Supervisory Control and Data Acquisition System | Energy Systems
Integration Facility | NREL Supervisory Control and Data Acquisition System Supervisory Control supervisory control and data acquisition (SCADA) system monitors and controls safety systems and gathers real Energy Systems Integration Facility control room. The Energy Systems Integration Facility's SCADA system
An Encryption Scheme for Communication Internet SCADA Components
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network. SCADA is considered a critical infrastructure, and connecting to the internet is putting the society on jeopardy, some operators hold back on connecting it to the internet. But since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Supervisory Control and Data Acquisition Systems (SCADA) through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
2010-03-01
CODIFYING INFORMATION ASSURANCE CONTROLS FOR DEPARTMENT OF DEFENSE (DOD) SUPERVISORY CONTROL AND DATA...Force, Department of Defense, or the U.S. Government. AFIT/GCO/ENG/10-13 CODIFYING INFORMATION ASSURANCE CONTROLS FOR DEPARTMENT OF...DEFENSE (DOD) SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) SYSTEMS THESIS Presented to the Faculty Department of Electrical and Computer
Review of Supervisory Control and Data Acquisition (SCADA) Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Reva Nickelson; Briam Johnson; Ken Barnes
2004-01-01
A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.
ERIC Educational Resources Information Center
Morsey, Christopher
2017-01-01
In the critical infrastructure world, many critical infrastructure sectors use a Supervisory Control and Data Acquisition (SCADA) system. The sectors that use SCADA systems are the electric power, nuclear power and water. These systems are used to control, monitor and extract data from the systems that give us all the ability to light our homes…
Wind Power Plant SCADA and Controls
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badrzadeh, Babak; Castillo, Nestor; Bradt, M.
2011-01-01
Modern Wind Power Plants (WPPs) contain a variety of intelligent electronic devices (IEDs), Supervisory Control and Data Acquisition (SCADA) and communication systems. This paper discusses the issues related to a typical WPP's SCADA and Control. Presentation topics are: (1) Wind Turbine Controls; (2) Wind Plant SCADA, OEM SCADA Solutions, Third-Party SCADA Solutions; (3) Wind Plant Control; and (4) Security and Reliability Compliance.
Security Encryption Scheme for Communication of Web Based Control Systems
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
7 CFR 1726.176 - Communications and control facilities.
Code of Federal Regulations, 2012 CFR
2012-01-01
... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...
7 CFR 1726.176 - Communications and control facilities.
Code of Federal Regulations, 2014 CFR
2014-01-01
... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...
7 CFR 1726.176 - Communications and control facilities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...
7 CFR 1726.176 - Communications and control facilities.
Code of Federal Regulations, 2013 CFR
2013-01-01
... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...
Mobile phone based SCADA for industrial automation.
Ozdemir, Engin; Karacor, Mevlut
2006-01-01
SCADA is the acronym for "Supervisory Control And Data Acquisition." SCADA systems are widely used in industry for supervisory control and data acquisition of industrial processes. Conventional SCADA systems use PC, notebook, thin client, and PDA as a client. In this paper, a Java-enabled mobile phone has been used as a client in a sample SCADA application in order to display and supervise the position of a sample prototype crane. The paper presents an actual implementation of the on-line controlling of the prototype crane via mobile phone. The wireless communication between the mobile phone and the SCADA server is performed by means of a base station via general packet radio service (GPRS) and wireless application protocol (WAP). Test results have indicated that the mobile phone based SCADA integration using the GPRS or WAP transfer scheme could enhance the performance of the crane in a day without causing an increase in the response times of SCADA functions. The operator can visualize and modify the plant parameters using his mobile phone, without reaching the site. In this way maintenance costs are reduced and productivity is increased.
