has important social and economic significance. In this paper, according to the running status of the medium-low pressure gas regulator in the SCADA system, a new method for gas regulator safety precaution based on the support vector machine (SVM) is presented. This method takes the gas regulator outlet pressure data as input variables of the SVM model, the fault categories and degree as output variables, which will effectively enhance the precaution accuracy as well as save significant manpower and material resources.
Radio Frequency Based Programmable Logic Controller Anomaly Detection
2013-09-01
include wireless radios, IEEE 802.15 Blue- tooth devices, cellular phones, and IEEE 802.11 WiFi networking devices. While wireless communication...MacKenzie, H. Shamoon Malware and SCADA Security What are the Im- pacts? . Technical Report, Tofino Security, Sep 2012. 61. Mateti,P. Hacking Techniques
Microcontroller-Based Experimental Setup and Experiments for SCADA Education
ERIC Educational Resources Information Center
Sahin, S.; Olmez, M.; Isler, Y.
2010-01-01
In the field of automation technology, research and development for industrial applications has increased rapidly in recent years. Therefore, industrial automation and control education is a very important element of the industrialization process in developing countries, such as Turkey, which needs to keep abreast for the latest developments in…
Towards Quantifying Programmable Logic Controller Resilience Against Intentional Exploits
2012-03-22
may improve the SCADA system’s resilience against DoS and man-in-the-middle ( MITM ) attacks. DoS attacks may be mitigated by using the redundant...paths available on the network links. MITM attacks may be mitigated by the data integrity checks associated with the middleware. Figure 4 illustrates
Lost Hills Field Trial - incorporating new technology for resevoir management
NASA Technical Reports Server (NTRS)
Fielding, E. J.; Brink, J. L.; Patzek, T. W.; Silin, D. B.
2002-01-01
This paper will discuss how Chevron U.S.A. Production Company is implementing a field trial that will use Supervisory Control and Data Acquisition (SCADA)on injection wells, in conjunction with satellite images to measure ground elevation changes, to perform real-time resevoir management in the Lost Hills Field.
Forecasting in an integrated surface water-ground water system: The Big Cypress Basin, South Florida
NASA Astrophysics Data System (ADS)
Butts, M. B.; Feng, K.; Klinting, A.; Stewart, K.; Nath, A.; Manning, P.; Hazlett, T.; Jacobsen, T.
2009-04-01
The South Florida Water Management District (SFWMD) manages and protects the state's water resources on behalf of 7.5 million South Floridians and is the lead agency in restoring America's Everglades - the largest environmental restoration project in US history. Many of the projects to restore and protect the Everglades ecosystem are part of the Comprehensive Everglades Restoration Plan (CERP). The region has a unique hydrological regime, with close connection between surface water and groundwater, and a complex managed drainage network with many structures. Added to the physical complexity are the conflicting needs of the ecosystem for protection and restoration, versus the substantial urban development with the accompanying water supply, water quality and flood control issues. In this paper a novel forecasting and real-time modelling system is presented for the Big Cypress Basin. The Big Cypress Basin includes 272 km of primary canals and 46 water control structures throughout the area that provide limited levels of flood protection, as well as water supply and environmental quality management. This system is linked to the South Florida Water Management District's extensive real-time (SCADA) data monitoring and collection system. Novel aspects of this system include the use of a fully distributed and integrated modeling approach and a new filter-based updating approach for accurately forecasting river levels. Because of the interaction between surface- and groundwater a fully integrated forecast modeling approach is required. Indeed, results for the Tropical Storm Fay in 2008, the groundwater levels show an extremely rapid response to heavy rainfall. Analysis of this storm also shows that updating levels in the river system can have a direct impact on groundwater levels.
2011-03-01
they can continue to leverage these capabilities (building Smart Grid infrastructure and providing Internet connectivity to every home ) while ensuring...21 Figure 9. Smart Grid Interoperability .............................................................................. 22 Figure 10. Smart ...Grid Integration .................................................................................... 24 Figure 11. National Smart Grid Initiatives
Power Plant Model Validation Tool
DOE Office of Scientific and Technical Information (OSTI.GOV)
The PPMV is used to validate generator model using disturbance recordings. The PPMV tool contains a collection of power plant models and model validation studies, as well as disturbance recordings from a number of historic grid events. The user can import data from a new disturbance into the database, which converts PMU and SCADA data into GE PSLF format, and then run the tool to validate (or invalidate) the model for a specific power plant against its actual performance. The PNNL PPMV tool enables the automation of the process of power plant model validation using disturbance recordings. The tool usesmore » PMU and SCADA measurements as input information. The tool automatically adjusts all required EPCL scripts and interacts with GE PSLF in the batch mode. The main tool features includes: The tool interacts with GE PSLF; The tool uses GE PSLF Play-In Function for generator model validation; Database of projects (model validation studies); Database of the historic events; Database of the power plant; The tool has advanced visualization capabilities; and The tool automatically generates reports« less
NASA Astrophysics Data System (ADS)
Iungo, G.; Said, E. A.; Santhanagopalan, V.; Zhan, L.
2016-12-01
Power production of a wind farm and durability of wind turbines are strongly dependent on non-linear wake interactions occurring within a turbine array. Wake dynamics are highly affected by the specific site conditions, such as topography and local atmospheric conditions. Furthermore, contingencies through the life of a wind farm, such as turbine ageing and off-design operations, make prediction of wake interactions and power performance a great challenge in wind energy. In this work, operations of an onshore wind turbine array were monitored through lidar measurements, SCADA and met-tower data. The atmospheric wind field investing the wind farm was estimated by using synergistically the available data through five different methods, which are characterized by different confidence levels. By combining SCADA data and the lidar measurements, it was possible to estimate power losses connected with wake interactions. For this specific array, power losses were estimated to be 4% and 2% of the total power production for stable and convective atmospheric regimes, respectively. The entire dataset was then leveraged for the calibration of a data-driven RANS (DDRANS) solver for prediction of wind turbine wakes and power production. The DDRANS is based on a parabolic formulation of the Navier-Stokes equations with axisymmetry and boundary layer approximations, which allow achieving very low computational costs. Accuracy in prediction of wind turbine wakes and power production is achieved through an optimal tuning of the turbulence closure model. The latter is based on a mixing length model, which was developed based on previous wind turbine wake studies carried out through large eddy simulations and wind tunnel experiments. Several operative conditions of the wind farm under examination were reproduced through DDRANS for different stability regimes, wind directions and wind velocity. The results show that DDRANS is capable of achieving a good level of accuracy in prediction of power production and wake velocity field associated with the turbine array.
A software-based sensor for combined sewer overflows.
Leonhardt, G; Fach, S; Engelhard, C; Kinzel, H; Rauch, W
2012-01-01
A new methodology for online estimation of excess flow from combined sewer overflow (CSO) structures based on simulation models is presented. If sufficient flow and water level data from the sewer system is available, no rainfall data are needed to run the model. An inverse rainfall-runoff model was developed to simulate net rainfall based on flow and water level data. Excess flow at all CSO structures in a catchment can then be simulated with a rainfall-runoff model. The method is applied to a case study and results show that the inverse rainfall-runoff model can be used instead of missing rain gauges. Online operation is ensured by software providing an interface to the SCADA-system of the operator and controlling the model. A water quality model could be included to simulate also pollutant concentrations in the excess flow.
The ALICE-HMPID Detector Control System: Its evolution towards an expert and adaptive system
NASA Astrophysics Data System (ADS)
De Cataldo, G.; Franco, A.; Pastore, C.; Sgura, I.; Volpe, G.
2011-05-01
The High Momentum Particle IDentification (HMPID) detector is a proximity focusing Ring Imaging Cherenkov (RICH) for charged hadron identification. The HMPID is based on liquid C 6F 14 as the radiator medium and on a 10 m 2 CsI coated, pad segmented photocathode of MWPCs for UV Cherenkov photon detection. To ensure full remote control, the HMPID is equipped with a detector control system (DCS) responding to industrial standards for robustness and reliability. It has been implemented using PVSS as Slow Control And Data Acquisition (SCADA) environment, Programmable Logic Controller as control devices and Finite State Machines for modular and automatic command execution. In the perspective of reducing human presence at the experiment site, this paper focuses on DCS evolution towards an expert and adaptive control system, providing, respectively, automatic error recovery and stable detector performance. HAL9000, the first prototype of the HMPID expert system, is then presented. Finally an analysis of the possible application of the adaptive features is provided.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must be combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusionmore » detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device's physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian system. We have included the Python scripts used to perform that monitoring.« less
NASA Astrophysics Data System (ADS)
Sakaguchi, Hideharu
Do you remember an expert system? I think there are various impressions about the system. For example, some might say “It reminds me of old days”. On the other hand, some might say “It was really troublesome”. About 25 years ago, from late 1980s to the middle of 1990s, when the Showa era was about to change into the Heisei Era, artificial intelligence boomed. Research and development for an expert system which was equipped with expertise and worked as smart as expert, was advanced in various fields. Our company also picked up the system as the new system which covered weak point of conventional computer technology. We started research and development in 1984, and installed an expert system in a SCADA system, which started operating in March 1990 in the Fukuoka Integrated Control Center. In this essay, as an electric power engineer who involved in development at that time, I introduce the situation and travail story about developing an expert system which support restorative actions from the outage and overload condition of power networks.
Final Technical Report. Project Boeing SGS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bell, Thomas E.
Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less
Managing operational documentation in the ALICE Detector Control System
NASA Astrophysics Data System (ADS)
Lechman, M.; Augustinus, A.; Bond, P.; Chochula, P.; Kurepin, A.; Pinazza, O.; Rosinsky, P.
2012-12-01
ALICE (A Large Ion Collider Experiment) is one of the big LHC (Large Hadron Collider) experiments at CERN in Geneve, Switzerland. The experiment is composed of 18 sub-detectors controlled by an integrated Detector Control System (DCS) that is implemented using the commercial SCADA package PVSSII. The DCS includes over 1200 network devices, over 1,000,000 monitored parameters and numerous custom made software components that are prepared by over 100 developers from all around the world. This complex system is controlled by a single operator via a central user interface. One of his/her main tasks is the recovery of anomalies and errors that may occur during operation. Therefore, clear, complete and easily accessible documentation is essential to guide the shifter through the expert interfaces of different subsystems. This paper describes the idea of the management of the operational documentation in ALICE using a generic repository that is built on a relational database and is integrated with the control system. The experience gained and the conclusions drawn from the project are also presented.
Technical Analysis of SSP-21 Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bromberger, S.
As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will usemore » other advanced technologies to provide a subset of security services.« less
Modeling of wastewater treatment system of car parks from petroleum products
NASA Astrophysics Data System (ADS)
Savdur, S. N.; Stepanova, Yu V.; Kodolova, I. A.; Fesina, E. L.
2018-05-01
The paper discusses the technological complex of wastewater treatment of car parks from petroleum products. Based on the review of the main modeling methods of discrete-continuous chemical and engineering processes, it substantiates expediency of using the theory of Petri nets (PN) for modeling the process of wastewater treatment of car parks from petroleum products. It is proposed to use a modification of Petri nets which is focused on modeling and analysis of discrete-continuous chemical and engineering processes by prioritizing transitions, timing marks in positions and transitions. A model in the form of modified Petri nets (MPN) is designed. A software package to control the process for wastewater treatment is designed by means of SCADA TRACE MODE.
Ribas, F; Rodríguez-Roda, I; Serrat, J; Clara, P; Comas, J
2008-05-01
Wastewater treatment plants employ various physical, chemical and biological processes to reduce pollutants from raw wastewater. One of the most important is the biological nitrogen removal process through nitrification and denitrification steps taking place in various sections of the biological reactor. One of the most extensively used configurations to achieve the biological nitrogen removal is an activated sludge system using oxidation ditch or extended aeration. To improve nitrogen removal in the wastewater treatment plant (WWTP) of Vic (Catalonia, NE Spain), the automatic aeration control system was complemented with an Expert System to always provide the most appropriate aeration or anoxia sequence based on the values of ammonium and nitrates given by an automatic analyzer. This article illustrates the development and implementation of this knowledge-based system within the framework of a Decision Support System, which performs SCADA functions. The paper also shows that the application of the decision support system in the Vic WWTP resulted in significant improvements to the biological nitrogen removal.
Towards a new Mercator Observatory Control System
NASA Astrophysics Data System (ADS)
Pessemier, W.; Raskin, G.; Prins, S.; Saey, P.; Merges, F.; Padilla, J. P.; Van Winckel, H.; Waelkens, C.
2010-07-01
A new control system is currently being developed for the 1.2-meter Mercator Telescope at the Roque de Los Muchachos Observatory (La Palma, Spain). Formerly based on transputers, the new Mercator Observatory Control System (MOCS) consists of a small network of Linux computers complemented by a central industrial controller and an industrial real-time data communication network. Python is chosen as the high-level language to develop flexible yet powerful supervisory control and data acquisition (SCADA) software for the Linux computers. Specialized applications such as detector control, auto-guiding and middleware management are also integrated in the same Python software package. The industrial controller, on the other hand, is connected to the majority of the field devices and is targeted to run various control loops, some of which are real-time critical. Independently of the Linux distributed control system (DCS), this controller makes sure that high priority tasks such as the telescope motion, mirror support and hydrostatic bearing control are carried out in a reliable and safe way. A comparison is made between different controller technologies including a LabVIEW embedded system, a PROFINET Programmable Logic Controller (PLC) and motion controller, and an EtherCAT embedded PC (soft-PLC). As the latter is chosen as the primary platform for the lower level control, a substantial part of the software is being ported to the IEC 61131-3 standard programming languages. Additionally, obsolete hardware is gradually being replaced by standard industrial alternatives with fast EtherCAT communication. The use of Python as a scripting language allows a smooth migration to the final MOCS: finished parts of the new control system can readily be commissioned to replace the corresponding transputer units of the old control system with minimal downtime. In this contribution, we give an overview of the systems design, implementation details and the current status of the project.
A Data Quality Filter for PMU Measurements: Description, Experience, and Examples
DOE Office of Scientific and Technical Information (OSTI.GOV)
Follum, James D.; Amidan, Brett G.
Networks of phasor measurement units (PMUs) continue to grow, and along with them, the amount of data available for analysis. With so much data, it is impractical to identify and remove poor quality data manually. The data quality filter described in this paper was developed for use with the Data Integrity and Situation Awareness Tool (DISAT), which analyzes PMU data to identify anomalous system behavior. The filter operates based only on the information included in the data files, without supervisory control and data acquisition (SCADA) data, state estimator values, or system topology information. Measurements are compared to preselected thresholds tomore » determine if they are reliable. Along with the filter's description, examples of data quality issues from application of the filter to nine months of archived PMU data are provided. The paper is intended to aid the reader in recognizing and properly addressing data quality issues in PMU data.« less
Reducing SCADA System Nuisance Alarms in the Water Industry in Northern Ireland.
O'Donoghue, Nigel; Phillips, Debra H; Nicell, Ciaran
2015-08-01
The advancement of telemetry control for the water industry has increased the difficulty of managing large volumes of nuisance alarms (i.e., alarms that do not require a response). The aim of this study was to identify and reduce the number of nuisance alarms that occur for Northern Ireland (NI) Water by carrying out alarm duration analysis to determine the appropriate length of persistence (an advanced alarm management tool) that could be applied. All data were extracted from TelemWeb (NI Water's telemetry monitoring system) and analyzed in Excel. Over a 6-week period, an average of 40 000 alarms occurred per week. The alarm duration analysis, which has never been implemented before by NI Water, found that an average of 57% of NI Water alarms had a duration of <5 minutes. Applying 5-minute persistence, therefore, could prevent an average 26 816 nuisance alarms per week. Most of these alarms were from wastewater assets.
Computer assisted operations in Petroleum Development Oman (PDO)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Al-Hinai, S.H.; Mutimer, K.
1995-10-01
Petroleum Development Oman (PDO) currently produces some 750,000 bopd and 900,000 bwpd from some 74 fields in a large geographical area and diverse operating conditions. A key corporate objective is to reduce operating costs by exploiting productivity gains from proven technology. Automation is seen as a means of managing the rapid growth of well population and production facilities. the overall objective is to improve field management through continuous monitoring of wells and facilities and dissemination of data throughout the whole organization. A major upgrade of PDO`s field Supervisory Control and Data Acquisition (SCADA) system is complete providing a platform tomore » exploit new initiatives particularly for production optimization of artificial lift systems and automatic well testing using multi selector valves, coriolis flow meter measurements and multi component (oil, gas, water) flowmeter. The paper describes PDO`s experience including benefits and challenges which have to be managed when developing Computer Assisted Operations (CAO).« less
NASA Astrophysics Data System (ADS)
Gibson, Wayne H.; Levesque, Daniel
2000-03-01
This paper discusses how gamma irradiation plants are putting the latest advances in computer and information technology to use for better process control, cost savings, and strategic advantages. Some irradiator operations are gaining significant benefits by integrating computer technology and robotics with real-time information processing, multi-user databases, and communication networks. The paper reports on several irradiation facilities that are making good use of client/server LANs, user-friendly graphics interfaces, supervisory control and data acquisition (SCADA) systems, distributed I/O with real-time sensor devices, trending analysis, real-time product tracking, dynamic product scheduling, and automated dosimetry reading. These plants are lowering costs by fast and reliable reconciliation of dosimetry data, easier validation to GMP requirements, optimizing production flow, and faster release of sterilized products to market. There is a trend in the manufacturing sector towards total automation using "predictive process control". Real-time verification of process parameters "on-the-run" allows control parameters to be adjusted appropriately, before the process strays out of limits. Applying this technology to the gamma radiation process, control will be based on monitoring the key parameters such as time, and making adjustments during the process to optimize quality and throughput. Dosimetry results will be used as a quality control measurement rather than as a final monitor for the release of the product. Results are correlated with the irradiation process data to quickly and confidently reconcile variations. Ultimately, a parametric process control system utilizing responsive control, feedback and verification will not only increase productivity and process efficiency, but can also result in operating within tighter dose control set points.
A demonstrator for an integrated subway protection system
NASA Astrophysics Data System (ADS)
Detoma, E.; Capetti, P.; Casati, G.; Billington, S.
2008-04-01
In 2006 SEPA has carried on the installation and tests of a demonstrator for an integrated subway protection system at a new subway station in the Naples, Italy) metropolitan area. Protection of a subway system is a difficult task given the amount of passengers transported every day. The demonstrator has been limited to non-intrusive detection techniques not to impair the passenger flow into the station. The demonstrator integrates several technologies and products that have been developed by SEPA or are already available on the market (MKS Instruments,...). The main purpose is to provide detection capabilities for attempts to introduce radioactive substances in the subway station, in order to foil possible attempts to place a dirty bomb, and threat detection and identification following release of chemical agents. The system integrates additional sensors such as video surveillance cameras and air flow sensing to complement the basic sensors suite. The need to protect sensitive installations such as subway stations has been highlighted by the series of terroristics actions carried out in recent years in the subway in London. However, given the number of passengers of a metro system, it is impossible to propose security techniques operating in ways similar to the screening of passengers in airports. Passengers screening and threat detection and identification must be quick, non-intrusive and capable of screening a large number of passengers to be applicable to mass transit systems. In 2005 SEPA, a small company operating in the field of trains video-surveillance systems and radiation detectors, started developing an integrated system to provide a comprehensive protection to subway stations, based on ready available or off-the-shelf components in order to quickly develop a reliable system with available technology. We ruled out at the beginning any new development in order to speed up the fielding of the system in less than one year. The system was developed with commercial sensors and deployed in a new station of the Naples metropolitan transit system in Mugnano. The station was particularly suitable for the demonstration since it is a new station that includes air venting control, water barriers (for fire and smoke containment) and a complete SCADA system to integrate technical and video surveillance operations. In order to protect the subway, we tackled four basic technologies, all readily available in-house or on the market: - radiation detection, to detect the introduction in the station of radionuclides, that may be dispersed by conventional explosive (a "dirty" bomb); - chemical agents detection and identification (after release), complemented with air speed and velocity sensors to estimate, track and predict the contamination plume; - video surveillance, integrated with the SCADA system and already available in the station.
Implementation method of multi-terminal DC control system
NASA Astrophysics Data System (ADS)
Yi, Liu; Hao-Ran, Huang; Jun-Wen, Zhou; Hong-Guang, Guo; Yu-Yong, Zhou
2018-04-01
Currently the multi-terminal DC system (MTDC) has more stations. Each station needs operators to monitor and control the device. It needs much more operation and maintenance, low efficiency and small reliability; for the most important reason, multi-terminal DC system has complex control mode. If one of the stations has some problem, the control of the whole system should have problems. According to research of the characteristics of multi-terminal DC (VSC-MTDC) systems, this paper presents a strong implementation of the multi-terminal DC Supervisory Control and Data Acquisition (SCADA) system. This system is intelligent, can be networking, integration and intelligent. A master control system is added in each station to communication with the other stations to send current and DC voltage value to pole control system for each station. Based on the practical application and information feedback in the China South Power Grid research center VSC-MTDC project, this system is higher efficiency and save the cost on the maintenance of convertor station to improve the intelligent level and comprehensive effect. And because of the master control system, a multi-terminal system hierarchy coordination control strategy is formed, this make the control and protection system more efficiency and reliability.
A framework for analyzing the impact of data integrity/quality on electricity market operations
NASA Astrophysics Data System (ADS)
Choi, Dae Hyun
This dissertation examines the impact of data integrity/quality in the supervisory control and data acquisition (SCADA) system on real-time locational marginal price (LMP) in electricity market operations. Measurement noise and/or manipulated sensor errors in a SCADA system may mislead system operators about real-time conditions in a power system, which, in turn, may impact the price signals in real-time power markets. This dissertation serves as a first attempt to analytically investigate the impact of bad/malicious data on electric power market operations. In future power system operations, which will probably involve many more sensors, the impact of sensor data integrity/quality on grid operations will become increasingly important. The first part of this dissertation studies from a market participant's perspective a new class of malicious data attacks on state estimation, which subsequently influences the result of the newly emerging look-ahead dispatch models in the real-time power market. In comparison with prior work of cyber-attack on static dispatch where no inter-temporal ramping constraint is considered, we propose a novel attack strategy, named ramp-induced data (RID) attack, with which the attacker can manipulate the limits of ramp constraints of generators in look-ahead dispatch. It is demonstrated that the proposed attack can lead to financial profits via malicious capacity withholding of selected generators, while being undetected by the existing bad data detection algorithm embedded in today's state estimation software. In the second part, we investigate from a system operator's perspective the sensitivity of locational marginal price (LMP) with respect to data corruption-induced state estimation error in real-time power market. Two data corruption scenarios are considered, in which corrupted continuous data (e.g., the power injection/flow and voltage magnitude) falsify power flow estimate whereas corrupted discrete data (e.g., the on/off status of a circuit breaker) do network topology estimate, thus leading to the distortion of LMP. We present an analytical framework to quantify real-time LMP sensitivity subject to continuous and discrete data corruption via state estimation. The proposed framework offers system operators an analytical tool to identify economically sensitive buses and transmission lines to data corruption as well as find sensors that impact LMP changes significantly. This dissertation serves as a first step towards rigorous understanding of the fundamental coupling among cyber, physical and economical layers of operations in future smart grid.
NASA Astrophysics Data System (ADS)
Tautz-Weinert, J.; Watson, S. J.
2016-09-01
Effective condition monitoring techniques for wind turbines are needed to improve maintenance processes and reduce operational costs. Normal behaviour modelling of temperatures with information from other sensors can help to detect wear processes in drive trains. In a case study, modelling of bearing and generator temperatures is investigated with operational data from the SCADA systems of more than 100 turbines. The focus is here on automated training and testing on a farm level to enable an on-line system, which will detect failures without human interpretation. Modelling based on linear combinations, artificial neural networks, adaptive neuro-fuzzy inference systems, support vector machines and Gaussian process regression is compared. The selection of suitable modelling inputs is discussed with cross-correlation analyses and a sensitivity study, which reveals that the investigated modelling techniques react in different ways to an increased number of inputs. The case study highlights advantages of modelling with linear combinations and artificial neural networks in a feedforward configuration.
Deception Based Intrusion Detection & Prevention for SCADA Environments -
the case of the Ukraine incident, the substations. So here's the idea. Number one, understand from idea is that one of the quotes that he made in that book, it's actually a famous quote, is that all security products. Case in point, I'll be at RSA in February. There's over 2,600 vendors at RSA all solving
Controlling front-end electronics boards using commercial solutions
NASA Astrophysics Data System (ADS)
Beneyton, R.; Gaspar, C.; Jost, B.; Schmeling, S.
2002-04-01
LHCb is a dedicated B-physics experiment under construction at CERN's large hadron collider (LHC) accelerator. This paper will describe the novel approach LHCb is taking toward controlling and monitoring of electronics boards. Instead of using the bus in a crate to exercise control over the boards, we use credit-card sized personal computers (CCPCs) connected via Ethernet to cheap control PCs. The CCPCs will provide a simple parallel, I2C, and JTAG buses toward the electronics board. Each board will be equipped with a CCPC and, hence, will be completely independently controlled. The advantages of this scheme versus the traditional bus-based scheme will be described. Also, the integration of the controls of the electronics boards into a commercial supervisory control and data acquisition (SCADA) system will be shown.