An Architecture for SCADA Network Forensics
NASA Astrophysics Data System (ADS)
Kilpatrick, Tim; Gonzalez, Jesus; Chandia, Rodrigo; Papa, Mauricio; Shenoi, Sujeet
Supervisory control and data acquisition (SCADA) systems are widely used in industrial control and automation. Modern SCADA protocols often employ TCP/IP to transport sensor data and control signals. Meanwhile, corporate IT infrastructures are interconnecting with previously isolated SCADA networks. The use of TCP/IP as a carrier protocol and the interconnection of IT and SCADA networks raise serious security issues. This paper describes an architecture for SCADA network forensics. In addition to supporting forensic investigations of SCADA network incidents, the architecture incorporates mechanisms for monitoring process behavior, analyzing trends and optimizing plant performance.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marco Carvalho; Richard Ford
2012-05-14
Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-criticalmore » monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).« less
SCADA OPERATOR TRAINING TOOL APPLIED TO THE CENTRAL ARIZONA IRRIGATION AND DRAINAGE DISTRICT
USDA-ARS?s Scientific Manuscript database
Many irrigation districts use Supervisory Control and Data Acquisition (SCADA) software to manage their canal systems. Whether homegrown or commercial, these programs require a significant amount of training for new operators. While some SCADA operators are hired with extensive field experience, o...
2014-06-16
SCADA systems. These professionals should be aware of the vulnerabilities so they can take intelligent precautions to mitigate attacks. SCADA...vulnerabilities • Describe mitigation options for protecting a system from SCADA attacks For students that go on to pursue a degree in Computer...from SCADA attacks For students who do not remain in the IT realm, this introduction provides an awareness to help them mitigate threats for their
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jared Verba; Michael Milvich
2008-05-01
Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting maliciousmore » activity.« less
Production Facility SCADA Design Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dale, Gregory E.; Holloway, Michael Andrew; Baily, Scott A.
2015-03-23
The following report covers FY 14 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production facility. The goal of this effort is to provide Northstar with a baseline system design.
Development of a novel SCADA system for laboratory testing.
Patel, M; Cole, G R; Pryor, T L; Wilmot, N A
2004-07-01
This document summarizes the supervisory control and data acquisition (SCADA) system that allows communication with, and controlling the output of, various I/O devices in the renewable energy systems and components test facility RESLab. This SCADA system differs from traditional SCADA systems in that it supports a continuously changing operating environment depending on the test to be performed. The SCADA System is based on the concept of having one Master I/O Server and multiple client computer systems. This paper describes the main features and advantages of this dynamic SCADA system, the connections of various field devices to the master I/O server, the device servers, and numerous software features used in the system. The system is based on the graphical programming language "LabVIEW" and its "Datalogging and Supervisory Control" (DSC) module. The DSC module supports a real-time database called the "tag engine," which performs the I/O operations with all field devices attached to the master I/O server and communications with the other tag engines running on the client computers connected via a local area network. Generic and detailed communication block diagrams illustrating the hierarchical structure of this SCADA system are presented. The flow diagram outlining a complete test performed using this system in one of its standard configurations is described.
Study on the Future Internet System through Analysis of SCADA Systems
NASA Astrophysics Data System (ADS)
Song, Jae-Gu; Jung, Sungmo; Kim, Seoksoo
Research on the future Internet is focused on establishing standards by solving problems through various projects and accepting various requirements. In this study, the SCADA (Supervisory Control And Data Acquisition) environment, closely related with national infrastructure, is analyzed in order to explore requirements of the future Internet and then those of the SCADA network. Also, this study provides SCADA system environments for the future Internet.
2011-03-01
Byres, E. J., Lowe, J. (2004). The Myths and facts behind cyber security risks for industrial control systems . Berlin, Germany: VDE 2004 Congress...ACQUISITION (SCADA) SYSTEM THESIS Jason R. Nielsen, Major, USAF AFIT/GCO/ENG/11-10 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE...DATA ACQUISITION (SCADA) SYSTEM THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of
A Web-Based Remote Access Laboratory Using SCADA
ERIC Educational Resources Information Center
Aydogmus, Z.; Aydogmus, O.
2009-01-01
The Internet provides an opportunity for students to access laboratories from outside the campus. This paper presents a Web-based remote access real-time laboratory using SCADA (supervisory control and data acquisition) control. The control of an induction motor is used as an example to demonstrate the effectiveness of this remote laboratory,…
Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems
NASA Astrophysics Data System (ADS)
Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.
2017-01-01
The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barnes, G.A.
1998-03-11
This document defines the requirements applicable to the operation, maintenance and storage of the Supervisory Control and Data Acquisition System (SCADAS) and Control Network in support of the Light Duty Utility Arm (LDUA) operations.
Using Physical Models for Anomaly Detection in Control Systems
NASA Astrophysics Data System (ADS)
Svendsen, Nils; Wolthusen, Stephen
Supervisory control and data acquisition (SCADA) systems are increasingly used to operate critical infrastructure assets. However, the inclusion of advanced information technology and communications components and elaborate control strategies in SCADA systems increase the threat surface for external and subversion-type attacks. The problems are exacerbated by site-specific properties of SCADA environments that make subversion detection impractical; and by sensor noise and feedback characteristics that degrade conventional anomaly detection systems. Moreover, potential attack mechanisms are ill-defined and may include both physical and logical aspects.
Upgrade of U.S. EPA's Experimental Stream Facility Supervisory Control and Data Acquisition System
The Supervisory control and data acquisition (SCADA) system for the U.S. EPA’s Experimental Stream Facility (ESF) was upgraded using Camile hardware and software in 2015. The upgrade added additional hardwired connections, new wireless capabilities, and included a complete rewrit...
Communication Security for Control Systems in Smart Grid
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.
Drainpipe network management information system design based on GIS and SCADA technique
NASA Astrophysics Data System (ADS)
Gu, Ze-Yu; Zhao, De-An
2011-02-01
Achieving urban drainpipe network integration of geographical information system (GIS) and supervisory control and data acquisition (SCADA) technology is described in this paper. The system design's plans are put forward, which have realized GIS and SCADA system supplementary in the technology and strengthened the model visible analysis ability. It is verified by practical cases that the system has more practical values and a good prospect.
Automatic Generation of Supervisory Control System Software Using Graph Composition
NASA Astrophysics Data System (ADS)
Nakata, Hideo; Sano, Tatsuro; Kojima, Taizo; Seo, Kazuo; Uchida, Tomoyuki; Nakamura, Yasuaki
This paper describes the automatic generation of system descriptions for SCADA (Supervisory Control And Data Acquisition) systems. The proposed method produces various types of data and programs for SCADA systems from equipment definitions using conversion rules. At first, this method makes directed graphs, which represent connections between the equipment, from equipment definitions. System descriptions are generated using the conversion rules, by analyzing these directed graphs, and finding the groups of equipment that involve similar operations. This method can make the conversion rules multi levels by using the composition of graphs, and can reduce the number of rules. The developer can define and manage these rules efficiently.
The Commanding Officer’s Perspective on Protecting Shipboard IT Networks
2014-09-01
potential checklist for protecting Supervisory Control and Data Acquisition ( SCADA ) systems. “A SCADA system is the software that controls networks such as...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited THE COMMANDING... for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data
Access Control Management for SCADA Systems
NASA Astrophysics Data System (ADS)
Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan
The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.
Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Abercrombie, Robert K
2014-01-01
Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies tomore » SCADA systems; our metric is a specialization of the generic measure of mean failure cost.« less
Sandia SCADA Program -- High Surety SCADA LDRD Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
CARLSON, ROLF E.
2002-04-01
Supervisory Control and Data Acquisition (SCADA) systems are a part of the nation's critical infrastructure that is especially vulnerable to attack or disruption. Sandia National Laboratories is developing a high-security SCADA specification to increase the national security posture of the U.S. Because SCADA security is an international problem and is shaped by foreign and multinational interests, Sandia is working to develop a standards-based solution through committees such as the IEC TC 57 WG 15, the IEEE Substation Committee, and the IEEE P1547-related activity on communications and controls. The accepted standards are anticipated to take the form of a Common Criteriamore » Protection Profile. This report provides the status of work completed and discusses several challenges ahead.« less
Real-Time Monitoring of Scada Based Control System for Filling Process
NASA Astrophysics Data System (ADS)
Soe, Aung Kyaw; Myint, Aung Naing; Latt, Maung Maung; Theingi
2008-10-01
This paper is a design of real-time monitoring for filling system using Supervisory Control and Data Acquisition (SCADA). The monitoring of production process is described in real-time using Visual Basic.Net programming under Visual Studio 2005 software without SCADA software. The software integrators are programmed to get the required information for the configuration screens. Simulation of components is expressed on the computer screen using parallel port between computers and filling devices. The programs of real-time simulation for the filling process from the pure drinking water industry are provided.