Synchronization software for automation in anesthesia.
Bressan, Nadja; Castro, Ana; Brás, Susana; Oliveira, Hélder P; Ribeiro, Lénio; Ferreira, David A; Antunes, Luís; Amorim, Pedro; Nunes, Catarina S
2007-01-01
This work presents the development of a software for data acquisition and control (ASYS) on a clinical setup. Similar to the industrial Supervisory Control And Data Acquisition (SCADA) the software assembles a Target Controlled Infusion (TCI) monitoring and supervisory control data in real time from devices in a surgical room. The software is not a full controller since the TCI systems comprehend permanent interaction from the anesthesiologist. Based on pharmacokinetic models, the effect-site and plasma concentrations can be related with the drug dose infused and vice versa. The software determines the infusion rates of the drug which are given as commands to the infusion pumps. This software provides the anesthesiologist with a trustworthy tool for managing a safe and balanced anesthesia. Since it also incorporates the acquisition and display of patients brain signals.
2004-03-01
with MySQL . This choice was made because MySQL is open source. Any significant database engine such as Oracle or MS- SQL or even MS Access can be used...10 Figure 6. The DoD vs . Commercial Life Cycle...necessarily be interested in SCADA network security 13. MySQL (Database server) – This station represents a typical data server for a web page
A Fault Recognition System for Gearboxes of Wind Turbines
NASA Astrophysics Data System (ADS)
Yang, Zhiling; Huang, Haiyue; Yin, Zidong
2017-12-01
Costs of maintenance and loss of power generation caused by the faults of wind turbines gearboxes are the main components of operation costs for a wind farm. Therefore, the technology of condition monitoring and fault recognition for wind turbines gearboxes is becoming a hot topic. A condition monitoring and fault recognition system (CMFRS) is presented for CBM of wind turbines gearboxes in this paper. The vibration signals from acceleration sensors at different locations of gearbox and the data from supervisory control and data acquisition (SCADA) system are collected to CMFRS. Then the feature extraction and optimization algorithm is applied to these operational data. Furthermore, to recognize the fault of gearboxes, the GSO-LSSVR algorithm is proposed, combining the least squares support vector regression machine (LSSVR) with the Glowworm Swarm Optimization (GSO) algorithm. Finally, the results show that the fault recognition system used in this paper has a high rate for identifying three states of wind turbines’ gears; besides, the combination of date features can affect the identifying rate and the selection optimization algorithm presented in this paper can get a pretty good date feature subset for the fault recognition.
Experimental study of mini SCADA renewable energy management system on microgrid using Raspberry Pi
NASA Astrophysics Data System (ADS)
Tridianto, E.; Permatasari, P. D.; Ali, I. R.
2018-03-01
Renewable Energy Management System (REMS) is a device that can be able to monitor power through a microgrid. The purpose of this system is to optimize power usage that produced from renewable energy with the result that reduces power demand from the grid. To reach the goal this device manage the load power needs fully supplied by renewable energy when the power produced from renewable energy is higher than load demand, besides power surplus will be stored in battery in this way energy stored in battery can be used when it needed. When the power produced from renewable energy can not satisfy the power demand, power will supply by renewable energy and grid. This device uses power meters for record any power flow through microgrid. In order to manage power flow in microgrid this system use relay module. The user can find out energy consumption (consumed by the load) and production (produced by renewable energy) in a period of time so that the user can switch on the load in right time.
Design and installation of a next generation pilot scale fermentation system.
Junker, B; Brix, T; Lester, M; Kardos, P; Adamca, J; Lynch, J; Schmitt, J; Salmon, P
2003-01-01
Four new fermenters were designed and constructed for use in secondary metabolite cultivations, bioconversions, and enzyme production. A new PC/PLC-based control system also was implemented using GE Fanuc PLCs, Genius I/O blocks, and Fix Dynamics SCADA software. These systems were incorporated into an industrial research fermentation pilot plant, designed and constructed in the early 1980s. Details of the design of these new fermenters and the new control system are described and compared with the existing installation for expected effectiveness. In addition, the reasoning behind selection of some of these features has been included. Key to the design was the goal of preserving similarity between the new and previously existing and successfully utilized fermenter hardware and software installations where feasible but implementing improvements where warranted and beneficial. Examples of enhancements include strategic use of Inconel as a material of construction to reduce corrosion, piping layout design for simplified hazardous energy isolation, on-line calculation and control of nutrient feed rates, and the use of field I/O modules located near the vessel to permit low-cost addition of new instrumentation.
NASA Astrophysics Data System (ADS)
Letizia, Stefano; Puccioni, Matteo; Zhan, Lu; Viola, Francesco; Camarri, Simone; Iungo, Giacomo Valerio
2017-11-01
Numerical simulations of wakes produced by utility-scale wind turbines still present challenges related to the variability of the atmospheric conditions and, in the most of the cases, the lack of information about the geometry and aerodynamic performance of the wind turbine blades. In order to overcome the mentioned difficulties, we propose a RANS solver for which turbine aerodynamic forcing and turbulence closure are calibrated through LiDAR and SCADA data acquired for an onshore wind farm. The wind farm under examination is located in North Texas over a relatively flat terrain. The experimental data are leveraged to maximize accuracy of the RANS predictions in terms of wake velocity field and power capture for different atmospheric stability conditions and settings of the wind turbines. The optimization of the RANS parameters is performed through an adjoint-RANS formulation and a gradient-based procedure. The optimally-tuned aerodynamic forcing and turbulence closure are then analyzed in order to investigate effects of the atmospheric stability on the evolution of wind turbine wakes and power performance. The proposed RANS solver has low computational costs comparable to those of wake engineering models, which make it a compelling tool for wind farm control and optimization. Acknowledgments: NSF I/UCRC WindSTAR IIP 1362033 and TACC.
Neural Network Based Intrusion Detection System for Critical Infrastructures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Todd Vollmer; Ondrej Linda; Milos Manic
2009-07-01
Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less
Detector Control System for the AFP detector in ATLAS experiment at CERN
NASA Astrophysics Data System (ADS)
Banaś, E.; Caforio, D.; Czekierda, S.; Hajduk, Z.; Olszowska, J.; Seabra, L.; Šícho, P.
2017-10-01
The ATLAS Forward Proton (AFP) detector consists of two forward detectors located at 205 m and 217 m on either side of the ATLAS experiment. The aim is to measure the momenta and angles of diffractively scattered protons. In 2016, two detector stations on one side of the ATLAS interaction point were installed and commissioned. The detector infrastructure and necessary services were installed and are supervised by the Detector Control System (DCS), which is responsible for the coherent and safe operation of the detector. A large variety of used equipment represents a considerable challenge for the AFP DCS design. Industrial Supervisory Control and Data Acquisition (SCADA) product Siemens WinCCOA, together with the CERN Joint Control Project (JCOP) framework and standard industrial and custom developed server applications and protocols are used for reading, processing, monitoring and archiving of the detector parameters. Graphical user interfaces allow for overall detector operation and visualization of the detector status. Parameters, important for the detector safety, are used for alert generation and interlock mechanisms.
Refurbishment and Automation of Thermal Vacuum Facilities at NASA/GSFC
NASA Technical Reports Server (NTRS)
Dunn, Jamie; Gomez, Carlos; Donohue, John; Johnson, Chris; Palmer, John; Sushon, Janet
1999-01-01
The thermal vacuum facilities located at the Goddard Space Flight Center (GSFC) have supported both manned and unmanned space flight since the 1960s. Of the eleven facilities, currently ten of the systems are scheduled for refurbishment or replacement as part of a five-year implementation. Expected return on investment includes the reduction in test schedules, improvements in safety of facility operations, and reduction in the personnel support required for a test. Additionally, GSFC will become a global resource renowned for expertise in thermal engineering, mechanical engineering, and for the automation of thermal vacuum facilities and tests. Automation of the thermal vacuum facilities includes the utilization of Programmable Logic Controllers (PLCs), the use of Supervisory Control and Data Acquisition (SCADA) systems, and the development of a centralized Test Data Management System. These components allow the computer control and automation of mechanical components such as valves and pumps. The project of refurbishment and automation began in 1996 and has resulted in complete computer control of one facility (Facility 281), and the integration of electronically controlled devices and PLCs in multiple others.
Refurbishment and Automation of Thermal Vacuum Facilities at NASA/GSFC
NASA Technical Reports Server (NTRS)
Dunn, Jamie; Gomez, Carlos; Donohue, John; Johnson, Chris; Palmer, John; Sushon, Janet
1998-01-01
The thermal vacuum facilities located at the Goddard Space Flight Center (GSFC) have supported both manned and unmanned space flight since the 1960s. Of the eleven facilities, currently ten of the systems are scheduled for refurbishment or replacement as part of a five-year implementation. Expected return on investment includes the reduction in test schedules, improvements in safety of facility operations, and reduction in the personnel support required for a test. Additionally, GSFC will become a global resource renowned for expertise in thermal engineering, mechanical engineering, and for the automation of thermal vacuum facilities and tests. Automation of the thermal vacuum facilities includes the utilization of Programmable Logic Controllers (PLCs), the use of Supervisory Control and Data Acquisition (SCADA) systems, and the development of a centralized Test Data Management System. These components allow the computer control and automation of mechanical components such as valves and pumps. The project of refurbishment and automation began in 1996 and has resulted in complete computer control of one facility (Facility 281), and the integration of electronically controlled devices and PLCs in multiple others.
Culture Representation in Human Reliability Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
David Gertman; Julie Marble; Steven Novack
Understanding human-system response is critical to being able to plan and predict mission success in the modern battlespace. Commonly, human reliability analysis has been used to predict failures of human performance in complex, critical systems. However, most human reliability methods fail to take culture into account. This paper takes an easily understood state of the art human reliability analysis method and extends that method to account for the influence of culture, including acceptance of new technology, upon performance. The cultural parameters used to modify the human reliability analysis were determined from two standard industry approaches to cultural assessment: Hofstede’s (1991)more » cultural factors and Davis’ (1989) technology acceptance model (TAM). The result is called the Culture Adjustment Method (CAM). An example is presented that (1) reviews human reliability assessment with and without cultural attributes for a Supervisory Control and Data Acquisition (SCADA) system attack, (2) demonstrates how country specific information can be used to increase the realism of HRA modeling, and (3) discusses the differences in human error probability estimates arising from cultural differences.« less
Preventing a Cyber Dresden: How the Evolution of Air Power can Guide the Evolution of Cyber
2011-06-01
24 Paul Cornish, On Cyber Warfare, (London: RUSI, 2010), 1. 25 CNN‟s footage of Project Aurora, the staged demonstration of SCADA vulnerabilities... Paul McHugh, “Striving for Coherence: Psychiatry‟s Efforts Over Classification”, The Journal of American Medical Association, no.293 (2005):2526-2528...Randall Wakelam, The Science of Bombing: Operational Research in RAF Bomber Command (Toronto: University of Toronto Press, 2009), 157-182 and Dana
A threat intelligence framework for access control security in the oil industry
NASA Astrophysics Data System (ADS)
Alaskandrani, Faisal T.
The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.
Experimental and analytical study of water pipe's rupture for damage identification purposes
NASA Astrophysics Data System (ADS)
Papakonstantinou, Konstantinos G.; Shinozuka, Masanobu; Beikae, Mohsen
2011-04-01
A malfunction, local damage or sudden pipe break of a pipeline system can trigger significant flow variations. As shown in the paper, pressure variations and pipe vibrations are two strongly correlated parameters. A sudden change in the flow velocity and pressure of a pipeline system can induce pipe vibrations. Thus, based on acceleration data, a rapid detection and localization of a possible damage may be carried out by inexpensive, nonintrusive monitoring techniques. To illustrate this approach, an experiment on a single pipe was conducted in the laboratory. Pressure gauges and accelerometers were installed and their correlation was checked during an artificially created transient flow. The experimental findings validated the correlation between the parameters. The interaction between pressure variations and pipe vibrations was also theoretically justified. The developed analytical model explains the connection among flow pressure, velocity, pressure wave propagation and pipe vibration. The proposed method provides a rapid, efficient and practical way to identify and locate sudden failures of a pipeline system and sets firm foundations for the development and implementation of an advanced, new generation Supervisory Control and Data Acquisition (SCADA) system for continuous health monitoring of pipe networks.
Ruano, M V; Ribes, J; Seco, A; Ferrer, J
2011-01-01
This paper presents a computer tool called DSC (Simulation based Controllers Design) that enables an easy design of control systems and strategies applied to wastewater treatment plants. Although the control systems are developed and evaluated by simulation, this tool aims to facilitate the direct implementation of the designed control system to the PC of the full-scale WWTP (wastewater treatment plants). The designed control system can be programmed in a dedicated control application and can be connected to either the simulation software or the SCADA of the plant. To this end, the developed DSC incorporates an OPC server (OLE for process control) which facilitates an open-standard communication protocol for different industrial process applications. The potential capabilities of the DSC tool are illustrated through the example of a full-scale application. An aeration control system applied to a nutrient removing WWTP was designed, tuned and evaluated with the DSC tool before its implementation in the full scale plant. The control parameters obtained by simulation were suitable for the full scale plant with only few modifications to improve the control performance. With the DSC tool, the control systems performance can be easily evaluated by simulation. Once developed and tuned by simulation, the control systems can be directly applied to the full-scale WWTP.
Puig, V; Cembrano, G; Romera, J; Quevedo, J; Aznar, B; Ramón, G; Cabot, J
2009-01-01
This paper deals with the global control of the Riera Blanca catchment in the Barcelona sewer network using a predictive optimal control approach. This catchment has been modelled using a conceptual modelling approach based on decomposing the catchments in subcatchments and representing them as virtual tanks. This conceptual modelling approach allows real-time model calibration and control of the sewer network. The global control problem of the Riera Blanca catchment is solved using a optimal/predictive control algorithm. To implement the predictive optimal control of the Riera Blanca catchment, a software tool named CORAL is used. The on-line control is simulated by interfacing CORAL with a high fidelity simulator of sewer networks (MOUSE). CORAL interchanges readings from the limnimeters and gate commands with MOUSE as if it was connected with the real SCADA system. Finally, the global control results obtained using the predictive optimal control are presented and compared against the results obtained using current local control system. The results obtained using the global control are very satisfactory compared to those obtained using the local control.
International online support to process optimisation and operation decisions.
Onnerth, T B; Eriksson, J
2002-01-01
The information level at all technical facilities has developed from almost nothing 30-40 years ago to advanced IT--Information Technology--systems based on both chemical and mechanical on-line sensors for process and equipment. Still the basic part of information is to get the right data at the right time for the decision to be made. Today a large amount of operational data is available at almost any European wastewater treatment plant, from laboratory and SCADA. The difficult part is to determine which data to keep, which to use in calculations and how and where to make data available. With the STARcontrol system it is possible to separate only process relevant data to use for on-line control and reporting at engineering level, to optimise operation. Furthermore, the use of IT makes it possible to communicate internationally, with full access to the whole amount of data on the single plant. In this way, expert supervision can be both very local in local language e.g. Polish and at the same time very professional with Danish experts advising on Danish processes in Poland or Sweden where some of the 12 STARcontrol systems are running.
FwWebViewPlus: integration of web technologies into WinCC OA based Human-Machine Interfaces at CERN
NASA Astrophysics Data System (ADS)
Golonka, Piotr; Fabian, Wojciech; Gonzalez-Berges, Manuel; Jasiun, Piotr; Varela-Rodriguez, Fernando
2014-06-01
The rapid growth in popularity of web applications gives rise to a plethora of reusable graphical components, such as Google Chart Tools and JQuery Sparklines, implemented in JavaScript and run inside a web browser. In the paper we describe the tool that allows for seamless integration of web-based widgets into WinCC Open Architecture, the SCADA system used commonly at CERN to build complex Human-Machine Interfaces. Reuse of widely available widget libraries and pushing the development efforts to a higher abstraction layer based on a scripting language allow for significant reduction in maintenance of the code in multi-platform environments compared to those currently used in C++ visualization plugins. Adequately designed interfaces allow for rapid integration of new web widgets into WinCC OA. At the same time, the mechanisms familiar to HMI developers are preserved, making the use of new widgets "native". Perspectives for further integration between the realms of WinCC OA and Web development are also discussed.
NASA Astrophysics Data System (ADS)
Krämer, Sebastian G. M.; Wiesent, Benjamin; Müller, Mathias S.; Puente León, Fernando; Méndez Hernández, Yarú
2008-04-01
Wind turbine blades are made of composite materials and reach a length of more than 42 meters. Developments for modern offshore turbines are working on about 60 meters long blades. Hence, with the increasing height of the turbines and the remote locations of the structures, health monitoring systems are becoming more and more important. Therefore, fiber-optic sensor systems are well-suited, as they are lightweight, immune against electromagnetic interference (EMI), and as they can be multiplexed. Based on two separately existing concepts for strain measurements and lightning detection on wind turbines, a fused system is presented. The strain measurement system is based on a reflective fiber-Bragg-grating (FBG) network embedded in the composite structure of the blade. For lightning detection, transmissive &fiber-optic magnetic field sensors based on the Faraday effect are used to register the lightning parameters and estimate the impact point. Hence, an existing lightning detection system will be augmented, due to the fusion, by the capability to measure strain, temperature and vibration. Load, strain, temperature and impact detection information can be incorporated into the turbine's monitoring or SCADA system and remote controlled by operators. Data analysis techniques allow dynamic maintenance scheduling to become a reality, what is of special interest for the cost-effective maintenance of large offshore or badly attainable onshore wind parks. To prove the feasibility of this sensor fusion on one optical fiber, interferences between both sensor systems are investigated and evaluated.
Process Control Migration of 50 LPH Helium Liquefier
NASA Astrophysics Data System (ADS)
Panda, U.; Mandal, A.; Das, A.; Behera, M.; Pal, Sandip
2017-02-01
Two helium liquefier/refrigerators are operational at VECC while one is dedicated for the Superconducting Cyclotron. The first helium liquefier of 50 LPH capacity from Air Liquide has already completed fifteen years of operation without any major trouble. This liquefier is being controlled by Eurotherm PC3000 make PLC. This PLC has become obsolete since last seven years or so. Though we can still manage to run the PLC system with existing spares, risk of discontinuation of the operation is always there due to unavailability of spare. In order to eliminate the risk, an equivalent PLC control system based on Siemens S7-300 was thought of. For smooth migration, total programming was done keeping the same field input and output interface, nomenclature and graphset. New program is a mix of S7-300 Graph, STL and LAD languages. One to one program verification of the entire process graph was done manually. The total program was run in simulation mode. Matlab mathematical model was also used for plant control simulations. EPICS based SCADA was used for process monitoring. As of now the entire hardware and software is ready for direct replacement with minimum required set up time.
RBAC Driven Least Privilege Architecture For Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hull, Julie; Markham, Mark
The concept of role based access control (RBAC) within the IT environment has been studied by researchers and was supported by NIST (circa 1992). This earlier work highlighted the benefits of RBAC which include reduced administrative workload and policies which are easier to analyze and apply. The goals of this research were to expand the application of RBAC in the following ways. Apply RBAC to the control systems environment: The typical RBAC model within the IT environment is used to control a user’s access to files. Within the control system environment files are replaced with measurement (e.g., temperature) and controlmore » (e.g. valve) points organized as a hierarchy of control assets (e.g. a boiler, compressor, refinery unit). Control points have parameters (e.g., high alarm limit, set point, etc.) associated with them. The RBAC model is extended to support access to points and their parameters based upon roles while at the same time allowing permissions for the points to be defined at the asset level or point level directly. In addition, centralized policy administration with distributed access enforcement mechanisms was developed to support the distributed architecture of distributed control systems and SCADA; Extend the RBAC model to include access control for software and devices: The established RBAC approach is to assign users to roles. This work extends that notion by first breaking the control system down into three layers 1) users, 2) software and 3) devices. An RBAC model is then created for each of these three layers. The result is that RBAC can be used to define machine-to-machine policy enforced via the IP security (IPsec) protocol. This highlights the potential to use RBAC for machine-to-machine connectivity within the internet of things; and Enable dynamic policy based upon the operating mode of the system: The IT environment is generally static with respect to policy. However, large cyber physical systems such as industrial controls have various operating modes (start-up, normal operation, emergency, shut-down and maintenance are typical). The policy enforcement architecture must be able to support changes in access permissions as the mode of the control system changes. For example an operator’s role may not allow the operator to shut down a pump during “normal operation” but that same operator role may be given permission to shut down the pump if the refinery transitions to “emergency” mode. The effectiveness of the approach was validated by applying it to the Experion Process Knowledge System. This is a large commercial industrial control system often used to control oil refineries and other assets within the oil and gas sector. As a by-product, other industries using Experion (Pharmaceuticals, Specialty Chemicals, etc.) also benefit from increased security. Policies representative of those that would be used within an oil refinery were created and validated against the RBAC model as implemented in the underlying SQL database. The administration of policy is simplified which in turn makes it practical for security administrators to specify policies which enforce least privilege. The result is a qualitative reduction in risk. The benefits of the enhanced RBAC model are clear and as a result. Honeywell is incorporating portions of the RBAC research into the 2014 release of Experion.« less
Smart Grid Integrity Attacks: Characterizations and Countermeasures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annarita Giani; Eilyan Bitar; Miles McQueen
2011-10-01
Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacksmore » [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.« less
Pornbanlualap, Somchai; Chalopagorn, Pornchanok
2011-08-01
The sequencing of the genome of Streptomyces coelicolor A3(2) identified seven putative adenine/adenosine deaminases and adenosine deaminase-like proteins, none of which have been biochemically characterized. This report describes recombinant expression, purification and characterization of SCO4901 which had been annotated in data bases as a putative adenosine deaminase. The purified putative adenosine deaminase gives a subunit Mr=48,400 on denaturing gel electrophoresis and an oligomer molecular weight of approximately 182,000 by comparative gel filtration. These values are consistent with the active enzyme being composed of four subunits with identical molecular weights. The turnover rate of adenosine is 11.5 s⁻¹ at 30 °C. Since adenine is deaminated ∼10³ slower by the enzyme when compared to that of adenosine, these data strongly show that the purified enzyme is an adenosine deaminase (ADA) and not an adenine deaminase (ADE). Other adenine nucleosides/nucleotides, including 9-β-D-arabinofuranosyl-adenine (ara-A), 5'-AMP, 5'-ADP and 5'-ATP, are not substrates for the enzyme. Coformycin and 2'-deoxycoformycin are potent competitive inhibitors of the enzyme with inhibition constants of 0.25 and 3.4 nM, respectively. Amino acid sequence alignment of ScADA with ADAs from other organisms reveals that eight of the nine highly conserved catalytic site residues in other ADAs are also conserved in ScADA. The only non-conserved residue is Asn317, which replaces Asp296 in the murine enzyme. Based on these data, it is suggested here that ADA and ADE proteins are divergently related enzymes that have evolved from a common α/β barrel scaffold to catalyze the deamination of different substrates, using a similar catalytic mechanism. Copyright © 2011 Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Santoni, Christian; Garcia-Cartagena, Edgardo J.; Zhan, Lu; Iungo, Giacomo Valerio; Leonardi, Stefano
2017-11-01
The integration of wind farm parameterizations into numerical weather prediction models is essential to study power production under realistic conditions. Nevertheless, recent models are unable to capture turbine wake interactions and, consequently, the mean kinetic energy entrainment, which are essential for the development of power optimization models. To address the study of wind turbine wake interaction, one-way nested mesoscale to large-eddy simulation (LES) were performed using the Weather Research and Forecasting model (WRF). The simulation contains five nested domains modeling the mesoscale wind on the entire North Texas Panhandle region to the microscale wind fluctuations and turbine wakes of a wind farm located at Panhandle, Texas. The wind speed, direction and boundary layer profile obtained from WRF were compared against measurements obtained with a sonic anemometer and light detection and ranging system located within the wind farm. Additionally, the power production were assessed against measurements obtained from the supervisory control and data acquisition system located in each turbine. Furthermore, to incorporate the turbines into very coarse LES, a modification to the implementation of the wind farm parameterization by Fitch et al. (2012) is proposed. This work was supported by the NSF, Grants No. 1243482 (WINDINSPIRE) and IIP 1362033 (WindSTAR), and TACC.