Programmable Logic Controller Modification Attacks for use in Detection Analysis
2014-03-27
and J. Lowe, “The Myths and Facts Behind Cyber Security Risks for Industrial Control Systems ,” in Proceedings of the VDE Kongress, vol. 116, 2004. [13...Feb 2014 Date 20 Feb 2014 Date 20 Feb 2014 Date AFIT-ENG-14-M-66 Abstract Unprotected Supervisory Control and Data Acquisition (SCADA) systems offer...control and monitor physical industrial processes. Although attacks targeting SCADA systems have increased, there has been little work exploring the
Fundamentals of SCADA and automated meter reading
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kwok, A.
1992-02-01
This paper discusses SCADA systems allow users to control and acquire data from remote facilities such as compressors, pressure-regulating stations, control valves and measurement stations. In general, a SCADA system performs functions in sequential control, continuous control, supervisory setpoint control and data acquisitions. AMR systems allow users to obtain up-to-date information on their gas demand. When AMR was in its infancy, equipment was designed only to read and record gas consumption values. The basic function of an early AMR system was to read gas volume at a fixed interval and record the data in its memory until it communicated withmore » a central receiving facility.« less
Smith, P J; Vigneswaran, S; Ngo, H H; Nguyen, H T; Ben-Aim, R
2006-01-01
The application of automation and supervisory control and data acquisition (SCADA) systems to municipal water and wastewater treatment plants is rapidly increasing. However, the application of these systems is less frequent in the research and development phases of emerging treatment technologies used in these industries. This study involved the implementation of automation and a SCADA system to the submerged membrane adsorption hybrid system for use in a semi-pilot scale research project. An incremental approach was used in the development of the automation and SCADA systems, leading to the development of two new control systems. The first system developed involved closed loop control of the backwash initiation, based upon a pressure increase, leading to productivity improvements as the backwash is only activated when required, not at a fixed time. This system resulted in a 40% reduction in the number of backwashes required and also enabled optimised operations under unsteady concentrations of wastewater. The second system developed involved closed loop control of the backwash duration, whereby the backwash was terminated when the pressure reached a steady state. This system resulted in a reduction of the duration of the backwash of up to 25% and enabled optimised operations as the foulant build-up within the reactor increased.
Expanding Combat Power Through Military Cyberpower Theory
2015-04-02
systems (ICS) and supervisory control and data acquisition systems ( SCADA ) are public-facing, providing more avenues of approach for an adversary. ICS...and SCADA are the two primary means for cyber adversaries to achieve direct physical effects through cyberspace. Strategic Attribution. From a...REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to
DOE Office of Scientific and Technical Information (OSTI.GOV)
Igure, V. M.; Williams, R. D.
2006-07-01
Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less
Design and Implementation of a Secure Modbus Protocol
NASA Astrophysics Data System (ADS)
Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto
The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.
Industrial Control System Process-Oriented Intrusion Detection (iPoid) Algorithm
2016-08-01
inspection rules using an intrusion-detection system (IDS) sensor, a simulated Programmable Logic Controller (PLC), and a Modbus client operating...operating system PLC Programmable Logic Controller SCADA supervisory control and data acquisition SIGHUP signal hangup SPAN Switched Port Analyzer
Applying New Network Security Technologies to SCADA Systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P
2006-11-01
Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators.more » 4This page intentionally left blank.« less
Multiple Flow Loop SCADA System Implemented on the Production Prototype Loop
DOE Office of Scientific and Technical Information (OSTI.GOV)
Baily, Scott A.; Dalmas, Dale Allen; Wheat, Robert Mitchell
2015-11-16
The following report covers FY 15 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production prototype gas flow loop. The goal of this effort is to expand the existing system to include a second flow loop with a larger production-sized blower. Besides testing the larger blower, this system will demonstrate the scalability of our solution to multiple flow loops.