Demey, D; Vanderhaegen, B; Vanhooren, H; Liessens, J; Van Eyck, L; Hopkins, L; Vanrolleghem, P A
2001-01-01
In this paper, the practical implementation and validation of advanced control strategies, designed using model based techniques, at an industrial wastewater treatment plant is demonstrated. The plant under study is treating the wastewater of a large pharmaceutical production facility. The process characteristics of the wastewater treatment were quantified by means of tracer tests, intensive measurement campaigns and the use of on-line sensors. In parallel, a dynamical model of the complete wastewater plant was developed according to the specific kinetic characteristics of the sludge and the highly varying composition of the industrial wastewater. Based on real-time data and dynamic models, control strategies for the equalisation system, the polymer dosing and phosphorus addition were established. The control strategies are being integrated in the existing SCADA system combining traditional PLC technology with robust PC based control calculations. The use of intelligent control in wastewater treatment offers a wide spectrum of possibilities to upgrade existing plants, to increase the capacity of the plant and to eliminate peaks. This can result in a more stable and secure overall performance and, finally, in cost savings. The use of on-line sensors has a potential not only for monitoring concentrations, but also for manipulating flows and concentrations. This way the performance of the plant can be secured.
OS friendly microprocessor architecture: Hardware level computer security
NASA Astrophysics Data System (ADS)
Jungwirth, Patrick; La Fratta, Patrick
2016-05-01
We present an introduction to the patented OS Friendly Microprocessor Architecture (OSFA) and hardware level computer security. Conventional microprocessors have not tried to balance hardware performance and OS performance at the same time. Conventional microprocessors have depended on the Operating System for computer security and information assurance. The goal of the OS Friendly Architecture is to provide a high performance and secure microprocessor and OS system. We are interested in cyber security, information technology (IT), and SCADA control professionals reviewing the hardware level security features. The OS Friendly Architecture is a switched set of cache memory banks in a pipeline configuration. For light-weight threads, the memory pipeline configuration provides near instantaneous context switching times. The pipelining and parallelism provided by the cache memory pipeline provides for background cache read and write operations while the microprocessor's execution pipeline is running instructions. The cache bank selection controllers provide arbitration to prevent the memory pipeline and microprocessor's execution pipeline from accessing the same cache bank at the same time. This separation allows the cache memory pages to transfer to and from level 1 (L1) caching while the microprocessor pipeline is executing instructions. Computer security operations are implemented in hardware. By extending Unix file permissions bits to each cache memory bank and memory address, the OSFA provides hardware level computer security.
Next generation information communication infrastructure and case studies for future power systems
NASA Astrophysics Data System (ADS)
Qiu, Bin
As power industry enters the new century, powerful driving forces, uncertainties and new functions are compelling electric utilities to make dramatic changes in their information communication infrastructure. Expanding network services such as real time measurement and monitoring are also driving the need for more bandwidth in the communication network. These needs will grow further as new remote real-time protection and control applications become more feasible and pervasive. This dissertation addresses two main issues for the future power system information infrastructure: communication network infrastructure and associated power system applications. Optical networks no doubt will become the predominant data transmission media for next generation power system communication. The rapid development of fiber optic network technology poses new challenges in the areas of topology design, network management and real time applications. Based on advanced fiber optic technologies, an all-fiber network is investigated and proposed. The study will cover the system architecture and data exchange protocol aspects. High bandwidth, robust optical networks could provide great opportunities to the power system for better service and efficient operation. In the dissertation, different applications are investigated. One of the typical applications is the SCADA information accessing system. An Internet-based application for the substation automation system will be presented. VLSI (Very Large Scale Integration) technology is also used for one-line diagrams auto-generation. High transition rate and low latency optical network is especially suitable for power system real time control. In the dissertation, a new local area network based Load Shedding Controller (LSC) for isolated power system will be presented. By using PMU (Phasor Measurement Unit) and fiber optic network, an AGE (Area Generation Error) based accurate wide area load shedding scheme will also be proposed. The objective is to shed the load in the limited area with minimum disturbance.
The consideration of atmospheric stability within wind farm AEP calculations
NASA Astrophysics Data System (ADS)
Schmidt, Jonas; Chang, Chi-Yao; Dörenkämper, Martin; Salimi, Milad; Teichmann, Tim; Stoevesandt, Bernhard
2016-09-01
The annual energy production of an existing wind farm including thermal stratification is calculated with two different methods and compared to the average of three years of SCADA data. The first method is based on steady state computational fluid dynamics simulations and the assumption of Reynolds-similarity at hub height. The second method is a wake modelling calculation, where a new stratification transformation model was imposed on the Jensen an Ainslie wake models. The inflow states for both approaches were obtained from one year WRF simulation data of the site. Although all models underestimate the mean wind speed and wake effects, the results from the phenomenological wake transformation are compatible with high-fidelity simulation results.
Power Performance Verification of a Wind Farm Using the Friedman's Test.
Hernandez, Wilmar; López-Presa, José Luis; Maldonado-Correa, Jorge L
2016-06-03
In this paper, a method of verification of the power performance of a wind farm is presented. This method is based on the Friedman's test, which is a nonparametric statistical inference technique, and it uses the information that is collected by the SCADA system from the sensors embedded in the wind turbines in order to carry out the power performance verification of a wind farm. Here, the guaranteed power curve of the wind turbines is used as one more wind turbine of the wind farm under assessment, and a multiple comparison method is used to investigate differences between pairs of wind turbines with respect to their power performance. The proposed method says whether the power performance of the specific wind farm under assessment differs significantly from what would be expected, and it also allows wind farm owners to know whether their wind farm has either a perfect power performance or an acceptable power performance. Finally, the power performance verification of an actual wind farm is carried out. The results of the application of the proposed method showed that the power performance of the specific wind farm under assessment was acceptable.
Power Performance Verification of a Wind Farm Using the Friedman’s Test
Hernandez, Wilmar; López-Presa, José Luis; Maldonado-Correa, Jorge L.
2016-01-01
In this paper, a method of verification of the power performance of a wind farm is presented. This method is based on the Friedman’s test, which is a nonparametric statistical inference technique, and it uses the information that is collected by the SCADA system from the sensors embedded in the wind turbines in order to carry out the power performance verification of a wind farm. Here, the guaranteed power curve of the wind turbines is used as one more wind turbine of the wind farm under assessment, and a multiple comparison method is used to investigate differences between pairs of wind turbines with respect to their power performance. The proposed method says whether the power performance of the specific wind farm under assessment differs significantly from what would be expected, and it also allows wind farm owners to know whether their wind farm has either a perfect power performance or an acceptable power performance. Finally, the power performance verification of an actual wind farm is carried out. The results of the application of the proposed method showed that the power performance of the specific wind farm under assessment was acceptable. PMID:27271628
NASA Astrophysics Data System (ADS)
Unuh, M. H.; Muhamad, P.; Norfazrina, H. M. Y.; Ismail, M. A.; Tanasta, Z.
2018-01-01
The applications of semi-active damper employing magnetorheological (MR) fluids keep increasing in fulfilling the demand to control undesired vibration effect. The aim of this study is to introduce the new design of damper for Malaysian vehicle model as well to evaluate its effectiveness in promoting comfort. The vibration isolation performance of the OEM damper featuring MR fluid was analysed physically under real road profile excitation experimentally. An experiment using quarter car rig suspension and LMS SCADAS Mobile was conducted to demonstrate the influence of current in controlling the characteristics of MR fluid in alter the damping behaviour under 5 cm bump impact. Subsequently, the displacement values were measured with respect to time. The new design OEM damper featuring MR fluid was validated by comparing the data with original equipment manufacturer (OEM) passive damper results under the same approach of testing. Comparison of numerical data of the new design OEM damper shown that it can reduce the excitation amplitude up to 40% compared to those obtained by OEM passive damper. Finally, the new design OEM damper featuring MR fluid has effectively isolated the disturbance from the road profile and control the output force.
Numerical and Experimental Methods for Wake Flow Analysis in Complex Terrain
NASA Astrophysics Data System (ADS)
Castellani, Francesco; Astolfi, Davide; Piccioni, Emanuele; Terzi, Ludovico
2015-06-01
Assessment and interpretation of the quality of wind farms power output is a non-trivial task, which poses at least three main challenges: reliable comprehension of free wind flow, which is stretched to the limit on very complex terrains, realistic model of how wake interactions resemble on the wind flow, awareness of the consequences on turbine control systems, including alignment patterns to the wind and, consequently, power output. The present work deals with an onshore wind farm in southern Italy, which has been a test case of IEA- Task 31 Wakebench project: 17 turbines, with 2.3 MW of rated power each, are sited on a very complex terrain. A cluster of machines is investigated through numerical and experimental methods: CFD is employed for simulating wind fields and power extraction, as well as wakes, are estimated through the Actuator Disc model. SCADA data mining techniques are employed for comparison between models and actual performances. The simulations are performed both on the real terrain and on flat terrain, in order to disentangle the effects of complex flow and wake effects. Attention is devoted to comparison between actual alignment patterns of the cluster of turbines and predicted flow deviation.
Racault, Y; Stricker, A-E; Husson, A; Gillot, S
2011-01-01
Oxygen transfer in biological wastewater treatment processes with high sludge concentration, such as membrane bioreactor (MBR), is an important issue. The variation of alpha-factor versus mixed liquor suspended solids (MLSS) concentration was investigated in a full scale MBR plant under process conditions, using mass balances. Exhaustive data from the Supervisory Control And Data Acquisition (SCADA) and from additional online sensors (COD, DO, MLSS) were used to calculate the daily oxygen consumption (OC) using a non-steady state mass balance for COD and total N on a 24-h basis. To close the oxygen balance, OC has to match the total oxygen transfer rate (OTRtot) of the system, which is provided by fine bubble (FB) diffusers in the aeration tank and coarse bubbles (CB) in separate membrane tanks. First assessing OTR(CB) then closing the balance OC = OTRtot allowed to calculate OTR(FB) and to fit an exponential relationship between OTR(FB) and MLSS. A comparison of the alpha-factor obtained by this balance method and by direct measurements with the off-gas method on the same plant is presented and discussed.
Experience of 12 kA / 16 V SMPS during the HTS Current Leads Test
NASA Astrophysics Data System (ADS)
Panchal, P.; Christian, D.; Panchal, R.; Sonara, D.; Purwar, G.; Garg, A.; Nimavat, H.; Singh, G.; Patel, J.; Tanna, V.; Pradhan, S.
2017-04-01
As a part of up gradation plans in SST-1 Tokamak, one pair of 3.3 kA rated prototype hybrid current leads were developed using Di-BSCCO as High Temperature Superconductors (HTS) and the copper heat exchanger. In order to validate the manufacturing procedure prior to go for series production of such current leads, it was recommended to test these current leads using dedicated and very reliable DC switch mode power supply (SMPS). As part of test facility, 12 kA, 16 VDC programmable SMPS was successfully installed, commissioned and tested. This power supply has special features such as modularity, N+1 redundancy, very low ripple voltage, precise current measurements with Direct Current Current Transformer, CC/CV modes with auto-crossover and auto-sequence programming. As a part of acceptance of this converter, A 5.8 mΩ water-cooled resistive dummy load and PLC based SCADA system is designed, developed for commissioning of power supply. The same power supply was used for the testing of the prototype HTS current leads. The paper describes the salient features and experience of state-of-art of power supply and results obtained from this converter during the HTS current leads test.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.
This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despitemore » much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Martin, Shawn
This software enables the user to produce Google Earth visualizations of turbine wake effects for wind farms. The visualizations are based on computations of statistical quantities that vary with wind direction and help quantify the effects on power production of upwind turbines on turbines in their wakes. The results of the software are plot images and kml files that can be loaded into Google Earth. The statistics computed are described in greater detail in the paper: S. Martin, C. H. Westergaard, and J. White (2016), Visualizing Wind Farm Wakes Using SCADA Data, in Wither Turbulence and Big Data in themore » 21st Century? Eds. A. Pollard, L. Castillo, L. Danaila, and M. Glauser. Springer, pgs. 231-254.« less
Economic Evaluation of Computerized Structural Analysis
NASA Technical Reports Server (NTRS)
Fortin, P. E.
1985-01-01
This completed effort involved a technical and economic study of the capabilities of computer programs in the area of structural analysis. The applicability of the programs to NASA projects and to other users was studied. The applications in other industries was explored including both research and development and applied areas. The costs of several alternative analysis programs were compared. A literature search covered applicable technical literature including journals, trade publications and books. In addition to the literature search, several commercial companies that have developed computerized structural analysis programs were contacted and their technical brochures reviewed. These programs include SDRC I-DEAS, MSC/NASTRAN, SCADA, SUPERSAP, NISA/DISPLAY, STAAD-III, MICAS, GTSTRUDL, and STARS. These programs were briefly reviewed as applicable to NASA projects.
Frequency response function (FRF) based updating of a laser spot welded structure
NASA Astrophysics Data System (ADS)
Zin, M. S. Mohd; Rani, M. N. Abdul; Yunus, M. A.; Sani, M. S. M.; Wan Iskandar Mirza, W. I. I.; Mat Isa, A. A.
2018-04-01
The objective of this paper is to present frequency response function (FRF) based updating as a method for matching the finite element (FE) model of a laser spot welded structure with a physical test structure. The FE model of the welded structure was developed using CQUAD4 and CWELD element connectors, and NASTRAN was used to calculate the natural frequencies, mode shapes and FRF. Minimization of the discrepancies between the finite element and experimental FRFs was carried out using the exceptional numerical capability of NASTRAN Sol 200. The experimental work was performed under free-free boundary conditions using LMS SCADAS. Avast improvement in the finite element FRF was achieved using the frequency response function (FRF) based updating with two different objective functions proposed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson; Mark Schanfein; Trond Bjornard
2011-07-01
Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less
Wind-farm simulation over moderately complex terrain
NASA Astrophysics Data System (ADS)
Segalini, Antonio; Castellani, Francesco
2017-05-01
A comparison between three independent software to estimate the power production and the flow field in a wind farm is conducted, validating them against SCADA (Supervisory, Control And Data Acquisition) data. The three software were ORFEUS, WindSim and WAsP: ORFEUS and WAsP are linearised solvers, while WindSim is fully nonlinear. A wake model (namely a prescribed velocity deficit associated to the turbines) is used by WAsP, while ORFEUS and WindSim use the actuator-disc method to account for the turbines presence. The comparison indicates that ORFEUS and WAsP perform slightly better than WindSim in the assessment of the polar efficiency. The wakes simulated with ORFEUS appear more persistent than the ones of WindSim, which uses a two-equation closure model for the turbulence effects.
Development of an FBG-based low temperature measurement system for cargo containment of LNG tankers
NASA Astrophysics Data System (ADS)
Kim, D. G.; Yoo, W.; Swinehart, P.; Jiang, B.; Haber, T.; Mendez, A.
2007-09-01
Given the growing demand for oil and natural gas to meet the world's energy needs, there is nowadays renewed interest in the use of liquefied natural gas (LNG) systems. For LNG to remain in its liquid phase, the gas has to be kept at cryogenic temperatures (< 160°C). And, as part of the LNG supply process, it becomes necessary to transport it using massive carrier tankers with cargo hulls operating at low temperatures and using special insulating double-wall construction. The safe and reliable storage and transportation of LNG products calls for low temperature monitoring of said containers to detect the onset of any potential leaks and possible thermal insulation degradation. Because of the hazardous nature of this cargo, only intrinsically-safe, explosion proof devices can be used. Optical fiber sensors-- such as fiber Bragg gratings-- are ideal for this application given their dielectric nature and multi-point sensing telemetry capability. In this paper, we describe the development of an on-line, multi-point FBG-based low temperature monitoring system based on a network of specially packaged FBG temperature and strain sensors mounted at critical locations within the inner hull, cofferdam and secondary barriers of a LNG carrier tanker. Given the stringent cryogenic operating temperature conditions, pertinent FBG designs, coatings and packaging approaches were formulated along with adequate installation techniques and integration of the interrogating FBG electronics into the tanker's overall SCADA monitoring system. FBG temperature sensors were demonstrated to be stable and sensitive over the 80-480K range. Stability is +/- 0.25K or better with repeated calibrations, and long term stability at 480K is ~0.2mK/hour.
Streamlining environmental product declarations: a stage model
NASA Astrophysics Data System (ADS)
Lefebvre, Elisabeth; Lefebvre, Louis A.; Talbot, Stephane; Le Hen, Gael
2001-02-01
General public environmental awareness and education is increasing, therefore stimulating the demand for reliable, objective and comparable information about products' environmental performances. The recently published standard series ISO 14040 and ISO 14025 are normalizing the preparation of Environmental Product Declarations (EPDs) containing comprehensive information relevant to a product's environmental impact during its life cycle. So far, only a few environmentally leading manufacturing organizations have experimented the preparation of EPDs (mostly from Europe), demonstrating its great potential as a marketing weapon. However the preparation of EPDs is a complex process, requiring collection and analysis of massive amounts of information coming from disparate sources (suppliers, sub-contractors, etc.). In a foreseeable future, the streamlining of the EPD preparation process will require product manufacturers to adapt their information systems (ERP, MES, SCADA) in order to make them capable of gathering, and transmitting the appropriate environmental information. It also requires strong functional integration all along the product supply chain in order to ensure that all the information is made available in a standardized and timely manner. The goal of the present paper is two fold: first to propose a transitional model towards green supply chain management and EPD preparation; second to identify key technologies and methodologies allowing to streamline the EPD process and subsequently the transition toward sustainable product development
NASA Astrophysics Data System (ADS)
Rajewski, D. A.
2015-12-01
Wind farms are an important resource for electrical generation in the Central U.S., however with each installation there are many poorly documented interactions with the local and surrounding environment. The impact of wind farms on surface microclimate is largely understood conceptually using numerical or wind tunnel models or ex situ satellite-detected changes. Measurements suitable for calibration of numerical simulations are few and of limited applicability but are urgently needed to improve parameterization of wind farm aerodynamics influenced by the diurnal evolution of the boundary layer. Among large eddy simulations of wind farm wakes in thermally stable stratification, there are discrepancies on the influence of turbine-induced mixing on the surface heat flux. We provide measurements from seven surface flux stations, vertical profiling LiDARs located upwind and downwind of turbines, and SCADA measurements from turbines during the 2013 Crop Wind Energy Experiment (CWEX-13) as the best evidence for the variability of turbine induced heat flux within a large wind farm. Examination of ambient conditions (wind direction, wind veer, and thermal stratification) and on turbine operation factors (hub-height wind speed, normalized power) reveal conditions that lead to the largest modification of heat flux. Our results demonstrate the highest flux change from the reference station to be where the leading few lines of turbines influence the surface. Under stably stratified conditions turbine-scale turbulence is highly efficient at bringing warmer air aloft to the surface, leading to an increase in downward heat flux. Conversely we see that the combination of wakes from several lines of turbines reduces the flux contrast from the reference station. In this regime of deep wind-farm flow, wake turbulence is similar in scale and intensity to the reference conditions. These analysis tools can be extended to other turbine SCADA and microclimate variables (e.g. temperature) to improve basic understanding of turbine-turbine and total wind farm wake interactions. Forthcoming tall-tower measurements will provide additional opportunities for comparison of simulated wind and thermal profiles in non-wake, and waked flow conditions.
[Study on the automatic parameters identification of water pipe network model].
Jia, Hai-Feng; Zhao, Qi-Feng
2010-01-01
Based on the problems analysis on development and application of water pipe network model, the model parameters automatic identification is regarded as a kernel bottleneck of model's application in water supply enterprise. The methodology of water pipe network model parameters automatic identification based on GIS and SCADA database is proposed. Then the kernel algorithm of model parameters automatic identification is studied, RSA (Regionalized Sensitivity Analysis) is used for automatic recognition of sensitive parameters, and MCS (Monte-Carlo Sampling) is used for automatic identification of parameters, the detail technical route based on RSA and MCS is presented. The module of water pipe network model parameters automatic identification is developed. At last, selected a typical water pipe network as a case, the case study on water pipe network model parameters automatic identification is conducted and the satisfied results are achieved.
Energy measurement using flow computers and chromatography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beeson, J.
1995-12-01
Arkla Pipeline Group (APG), along with most transmission companies, went to electronic flow measurement (EFM) to: (1) Increase resolution and accuracy; (2) Real time correction of flow variables; (3) Increase speed in data retrieval; (4) Reduce capital expenditures; and (5) Reduce operation and maintenance expenditures Prior to EFM, mechanical seven day charts were used which yielded 800 pressure and differential pressure readings. EFM yields 1.2-million readings, a 1500 time improvement in resolution and additional flow representation. The total system accuracy of the EFM system is 0.25 % compared with 2 % for the chart system which gives APG improved accuracy.more » A typical APG electronic measurement system includes a microprocessor-based flow computer, a telemetry communications package, and a gas chromatograph. Live relative density (specific gravity), BTU, CO{sub 2}, and N{sub 2} are updated from the chromatograph to the flow computer every six minutes which provides accurate MMBTU computations. Because the gas contract length has changed from years to monthly and from a majority of direct sales to transports both Arkla and its customers wanted access to actual volumes on a much more timely basis than is allowed with charts. The new electronic system allows volumes and other system data to be retrieved continuously, if EFM is on Supervisory Control and Data Acquisition (SCADA) or daily if on dial up telephone. Previously because of chart integration, information was not available for four to six weeks. EFM costs much less than the combined costs of telemetry transmitters, pressure and differential pressure chart recorders, and temperature chart recorder which it replaces. APG will install this equipment on smaller volume stations at a customers expense. APG requires backup measurement on metering facilities this size. It could be another APG flow computer or chart recorder, or the other companies flow computer or chart recorder.« less
An Integrated Simulation Module for Cyber-Physical Automation Systems †
Ferracuti, Francesco; Freddi, Alessandro; Monteriù, Andrea; Prist, Mariorosario
2016-01-01
The integration of Wireless Sensors Networks (WSNs) into Cyber Physical Systems (CPSs) is an important research problem to solve in order to increase the performances, safety, reliability and usability of wireless automation systems. Due to the complexity of real CPSs, emulators and simulators are often used to replace the real control devices and physical connections during the development stage. The most widespread simulators are free, open source, expandable, flexible and fully integrated into mathematical modeling tools; however, the connection at a physical level and the direct interaction with the real process via the WSN are only marginally tackled; moreover, the simulated wireless sensor motes are not able to generate the analogue output typically required for control purposes. A new simulation module for the control of a wireless cyber-physical system is proposed in this paper. The module integrates the COntiki OS JAva Simulator (COOJA), a cross-level wireless sensor network simulator, and the LabVIEW system design software from National Instruments. The proposed software module has been called “GILOO” (Graphical Integration of Labview and cOOja). It allows one to develop and to debug control strategies over the WSN both using virtual or real hardware modules, such as the National Instruments Real-Time Module platform, the CompactRio, the Supervisory Control And Data Acquisition (SCADA), etc. To test the proposed solution, we decided to integrate it with one of the most popular simulators, i.e., the Contiki OS, and wireless motes, i.e., the Sky mote. As a further contribution, the Contiki Sky DAC driver and a new “Advanced Sky GUI” have been proposed and tested in the COOJA Simulator in order to provide the possibility to develop control over the WSN. To test the performances of the proposed GILOO software module, several experimental tests have been made, and interesting preliminary results are reported. The GILOO module has been applied to a smart home mock-up where a networked control has been developed for the LED lighting system. PMID:27164109
An Integrated Simulation Module for Cyber-Physical Automation Systems.
Ferracuti, Francesco; Freddi, Alessandro; Monteriù, Andrea; Prist, Mariorosario
2016-05-05
The integration of Wireless Sensors Networks (WSNs) into Cyber Physical Systems (CPSs) is an important research problem to solve in order to increase the performances, safety, reliability and usability of wireless automation systems. Due to the complexity of real CPSs, emulators and simulators are often used to replace the real control devices and physical connections during the development stage. The most widespread simulators are free, open source, expandable, flexible and fully integrated into mathematical modeling tools; however, the connection at a physical level and the direct interaction with the real process via the WSN are only marginally tackled; moreover, the simulated wireless sensor motes are not able to generate the analogue output typically required for control purposes. A new simulation module for the control of a wireless cyber-physical system is proposed in this paper. The module integrates the COntiki OS JAva Simulator (COOJA), a cross-level wireless sensor network simulator, and the LabVIEW system design software from National Instruments. The proposed software module has been called "GILOO" (Graphical Integration of Labview and cOOja). It allows one to develop and to debug control strategies over the WSN both using virtual or real hardware modules, such as the National Instruments Real-Time Module platform, the CompactRio, the Supervisory Control And Data Acquisition (SCADA), etc. To test the proposed solution, we decided to integrate it with one of the most popular simulators, i.e., the Contiki OS, and wireless motes, i.e., the Sky mote. As a further contribution, the Contiki Sky DAC driver and a new "Advanced Sky GUI" have been proposed and tested in the COOJA Simulator in order to provide the possibility to develop control over the WSN. To test the performances of the proposed GILOO software module, several experimental tests have been made, and interesting preliminary results are reported. The GILOO module has been applied to a smart home mock-up where a networked control has been developed for the LED lighting system.