SCADA Application for ACTS Technology
NASA Technical Reports Server (NTRS)
Fairbanks, Barry
1992-01-01
The results of a system level study done by Hughes Network Systems for NASA are presented. For the supervisory control and data acquisition (SCADA) application, use of Ka-band spot beam satellite technology associated with NASA's Advanced Communication Technology Satellite (ACTS) offers a reduction in Earth station antenna size and transmitter power that may translate into lower system costs. The approaches taken to determine commercial potential of the system are described.
Using State Estimation Residuals to Detect Abnormal SCADA Data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ma, Jian; Chen, Yousu; Huang, Zhenyu
2010-04-30
Detection of abnormal supervisory control and data acquisition (SCADA) data is critically important for safe and secure operation of modern power systems. In this paper, a methodology of abnormal SCADA data detection based on state estimation residuals is presented. Preceded with a brief overview of outlier detection methods and bad SCADA data detection for state estimation, the framework of the proposed methodology is described. Instead of using original SCADA measurements as the bad data sources, the residuals calculated based on the results of the state estimator are used as the input for the outlier detection algorithm. The BACON algorithm ismore » applied to the outlier detection task. The IEEE 118-bus system is used as a test base to evaluate the effectiveness of the proposed methodology. The accuracy of the BACON method is compared with that of the 3-σ method for the simulated SCADA measurements and residuals.« less
Designing a SCADA system simulator for fast breeder reactor
NASA Astrophysics Data System (ADS)
Nugraha, E.; Abdullah, A. G.; Hakim, D. L.
2016-04-01
SCADA (Supervisory Control and Data Acquisition) system simulator is a Human Machine Interface-based software that is able to visualize the process of a plant. This study describes the results of the process of designing a SCADA system simulator that aims to facilitate the operator in monitoring, controlling, handling the alarm, accessing historical data and historical trend in Nuclear Power Plant (NPP) type Fast Breeder Reactor (FBR). This research used simulation to simulate NPP type FBR Kalpakkam in India. This simulator was developed using Wonderware Intouch software 10 and is equipped with main menu, plant overview, area graphics, control display, set point display, alarm system, real-time trending, historical trending and security system. This simulator can properly simulate the principle of energy flow and energy conversion process on NPP type FBR. This SCADA system simulator can be used as training media for NPP type FBR prospective operators.
Automated turn pike using PLC and SCADA
NASA Astrophysics Data System (ADS)
Silpa Sreedhar, P.; Aiswarya, P.; Kathirvelan, J.
2017-11-01
We propose a smart turnpike based on Programmable Logic Controller (PLC) and Supervisory Control and Data Acquisition Systems (SCADA) in this paper. In this work, the basic idea is to measure the weight of the vehicles and classify them according to its weight to the respective lanes. It is difficult for the turnpike people to monitor the whole process all the time. So, this PLC based diversion system can be implemented in turnpikes to reduce the difficulties. This method will work based on weight sensors (piezo-resistive) whose output will be fed to a PLC, which will control the vehicle diversion. Using SCADA software, the whole process can be monitored from a remote area. The algorithm developed in this successfully installed in real time system.
Using State Estimation Residuals to Detect Abnormal SCADA Data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ma, Jian; Chen, Yousu; Huang, Zhenyu
2010-06-14
Detection of manipulated supervisory control and data acquisition (SCADA) data is critically important for the safe and secure operation of modern power systems. In this paper, a methodology of detecting manipulated SCADA data based on state estimation residuals is presented. A framework of the proposed methodology is described. Instead of using original SCADA measurements as the bad data sources, the residuals calculated based on the results of the state estimator are used as the input for the outlier detection process. The BACON algorithm is applied to detect outliers in the state estimation residuals. The IEEE 118-bus system is used asmore » a test case to evaluate the effectiveness of the proposed methodology. The accuracy of the BACON method is compared with that of the 3-σ method for the simulated SCADA measurements and residuals.« less
Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research
NASA Astrophysics Data System (ADS)
Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne
This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.