Stuart, G; Hollingsworth, A; Thomsen, F; Szylkarski, S; Khan, S; Tomlinson, R; Kirkpatrick, S; Catterall, K; Capati, B
2009-01-01
Gold Coast Water is responsible for the management of the water, recycled water and wastewater assets of the City of the Gold Coast on Australia's east coast. Excess treated recycled water is released at the Gold Coast Seaway, a man-made channel connecting the Broadwater Estuary with the Pacific Ocean, on an outgoing tide in order for the recycled water to be dispersed before the tide changes and re-enters the Broadwater estuary. Rapid population growth has placed increasing demands on the city's recycled water release system and an investigation of the capacity of the Broadwater to assimilate a greater volume of recycled water over a longer release period was undertaken in 2007. As an outcome, Gold Coast Water was granted an extension of the existing release licence from 10.5 hours per day to 13.3 hours per day from the Coombabah wastewater treatment plant (WWTP). The Seaway SmartRelease Project has been designed to optimise the release of the recycled water from the Coombabah WWTP in order to minimise the impact to the receiving estuarine water quality and maximise the cost efficiency of pumping. In order achieve this; an optimisation study that involves intensive hydrodynamic and water quality monitoring, numerical modelling and a web-based decision support system is underway. An intensive monitoring campaign provided information on water levels, currents, winds, waves, nutrients and bacterial levels within the Broadwater. This data was then used to calibrate and verify numerical models using the MIKE by DHI suite of software. The Decision Support System will then collect continually measured data such as water levels, interact with the WWTP SCADA system, run the numerical models and provide the optimal time window to release the required amount of recycled water from the WWTP within the licence specifications.
Compact earth stations, hubs for energy industry expanding
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shimabukuro, T.
1992-02-01
That paper reports that advances in gallium arsenide (GaAs) technology, monolithic microwave integrated circuits (MMIC) and large scale integrated (VLSF) circuits, have contributed to the mass production of very reliable small aperture terminals (VSATs). Less publicized, but equally important to multinational energy organizations, are recent developments in compact earth station design and solid-state hubs for VSAT networks made possible by the new technology. Many applications are suited for the energy industry that involve compact earth station terminals and hubs. The first group of applications describes the use of GTE's ACES earth station for the Zaire Gulf Oil Co. in Zairemore » and for AMOCO in Trinidad. The second group of applications describes the compact hub for VSAT networks, which could potentially have a number of data communication uses in the energy industry, such as, IBM/SNA, X.25, or supervisory control an data acquisition (SCADA) applications.« less
NASA Astrophysics Data System (ADS)
Hahn, S.; Machefaux, E.; Hristov, Y. V.; Albano, M.; Threadgill, R.
2016-09-01
In the present study, combination of the standalone dynamic wake meandering (DWM) model with Reynolds-averaged Navier-Stokes (RANS) CFD solutions for ambient ABL flows is introduced, and its predictive performance for annual energy production (AEP) is evaluated against Vestas’ SCADA data for six operating wind farms over semi-complex terrains under neutral conditions. The performances of conventional linear and quadratic wake superposition techniques are also compared, together with the in-house implemention of successive hierarchical merging approaches. As compared to our standard procedure based on the Jensen model in WindPRO, the overall results are promising, leading to a significant improvement in AEP accuracy for four of the six sites. While the conventional linear superposition shows the best performance for the improved four sites, the hierarchical square superposition shows the least deteriorated result for the other two sites.
Simulation of a 7.7 MW onshore wind farm with the Actuator Line Model
NASA Astrophysics Data System (ADS)
Guggeri, A.; Draper, M.; Usera, G.
2017-05-01
Recently, the Actuator Line Model (ALM) has been evaluated with coarser resolution and larger time steps than what is generally recommended, taking into account an atmospheric sheared and turbulent inflow condition. The aim of the present paper is to continue these studies, assessing the capability of the ALM to represent the wind turbines’ interactions in an onshore wind farm. The ‘Libertad’ wind farm, which consists of four 1.9MW Vestas V100 wind turbines, was simulated considering different wind directions, and the results were compared with the wind farm SCADA data, finding good agreement between them. A sensitivity analysis was performed to evaluate the influence of the spatial resolution, finding acceptable agreement, although some differences were found. It is believed that these differences are due to the characteristics of the different Atmospheric Boundary Layer (ABL) simulations taken as inflow condition (precursor simulations).
Electric Motors Maintenance Planning From Its Operating Variables
NASA Astrophysics Data System (ADS)
Rodrigues, Francisco; Fonseca, Inácio; Farinha, José Torres; Ferreira, Luís; Galar, Diego
2017-09-01
The maintenance planning corresponds to an approach that seeks to maximize the availability of equipment and, consequently, increase the levels of competitiveness of companies by increasing production times. This paper presents a maintenance planning based on operating variables (number of hours worked, duty cycles, number of revolutions) to maximizing the availability of operation of electrical motors. The reading of the operating variables and its sampling is done based on predetermined sampling cycles and subsequently is made the data analysis through time series algorithms aiming to launch work orders before reaching the variables limit values. This approach is supported by tools and technologies such as logical applications that enable a graphical user interface for access to relevant information about their Physical Asset HMI (Human Machine Interface), including the control and supervision by acquisition through SCADA (Supervisory Control And data acquisition) data, also including the communication protocols among different logical applications.
Mapping Wind Farm Loads and Power Production - A Case Study on Horns Rev 1
NASA Astrophysics Data System (ADS)
Galinos, Christos; Dimitrov, Nikolay; Larsen, Torben J.; Natarajan, Anand; Hansen, Kurt S.
2016-09-01
This paper describes the development of a wind turbine (WT) component lifetime fatigue load variation map within an offshore wind farm. A case study on the offshore wind farm Horns Rev I is conducted with this purpose, by quantifying wake effects using the Dynamic Wake Meandering (DWM) method, which has previously been validated based on CFD, Lidar and full scale load measurements. Fully coupled aeroelastic load simulations using turbulent wind conditions are conducted for all wind directions and mean wind speeds between cut-in and cut-out using site specific turbulence level measurements. Based on the mean wind speed and direction distribution, the representative 20-year lifetime fatigue loads are calculated. It is found that the heaviest loaded WT is not the same when looking at blade root, tower top or tower base components. The blade loads are mainly dominated by the wake situations above rated wind speed and the highest loaded blades are in the easternmost row as the dominating wind direction is from West. Regarding the tower components, the highest loaded WTs are also located towards the eastern central location. The turbines with highest power production are, not surprisingly, the ones facing a free sector towards west and south. The power production results of few turbines are compared with SCADA data. The results of this paper are expected to have significance for operation and maintenance planning, where the schedules for inspection and service activities can be adjusted to the requirements arising from the varying fatigue levels. Furthermore, the results can be used in the context of remaining fatigue lifetime assessment and planning of decommissioning.
Designing an operator interface? Consider user`s `psychology`
DOE Office of Scientific and Technical Information (OSTI.GOV)
Toffer, D.E.
The modern operator interface is a channel of communication between operators and the plant that, ideally, provides them with information necessary to keep the plant running at maximum efficiency. Advances in automation technology have increased information flow from the field to the screen. New and improved Supervisory Control and Data Acquisition (SCADA) packages provide designers with powerful and open design considerations. All too often, however, systems go to the field designed for the software rather than the operator. Plant operators` jobs have changed fundamentally, from controlling their plants from out in the field to doing so from within control rooms.more » Control room-based operation does not denote idleness. Trained operators should be engaged in examination of plant status and cognitive evaluation of plant efficiencies. Designers who are extremely computer literate, often do not consider demographics of field operators. Many field operators have little knowledge of modern computer systems. As a result, they do not take full advantage of the interface`s capabilities. Designers often fail to understand the true nature of how operators run their plants. To aid field operators, designers must provide familiar controls and intuitive choices. To achieve success in interface design, it is necessary to understand the ways in which humans think conceptually, and to understand how they process this information physically. The physical and the conceptual are closely related when working with any type of interface. Designers should ask themselves: {open_quotes}What type of information is useful to the field operator?{close_quotes} Let`s explore an integration model that contains the following key elements: (1) Easily navigated menus; (2) Reduced chances for misunderstanding; (3) Accurate representations of the plant or operation; (4) Consistent and predictable operation; (5) A pleasant and engaging interface that conforms to the operator`s expectations. 4 figs.« less
NASA Astrophysics Data System (ADS)
Ye, Xiang; Gao, Weihua; Yan, Yanjun; Osadciw, Lisa A.
2010-04-01
Wind is an important renewable energy source. The energy and economic return from building wind farms justify the expensive investments in doing so. However, without an effective monitoring system, underperforming or faulty turbines will cause a huge loss in revenue. Early detection of such failures help prevent these undesired working conditions. We develop three tests on power curve, rotor speed curve, pitch angle curve of individual turbine. In each test, multiple states are defined to distinguish different working conditions, including complete shut-downs, under-performing states, abnormally frequent default states, as well as normal working states. These three tests are combined to reach a final conclusion, which is more effective than any single test. Through extensive data mining of historical data and verification from farm operators, some state combinations are discovered to be strong indicators of spindle failures, lightning strikes, anemometer faults, etc, for fault detection. In each individual test, and in the score fusion of these tests, we apply multidimensional scaling (MDS) to reduce the high dimensional feature space into a 3-dimensional visualization, from which it is easier to discover turbine working information. This approach gains a qualitative understanding of turbine performance status to detect faults, and also provides explanations on what has happened for detailed diagnostics. The state-of-the-art SCADA (Supervisory Control And Data Acquisition) system in industry can only answer the question whether there are abnormal working states, and our evaluation of multiple states in multiple tests is also promising for diagnostics. In the future, these tests can be readily incorporated in a Bayesian network for intelligent analysis and decision support.
Cryogenic system for the ArTeMiS large sub millimeter camera
NASA Astrophysics Data System (ADS)
Ercolani, E.; Relland, J.; Clerc, L.; Duband, L.; Jourdan, T.; Talvard, M.; Le Pennec, J.; Martignac, J.; Visticot, F.
2014-07-01
A new photonic camera has been developed in the framework of the ArTéMis project (Bolometers architecture for large field of view ground based telescopes in the sub-millimeter). This camera scans the sky in the sub-millimeter range at simultaneously three different wavelengths, namely 200 μm, 350 μm, 450 μm, and is installed inside the APEX telescope located at 5100m above sea level in Chile. Bolometric detectors cooled to 300 mK are used in the camera, which is integrated in an original cryostat developed at the low temperature laboratory (SBT) of the INAC institut. This cryostat contains filters, optics, mirrors and detectors which have to be implemented according to mass, size and stiffness requirements. As a result the cryostat exhibits an unusual geometry. The inner structure of the cryostat is a 40 K plate which acts as an optical bench and is bound to the external vessel through two hexapods, one fixed and the other one mobile thanks to a ball bearing. Once the cryostat is cold, this characteristic enabled all the different elements to be aligned with the optical axis. The cryogenic chain is built around a pulse tube cooler (40 K and 4 K) coupled to a double stage helium sorption cooler (300 mK). The cryogenic and vacuum processes are managed by a Siemens PLC and all the data are showed and stored on a CEA SCADA system. This paper describes the mechanical and thermal design of the cryostat, its command control, and the first thermal laboratory tests. This work was carried out in collaboration with the Astrophysics laboratory SAp of the IRFU institut. SAp and SBT have installed the camera in July 2013 inside the Cassegrain cabin of APEX.
NASA Technical Reports Server (NTRS)
Ganzy, Ethan G.
2014-01-01
All devices attached to the NASA KSC network are subject to security vulnerability scanning and/or penetration testing. In today's changing environment, vulnerable and/or unprotected systems can easily be overlooked. Systems that are not properly managed can become a potential threat to the operational integrity of our systems and networks. This includes all NASA (internal and external) information systems within NASA KSC Internet Protocol (IP) address space, and NASA KSC facilities. The Office of the Chief Information Officer (OCIO) recommends that all NASA Centers and information systems be subject to penetration testing on a regular interval in accordance with the guidelines identified by the National Institute of Standards and Technology (NIST). (ITS-HBK-2810.04-02A) Protecting information and equipment at NASA is an area of increasing concern. In addition to the CPU's on the network; Supervisory, Control and Data Acquisition (SCADA) systems are especially vulnerable because these systems have lacked standards, use embedded controllers with little computational power and informal software, are connected to physical processes, have few operators, and are increasingly also being connected to corporate networks. The scope of work is comprised of several individual components which together build upon previous work by Drew Branch, NASA KSC Intern. The Pwn Plug is the selected COTS (Commercial-Off-The-Shelf) device chosen to test simplification of mandatory IT Security tasks. The device will be utilized to provide services to NASA KSC and enable an assessment of infrastructure soundness and regulatory compliance in an efficient, economical, and business responsive manner. The Pwn Plug is designed as a pen testing appliance which provides a hardware platform that can support commercial penetration testing efforts at significantly reduced costs. The expected outcomes are: 1) External Penetration Testing, 2) Social Engineering, 3) Procedural Documentation, 4) Recommended Remediation Action Plan, 5) System Retest & Remediation Attestation and 6) Final Reports, out briefing and Presentation. Due to physical and material constraints beyond intern and mentor control, the project was redefined as a working pen-test scenario. Limitations of lab availability and tools dictated an academic exercise. This report was developed within the scenario guidelines suggested by the project mentor. The guidelines were to be creative in developing a Pen Test program for a client.
NASA Astrophysics Data System (ADS)
Moriarty, Patrick; Sanz Rodrigo, Javier; Gancarski, Pawel; Chuchfield, Matthew; Naughton, Jonathan W.; Hansen, Kurt S.; Machefaux, Ewan; Maguire, Eoghan; Castellani, Francesco; Terzi, Ludovico; Breton, Simon-Philippe; Ueda, Yuko
2014-06-01
Researchers within the International Energy Agency (IEA) Task 31: Wakebench have created a framework for the evaluation of wind farm flow models operating at the microscale level. The framework consists of a model evaluation protocol integrated with a web-based portal for model benchmarking (www.windbench.net). This paper provides an overview of the building-block validation approach applied to wind farm wake models, including best practices for the benchmarking and data processing procedures for validation datasets from wind farm SCADA and meteorological databases. A hierarchy of test cases has been proposed for wake model evaluation, from similarity theory of the axisymmetric wake and idealized infinite wind farm, to single-wake wind tunnel (UMN-EPFL) and field experiments (Sexbierum), to wind farm arrays in offshore (Horns Rev, Lillgrund) and complex terrain conditions (San Gregorio). A summary of results from the axisymmetric wake, Sexbierum, Horns Rev and Lillgrund benchmarks are used to discuss the state-of-the-art of wake model validation and highlight the most relevant issues for future development.
NASA Astrophysics Data System (ADS)
Soni, Jignesh; Yadav, Ratnakar; Gahlaut, A.; Bansal, G.; Singh, M. J.; Bandyopadhyay, M.; Parmar, K. G.; Pandya, K.; Chakraborty, A.
2011-09-01
Negative ion Experimental facility has been setup at IPR. The facility consists of a RF based negative ion source (ROBIN)—procured under a license agreement with IPP Garching, as a replica of BATMAN, presently operating in IPP, 100 kW 1 MHz RF generators and a set of low and high voltage power supplies, vacuum system and diagnostics. 35 keV 10A H- beam is expected from this setup. Automated successful operation of the system requires an advanced, rugged, time proven and flexible control system. Further the data generated in the experimental phase needs to be acquired, monitored and analyzed to verify and judge the system performance. In the present test bed, this is done using a combination of PLC based control system and a PXI based data acquisition system. The control system consists of three different Siemens PLC systems viz. (1) S-7 400 PLC as a Master Control, (2) S-7 300 PLC for Vacuum system control and (3) C-7 PLC for RF generator control. Master control PLC directly controls all the subsystems except the Vacuum system and RF generator. The Vacuum system and RF generator have their own dedicated PLCs (S-7 300 and C-7 respectively). Further, these two PLC systems work as a slave for the Master control PLC system. Communication between PLC S-7 400, S-7 300 and central control room computer is done through Industrial Ethernet (IE). Control program and GUI are developed in Siemens Step-7 PLC programming software and Wincc SCADA software, respectively. There are approximately 150 analog and 200 digital control and monitoring signals required to perform complete closed loop control of the system. Since the source floats at high potential (˜35 kV); a combination of galvanic and fiber optic isolation has been implemented. PXI based Data Acquisition system (DAS) is a combination of PXI RT (Real time) system, front end signal conditioning electronics, host system and DAQ program. All the acquisition signals coming from various sub-systems are connected and acquired by the PXI RT system, through only fiber optics link for signal conditioning, electrical isolation and better noise immunity. Real time and Host application programs are developed in LabVIEW and the data shall be stored with a facility of online display of selected parameters. Mathematical calculations and report generation will take place at the end of each beam shot. The paper describes in detail about the design approach, implementation strategy, program development, commissioning and operational test result of ROBIN through a data acquisition and control system.
US-CERT Control System Center Input/Output (I/O) Conceputal Design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2005-02-01
This document was prepared for the US-CERT Control Systems Center of the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs the federal departments to identify and prioritize critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the NCSD to address the control system security component addressed in the National Strategy to Secure Cyberspace andmore » the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems; the I/O upgrade described in this document supports these goals. The vulnerability assessment Test Bed, located in the Information Operations Research Center (IORC) facility at Idaho National Laboratory (INL), consists of a cyber test facility integrated with multiple test beds that simulate the nation's critical infrastructure. The fundamental mission of the Test Bed is to provide industry owner/operators, system vendors, and multi-agency partners of the INL National Security Division a platform for vulnerability assessments of control systems. The Input/Output (I/O) upgrade to the Test Bed (see Work Package 3.1 of the FY-05 Annual Work Plan) will provide for the expansion of assessment capabilities within the IORC facility. It will also provide capabilities to connect test beds within the Test Range and other Laboratory resources. This will allow real time I/O data input and communication channels for full replications of control systems (Process Control Systems [PCS], Supervisory Control and Data Acquisition Systems [SCADA], and components). This will be accomplished through the design and implementation of a modular infrastructure of control system, communications, networking, computing and associated equipment, and measurement/control devices. The architecture upgrade will provide a flexible patching system providing a quick ''plug and play''configuration through various communication paths to gain access to live I/O running over specific protocols. This will allow for in-depth assessments of control systems in a true-to-life environment. The full I/O upgrade will be completed through a two-phased approach. Phase I, funded by DHS, expands the capabilities of the Test Bed by developing an operational control system in two functional areas, the Science & Technology Applications Research (STAR) Facility and the expansion of various portions of the Test Bed. Phase II (see Appendix A), funded by other programs, will complete the full I/O upgrade to the facility.« less
ICE CONTROL - Towards optimizing wind energy production during icing events
NASA Astrophysics Data System (ADS)
Dorninger, Manfred; Strauss, Lukas; Serafin, Stefano; Beck, Alexander; Wittmann, Christoph; Weidle, Florian; Meier, Florian; Bourgeois, Saskia; Cattin, René; Burchhart, Thomas; Fink, Martin
2017-04-01
Forecasts of wind power production loss caused by icing weather conditions are produced by a chain of physical models. The model chain consists of a numerical weather prediction model, an icing model and a production loss model. Each element of the model chain is affected by significant uncertainty, which can be quantified using targeted observations and a probabilistic forecasting approach. In this contribution, we present preliminary results from the recently launched project ICE CONTROL, an Austrian research initiative on measurements, probabilistic forecasting, and verification of icing on wind turbine blades. ICE CONTROL includes an experimental field phase, consisting of measurement campaigns in a wind park in Rhineland-Palatinate, Germany, in the winters 2016/17 and 2017/18. Instruments deployed during the campaigns consist of a conventional icing detector on the turbine hub and newly devised ice sensors (eologix Sensor System) on the turbine blades, as well as meteorological sensors for wind, temperature, humidity, visibility, and precipitation type and spectra. Liquid water content and spectral characteristics of super-cooled water droplets are measured using a Fog Monitor FM-120. Three cameras document the icing conditions on the instruments and on the blades. Different modelling approaches are used to quantify the components of the model-chain uncertainties. The uncertainty related to the initial conditions of the weather prediction is evaluated using the existing global ensemble prediction system (EPS) of the European Centre for Medium-Range Weather Forecasts (ECMWF). Furthermore, observation system experiments are conducted with the AROME model and its 3D-Var data assimilation to investigate the impact of additional observations (such as Mode-S aircraft data, SCADA data and MSG cloud mask initialization) on the numerical icing forecast. The uncertainty related to model formulation is estimated from multi-physics ensembles based on the Weather Research and Forecasting model (WRF) by perturbing parameters in the physical parameterization schemes. In addition, uncertainties of the icing model and of its adaptations to the rotating turbine blade are addressed. The model forecasts combined with the suite of instruments and their measurements make it possible to conduct a step-wise verification of all the components of the model chain - a novel aspect compared to similar ongoing and completed forecasting projects.
A Testbed Environment for Buildings-to-Grid Cyber Resilience Research and Development
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sridhar, Siddharth; Ashok, Aditya; Mylrea, Michael E.
The Smart Grid is characterized by the proliferation of advanced digital controllers at all levels of its operational hierarchy from generation to end consumption. Such controllers within modern residential and commercial buildings enable grid operators to exercise fine-grained control over energy consumption through several emerging Buildings-to-Grid (B2G) applications. Though this capability promises significant benefits in terms of operational economics and improved reliability, cybersecurity weaknesses in the supporting infrastructure could be exploited to cause a detrimental effect and this necessitates focused research efforts on two fronts. First, the understanding of how cyber attacks in the B2G space could impact grid reliabilitymore » and to what extent. Second, the development and validation of cyber-physical application-specific countermeasures that are complementary to traditional infrastructure cybersecurity mechanisms for enhanced cyber attack detection and mitigation. The PNNL B2G testbed is currently being developed to address these core research needs. Specifically, the B2G testbed combines high-fidelity buildings+grid simulators, industry-grade building automation and Supervisory Control and Data Acquisition (SCADA) systems in an integrated, realistic, and reconfigurable environment capable of supporting attack-impact-detection-mitigation experimentation. In this paper, we articulate the need for research testbeds to model various B2G applications broadly by looking at the end-to-end operational hierarchy of the Smart Grid. Finally, the paper not only describes the architecture of the B2G testbed in detail, but also addresses the broad spectrum of B2G resilience research it is capable of supporting based on the smart grid operational hierarchy identified earlier.« less
The use of pneumatically generated water pressure signals for aquifer characterization
NASA Astrophysics Data System (ADS)
Fort, M.; Roberts, R.; Chace, D.
2013-12-01
The use of pneumatically generated pressure signals for aquifer characterization Hydraulic tests are the most reliable method of obtaining estimates of hydrologic properties, such as conductivity, that are essential for flow and transport modeling. The use of a sinusoidal signal for hydraulic testing is well established, with Streltsova (1988), Rasmussen (2003) and others having developed analytic solutions. Sinusoidal tests provide a unique easily distinguished signal that reduces ambiguity during analysis and we show that a sinusoidal pressure signal propagates farther into the formation than a standard slug-test signal. If a sinusoidal test is combined with a slug and/or a constant rate test, it can further reduce uncertainty in the estimated parameter values. We demonstrate how pneumatic pressure can be used to generate all three of these signals. By positioning pressure transducers both below the water level and in the head space above the water, we can monitor the total pressure acting on the formation and the changes in water level. From the changes in water level, it is possible to calculate the flow rate in and out of the well, assuming that the well diameter and water density are known. Using gas flow controllers with a Supervisory Control And Data Acquisition (SCADA) system we are able to precisely control the pressures in the well. The use of pneumatic pressure has the advantage that it requires less equipment (no pumps) and produces no water. We also show how the numerical well test analysis program nSIGHTS can be used to analyze all three types of tests simultaneously and to assess the relative contribution of each type of test to the parameter estimation. nSIGHTS was recently released as open source by Sandia National Laboratories and is available for free.
Wind Turbine Failures - Tackling current Problems in Failure Data Analysis
NASA Astrophysics Data System (ADS)
Reder, M. D.; Gonzalez, E.; Melero, J. J.
2016-09-01
The wind industry has been growing significantly over the past decades, resulting in a remarkable increase in installed wind power capacity. Turbine technologies are rapidly evolving in terms of complexity and size, and there is an urgent need for cost effective operation and maintenance (O&M) strategies. Especially unplanned downtime represents one of the main cost drivers of a modern wind farm. Here, reliability and failure prediction models can enable operators to apply preventive O&M strategies rather than corrective actions. In order to develop these models, the failure rates and downtimes of wind turbine (WT) components have to be understood profoundly. This paper is focused on tackling three of the main issues related to WT failure analyses. These are, the non-uniform data treatment, the scarcity of available failure analyses, and the lack of investigation on alternative data sources. For this, a modernised form of an existing WT taxonomy is introduced. Additionally, an extensive analysis of historical failure and downtime data of more than 4300 turbines is presented. Finally, the possibilities to encounter the lack of available failure data by complementing historical databases with Supervisory Control and Data Acquisition (SCADA) alarms are evaluated.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Churchfield, M. J.; Moriarty, P. J.; Hao, Y.
The focus of this work is the comparison of the dynamic wake meandering model and large-eddy simulation with field data from the Egmond aan Zee offshore wind plant composed of 36 3-MW turbines. The field data includes meteorological mast measurements, SCADA information from all turbines, and strain-gauge data from two turbines. The dynamic wake meandering model and large-eddy simulation are means of computing unsteady wind plant aerodynamics, including the important unsteady meandering of wakes as they convect downstream and interact with other turbines and wakes. Both of these models are coupled to a turbine model such that power and mechanicalmore » loads of each turbine in the wind plant are computed. We are interested in how accurately different types of waking (e.g., direct versus partial waking), can be modeled, and how background turbulence level affects these loads. We show that both the dynamic wake meandering model and large-eddy simulation appear to underpredict power and overpredict fatigue loads because of wake effects, but it is unclear that they are really in error. This discrepancy may be caused by wind-direction uncertainty in the field data, which tends to make wake effects appear less pronounced.« less
NASA Astrophysics Data System (ADS)
Dinzi, R.; Hamonangan, TS; Fahmi, F.
2018-02-01
In the current distribution system, a large-capacity distribution transformer supplies loads to remote locations. The use of 220/380 V network is nowadays less common compared to 20 kV network. This results in losses due to the non-optimal distribution transformer, which neglected the load location, poor consumer profile, and large power losses along the carrier. This paper discusses how high voltage distribution systems (HVDS) can be a better system used in distribution networks than the currently used distribution system (Low Voltage Distribution System, LVDS). The proposed change of the system into the new configuration is done by replacing a large-capacity distribution transformer with some smaller-capacity distribution transformers and installed them in positions that closest to the load. The use of high voltage distribution systems will result in better voltage profiles and fewer power losses. From the non-technical side, the annual savings and payback periods on high voltage distribution systems will also be the advantage.
Energy Management of Smart Distribution Systems
NASA Astrophysics Data System (ADS)
Ansari, Bananeh
Electric power distribution systems interface the end-users of electricity with the power grid. Traditional distribution systems are operated in a centralized fashion with the distribution system owner or operator being the only decision maker. The management and control architecture of distribution systems needs to gradually transform to accommodate the emerging smart grid technologies, distributed energy resources, and active electricity end-users or prosumers. The content of this document concerns with developing multi-task multi-objective energy management schemes for: 1) commercial/large residential prosumers, and 2) distribution system operator of a smart distribution system. The first part of this document describes a method of distributed energy management of multiple commercial/ large residential prosumers. These prosumers not only consume electricity, but also generate electricity using their roof-top solar photovoltaics systems. When photovoltaics generation is larger than local consumption, excess electricity will be fed into the distribution system, creating a voltage rise along the feeder. Distribution system operator cannot tolerate a significant voltage rise. ES can help the prosumers manage their electricity exchanges with the distribution system such that minimal voltage fluctuation occurs. The proposed distributed energy management scheme sizes and schedules each prosumer's ES to reduce the electricity bill and mitigate voltage rise along the feeder. The second part of this document focuses on emergency energy management and resilience assessment of a distribution system. The developed emergency energy management system uses available resources and redundancy to restore the distribution system's functionality fully or partially. The success of the restoration maneuver depends on how resilient the distribution system is. Engineering resilience terminology is used to evaluate the resilience of distribution system. The proposed emergency energy management scheme together with resilience assessment increases the distribution system operator's preparedness for emergency events.
NASA Astrophysics Data System (ADS)
van Heeringen, Klaas-Jan; van Nooijen, Ronald; Kooij, Kees; Postma, Bokke
2016-04-01
The Garmerwolde waste water treatment plant (WWTP) in the Groningen area of the Netherlands, receives waste water from a large area. That waste water is collected from many sewer systems and transported to the WWTP through pressurized pipes. The supply of waste water to the WWTP is relatively low and very irregular during dry-weather conditions, resulting in a random pattern of flows. This irregularity is the effect of the local control of the pumps, where the pumps are individually operated as an on/off control based on the water levels in the connected sewer system. The influent may change from zero to high values in a few minutes. The treatment processes at the WWTP are negatively influenced by this irregularity, which ends in high costs for energy and use of chemicals. The ControlNEXT central control system is used to control the 5 largest pump stations, such that the total inflow at the WWTP becomes much smoother. This results in a reduction of operational costs of about 10%. The control algorithm determines whether the actual condition is dry or wet, based on real-time radar precipitation images and the rainfall forecast product HiRLAM. All actual data is also collected and validated, like water levels, pump operations and pump availability. This data management is done using Delft-FEWS. If the situation is identified as "wet", the sewer systems are emptied as far as possible to create maximum storage. If the situation is "dry" (and of course there is a dead band between dry and wet), the pumps are operated such that the total inflow into the WWTP is smoothed. This is done with a Greedy algorithm, developed by Delft University of Technology. The algorithm makes a plan for the next 24 hours (as the daily inflow has a typical daily pattern) and generally stores some water volume in the sewer systems during the day to be able to continue operations during the night. The pumps are controlled with a time step of 5 minutes, where ControlNEXT manages the communication of pump operation setpoints to the SCADA system. In case of failing communication, backup procedures are programmed in the PLC of the pump stations. In that case the old on/off operation based on local water levels will be used. The system has been operational since January 2016 and has been monitored since then. In addition to monitoring the positive effect on the inflow at the WWTP, an important issue is the possible sedimentation in the sewer systems. This will be monitored too.
Thermal Distribution System | Energy Systems Integration Facility | NREL
Thermal Distribution System Thermal Distribution System The Energy Systems Integration Facility's integrated thermal distribution system consists of a thermal water loop connected to a research boiler and . Photo of the roof of the Energy Systems Integration Facility. The thermal distribution bus allows
Planning Systems for Distributed Operations
NASA Technical Reports Server (NTRS)
Maxwell, Theresa G.
2002-01-01
This viewgraph representation presents an overview of the mission planning process involving distributed operations (such as the International Space Station (ISS)) and the computer hardware and software systems needed to support such an effort. Topics considered include: evolution of distributed planning systems, ISS distributed planning, the Payload Planning System (PPS), future developments in distributed planning systems, Request Oriented Scheduling Engine (ROSE) and Next Generation distributed planning systems.
14 CFR 29.1355 - Distribution system.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 1 2014-01-01 2014-01-01 false Distribution system. 29.1355 Section 29... AIRWORTHINESS STANDARDS: TRANSPORT CATEGORY ROTORCRAFT Equipment Electrical Systems and Equipment § 29.1355 Distribution system. (a) The distribution system includes the distribution busses, their associated feeders...
14 CFR 25.1355 - Distribution system.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 1 2014-01-01 2014-01-01 false Distribution system. 25.1355 Section 25... AIRWORTHINESS STANDARDS: TRANSPORT CATEGORY AIRPLANES Equipment Electrical Systems and Equipment § 25.1355 Distribution system. (a) The distribution system includes the distribution busses, their associated feeders...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Jie; Jain, Rishabh; Hodge, Bri-Mathias
A data-driven methodology is developed to analyze how ambient and wake turbulence affect the power generation of wind turbine(s). Using supervisory control and data acquisition (SCADA) data from a wind plant, we select two sets of wind velocity and power data for turbines on the edge of the plant that resemble (i) an out-of-wake scenario and (ii) an in-wake scenario. For each set of data, two surrogate models are developed to represent the turbine(s) power generation as a function of (i) the wind speed and (ii) the wind speed and turbulence intensity. Three types of uncertainties in turbine(s) power generationmore » are investigated: (i) the uncertainty in power generation with respect to the reported power curve; (ii) the uncertainty in power generation with respect to the estimated power response that accounts for only mean wind speed; and (iii) the uncertainty in power generation with respect to the estimated power response that accounts for both mean wind speed and turbulence intensity. Results show that (i) the turbine(s) generally produce more power under the in-wake scenario than under the out-of-wake scenario with the same wind speed; and (ii) there is relatively more uncertainty in the power generation under the in-wake scenario than under the out-of-wake scenario.« less
CFD three dimensional wake analysis in complex terrain
NASA Astrophysics Data System (ADS)
Castellani, F.; Astolfi, D.; Terzi, L.
2017-11-01
Even if wind energy technology is nowadays fully developed, the use of wind energy in very complex terrain is still challenging. In particular, it is challenging to characterize the combination effects of wind ow over complex terrain and wake interactions between nearby turbines and this has a practical relevance too, for the perspective of mitigating anomalous vibrations and loads as well improving the farm efficiency. In this work, a very complex terrain site has been analyzed through a Reynolds-averaged CFD (Computational Fluid Dynamics) numerical wind field model; in the simulation the inuence of wakes has been included through the Actuator Disk (AD) approach. In particular, the upstream turbine of a cluster of 4 wind turbines having 2.3 MW of rated power is studied. The objective of this study is investigating the full three-dimensional wind field and the impact of three-dimensionality on the evolution of the waked area between nearby turbines. A post-processing method of the output of the CFD simulation is developed and this allows to estimate the wake lateral deviation and the wake width. The reliability of the numerical approach is inspired by and crosschecked through the analysis of the operational SCADA (Supervisory Control and Data Acquisition) data of the cluster of interest.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mather, Barry A; Boemer, Jens C.; Vittal, Eknath
The response of low voltage networks with high penetration of PV systems to transmission network faults will, in the future, determine the overall power system performance during certain hours of the year. The WECC distributed PV system model (PVD1) is designed to represent small-scale distribution-connected systems. Although default values are provided by WECC for the model parameters, tuning of those parameters seems to become important in order to accurately estimate the partial loss of distributed PV systems for bulk system studies. The objective of this paper is to describe a new methodology to determine the WECC distributed PV system (PVD1)more » model parameters and to derive parameter sets obtained for six distribution circuits of a Californian investor-owned utility with large amounts of distributed PV systems. The results indicate that the parameters for the partial loss of distributed PV systems may differ significantly from the default values provided by WECC.« less
Distribution Management System Volt/VAR Evaluation | Grid Modernization |
NREL Distribution Management System Volt/VAR Evaluation Distribution Management System Volt/VAR Evaluation This project involves building a prototype distribution management system testbed that links a GE Grid Solutions distribution management system to power hardware-in-the-loop testing. This setup is
Fuel Distribution Systems | Energy Systems Integration Facility | NREL
Fuel Distribution Systems Fuel Distribution Systems The Energy Systems Integration Facility's integrated fuel distribution systems provide natural gas, hydrogen, and diesel throughout its laboratories in two laboratories: the Power Systems Integration Laboratory and the Energy Storage Laboratory. Each
NASA Astrophysics Data System (ADS)
Protalinsky, O. M.; Shcherbatov, I. A.; Stepanov, P. V.
2017-11-01
A growing number of severe accidents in RF call for the need to develop a system that could prevent emergency situations. In a number of cases accident rate is stipulated by careless inspections and neglects in developing repair programs. Across the country rates of accidents are growing because of a so-called “human factor”. In this regard, there has become urgent the problem of identification of the actual state of technological facilities in power engineering using data on engineering processes running and applying artificial intelligence methods. The present work comprises four model states of manufacturing equipment of engineering companies: defect, failure, preliminary situation, accident. Defect evaluation is carried out using both data from SCADA and ASEPCR and qualitative information (verbal assessments of experts in subject matter, photo- and video materials of surveys processed using pattern recognition methods in order to satisfy the requirements). Early identification of defects makes possible to predict the failure of manufacturing equipment using mathematical techniques of artificial neural network. In its turn, this helps to calculate predicted characteristics of reliability of engineering facilities using methods of reliability theory. Calculation of the given parameters provides the real-time estimation of remaining service life of manufacturing equipment for the whole operation period. The neural networks model allows evaluating possibility of failure of a piece of equipment consistent with types of actual defects and their previous reasons. The article presents the grounds for a choice of training and testing samples for the developed neural network, evaluates the adequacy of the neural networks model, and shows how the model can be used to forecast equipment failure. There have been carried out simulating experiments using a computer and retrospective samples of actual values for power engineering companies. The efficiency of the developed model for different types of manufacturing equipment has been proved. There have been offered other research areas in terms of the presented subject matter.
1990-11-01
Intelligence Systems," in Distributed Artifcial Intelligence , vol. II, L. Gasser and M. Huhns (eds), Pitman, London, 1989, pp. 413-430. Shaw, M. Harrow, B...IDTIC FILE COPY A Distributed Problem-Solving Approach to Rule Induction: Learning in Distributed Artificial Intelligence Systems N Michael I. Shaw...SUBTITLE 5. FUNDING NUMBERS A Distributed Problem-Solving Approach to Rule Induction: Learning in Distributed Artificial Intelligence Systems 6
Load flow and state estimation algorithms for three-phase unbalanced power distribution systems
NASA Astrophysics Data System (ADS)
Madvesh, Chiranjeevi
Distribution load flow and state estimation are two important functions in distribution energy management systems (DEMS) and advanced distribution automation (ADA) systems. Distribution load flow analysis is a tool which helps to analyze the status of a power distribution system under steady-state operating conditions. In this research, an effective and comprehensive load flow algorithm is developed to extensively incorporate the distribution system components. Distribution system state estimation is a mathematical procedure which aims to estimate the operating states of a power distribution system by utilizing the information collected from available measurement devices in real-time. An efficient and computationally effective state estimation algorithm adapting the weighted-least-squares (WLS) method has been developed in this research. Both the developed algorithms are tested on different IEEE test-feeders and the results obtained are justified.
A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems
2002-04-01
Based Approach to Intrusion Detection System Evaluation for Distributed Real - Time Systems Authors: G. A. Fink, B. L. Chappell, T. G. Turner, and...Distributed, Security. 1 Introduction Processing and cost requirements are driving future naval combat platforms to use distributed, real - time systems of...distributed, real - time systems . As these systems grow more complex, the timing requirements do not diminish; indeed, they may become more constrained
Organization of the secure distributed computing based on multi-agent system
NASA Astrophysics Data System (ADS)
Khovanskov, Sergey; Rumyantsev, Konstantin; Khovanskova, Vera
2018-04-01
Nowadays developing methods for distributed computing is received much attention. One of the methods of distributed computing is using of multi-agent systems. The organization of distributed computing based on the conventional network computers can experience security threats performed by computational processes. Authors have developed the unified agent algorithm of control system of computing network nodes operation. Network PCs is used as computing nodes. The proposed multi-agent control system for the implementation of distributed computing allows in a short time to organize using of the processing power of computers any existing network to solve large-task by creating a distributed computing. Agents based on a computer network can: configure a distributed computing system; to distribute the computational load among computers operated agents; perform optimization distributed computing system according to the computing power of computers on the network. The number of computers connected to the network can be increased by connecting computers to the new computer system, which leads to an increase in overall processing power. Adding multi-agent system in the central agent increases the security of distributed computing. This organization of the distributed computing system reduces the problem solving time and increase fault tolerance (vitality) of computing processes in a changing computing environment (dynamic change of the number of computers on the network). Developed a multi-agent system detects cases of falsification of the results of a distributed system, which may lead to wrong decisions. In addition, the system checks and corrects wrong results.
Advanced Distribution Management Systems | Grid Modernization | NREL
Advanced Distribution Management Systems Advanced Distribution Management Systems Electric utilities are investing in updated grid technologies such as advanced distribution management systems to management testbed for cyber security in power systems. The "advanced" elements of advanced
Analyzing Distributed Functions in an Integrated Hazard Analysis
NASA Technical Reports Server (NTRS)
Morris, A. Terry; Massie, Michael J.
2010-01-01
Large scale integration of today's aerospace systems is achievable through the use of distributed systems. Validating the safety of distributed systems is significantly more difficult as compared to centralized systems because of the complexity of the interactions between simultaneously active components. Integrated hazard analysis (IHA), a process used to identify unacceptable risks and to provide a means of controlling them, can be applied to either centralized or distributed systems. IHA, though, must be tailored to fit the particular system being analyzed. Distributed systems, for instance, must be analyzed for hazards in terms of the functions that rely on them. This paper will describe systems-oriented IHA techniques (as opposed to traditional failure-event or reliability techniques) that should be employed for distributed systems in aerospace environments. Special considerations will be addressed when dealing with specific distributed systems such as active thermal control, electrical power, command and data handling, and software systems (including the interaction with fault management systems). Because of the significance of second-order effects in large scale distributed systems, the paper will also describe how to analyze secondary functions to secondary functions through the use of channelization.
Systems of frequency distributions for water and environmental engineering
NASA Astrophysics Data System (ADS)
Singh, Vijay P.
2018-09-01
A wide spectrum of frequency distributions are used in hydrologic, hydraulic, environmental and water resources engineering. These distributions may have different origins, are based on different hypotheses, and belong to different generating systems. Review of literature suggests that different systems of frequency distributions employed in science and engineering in general and environmental and water engineering in particular have been derived using different approaches which include (1) differential equations, (2) distribution elasticity, (3) genetic theory, (4) generating functions, (5) transformations, (6) Bessel function, (7) expansions, and (8) entropy maximization. This paper revisits these systems of distributions and discusses the hypotheses that are used for deriving these systems. It also proposes, based on empirical evidence, another general system of distributions and derives a number of distributions from this general system that are used in environmental and water engineering.
Stability Analysis of Distributed Order Fractional Chen System
Aminikhah, H.; Refahi Sheikhani, A.; Rezazadeh, H.
2013-01-01
We first investigate sufficient and necessary conditions of stability of nonlinear distributed order fractional system and then we generalize the integer-order Chen system into the distributed order fractional domain. Based on the asymptotic stability theory of nonlinear distributed order fractional systems, the stability of distributed order fractional Chen system is discussed. In addition, we have found that chaos exists in the double fractional order Chen system. Numerical solutions are used to verify the analytical results. PMID:24489508
47 CFR 73.626 - DTV distributed transmission systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 4 2010-10-01 2010-10-01 false DTV distributed transmission systems. 73.626... RADIO BROADCAST SERVICES Television Broadcast Stations § 73.626 DTV distributed transmission systems. (a... distributed transmission system (DTS). Except as expressly provided in this section, DTV stations operating a...
NASA Astrophysics Data System (ADS)
Rajalakshmi, N.; Padma Subramanian, D.; Thamizhavel, K.
2015-03-01
The extent of real power loss and voltage deviation associated with overloaded feeders in radial distribution system can be reduced by reconfiguration. Reconfiguration is normally achieved by changing the open/closed state of tie/sectionalizing switches. Finding optimal switch combination is a complicated problem as there are many switching combinations possible in a distribution system. Hence optimization techniques are finding greater importance in reducing the complexity of reconfiguration problem. This paper presents the application of firefly algorithm (FA) for optimal reconfiguration of radial distribution system with distributed generators (DG). The algorithm is tested on IEEE 33 bus system installed with DGs and the results are compared with binary genetic algorithm. It is found that binary FA is more effective than binary genetic algorithm in achieving real power loss reduction and improving voltage profile and hence enhancing the performance of radial distribution system. Results are found to be optimum when DGs are added to the test system, which proved the impact of DGs on distribution system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Rui; Zhang, Yingchen
2016-08-01
Distributed energy resources (DERs) and smart loads have the potential to provide flexibility to the distribution system operation. A coordinated optimization approach is proposed in this paper to actively manage DERs and smart loads in distribution systems to achieve the optimal operation status. A three-phase unbalanced Optimal Power Flow (OPF) problem is developed to determine the output from DERs and smart loads with respect to the system operator's control objective. This paper focuses on coordinating PV systems and smart loads to improve the overall voltage profile in distribution systems. Simulations have been carried out in a 12-bus distribution feeder andmore » results illustrate the superior control performance of the proposed approach.« less
Coordinated Optimization of Distributed Energy Resources and Smart Loads in Distribution Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Rui; Zhang, Yingchen
2016-11-14
Distributed energy resources (DERs) and smart loads have the potential to provide flexibility to the distribution system operation. A coordinated optimization approach is proposed in this paper to actively manage DERs and smart loads in distribution systems to achieve the optimal operation status. A three-phase unbalanced Optimal Power Flow (OPF) problem is developed to determine the output from DERs and smart loads with respect to the system operator's control objective. This paper focuses on coordinating PV systems and smart loads to improve the overall voltage profile in distribution systems. Simulations have been carried out in a 12-bus distribution feeder andmore » results illustrate the superior control performance of the proposed approach.« less
Comprehensive evaluation index system of total supply capability in distribution network
NASA Astrophysics Data System (ADS)
Zhang, Linyao; Wu, Guilian; Yang, Jingyuan; Jia, Shuangrui; Zhang, Wei; Sun, Weiqing
2018-01-01
Aiming at the lack of a comprehensive evaluation of the distribution network, based on the existing distribution network evaluation index system, combined with the basic principles of constructing the evaluation index, put forward a new evaluation index system of distribution network capacity. This paper is mainly based on the total supply capability of the distribution network, combining single index and various factors, into a multi-evaluation index of the distribution network, thus forming a reasonable index system, and various indicators of rational quantification make the evaluation results more intuitive. In order to have a comprehensive judgment of distribution network, this paper uses weights to analyse the importance of each index, verify the rationality of the index system through the example, it is proved that the rationality of the index system, so as to guide the direction of distribution network planning.
49 CFR 192.723 - Distribution systems: Leakage surveys.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 3 2014-10-01 2014-10-01 false Distribution systems: Leakage surveys. 192.723... Distribution systems: Leakage surveys. (a) Each operator of a distribution system shall conduct periodic leakage surveys in accordance with this section. (b) The type and scope of the leakage control program...
49 CFR 192.723 - Distribution systems: Leakage surveys.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 3 2012-10-01 2012-10-01 false Distribution systems: Leakage surveys. 192.723... Distribution systems: Leakage surveys. (a) Each operator of a distribution system shall conduct periodic leakage surveys in accordance with this section. (b) The type and scope of the leakage control program...
49 CFR 192.723 - Distribution systems: Leakage surveys.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 3 2011-10-01 2011-10-01 false Distribution systems: Leakage surveys. 192.723... Distribution systems: Leakage surveys. (a) Each operator of a distribution system shall conduct periodic leakage surveys in accordance with this section. (b) The type and scope of the leakage control program...
49 CFR 192.723 - Distribution systems: Leakage surveys.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 3 2013-10-01 2013-10-01 false Distribution systems: Leakage surveys. 192.723... Distribution systems: Leakage surveys. (a) Each operator of a distribution system shall conduct periodic leakage surveys in accordance with this section. (b) The type and scope of the leakage control program...
49 CFR 192.723 - Distribution systems: Leakage surveys.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 3 2010-10-01 2010-10-01 false Distribution systems: Leakage surveys. 192.723... Distribution systems: Leakage surveys. (a) Each operator of a distribution system shall conduct periodic leakage surveys in accordance with this section. (b) The type and scope of the leakage control program...
Advanced Grid Control Technologies Workshop Series | Energy Systems
on advanced distribution management systems (ADMS) and microgrid controls. The workshops were held at . July 7, 2015: Advanced Distribution Management Systems (ADMS) Welcome and NREL Overview Dr. Murali Keynote: Next-Generation Distribution Management Systems and Distributed Resource Energy Management
Laser beam distribution system for the HiLASE Center
NASA Astrophysics Data System (ADS)
Macúchová, Karolina; Heřmánek, Jan; Kaufman, Jan; Muresan, Mihai-George; Růžička, Jan; Řeháková, Martina; Divoký, Martin; Švandrlík, Luděk.; Mocek, Tomáś
2017-12-01
We report recent progress in design and testing of a distribution system for high-power laser beam delivery developed within the HiLASE project of the IOP in the Czech Republic. Laser beam distribution system is a technical system allowing safe and precise distribution of different laser beams from laboratories to several experimental stations. The unique nature of HiLASE lasers requires new approach, which makes design of the distribution system a state-of-the-art challenge.
Assessment of distributed photovoltair electric-power systems
NASA Astrophysics Data System (ADS)
Neal, R. W.; Deduck, P. F.; Marshall, R. N.
1982-10-01
The development of a methodology to assess the potential impacts of distributed photovoltaic (PV) systems on electric utility systems, including subtransmission and distribution networks, and to apply that methodology to several illustrative examples was developed. The investigations focused upon five specific utilities. Impacts upon utility system operations and generation mix were assessed using accepted utility planning methods in combination with models that simulate PV system performance and life cycle economics. Impacts on the utility subtransmission and distribution systems were also investigated. The economic potential of distributed PV systems was investigated for ownership by the utility as well as by the individual utility customer.
Building a generalized distributed system model
NASA Technical Reports Server (NTRS)
Mukkamala, Ravi
1991-01-01
A number of topics related to building a generalized distributed system model are discussed. The effects of distributed database modeling on evaluation of transaction rollbacks, the measurement of effects of distributed database models on transaction availability measures, and a performance analysis of static locking in replicated distributed database systems are covered.
Jiang, Yazhou; Liu, Chen -Ching; Xu, Yin
2016-04-19
The increasing importance of system reliability and resilience is changing the way distribution systems are planned and operated. To achieve a distribution system self-healing against power outages, emerging technologies and devices, such as remote-controlled switches (RCSs) and smart meters, are being deployed. The higher level of automation is transforming traditional distribution systems into the smart distribution systems (SDSs) of the future. The availability of data and remote control capability in SDSs provides distribution operators with an opportunity to optimize system operation and control. In this paper, the development of SDSs and resulting benefits of enhanced system capabilities are discussed. Amore » comprehensive survey is conducted on the state-of-the-art applications of RCSs and smart meters in SDSs. Specifically, a new method, called Temporal Causal Diagram (TCD), is used to incorporate outage notifications from smart meters for enhanced outage management. To fully utilize the fast operation of RCSs, the spanning tree search algorithm is used to develop service restoration strategies. Optimal placement of RCSs and the resulting enhancement of system reliability are discussed. Distribution system resilience with respect to extreme events is presented. Furthermore, test cases are used to demonstrate the benefit of SDSs. Active management of distributed generators (DGs) is introduced. Future research in a smart distribution environment is proposed.« less
Prevention of Unintentional Islands in Power Systems with Distributed
Islands in Power Systems with Distributed Resources Webinar Prevention of Unintentional Islands in Power Systems with Distributed Resources Webinar Learn about unintentional islanding in a webinar from NREL and following the presentation. Types of islands in power systems with distributed resources Issues with
Fractional System Identification: An Approach Using Continuous Order-Distributions
NASA Technical Reports Server (NTRS)
Hartley, Tom T.; Lorenzo, Carl F.
1999-01-01
This paper discusses the identification of fractional- and integer-order systems using the concept of continuous order-distribution. Based on the ability to define systems using continuous order-distributions, it is shown that frequency domain system identification can be performed using least squares techniques after discretizing the order-distribution.
46 CFR 183.376 - Grounded distribution systems (neutral grounded).
Code of Federal Regulations, 2013 CFR
2013-10-01
... VESSELS (UNDER 100 GROSS TONS) ELECTRICAL INSTALLATION Power Sources and Distribution Systems § 183.376... propulsion, power, lighting, or distribution system having a neutral bus or conductor must have the neutral... 46 Shipping 7 2013-10-01 2013-10-01 false Grounded distribution systems (neutral grounded). 183...
46 CFR 28.855 - Electrical distribution systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Electrical distribution systems. 28.855 Section 28.855... FISHING INDUSTRY VESSELS Aleutian Trade Act Vessels § 28.855 Electrical distribution systems. (a) Each electrical distribution system which has a neutral bus or conductor must have the neutral bus or conductor...
46 CFR 28.360 - Electrical distribution systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Electrical distribution systems. 28.360 Section 28.360... Operate With More Than 16 Individuals on Board § 28.360 Electrical distribution systems. (a) Each electrical distribution system which has a neutral bus or conductor must have the neutral bus or conductor...
46 CFR 28.360 - Electrical distribution systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Electrical distribution systems. 28.360 Section 28.360... Operate With More Than 16 Individuals on Board § 28.360 Electrical distribution systems. (a) Each electrical distribution system which has a neutral bus or conductor must have the neutral bus or conductor...
46 CFR 28.360 - Electrical distribution systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Electrical distribution systems. 28.360 Section 28.360... Operate With More Than 16 Individuals on Board § 28.360 Electrical distribution systems. (a) Each electrical distribution system which has a neutral bus or conductor must have the neutral bus or conductor...
46 CFR 28.855 - Electrical distribution systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Electrical distribution systems. 28.855 Section 28.855... FISHING INDUSTRY VESSELS Aleutian Trade Act Vessels § 28.855 Electrical distribution systems. (a) Each electrical distribution system which has a neutral bus or conductor must have the neutral bus or conductor...
46 CFR 28.360 - Electrical distribution systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Electrical distribution systems. 28.360 Section 28.360... Operate With More Than 16 Individuals on Board § 28.360 Electrical distribution systems. (a) Each electrical distribution system which has a neutral bus or conductor must have the neutral bus or conductor...
46 CFR 28.855 - Electrical distribution systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Electrical distribution systems. 28.855 Section 28.855... FISHING INDUSTRY VESSELS Aleutian Trade Act Vessels § 28.855 Electrical distribution systems. (a) Each electrical distribution system which has a neutral bus or conductor must have the neutral bus or conductor...
46 CFR 28.855 - Electrical distribution systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Electrical distribution systems. 28.855 Section 28.855... FISHING INDUSTRY VESSELS Aleutian Trade Act Vessels § 28.855 Electrical distribution systems. (a) Each electrical distribution system which has a neutral bus or conductor must have the neutral bus or conductor...
A Distribution-class Locational Marginal Price (DLMP) Index for Enhanced Distribution Systems
NASA Astrophysics Data System (ADS)
Akinbode, Oluwaseyi Wemimo
The smart grid initiative is the impetus behind changes that are expected to culminate into an enhanced distribution system with the communication and control infrastructure to support advanced distribution system applications and resources such as distributed generation, energy storage systems, and price responsive loads. This research proposes a distribution-class analog of the transmission LMP (DLMP) as an enabler of the advanced applications of the enhanced distribution system. The DLMP is envisioned as a control signal that can incentivize distribution system resources to behave optimally in a manner that benefits economic efficiency and system reliability and that can optimally couple the transmission and the distribution systems. The DLMP is calculated from a two-stage optimization problem; a transmission system OPF and a distribution system OPF. An iterative framework that ensures accurate representation of the distribution system's price sensitive resources for the transmission system problem and vice versa is developed and its convergence problem is discussed. As part of the DLMP calculation framework, a DCOPF formulation that endogenously captures the effect of real power losses is discussed. The formulation uses piecewise linear functions to approximate losses. This thesis explores, with theoretical proofs, the breakdown of the loss approximation technique when non-positive DLMPs/LMPs occur and discusses a mixed integer linear programming formulation that corrects the breakdown. The DLMP is numerically illustrated in traditional and enhanced distribution systems and its superiority to contemporary pricing mechanisms is demonstrated using price responsive loads. Results show that the impact of the inaccuracy of contemporary pricing schemes becomes significant as flexible resources increase. At high elasticity, aggregate load consumption deviated from the optimal consumption by up to about 45 percent when using a flat or time-of-use rate. Individual load consumption deviated by up to 25 percent when using a real-time price. The superiority of the DLMP is more pronounced when important distribution network conditions are not reflected by contemporary prices. The individual load consumption incentivized by the real-time price deviated by up to 90 percent from the optimal consumption in a congested distribution network. While the DLMP internalizes congestion management, the consumption incentivized by the real-time price caused overloads.
Recommendation System Based On Association Rules For Distributed E-Learning Management Systems
NASA Astrophysics Data System (ADS)
Mihai, Gabroveanu
2015-09-01
Traditional Learning Management Systems are installed on a single server where learning materials and user data are kept. To increase its performance, the Learning Management System can be installed on multiple servers; learning materials and user data could be distributed across these servers obtaining a Distributed Learning Management System. In this paper is proposed the prototype of a recommendation system based on association rules for Distributed Learning Management System. Information from LMS databases is analyzed using distributed data mining algorithms in order to extract the association rules. Then the extracted rules are used as inference rules to provide personalized recommendations. The quality of provided recommendations is improved because the rules used to make the inferences are more accurate, since these rules aggregate knowledge from all e-Learning systems included in Distributed Learning Management System.
47 CFR 73.6023 - Distributed transmission systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 4 2010-10-01 2010-10-01 false Distributed transmission systems. 73.6023... distributed transmission system. [73 FR 74064, Dec. 5, 2008] ... RADIO BROADCAST SERVICES Class A Television Broadcast Stations § 73.6023 Distributed transmission...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cappers, Peter; MacDonald, Jason; Page, Janie
2016-01-01
This scoping study focuses on identifying the ability for current and future demand response opportunities to contribute to distribution system management. To do so, this scoping study will identify the needs of a distribution system to operate efficiently, safely and reliably; summarize both benefits and challenges for the operation of the distribution system with high penetration levels of distributed energy resources; define a suite of services based on those changing operational needs that could be provided by resources; identify existing demand response opportunities sponsored by distribution utilities and/or aggregators of retail customers; assess the extent to which distribution system servicesmore » can be provided via DR opportunities both in their current form and with alterations to their design; and provide a qualitative assessment of coordination issues that bulk power and distribution system providers of DR opportunities will need to address.« less
NASA Astrophysics Data System (ADS)
Kodama, Yu; Hamagami, Tomoki
Distributed processing system for restoration of electric power distribution network using two-layered CNP is proposed. The goal of this study is to develop the restoration system which adjusts to the future power network with distributed generators. The state of the art of this study is that the two-layered CNP is applied for the distributed computing environment in practical use. The two-layered CNP has two classes of agents, named field agent and operating agent in the network. In order to avoid conflicts of tasks, operating agent controls privilege for managers to send the task announcement messages in CNP. This technique realizes the coordination between agents which work asynchronously in parallel with others. Moreover, this study implements the distributed processing system using a de-fact standard multi-agent framework, JADE(Java Agent DEvelopment framework). This study conducts the simulation experiments of power distribution network restoration and compares the proposed system with the previous system. We confirmed the results show effectiveness of the proposed system.
NASA Astrophysics Data System (ADS)
Li, Jinze; Qu, Zhi; He, Xiaoyang; Jin, Xiaoming; Li, Tie; Wang, Mingkai; Han, Qiu; Gao, Ziji; Jiang, Feng
2018-02-01
Large-scale access of distributed power can improve the current environmental pressure, at the same time, increasing the complexity and uncertainty of overall distribution system. Rational planning of distributed power can effectively improve the system voltage level. To this point, the specific impact on distribution network power quality caused by the access of typical distributed power was analyzed and from the point of improving the learning factor and the inertia weight, an improved particle swarm optimization algorithm (IPSO) was proposed which could solve distributed generation planning for distribution network to improve the local and global search performance of the algorithm. Results show that the proposed method can well reduce the system network loss and improve the economic performance of system operation with distributed generation.
NASA Astrophysics Data System (ADS)
O'Brien, Enda; McKinstry, Alastair; Ralph, Adam
2015-04-01
Building on previous work presented at EGU 2013 (http://www.sciencedirect.com/science/article/pii/S1876610213016068 ), more results are available now from a different wind-farm in complex terrain in southwest Ireland. The basic approach is to interpolate wind-speed forecasts from an operational weather forecast model (i.e., HARMONIE in the case of Ireland) to the precise location of each wind-turbine, and then use Bayes Model Averaging (BMA; with statistical information collected from a prior training-period of e.g., 25 days) to remove systematic biases. Bias-corrected wind-speed forecasts (and associated power-generation forecasts) are then provided twice daily (at 5am and 5pm) out to 30 hours, with each forecast validation fed back to BMA for future learning. 30-hr forecasts from the operational Met Éireann HARMONIE model at 2.5km resolution have been validated against turbine SCADA observations since Jan. 2014. An extra high-resolution (0.5km grid-spacing) HARMONIE configuration has been run since Nov. 2014 as an extra member of the forecast "ensemble". A new version of HARMONIE with extra filters designed to stabilize high-resolution configurations has been run since Jan. 2015. Measures of forecast skill and forecast errors will be provided, and the contributions made by the various physical and computational enhancements to HARMONIE will be quantified.
Power-Production Diagnostic Tools for Low-Density Wind Farms with Applications to Wake Steering
NASA Astrophysics Data System (ADS)
Takle, E. S.; Herzmann, D.; Rajewski, D. A.; Lundquist, J. K.; Rhodes, M. E.
2016-12-01
Hansen (2011) provided guidelines for wind farm wake analysis with applications to "high density" wind farms (where average distance between turbines is less than ten times rotor diameter). For "low-density" (average distance greater than fifteen times rotor diameter) wind farms, or sections of wind farms we demonstrate simpler sorting and visualization tools that reveal wake interactions and opportunities for wind farm power prediction and wake steering. SCADA data from a segment of a large mid-continent wind farm, together with surface flux measurements and lidar data are subjected to analysis and visualization of wake interactions. A time-history animated visualization of a plan view of power level of individual turbines provides a quick analysis of wake interaction dynamics. Yaw-based sectoral histograms of enhancement/decline of wind speed and power from wind farm reference levels reveals angular width of wake interactions and identifies the turbine(s) responsible for the power reduction. Concurrent surface flux measurements within the wind farm allowed us to evaluate stability influence on wake loss. A one-season climatology is used to identify high-priority candidates for wake steering based on estimated power recovery. Typical clearing prices on the day-ahead market are used to estimate the added value of wake steering. Current research is exploring options for identifying candidate locations for wind farm "build-in" in existing low-density wind farms.
Leveraging AMI data for distribution system model calibration and situational awareness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Peppanen, Jouni; Reno, Matthew J.; Thakkar, Mohini
The many new distributed energy resources being installed at the distribution system level require increased visibility into system operations that will be enabled by distribution system state estimation (DSSE) and situational awareness applications. Reliable and accurate DSSE requires both robust methods for managing the big data provided by smart meters and quality distribution system models. This paper presents intelligent methods for detecting and dealing with missing or inaccurate smart meter data, as well as the ways to process the data for different applications. It also presents an efficient and flexible parameter estimation method based on the voltage drop equation andmore » regression analysis to enhance distribution system model accuracy. Finally, it presents a 3-D graphical user interface for advanced visualization of the system state and events. Moreover, we demonstrate this paper for a university distribution network with the state-of-the-art real-time and historical smart meter data infrastructure.« less
Leveraging AMI data for distribution system model calibration and situational awareness
Peppanen, Jouni; Reno, Matthew J.; Thakkar, Mohini; ...
2015-01-15
The many new distributed energy resources being installed at the distribution system level require increased visibility into system operations that will be enabled by distribution system state estimation (DSSE) and situational awareness applications. Reliable and accurate DSSE requires both robust methods for managing the big data provided by smart meters and quality distribution system models. This paper presents intelligent methods for detecting and dealing with missing or inaccurate smart meter data, as well as the ways to process the data for different applications. It also presents an efficient and flexible parameter estimation method based on the voltage drop equation andmore » regression analysis to enhance distribution system model accuracy. Finally, it presents a 3-D graphical user interface for advanced visualization of the system state and events. Moreover, we demonstrate this paper for a university distribution network with the state-of-the-art real-time and historical smart meter data infrastructure.« less
Communication Needs Assessment for Distributed Turbine Engine Control
NASA Technical Reports Server (NTRS)
Culley, Dennis E.; Behbahani, Alireza R.
2008-01-01
Control system architecture is a major contributor to future propulsion engine performance enhancement and life cycle cost reduction. The control system architecture can be a means to effect net weight reduction in future engine systems, provide a streamlined approach to system design and implementation, and enable new opportunities for performance optimization and increased awareness about system health. The transition from a centralized, point-to-point analog control topology to a modular, networked, distributed system is paramount to extracting these system improvements. However, distributed engine control systems are only possible through the successful design and implementation of a suitable communication system. In a networked system, understanding the data flow between control elements is a fundamental requirement for specifying the communication architecture which, itself, is dependent on the functional capability of electronics in the engine environment. This paper presents an assessment of the communication needs for distributed control using strawman designs and relates how system design decisions relate to overall goals as we progress from the baseline centralized architecture, through partially distributed and fully distributed control systems.
Cathode power distribution system and method of using the same for power distribution
Williamson, Mark A; Wiedmeyer, Stanley G; Koehl, Eugene R; Bailey, James L; Willit, James L; Barnes, Laurel A; Blaskovitz, Robert J
2014-11-11
Embodiments include a cathode power distribution system and/or method of using the same for power distribution. The cathode power distribution system includes a plurality of cathode assemblies. Each cathode assembly of the plurality of cathode assemblies includes a plurality of cathode rods. The system also includes a plurality of bus bars configured to distribute current to each of the plurality of cathode assemblies. The plurality of bus bars include a first bus bar configured to distribute the current to first ends of the plurality of cathode assemblies and a second bus bar configured to distribute the current to second ends of the plurality of cathode assemblies.
Impact of Utility-Scale Distributed Wind on Transmission-Level System Operations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brancucci Martinez-Anido, C.; Hodge, B. M.
2014-09-01
This report presents a new renewable integration study that aims to assess the potential for adding distributed wind to the current power system with minimal or no upgrades to the distribution or transmission electricity systems. It investigates the impacts of integrating large amounts of utility-scale distributed wind power on bulk system operations by performing a case study on the power system of the Independent System Operator-New England (ISO-NE).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Palminitier, Bryan; Broderick, Robert; Mather, Barry
2016-05-01
Wide use of advanced inverters could double the electricity-distribution system’s hosting capacity for distributed PV at low costs—from about 170 GW to 350 GW (see Palmintier et al. 2016). At the distribution system level, increased variable generation due to high penetrations of distributed PV (typically rooftop and smaller ground-mounted systems) could challenge the management of distribution voltage, potentially increase wear and tear on electromechanical utility equipment, and complicate the configuration of circuit-breakers and other protection systems—all of which could increase costs, limit further PV deployment, or both. However, improved analysis of distribution system hosting capacity—the amount of distributed PV thatmore » can be interconnected without changing the existing infrastructure or prematurely wearing out equipment—has overturned previous rule-of-thumb assumptions such as the idea that distributed PV penetrations higher than 15% require detailed impact studies. For example, new analysis suggests that the hosting capacity for distributed PV could rise from approximately 170 GW using traditional inverters to about 350 GW with the use of advanced inverters for voltage management, and it could be even higher using accessible and low-cost strategies such as careful siting of PV systems within a distribution feeder and additional minor changes in distribution operations. Also critical to facilitating distributed PV deployment is the improvement of interconnection processes, associated standards and codes, and compensation mechanisms so they embrace PV’s contributions to system-wide operations. Ultimately SunShot-level PV deployment will require unprecedented coordination of the historically separate distribution and transmission systems along with incorporation of energy storage and “virtual storage,” which exploits improved management of electric vehicle charging, building energy systems, and other large loads. Additional analysis and innovation are neede« less
NASA Technical Reports Server (NTRS)
Lefebvre, D. R.; Sanderson, A. C.
1994-01-01
Robot coordination and control systems for remote teleoperation applications are by necessity implemented on distributed computers. Modeling and performance analysis of these distributed robotic systems is difficult, but important for economic system design. Performance analysis methods originally developed for conventional distributed computer systems are often unsatisfactory for evaluating real-time systems. The paper introduces a formal model of distributed robotic control systems; and a performance analysis method, based on scheduling theory, which can handle concurrent hard-real-time response specifications. Use of the method is illustrated by a case of remote teleoperation which assesses the effect of communication delays and the allocation of robot control functions on control system hardware requirements.
Predictive Analytics for Coordinated Optimization in Distribution Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Rui
This talk will present NREL's work on developing predictive analytics that enables the optimal coordination of all the available resources in distribution systems to achieve the control objectives of system operators. Two projects will be presented. One focuses on developing short-term state forecasting-based optimal voltage regulation in distribution systems; and the other one focuses on actively engaging electricity consumers to benefit distribution system operations.
NASA Astrophysics Data System (ADS)
Pershin, I. M.; Pervukhin, D. A.; Ilyushin, Y. V.; Afanaseva, O. V.
2017-10-01
The paper considers an important problem of designing distributed systems of hydrolithosphere processes management. The control actions on the hydrolithosphere processes under consideration are implemented by a set of extractive wells. The article shows the method of defining the approximation links for description of the dynamic characteristics of hydrolithosphere processes. The structure of distributed regulators, used in the management systems by the considered processes, is presented. The paper analyses the results of the synthesis of the distributed management system and the results of modelling the closed-loop control system by the parameters of the hydrolithosphere process.
THE PRESENCE OF ARSENIC IN DRINKING WATER DISTRIBUTION SOLIDS
The objective of this presentation was to determine whether solids found in drinking water distribution systems contain arsenic. Distribution system pipes and solids removed during hydrant flushing were collected from the distribution system of eight water utilities that had mea...
Defining and Enabling Resiliency of Electric Distribution Systems With Multiple Microgrids
Chanda, Sayonsom; Srivastava, Anurag K.
2016-05-02
This paper presents a method for quantifying and enabling the resiliency of a power distribution system (PDS) using analytical hierarchical process and percolation theory. Using this metric, quantitative analysis can be done to analyze the impact of possible control decisions to pro-actively enable the resilient operation of distribution system with multiple microgrids and other resources. Developed resiliency metric can also be used in short term distribution system planning. The benefits of being able to quantify resiliency can help distribution system planning engineers and operators to justify control actions, compare different reconfiguration algorithms, develop proactive control actions to avert power systemmore » outage due to impending catastrophic weather situations or other adverse events. Validation of the proposed method is done using modified CERTS microgrids and a modified industrial distribution system. Furthermore, simulation results show topological and composite metric considering power system characteristics to quantify the resiliency of a distribution system with the proposed methodology, and improvements in resiliency using two-stage reconfiguration algorithm and multiple microgrids.« less
DG Planning with Amalgamation of Operational and Reliability Considerations
NASA Astrophysics Data System (ADS)
Battu, Neelakanteshwar Rao; Abhyankar, A. R.; Senroy, Nilanjan
2016-04-01
Distributed Generation has been playing a vital role in dealing issues related to distribution systems. This paper presents an approach which provides policy maker with a set of solutions for DG placement to optimize reliability and real power loss of the system. Optimal location of a Distributed Generator is evaluated based on performance indices derived for reliability index and real power loss. The proposed approach is applied on a 15-bus radial distribution system and a 18-bus radial distribution system with conventional and wind distributed generators individually.
Quality monitored distributed voting system
Skogmo, David
1997-01-01
A quality monitoring system can detect certain system faults and fraud attempts in a distributed voting system. The system uses decoy voters to cast predetermined check ballots. Absent check ballots can indicate system faults. Altered check ballots can indicate attempts at counterfeiting votes. The system can also cast check ballots at predetermined times to provide another check on the distributed voting system.
2012-03-01
EMPIRICAL ANALYSIS OF OPTICAL ATTENUATOR PERFORMANCE IN QUANTUM KEY DISTRIBUTION SYSTEMS USING A...DISTRIBUTION IS UNLIMITED AFIT/GCS/ENG/12-01 EMPIRICAL ANALYSIS OF OPTICAL ATTENUATOR PERFORMANCE IN QUANTUM KEY DISTRIBUTION SYSTEMS USING ...challenging as the complexity of actual implementation specifics are considered. Two components common to most quantum key distribution
49 CFR 192.621 - Maximum allowable operating pressure: High-pressure distribution systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... STANDARDS Operations § 192.621 Maximum allowable operating pressure: High-pressure distribution systems. (a) No person may operate a segment of a high pressure distribution system at a pressure that exceeds the... segment of a distribution system otherwise designed to operate at over 60 p.s.i. (414 kPa) gage, unless...
Code of Federal Regulations, 2012 CFR
2012-10-01
... distribution systems. (a) No person may operate a low-pressure distribution system at a pressure high enough to...) No person may operate a low pressure distribution system at a pressure lower than the minimum... 49 Transportation 3 2012-10-01 2012-10-01 false Maximum and minimum allowable operating pressure...
49 CFR 192.621 - Maximum allowable operating pressure: High-pressure distribution systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... STANDARDS Operations § 192.621 Maximum allowable operating pressure: High-pressure distribution systems. (a) No person may operate a segment of a high pressure distribution system at a pressure that exceeds the... segment of a distribution system otherwise designed to operate at over 60 p.s.i. (414 kPa) gage, unless...
Code of Federal Regulations, 2011 CFR
2011-10-01
... distribution systems. (a) No person may operate a low-pressure distribution system at a pressure high enough to...) No person may operate a low pressure distribution system at a pressure lower than the minimum... 49 Transportation 3 2011-10-01 2011-10-01 false Maximum and minimum allowable operating pressure...
49 CFR 192.621 - Maximum allowable operating pressure: High-pressure distribution systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... STANDARDS Operations § 192.621 Maximum allowable operating pressure: High-pressure distribution systems. (a) No person may operate a segment of a high pressure distribution system at a pressure that exceeds the... segment of a distribution system otherwise designed to operate at over 60 p.s.i. (414 kPa) gage, unless...
49 CFR 192.621 - Maximum allowable operating pressure: High-pressure distribution systems.
Code of Federal Regulations, 2014 CFR
2014-10-01
... STANDARDS Operations § 192.621 Maximum allowable operating pressure: High-pressure distribution systems. (a) No person may operate a segment of a high pressure distribution system at a pressure that exceeds the... segment of a distribution system otherwise designed to operate at over 60 p.s.i. (414 kPa) gage, unless...
Code of Federal Regulations, 2013 CFR
2013-10-01
... distribution systems. (a) No person may operate a low-pressure distribution system at a pressure high enough to...) No person may operate a low pressure distribution system at a pressure lower than the minimum... 49 Transportation 3 2013-10-01 2013-10-01 false Maximum and minimum allowable operating pressure...
Code of Federal Regulations, 2014 CFR
2014-10-01
... distribution systems. (a) No person may operate a low-pressure distribution system at a pressure high enough to...) No person may operate a low pressure distribution system at a pressure lower than the minimum... 49 Transportation 3 2014-10-01 2014-10-01 false Maximum and minimum allowable operating pressure...
Code of Federal Regulations, 2010 CFR
2010-10-01
... distribution systems. (a) No person may operate a low-pressure distribution system at a pressure high enough to...) No person may operate a low pressure distribution system at a pressure lower than the minimum... 49 Transportation 3 2010-10-01 2010-10-01 false Maximum and minimum allowable operating pressure...
49 CFR 192.621 - Maximum allowable operating pressure: High-pressure distribution systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... STANDARDS Operations § 192.621 Maximum allowable operating pressure: High-pressure distribution systems. (a) No person may operate a segment of a high pressure distribution system at a pressure that exceeds the... segment of a distribution system otherwise designed to operate at over 60 p.s.i. (414 kPa) gage, unless...
Building a generalized distributed system model
NASA Technical Reports Server (NTRS)
Mukkamala, Ravi; Foudriat, E. C.
1991-01-01
A modeling tool for both analysis and design of distributed systems is discussed. Since many research institutions have access to networks of workstations, the researchers decided to build a tool running on top of the workstations to function as a prototype as well as a distributed simulator for a computing system. The effects of system modeling on performance prediction in distributed systems and the effect of static locking and deadlocks on the performance predictions of distributed transactions are also discussed. While the probability of deadlock is considerably small, its effects on performance could be significant.
NASA Astrophysics Data System (ADS)
Fan, Dehui; Gao, Shan
This paper implemented an intelligent cold chain distribution system based on the technology of Internet of things, and took the protoplasmic beer logistics transport system as example. It realized the remote real-time monitoring material status, recorded the distribution information, dynamically adjusted the distribution tasks and other functions. At the same time, the system combined the Internet of things technology with weighted filtering algorithm, realized the real-time query of condition curve, emergency alarming, distribution data retrieval, intelligent distribution task arrangement, etc. According to the actual test, it can realize the optimization of inventory structure, and improve the efficiency of cold chain distribution.
OPTIMAL SCHEDULING OF BOOSTER DISINFECTION IN WATER DISTRIBUTION SYSTEMS
Booster disinfection is the addition of disinfectant at locations distributed throughout a water distribution system. Such a strategy can reduce the mass of disinfectant required to maintain a detectable residual at points of consumption in the distribution system, which may lea...
Detection of contamination of municipal water distribution systems
Cooper, John F [Oakland, CA
2012-01-17
A system for the detection of contaminates of a fluid in a conduit. The conduit is part of a fluid distribution system. A chemical or biological sensor array is connected to the conduit. The sensor array produces an acoustic signal burst in the fluid upon detection of contaminates in the fluid. A supervisory control system connected to the fluid and operatively connected to the fluid distribution system signals the fluid distribution system upon detection of contaminates in the fluid.
NASA Astrophysics Data System (ADS)
Li, Dazhi; Hendricks-Franssen, Harrie-Jan; Han, Xujun; Jiménez Bello, Miguel Angel; Martínez Alzamora, Fernando; Vereecken, Harry
2017-04-01
Irrigated agriculture accounts worldwide for 40% of food production and 70% of fresh water withdrawals. Irrigation scheduling aims to minimize water use while maintaining the agricultural production. In this study we were concerned with the real-time automatic control of irrigation, which calculates daily water allocation by combining information from soil moisture sensors and a land surface model. The combination of soil moisture measurements and predictions by the Community Land Model (CLM) using sequential data assimilation (DA) is a promising alternative to improve the estimate of soil and plant water status. The LETKF (Local Ensemble Transform Kalman Filter) was chosen to assimilate soil water content measured by FDR (Frequency Domain Reflectometry) into CLM and improve the initial (soil moisture) conditions for the next model run. In addition, predictions by the GFS (Global Forecast System) atmospheric simulation model were used as atmospheric input data for CLM to predict an ensemble of possible soil moisture evolutions for the next days. The difference between predicted and target soil water content is defined as the water deficit, and the irrigation amount was calculated by the integrated water deficit over the root zone. The corresponding irrigation time to apply the required water was introduced in SCADA (supervisory control and data acquisition system) for each citrus field. In total 6 fields were irrigated according our optimization approach including data assimilation (CLM-DA) and there were also 2 fields following the FAO (Food and Agriculture Organization) water balance method and 4 fields controlled by farmers as reference. During the real-time irrigation campaign in Valencia from July to October in 2015 and June to October in 2016, the applied irrigation amount, stem water potential and soil moisture content were recorded. The data indicated that 5% 20% less irrigation water was needed for the CLM-DA scheduled fields than for the other fields following the FAO or farmers' method. Stem water potential data indicated that the CLM-DA fields were not suffering from water stress during most of the irrigation period. Even though the CLM-DA fields received the least irrigation water, the orange production was not suppressed either. Our results show the water saving potential of the CLM-DA method compared to other traditional irrigation methods.
SMART-DS: Synthetic Models for Advanced, Realistic Testing: Distribution Systems and Scenarios
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hodge, Bri-Mathias; Palmintier, Bryan
This presentation provides an overview of full-scale, high-quality, synthetic distribution system data set(s) for testing distribution automation algorithms, distributed control approaches, ADMS capabilities, and other emerging distribution technologies.
Smart intimation and location of faults in distribution system
NASA Astrophysics Data System (ADS)
Hari Krishna, K.; Srinivasa Rao, B.
2018-04-01
Location of faults in the distribution system is one of the most complicated problems that we are facing today. Identification of fault location and severity of fault within a short time is required to provide continuous power supply but fault identification and information transfer to the operator is the biggest challenge in the distribution network. This paper proposes a fault location method in the distribution system based on Arduino nano and GSM module with flame sensor. The main idea is to locate the fault in the distribution transformer by sensing the arc coming out from the fuse element. The biggest challenge in the distribution network is to identify the location and the severity of faults under different conditions. Well operated transmission and distribution systems will play a key role for uninterrupted power supply. Whenever fault occurs in the distribution system the time taken to locate and eliminate the fault has to be reduced. The proposed design was achieved with flame sensor and GSM module. Under faulty condition, the system will automatically send an alert message to the operator in the distribution system, about the abnormal conditions near the transformer, site code and its exact location for possible power restoration.
NASA Astrophysics Data System (ADS)
Mwakabuta, Ndaga Stanslaus
Electric power distribution systems play a significant role in providing continuous and "quality" electrical energy to different classes of customers. In the context of the present restrictions on transmission system expansions and the new paradigm of "open and shared" infrastructure, new approaches to distribution system analyses, economic and operational decision-making need investigation. This dissertation includes three layers of distribution system investigations. In the basic level, improved linear models are shown to offer significant advantages over previous models for advanced analysis. In the intermediate level, the improved model is applied to solve the traditional problem of operating cost minimization using capacitors and voltage regulators. In the advanced level, an artificial intelligence technique is applied to minimize cost under Distributed Generation injection from private vendors. Soft computing techniques are finding increasing applications in solving optimization problems in large and complex practical systems. The dissertation focuses on Genetic Algorithm for investigating the economic aspects of distributed generation penetration without compromising the operational security of the distribution system. The work presents a methodology for determining the optimal pricing of distributed generation that would help utilities make a decision on how to operate their system economically. This would enable modular and flexible investments that have real benefits to the electric distribution system. Improved reliability for both customers and the distribution system in general, reduced environmental impacts, increased efficiency of energy use, and reduced costs of energy services are some advantages.
Quality monitored distributed voting system
Skogmo, D.
1997-03-18
A quality monitoring system can detect certain system faults and fraud attempts in a distributed voting system. The system uses decoy voters to cast predetermined check ballots. Absent check ballots can indicate system faults. Altered check ballots can indicate attempts at counterfeiting votes. The system can also cast check ballots at predetermined times to provide another check on the distributed voting system. 6 figs.
Research in Distributed Real-Time Systems
NASA Technical Reports Server (NTRS)
Mukkamala, R.
1997-01-01
This document summarizes the progress we have made on our study of issues concerning the schedulability of real-time systems. Our study has produced several results in the scalability issues of distributed real-time systems. In particular, we have used our techniques to resolve schedulability issues in distributed systems with end-to-end requirements. During the next year (1997-98), we propose to extend the current work to address the modeling and workload characterization issues in distributed real-time systems. In particular, we propose to investigate the effect of different workload models and component models on the design and the subsequent performance of distributed real-time systems.
Simulation of Tasks Distribution in Horizontally Scalable Management System
NASA Astrophysics Data System (ADS)
Kustov, D.; Sherstneva, A.; Botygin, I.
2016-08-01
This paper presents an imitational model of the task distribution system for the components of territorially-distributed automated management system with a dynamically changing topology. Each resource of the distributed automated management system is represented with an agent, which allows to set behavior of every resource in the best possible way and ensure their interaction. The agent work load imitation was done via service query imitation formed in a system dynamics style using a stream diagram. The query generation took place in the abstract-represented center - afterwards, they were sent to the drive to be distributed to management system resources according to a ranking table.
Microgrid Controls | Grid Modernization | NREL
Systems Integration Facility. Microgrid Controller Interaction with Distribution Management Systems This project investigates the interaction of distribution management systems with local controllers, including microgrid controllers. The project is developing integrated control and management systems for distribution
An Intelligent System for Document Retrieval in Distributed Office Environments.
ERIC Educational Resources Information Center
Mukhopadhyay, Uttam; And Others
1986-01-01
MINDS (Multiple Intelligent Node Document Servers) is a distributed system of knowledge-based query engines for efficiently retrieving multimedia documents in an office environment of distributed workstations. By learning document distribution patterns and user interests and preferences during system usage, it customizes document retrievals for…
14 CFR 23.1310 - Power source capacity and distribution.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 1 2012-01-01 2012-01-01 false Power source capacity and distribution. 23... Equipment General § 23.1310 Power source capacity and distribution. (a) Each installation whose functioning... power supply system, distribution system, or other utilization system. (b) In determining compliance...
14 CFR 23.1310 - Power source capacity and distribution.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 1 2014-01-01 2014-01-01 false Power source capacity and distribution. 23... Equipment General § 23.1310 Power source capacity and distribution. (a) Each installation whose functioning... power supply system, distribution system, or other utilization system. (b) In determining compliance...
14 CFR 23.1310 - Power source capacity and distribution.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 14 Aeronautics and Space 1 2013-01-01 2013-01-01 false Power source capacity and distribution. 23... Equipment General § 23.1310 Power source capacity and distribution. (a) Each installation whose functioning... power supply system, distribution system, or other utilization system. (b) In determining compliance...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-04
... Production Act of 1993--Cooperative Research Group on Evaluation of Distributed Leak Detection Systems... Institute-- Cooperative Research Group on Evaluation of Distributed Leak Detection Systems--Performance... detection systems for offshore pipelines. Laboratory testing of distributed temperature and distributed...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lundstrom, Blake; Gotseff, Peter; Giraldez, Julieta
Continued deployment of renewable and distributed energy resources is fundamentally changing the way that electric distribution systems are controlled and operated; more sophisticated active system control and greater situational awareness are needed. Real-time measurements and distribution system state estimation (DSSE) techniques enable more sophisticated system control and, when combined with visualization applications, greater situational awareness. This paper presents a novel demonstration of a high-speed, real-time DSSE platform and related control and visualization functionalities, implemented using existing open-source software and distribution system monitoring hardware. Live scrolling strip charts of meter data and intuitive annotated map visualizations of the entire state (obtainedmore » via DSSE) of a real-world distribution circuit are shown. The DSSE implementation is validated to demonstrate provision of accurate voltage data. This platform allows for enhanced control and situational awareness using only a minimum quantity of distribution system measurement units and modest data and software infrastructure.« less
Cyber Physical System Modelling of Distribution Power Systems for Dynamic Demand Response
NASA Astrophysics Data System (ADS)
Chu, Xiaodong; Zhang, Rongxiang; Tang, Maosen; Huang, Haoyi; Zhang, Lei
2018-01-01
Dynamic demand response (DDR) is a package of control methods to enhance power system security. A CPS modelling and simulation platform for DDR in distribution power systems is presented in this paper. CPS modelling requirements of distribution power systems are analyzed. A coupled CPS modelling platform is built for assessing DDR in the distribution power system, which combines seamlessly modelling tools of physical power networks and cyber communication networks. Simulations results of IEEE 13-node test system demonstrate the effectiveness of the modelling and simulation platform.
NASA Astrophysics Data System (ADS)
Liang, Likai; Bi, Yushen
Considered on the distributed network management system's demand of high distributives, extensibility and reusability, a framework model of Three-tier distributed network management system based on COM/COM+ and DNA is proposed, which adopts software component technology and N-tier application software framework design idea. We also give the concrete design plan of each layer of this model. Finally, we discuss the internal running process of each layer in the distributed network management system's framework model.
Redesign of Water Distribution Systems for Passive ...
Journal article The purpose of this paper is to examine how water distribution systems could be designed or retrofitted to passively contain contaminants that might enter the water distribution system.
Research Electrical Distribution Bus | Energy Systems Integration Facility
| NREL Research Electrical Distribution Bus Research Electrical Distribution Bus The research electrical distribution bus (REDB) is the heart of the Energy Systems Integration Facility electrical system throughout the laboratories. Photo of a technician performing maintenance on the Research Electrical
NASA Technical Reports Server (NTRS)
Rodriguez, G. (Editor)
1983-01-01
Two general themes in the control of large space structures are addressed: control theory for distributed parameter systems and distributed control for systems requiring spatially-distributed multipoint sensing and actuation. Topics include modeling and control, stabilization, and estimation and identification.
Effect of distributed generation installation on power loss using genetic algorithm method
NASA Astrophysics Data System (ADS)
Hasibuan, A.; Masri, S.; Othman, W. A. F. W. B.
2018-02-01
Injection of the generator distributed in the distribution network can affect the power system significantly. The effect that occurs depends on the allocation of DG on each part of the distribution network. Implementation of this approach has been made to the IEEE 30 bus standard and shows the optimum location and size of the DG which shows a decrease in power losses in the system. This paper aims to show the impact of distributed generation on the distribution system losses. The main purpose of installing DG on a distribution system is to reduce power losses on the power system.Some problems in power systems that can be solved with the installation of DG, one of which will be explored in the use of DG in this study is to reduce the power loss in the transmission line. Simulation results from case studies on the IEEE 30 bus standard system show that the system power loss decreased from 5.7781 MW to 1,5757 MW or just 27,27%. The simulated DG is injected to the bus with the lowest voltage drop on the bus number 8.
Lambertini, Elisabetta; Borchardt, Mark A; Kieke, Burney A; Spencer, Susan K; Loge, Frank J
2012-09-04
Acute gastrointestinal illness (AGI) resulting from pathogens directly entering the piping of drinking water distribution systems is insufficiently understood. Here, we estimate AGI incidence from virus intrusions into the distribution systems of 14 nondisinfecting, groundwater-source, community water systems. Water samples for virus quantification were collected monthly at wells and households during four 12-week periods in 2006-2007. Ultraviolet (UV) disinfection was installed on the communities' wellheads during one study year; UV was absent the other year. UV was intended to eliminate virus contributions from the wells and without residual disinfectant present in these systems, any increase in virus concentration downstream at household taps represented virus contributions from the distribution system (Approach 1). During no-UV periods, distribution system viruses were estimated by the difference between well water and household tap virus concentrations (Approach 2). For both approaches, a Monte Carlo risk assessment framework was used to estimate AGI risk from distribution systems using study-specific exposure-response relationships. Depending on the exposure-response relationship selected, AGI risk from the distribution systems was 0.0180-0.0661 and 0.001-0.1047 episodes/person-year estimated by Approaches 1 and 2, respectively. These values represented 0.1-4.9% of AGI risk from all exposure routes, and 1.6-67.8% of risk related to drinking water exposure. Virus intrusions into nondisinfected drinking water distribution systems can contribute to sporadic AGI.
Drinking Water Distribution Systems
Learn about an overview of drinking water distribution systems, the factors that degrade water quality in the distribution system, assessments of risk, future research about these risks, and how to reduce cross-connection control risk.
NASA Astrophysics Data System (ADS)
Kumar, Ashwani; Vijay Babu, P.; Murty, V. V. S. N.
2017-06-01
Rapidly increasing electricity demands and capacity shortage of transmission and distribution facilities are the main driving forces for the growth of distributed generation (DG) integration in power grids. One of the reasons for choosing a DG is its ability to support voltage in a distribution system. Selection of effective DG characteristics and DG parameters is a significant concern of distribution system planners to obtain maximum potential benefits from the DG unit. The objective of the paper is to reduce the power losses and improve the voltage profile of the radial distribution system with optimal allocation of the multiple DG in the system. The main contribution in this paper is (i) combined power loss sensitivity (CPLS) based method for multiple DG locations, (ii) determination of optimal sizes for multiple DG units at unity and lagging power factor, (iii) impact of DG installed at optimal, that is, combined load power factor on the system performance, (iv) impact of load growth on optimal DG planning, (v) Impact of DG integration in distribution systems on voltage stability index, (vi) Economic and technical Impact of DG integration in the distribution systems. The load growth factor has been considered in the study which is essential for planning and expansion of the existing systems. The technical and economic aspects are investigated in terms of improvement in voltage profile, reduction in total power losses, cost of energy loss, cost of power obtained from DG, cost of power intake from the substation, and savings in cost of energy loss. The results are obtained on IEEE 69-bus radial distribution systems and also compared with other existing methods.
Multi-KW dc distribution system technology research study
NASA Technical Reports Server (NTRS)
Dawson, S. G.
1978-01-01
The Multi-KW DC Distribution System Technology Research Study is the third phase of the NASA/MSFC study program. The purpose of this contract was to complete the design of the integrated technology test facility, provide test planning, support test operations and evaluate test results. The subjet of this study is a continuation of this contract. The purpose of this continuation is to study and analyze high voltage system safety, to determine optimum voltage levels versus power, to identify power distribution system components which require development for higher voltage systems and finally to determine what modifications must be made to the Power Distribution System Simulator (PDSS) to demonstrate 300 Vdc distribution capability.
Interconnection, Integration, and Interactive Impact Analysis of Microgrids and Distribution Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kang, Ning; Wang, Jianhui; Singh, Ravindra
2017-01-01
Distribution management systems (DMSs) are increasingly used by distribution system operators (DSOs) to manage the distribution grid and to monitor the status of both power imported from the transmission grid and power generated locally by a distributed energy resource (DER), to ensure that power flows and voltages along the feeders are maintained within designed limits and that appropriate measures are taken to guarantee service continuity and energy security. When microgrids are deployed and interconnected to the distribution grids, they will have an impact on the operation of the distribution grid. The challenge is to design this interconnection in such amore » way that it enhances the reliability and security of the distribution grid and the loads embedded in the microgrid, while providing economic benefits to all stakeholders, including the microgrid owner and operator and the distribution system operator.« less
Grid-connected distributed solar power systems
NASA Astrophysics Data System (ADS)
Moyle, R.; Chernoff, H.; Schweizer, T.
This paper discusses some important, though often ignored, technical and economic issues of distributed solar power systems: protection of the utility system and nonsolar customers requires suitable interfaced equipment. Purchase criteria must mirror reality; most analyses use life-cycle costing with low discount rates - most buyers use short payback periods. Distributing, installing, and marketing small, distributed solar systems is more costly than most analyses estimate. Results show that certain local conditions and uncommon purchase considerations can combine to make small, distributed solar power attractive, but lower interconnect costs (per kW), lower marketing and product distribution costs, and more favorable purchase criteria make large, centralized solar energy more attractive. Specifically, the value of dispersed solar systems to investors and utilities can be higher than $2000/kw. However, typical residential owners place a value of well under $1000 on the installed system.
Optimal placement and sizing of wind / solar based DG sources in distribution system
NASA Astrophysics Data System (ADS)
Guan, Wanlin; Guo, Niao; Yu, Chunlai; Chen, Xiaoguang; Yu, Haiyang; Liu, Zhipeng; Cui, Jiapeng
2017-06-01
Proper placement and sizing of Distributed Generation (DG) in distribution system can obtain maximum potential benefits. This paper proposes quantum particle swarm algorithm (QPSO) based wind turbine generation unit (WTGU) and photovoltaic (PV) array placement and sizing approach for real power loss reduction and voltage stability improvement of distribution system. Performance modeling of wind and solar generation system are described and classified into PQ\\PQ (V)\\PI type models in power flow. Considering the WTGU and PV based DGs in distribution system is geographical restrictive, the optimal area and DG capacity limits of each bus in the setting area need to be set before optimization, the area optimization method is proposed . The method has been tested on IEEE 33-bus radial distribution systems to demonstrate the performance and effectiveness of the proposed method.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Horowitz, Kelsey A; Ding, Fei; Mather, Barry A
The increasing deployment of distributed photovoltaic systems (DPV) can impact operations at the distribution level and the transmission level of the electric grid. It is important to develop and implement forward-looking approaches for calculating distribution upgrade costs that can be used to inform system planning, market and tariff design, cost allocation, and other policymaking as penetration levels of DPV increase. Using a bottom-up approach that involves iterative hosting capacity analysis, this report calculates distribution upgrade costs as a function of DPV penetration on three real feeders - two in California and one in the Northeastern United States.
NASA Technical Reports Server (NTRS)
Schilling, D. L.; Oh, S. J.; Thau, F.
1975-01-01
Developments in communications systems, computer systems, and power distribution systems for the space shuttle are described. The use of high speed delta modulation for bit rate compression in the transmission of television signals is discussed. Simultaneous Multiprocessor Organization, an approach to computer organization, is presented. Methods of computer simulation and automatic malfunction detection for the shuttle power distribution system are also described.
ERIC Educational Resources Information Center
Maryland State Dept. of Education, Baltimore.
Standards established by Maryland public schools for information and communication distribution systems in new construction and renovation projects are detailed. The function of the communications distribution room (CDR) is to house the distribution equipment of the school's communications systems and may contain gateways, tuners, video cassette…
Emerald: an object-based language for distributed programming
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hutchinson, N.C.
1987-01-01
Distributed systems have become more common, however constructing distributed applications remains a very difficult task. Numerous operating systems and programming languages have been proposed that attempt to simplify the programming of distributed applications. Here a programing language called Emerald is presented that simplifies distributed programming by extending the concepts of object-based languages to the distributed environment. Emerald supports a single model of computation: the object. Emerald objects include private entities such as integers and Booleans, as well as shared, distributed entities such as compilers, directories, and entire file systems. Emerald objects may move between machines in the system, but objectmore » invocation is location independent. The uniform semantic model used for describing all Emerald objects makes the construction of distributed applications in Emerald much simpler than in systems where the differences in implementation between local and remote entities are visible in the language semantics. Emerald incorporates a type system that deals only with the specification of objects - ignoring differences in implementation. Thus, two different implementations of the same abstraction may be freely mixed.« less
Energy System Basics and Distribution Integration Video Series | Energy
renewablesparticularly solar photovoltaic (PV) technologiesonto the distribution grid. Solar Energy Technologies PV Integration Case Studies Integrating Photovoltaic Systems onto Secondary Network Distribution Systems Standards and Codes for U.S. Photovoltaic System Installation Network-Optimal Control of Photovoltaics on
NASA Astrophysics Data System (ADS)
Santi, D. N.; Purnaba, I. G. P.; Mangku, I. W.
2016-01-01
Bonus-Malus system is said to be optimal if it is financially balanced for insurance companies and fair for policyholders. Previous research about Bonus-Malus system concern with the determination of the risk premium which applied to all of the severity that guaranteed by the insurance company. In fact, not all of the severity that proposed by policyholder may be covered by insurance company. When the insurance company sets a maximum bound of the severity incurred, so it is necessary to modify the model of the severity distribution into the severity bound distribution. In this paper, optimal Bonus-Malus system is compound of claim frequency component has geometric distribution and severity component has truncated Weibull distribution is discussed. The number of claims considered to follow a Poisson distribution, and the expected number λ is exponentially distributed, so the number of claims has a geometric distribution. The severity with a given parameter θ is considered to have a truncated exponential distribution is modelled using the Levy distribution, so the severity have a truncated Weibull distribution.
Research on intelligent power distribution system for spacecraft
NASA Astrophysics Data System (ADS)
Xia, Xiaodong; Wu, Jianju
2017-10-01
The power distribution system (PDS) mainly realizes the power distribution and management of the electrical load of the whole spacecraft, which is directly related to the success or failure of the mission, and hence is an important part of the spacecraft. In order to improve the reliability and intelligent degree of the PDS, and considering the function and composition of spacecraft power distribution system, this paper systematically expounds the design principle and method of the intelligent power distribution system based on SSPC, and provides the analysis and verification of the test data additionally.
NASA Astrophysics Data System (ADS)
Zhizhimov, Oleg; Mazov, Nikolay; Skibin, Sergey
Questions concerned with construction and operation of the distributed information systems on the basis of ANSI/NISO Z39.50 Information Retrieval Protocol are discussed in the paper. The paper is based on authors' practice in developing ZooPARK server. Architecture of distributed information systems, questions of reliability of such systems, minimization of search time and administration are examined. Problems with developing of distributed information systems are also described.
Vehicle electrical system state controller
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bissontz, Jay E.
A motor vehicle electrical power distribution system includes a plurality of distribution sub-systems, an electrical power storage sub-system and a plurality of switching devices for selective connection of elements of and loads on the power distribution system to the electrical power storage sub-system. A state transition initiator provides inputs to control system operation of switching devices to change the states of the power distribution system. The state transition initiator has a plurality of positions selection of which can initiate a state transition. The state transition initiator can emulate a four position rotary ignition switch. Fail safe power cutoff switches providemore » high voltage switching device protection.« less
A Performance Comparison of Tree and Ring Topologies in Distributed System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Huang, Min
A distributed system is a collection of computers that are connected via a communication network. Distributed systems have become commonplace due to the wide availability of low-cost, high performance computers and network devices. However, the management infrastructure often does not scale well when distributed systems get very large. Some of the considerations in building a distributed system are the choice of the network topology and the method used to construct the distributed system so as to optimize the scalability and reliability of the system, lower the cost of linking nodes together and minimize the message delay in transmission, and simplifymore » system resource management. We have developed a new distributed management system that is able to handle the dynamic increase of system size, detect and recover the unexpected failure of system services, and manage system resources. The topologies used in the system are the tree-structured network and the ring-structured network. This thesis presents the research background, system components, design, implementation, experiment results and the conclusions of our work. The thesis is organized as follows: the research background is presented in chapter 1. Chapter 2 describes the system components, including the different node types and different connection types used in the system. In chapter 3, we describe the message types and message formats in the system. We discuss the system design and implementation in chapter 4. In chapter 5, we present the test environment and results, Finally, we conclude with a summary and describe our future work in chapter 6.« less
A Theoretical Solid Oxide Fuel Cell Model for System Controls and Stability Design
NASA Technical Reports Server (NTRS)
Kopasakis, George; Brinson, Thomas; Credle, Sydni; Xu, Ming
2006-01-01
As the aviation industry moves towards higher efficiency electrical power generation, all electric aircraft, or zero emissions and more quiet aircraft, fuel cells are sought as the technology that can deliver on these high expectations. The Hybrid Solid Oxide Fuel Cell system combines the fuel cell with a microturbine to obtain up to 70 percent cycle efficiency, and then distributes the electrical power to the loads via a power distribution system. The challenge is to understand the dynamics of this complex multi-discipline system, and design distributed controls that take the system through its operating conditions in a stable and safe manner while maintaining the system performance. This particular system is a power generation and distribution system and the fuel cell and microturbine model fidelity should be compatible with the dynamics of the power distribution system in order to allow proper stability and distributed controls design. A novel modeling approach is proposed for the fuel cell that will allow the fuel cell and the power system to be integrated and designed for stability, distributed controls, and other interface specifications. This investigation shows that for the fuel cell, the voltage characteristic should be modeled, but in addition, conservation equation dynamics, ion diffusion, charge transfer kinetics, and the electron flow inherent impedance should also be included.
Past Seminars and Workshops | Energy Systems Integration Facility | NREL
Distributed Optimization and Control of Sustainable Power Systems Workshop Integrating PV in Distributed Grids Unintentional Islands in Power Systems with Distributed Resources Webinar Smart Grid Educational Series Energy
Distribution automation applications of fiber optics
NASA Technical Reports Server (NTRS)
Kirkham, Harold; Johnston, A.; Friend, H.
1989-01-01
Motivations for interest and research in distribution automation are discussed. The communication requirements of distribution automation are examined and shown to exceed the capabilities of power line carrier, radio, and telephone systems. A fiber optic based communication system is described that is co-located with the distribution system and that could satisfy the data rate and reliability requirements. A cost comparison shows that it could be constructed at a cost that is similar to that of a power line carrier system. The requirements for fiber optic sensors for distribution automation are discussed. The design of a data link suitable for optically-powered electronic sensing is presented. Empirical results are given. A modeling technique that was used to understand the reflections of guided light from a variety of surfaces is described. An optical position-indicator design is discussed. Systems aspects of distribution automation are discussed, in particular, the lack of interface, communications, and data standards. The economics of distribution automation are examined.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 3 2010-10-01 2010-10-01 false Distribution systems reporting transmission pipelines; transmission or gathering systems reporting distribution pipelines. 191.13 Section 191.13 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF...
46 CFR 129.375 - System grounding.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Power Sources and Distribution Systems § 129.375 System grounding. (a) If a grounded distribution system is provided, there must be only one connection to ground, regardless of the number of power sources. This connection must be at the main switchboard. (b) On each metallic vessel, a grounded distribution...
46 CFR 129.375 - System grounding.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Power Sources and Distribution Systems § 129.375 System grounding. (a) If a grounded distribution system is provided, there must be only one connection to ground, regardless of the number of power sources. This connection must be at the main switchboard. (b) On each metallic vessel, a grounded distribution...
46 CFR 129.375 - System grounding.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Power Sources and Distribution Systems § 129.375 System grounding. (a) If a grounded distribution system is provided, there must be only one connection to ground, regardless of the number of power sources. This connection must be at the main switchboard. (b) On each metallic vessel, a grounded distribution...
NASA Technical Reports Server (NTRS)
Lapenta, C. C.
1992-01-01
The functionality of the Distributed Active Archive Centers (DAACs) which are significant elements of the Earth Observing System Data and Information System (EOSDIS) is discussed. Each DAAC encompasses the information management system, the data archival and distribution system, and the product generation system. The EOSDIS DAACs are expected to improve the access to earth science data set needed for global change research.
Double Wigner distribution function of a first-order optical system with a hard-edge aperture.
Pan, Weiqing
2008-01-01
The effect of an apertured optical system on Wigner distribution can be expressed as a superposition integral of the input Wigner distribution function and the double Wigner distribution function of the apertured optical system. By introducing a hard aperture function into a finite sum of complex Gaussian functions, the double Wigner distribution functions of a first-order optical system with a hard aperture outside and inside it are derived. As an example of application, the analytical expressions of the Wigner distribution for a Gaussian beam passing through a spatial filtering optical system with an internal hard aperture are obtained. The analytical results are also compared with the numerical integral results, and they show that the analytical results are proper and ascendant.
Distributed Architecture for the Object-Oriented Method for Interoperability
2003-03-01
Collaborative Environment. ......................121 Figure V-2. Distributed OOMI And The Collaboration Centric Paradigm. .....................123 Figure V...of systems are formed into a system federation to resolve differences in modeling. An OOMI Integrated Development Environment (OOMI IDE) lends ...space for the creation of possible distributed systems is partitioned into User Centric systems, Processing/Storage Centric systems, Implementation
2014-09-18
and full/scale experimental verifications towards ground/ satellite quantum key distribution0 Oat Qhotonics 4235>9+7,=5;9!អ \\58^ Zin K. Dao Z. Miu T...Conceptual Modeling of a Quantum Key Distribution Simulation Framework Using the Discrete Event System Specification DISSERTATION Jeffrey D. Morris... QUANTUM KEY DISTRIBUTION SIMULATION FRAMEWORK USING THE DISCRETE EVENT SYSTEM SPECIFICATION DISSERTATION Presented to the Faculty Department of Systems
NASA Technical Reports Server (NTRS)
Jefferson, David; Beckman, Brian
1986-01-01
This paper describes the concept of virtual time and its implementation in the Time Warp Operating System at the Jet Propulsion Laboratory. Virtual time is a distributed synchronization paradigm that is appropriate for distributed simulation, database concurrency control, real time systems, and coordination of replicated processes. The Time Warp Operating System is targeted toward the distributed simulation application and runs on a 32-node JPL Mark II Hypercube.
Intelligent Systems for Power Management and Distribution
NASA Technical Reports Server (NTRS)
Button, Robert M.
2002-01-01
The motivation behind an advanced technology program to develop intelligent power management and distribution (PMAD) systems is described. The program concentrates on developing digital control and distributed processing algorithms for PMAD components and systems to improve their size, weight, efficiency, and reliability. Specific areas of research in developing intelligent DC-DC converters and distributed switchgear are described. Results from recent development efforts are presented along with expected future benefits to the overall PMAD system performance.
Electric Power Distribution System Model Simplification Using Segment Substitution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Reiman, Andrew P.; McDermott, Thomas E.; Akcakaya, Murat
Quasi-static time-series (QSTS) simulation is used to simulate the behavior of distribution systems over long periods of time (typically hours to years). The technique involves repeatedly solving the load-flow problem for a distribution system model and is useful for distributed energy resource (DER) planning. When a QSTS simulation has a small time step and a long duration, the computational burden of the simulation can be a barrier to integration into utility workflows. One way to relieve the computational burden is to simplify the system model. The segment substitution method of simplifying distribution system models introduced in this paper offers modelmore » bus reduction of up to 98% with a simplification error as low as 0.2% (0.002 pu voltage). In contrast to existing methods of distribution system model simplification, which rely on topological inspection and linearization, the segment substitution method uses black-box segment data and an assumed simplified topology.« less
Parametric distribution approach for flow availability in small hydro potential analysis
NASA Astrophysics Data System (ADS)
Abdullah, Samizee; Basri, Mohd Juhari Mat; Jamaluddin, Zahrul Zamri; Azrulhisham, Engku Ahmad; Othman, Jamel
2016-10-01
Small hydro system is one of the important sources of renewable energy and it has been recognized worldwide as clean energy sources. Small hydropower generation system uses the potential energy in flowing water to produce electricity is often questionable due to inconsistent and intermittent of power generated. Potential analysis of small hydro system which is mainly dependent on the availability of water requires the knowledge of water flow or stream flow distribution. This paper presented the possibility of applying Pearson system for stream flow availability distribution approximation in the small hydro system. By considering the stochastic nature of stream flow, the Pearson parametric distribution approximation was computed based on the significant characteristic of Pearson system applying direct correlation between the first four statistical moments of the distribution. The advantage of applying various statistical moments in small hydro potential analysis will have the ability to analyze the variation shapes of stream flow distribution.
24 CFR 3280.609 - Water distribution systems.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 24 Housing and Urban Development 5 2011-04-01 2011-04-01 false Water distribution systems. 3280....609 Water distribution systems. (a) Water supply—(1) Supply piping. Piping systems shall be sized to provide an adequate quantity of water to each plumbing fixture at a flow rate sufficient to keep the...
24 CFR 3280.609 - Water distribution systems.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 24 Housing and Urban Development 5 2012-04-01 2012-04-01 false Water distribution systems. 3280....609 Water distribution systems. (a) Water supply—(1) Supply piping. Piping systems shall be sized to provide an adequate quantity of water to each plumbing fixture at a flow rate sufficient to keep the...
Frontiers in Distributed Optimization and Control of Sustainable Power
Optimization and Control of Sustainable Power Systems Workshop Frontiers in Distributed Optimization and Control of Sustainable Power Systems Workshop In January 2016, NREL's energy systems integration team hosted a workshop on frontiers in distributed optimization and control of sustainable power systems. The
24 CFR 3280.609 - Water distribution systems.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 5 2013-04-01 2013-04-01 false Water distribution systems. 3280....609 Water distribution systems. (a) Water supply—(1) Supply piping. Piping systems shall be sized to provide an adequate quantity of water to each plumbing fixture at a flow rate sufficient to keep the...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wang, Jianhui
2015-09-01
Grid modernization is transforming the operation and management of electric distribution systems from manual, paper-driven business processes to electronic, computer-assisted decisionmaking. At the center of this business transformation is the distribution management system (DMS), which provides a foundation from which optimal levels of performance can be achieved in an increasingly complex business and operating environment. Electric distribution utilities are facing many new challenges that are dramatically increasing the complexity of operating and managing the electric distribution system: growing customer expectations for service reliability and power quality, pressure to achieve better efficiency and utilization of existing distribution system assets, and reductionmore » of greenhouse gas emissions by accommodating high penetration levels of distributed generating resources powered by renewable energy sources (wind, solar, etc.). Recent “storm of the century” events in the northeastern United States and the lengthy power outages and customer hardships that followed have greatly elevated the need to make power delivery systems more resilient to major storm events and to provide a more effective electric utility response during such regional power grid emergencies. Despite these newly emerging challenges for electric distribution system operators, only a small percentage of electric utilities have actually implemented a DMS. This paper discusses reasons why a DMS is needed and why the DMS may emerge as a mission-critical system that will soon be considered essential as electric utilities roll out their grid modernization strategies.« less
NASA Astrophysics Data System (ADS)
Zhang, Langwen; Xie, Wei; Wang, Jingcheng
2017-11-01
In this work, synthesis of robust distributed model predictive control (MPC) is presented for a class of linear systems subject to structured time-varying uncertainties. By decomposing a global system into smaller dimensional subsystems, a set of distributed MPC controllers, instead of a centralised controller, are designed. To ensure the robust stability of the closed-loop system with respect to model uncertainties, distributed state feedback laws are obtained by solving a min-max optimisation problem. The design of robust distributed MPC is then transformed into solving a minimisation optimisation problem with linear matrix inequality constraints. An iterative online algorithm with adjustable maximum iteration is proposed to coordinate the distributed controllers to achieve a global performance. The simulation results show the effectiveness of the proposed robust distributed MPC algorithm.
Heartbeat-based error diagnosis framework for distributed embedded systems
NASA Astrophysics Data System (ADS)
Mishra, Swagat; Khilar, Pabitra Mohan
2012-01-01
Distributed Embedded Systems have significant applications in automobile industry as steer-by-wire, fly-by-wire and brake-by-wire systems. In this paper, we provide a general framework for fault detection in a distributed embedded real time system. We use heartbeat monitoring, check pointing and model based redundancy to design a scalable framework that takes care of task scheduling, temperature control and diagnosis of faulty nodes in a distributed embedded system. This helps in diagnosis and shutting down of faulty actuators before the system becomes unsafe. The framework is designed and tested using a new simulation model consisting of virtual nodes working on a message passing system.
Heartbeat-based error diagnosis framework for distributed embedded systems
NASA Astrophysics Data System (ADS)
Mishra, Swagat; Khilar, Pabitra Mohan
2011-12-01
Distributed Embedded Systems have significant applications in automobile industry as steer-by-wire, fly-by-wire and brake-by-wire systems. In this paper, we provide a general framework for fault detection in a distributed embedded real time system. We use heartbeat monitoring, check pointing and model based redundancy to design a scalable framework that takes care of task scheduling, temperature control and diagnosis of faulty nodes in a distributed embedded system. This helps in diagnosis and shutting down of faulty actuators before the system becomes unsafe. The framework is designed and tested using a new simulation model consisting of virtual nodes working on a message passing system.
Distributed intrusion detection system based on grid security model
NASA Astrophysics Data System (ADS)
Su, Jie; Liu, Yahui
2008-03-01
Grid computing has developed rapidly with the development of network technology and it can solve the problem of large-scale complex computing by sharing large-scale computing resource. In grid environment, we can realize a distributed and load balance intrusion detection system. This paper first discusses the security mechanism in grid computing and the function of PKI/CA in the grid security system, then gives the application of grid computing character in the distributed intrusion detection system (IDS) based on Artificial Immune System. Finally, it gives a distributed intrusion detection system based on grid security system that can reduce the processing delay and assure the detection rates.
A computer assisted intelligent storm outage evaluator for power distribution systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Balakrishnan, R.; Pahwa, A.
1990-07-01
The lower voltage part of the power distribution system (primary and secondary sub-systems) does not have the provision for real-time status feedback, and as a result evaluation of outages is an extremely difficult task, especially during system emergencies caused by tornadoes and ice-storms. In this paper, a knowledge based approach is proposed for evaluation of storm related outages in the distribution systems. At the outset, binary voltage sensors capable of transmitting the real-time voltage on/off symptoms are recommended to be installed at strategic locations in the distribution system.
NASA Astrophysics Data System (ADS)
Chaitusaney, Surachai; Yokoyama, Akihiko
In distribution system, Distributed Generation (DG) is expected to improve the system reliability as its backup generation. However, DG contribution in fault current may cause the loss of the existing protection coordination, e.g. recloser-fuse coordination and breaker-breaker coordination. This problem can drastically deteriorate the system reliability, and it is more serious and complicated when there are several DG sources in the system. Hence, the above conflict in reliability aspect unavoidably needs a detailed investigation before the installation or enhancement of DG is done. The model of composite DG fault current is proposed to find the threshold beyond which existing protection coordination is lost. Cases of protection miscoordination are described, together with their consequences. Since a distribution system may be tied with another system, the issues of tie line and on-site DG are integrated into this study. Reliability indices are evaluated and compared in the distribution reliability test system RBTS Bus 2.
Distributed and parallel Ada and the Ada 9X recommendations
NASA Technical Reports Server (NTRS)
Volz, Richard A.; Goldsack, Stephen J.; Theriault, R.; Waldrop, Raymond S.; Holzbacher-Valero, A. A.
1992-01-01
Recently, the DoD has sponsored work towards a new version of Ada, intended to support the construction of distributed systems. The revised version, often called Ada 9X, will become the new standard sometimes in the 1990s. It is intended that Ada 9X should provide language features giving limited support for distributed system construction. The requirements for such features are given. Many of the most advanced computer applications involve embedded systems that are comprised of parallel processors or networks of distributed computers. If Ada is to become the widely adopted language envisioned by many, it is essential that suitable compilers and tools be available to facilitate the creation of distributed and parallel Ada programs for these applications. The major languages issues impacting distributed and parallel programming are reviewed, and some principles upon which distributed/parallel language systems should be built are suggested. Based upon these, alternative language concepts for distributed/parallel programming are analyzed.
Nitrification in Chloraminated Drinking Water Distribution Systems: Factors Affecting Occurrence
Drinking water distribution systems with ammonia present from either naturally occurring ammonia or ammonia addition during chloramination are at risk for nitrification. Nitrification in drinking water distribution systems is undesirable and may result in water quality degradatio...
Utility of 222Rn as a passive tracer of subglacial distributed system drainage
NASA Astrophysics Data System (ADS)
Linhoff, Benjamin S.; Charette, Matthew A.; Nienow, Peter W.; Wadham, Jemma L.; Tedstone, Andrew J.; Cowton, Thomas
2017-03-01
Water flow beneath the Greenland Ice Sheet (GrIS) has been shown to include slow-inefficient (distributed) and fast-efficient (channelized) drainage systems, in response to meltwater delivery to the bed via both moulins and surface lake drainage. This partitioning between channelized and distributed drainage systems is difficult to quantify yet it plays an important role in bulk meltwater chemistry and glacial velocity, and thus subglacial erosion. Radon-222, which is continuously produced via the decay of 226Ra, accumulates in meltwater that has interacted with rock and sediment. Hence, elevated concentrations of 222Rn should be indicative of meltwater that has flowed through a distributed drainage system network. In the spring and summer of 2011 and 2012, we made hourly 222Rn measurements in the proglacial river of a large outlet glacier of the GrIS (Leverett Glacier, SW Greenland). Radon-222 activities were highest in the early melt season (10-15 dpm L-1), decreasing by a factor of 2-5 (3-5 dpm L-1) following the onset of widespread surface melt. Using a 222Rn mass balance model, we estimate that, on average, greater than 90% of the river 222Rn was sourced from distributed system meltwater. The distributed system 222Rn flux varied on diurnal, weekly, and seasonal time scales with highest fluxes generally occurring on the falling limb of the hydrograph and during expansion of the channelized drainage system. Using laboratory based estimates of distributed system 222Rn, the distributed system water flux generally ranged between 1-5% of the total proglacial river discharge for both seasons. This study provides a promising new method for hydrograph separation in glacial watersheds and for estimating the timing and magnitude of distributed system fluxes expelled at ice sheet margins.
NASA Astrophysics Data System (ADS)
Lv, Z. H.; Li, Q.; Huang, R. W.; Liu, H. M.; Liu, D.
2016-08-01
Based on the discussion about topology structure of integrated distributed photovoltaic (PV) power generation system and energy storage (ES) in single or mixed type, this paper focuses on analyzing grid-connected performance of integrated distributed photovoltaic and energy storage (PV-ES) systems, and proposes a comprehensive evaluation index system. Then a multi-level fuzzy comprehensive evaluation method based on grey correlation degree is proposed, and the calculations for weight matrix and fuzzy matrix are presented step by step. Finally, a distributed integrated PV-ES power generation system connected to a 380 V low voltage distribution network is taken as the example, and some suggestions are made based on the evaluation results.
One approach for evaluating the Distributed Computing Design System (DCDS)
NASA Technical Reports Server (NTRS)
Ellis, J. T.
1985-01-01
The Distributed Computer Design System (DCDS) provides an integrated environment to support the life cycle of developing real-time distributed computing systems. The primary focus of DCDS is to significantly increase system reliability and software development productivity, and to minimize schedule and cost risk. DCDS consists of integrated methodologies, languages, and tools to support the life cycle of developing distributed software and systems. Smooth and well-defined transistions from phase to phase, language to language, and tool to tool provide a unique and unified environment. An approach to evaluating DCDS highlights its benefits.
Distributed software framework and continuous integration in hydroinformatics systems
NASA Astrophysics Data System (ADS)
Zhou, Jianzhong; Zhang, Wei; Xie, Mengfei; Lu, Chengwei; Chen, Xiao
2017-08-01
When encountering multiple and complicated models, multisource structured and unstructured data, complex requirements analysis, the platform design and integration of hydroinformatics systems become a challenge. To properly solve these problems, we describe a distributed software framework and it’s continuous integration process in hydroinformatics systems. This distributed framework mainly consists of server cluster for models, distributed database, GIS (Geographic Information System) servers, master node and clients. Based on it, a GIS - based decision support system for joint regulating of water quantity and water quality of group lakes in Wuhan China is established.
A comparison of queueing, cluster and distributed computing systems
NASA Technical Reports Server (NTRS)
Kaplan, Joseph A.; Nelson, Michael L.
1993-01-01
Using workstation clusters for distributed computing has become popular with the proliferation of inexpensive, powerful workstations. Workstation clusters offer both a cost effective alternative to batch processing and an easy entry into parallel computing. However, a number of workstations on a network does not constitute a cluster. Cluster management software is necessary to harness the collective computing power. A variety of cluster management and queuing systems are compared: Distributed Queueing Systems (DQS), Condor, Load Leveler, Load Balancer, Load Sharing Facility (LSF - formerly Utopia), Distributed Job Manager (DJM), Computing in Distributed Networked Environments (CODINE), and NQS/Exec. The systems differ in their design philosophy and implementation. Based on published reports on the different systems and conversations with the system's developers and vendors, a comparison of the systems are made on the integral issues of clustered computing.
1996-04-01
time systems . The focus is on the study of ’building-blocks’ for the construction of reliable and efficient systems. Our works falls into three...Members of MIT’s Theory of Distributed Systems group have continued their work on modelling, designing, verifying and analyzing distributed and real
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weston, F.; Harrington, C.; Moskovitz, D.
Distributed resources can provide cost-effective reliability and energy services - in many cases, obviating the need for more expensive investments in wires and central station electricity generating facilities. Given the unique features of distributed resources, the challenge facing policymakers today is how to restructure wholesale markets for electricity and related services so as to reveal the full value that distributed resources can provide to the electric power system (utility grid). This report looks at the functions that distributed resources can perform and examines the barriers to them. It then identifies a series of policy and operational approaches to promoting DRmore » in wholesale markets. This report is one in the State Electricity Regulatory Policy and Distributed Resources series developed under contract to NREL (see Annual Technical Status Report of the Regulatory Assistance Project: September 2000-September 2001, NREL/SR-560-32733). Other titles in this series are: (1) Distributed Resource Distribution Credit Pilot Programs - Revealing the Value to Consumers and Vendors, NREL/SR-560-32499; (2) Distributed Resources and Electric System Reliability, NREL/SR-560-32498; (3) Distribution System Cost Methodologies for Distributed Generation, NREL/SR-560-32500; (4) Distribution System Cost Methodologies for Distributed Generation Appendices, NREL/SR-560-32501« less
Money-center structures in dynamic banking systems
NASA Astrophysics Data System (ADS)
Li, Shouwei; Zhang, Minghui
2016-10-01
In this paper, we propose a dynamic model for banking systems based on the description of balance sheets. It generates some features identified through empirical analysis. Through simulation analysis of the model, we find that banking systems have the feature of money-center structures, that bank asset distributions are power-law distributions, and that contract size distributions are log-normal distributions.
Review on Water Distribution of Cooling Tower in Power Station
NASA Astrophysics Data System (ADS)
Huichao, Zhang; Lei, Fang; Hao, Guang; Ying, Niu
2018-04-01
As the energy sources situation is becoming more and more severe, the importance of energy conservation and emissions reduction gets clearer. Since the optimization of water distribution system of cooling tower in power station can save a great amount of energy, the research of water distribution system gets more attention nowadays. This paper summarizes the development process of counter-flow type natural draft wet cooling tower and the water distribution system, and introduces the related domestic and international research situation. Combining the current situation, we come to the conclusion about the advantages and disadvantages of the several major water distribution modes, and analyze the problems of the existing water distribution ways in engineering application, furthermore, we put forward the direction of water distribution mode development on the basis knowledge of water distribution of cooling tower. Due to the water system can hardly be optimized again when it’s built, choosing an appropriate water distribution mode according to actual condition seems to be more significant.