Industrial Control Systems/SCADA systems risk assessment in the energy sector
NASA Astrophysics Data System (ADS)
Falodun, Babatunde
The energy sector is one of the most critical components of our national infrastructure. It not only provides the electrical power and petroleum required to run day-to-day operations and mechanisms in society, it's also an important element that directly impacts the economy with regard to growth and stability. Industrial Control Systems (ICS) /Supervisory Control and Data Acquisition Systems (SCADA) are computerized mechanisms, they are both software and hardware that are used to control real time processes and operations in power plants and oil production facilities. A significant attack on these control systems that leads to widespread disruption of energy could result in catastrophic consequences for any major city and even the nation. This research paper explores cyber threats and vulnerabilities faced by ICS/SCADA systems in the energy sector and also highlights possible outcomes of a successful breach. Furthermore, the research underscores mitigation strategies that could be used to prevent and respond to an attack. Keywords: Cybersecurity, SCADA, Cyber Attacks, Threats, Vulnerabilities, Risk Assessment, Dr. Albert Orbinati.
A Survey of Research in Supervisory Control and Data Acquisition (SCADA)
2014-09-01
distance learning .2 The data acquired may be operationally oriented and used to better run the system, or it could be strategic in nature and used to...Technically the SCADA system is composed of the information technology (IT) that provides the human- machine interface (HMI) and stores and analyzes the data...systems work by learning what normal or benign traffic is and reporting on any abnormal traffic. These systems have the potential to detect zero-day
Code of Federal Regulations, 2011 CFR
2011-10-01
... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...
Code of Federal Regulations, 2010 CFR
2010-10-01
... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...
Code of Federal Regulations, 2013 CFR
2013-10-01
... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...
Code of Federal Regulations, 2014 CFR
2014-10-01
... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...
Code of Federal Regulations, 2012 CFR
2012-10-01
... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...
2015-05-01
application ,1 while the simulated PLC software is the open source ModbusPal Java application . When queried using the Modbus TCP protocol, ModbusPal reports...and programmable logic controller ( PLC ) components. The HMI and PLC components were instantiated with software and installed in multiple virtual...creating and capturing HMI– PLC network traffic over a 24-h period in the virtualized network and inspect the packets for errors. Test the
Acceptance Testing of a Satellite SCADA Photovoltaic-Diesel Hybrid System
NASA Technical Reports Server (NTRS)
Kalu, Alex; Acosta, R.; Durand, S.; Emrich, Carol; Ventre, G.; Wilson, W.
1999-01-01
Savannah State University (SSU) and the Florida Solar Energy Center (FSEC) have been participating in the NASA Advanced Communications Technology Satellite (ACTS) program for the last five years. This program was designed by NASA to help maintain U.S. leadership in commercial space communications by funding high-risk research, and to flight-test next-generation digital satellite components. Launched in 1993, ACTS is an U.S. government funded technology test-bed that incorporates high power Ka-band transponders, small spot beams, and on-board digital storage and switching technology. Associated with the spacecraft, is a prototype satellite control center that supports various application experiments. The SSU/FSEC application experiment is to developing a Photovoltaic-Diesel Hybrid Power system complete with satellite Supervisory Control and Data Acquisition (SCADA). The hybrid system was design to demonstrate the feasibility of using SCADA to maintain and operate remote village power systems. This configuration would enable experts at a central location to provide technical assistance to local technicians while they acquire a measure of proficiency with the hybrid system operation and maintenance. Upon full mastery of the technology, similar SCADA arrangement are planned to remotely monitor and control constellation of hybrid systems scattered overlarge rural areas. Two Orion Energy APEX-1000 hybrid systems were delivered in 1998, one was installed at SSU in eastern Georgia and the other was installed at FSEC in Central Florida. The project was designed to: (1) evaluate the performance of ACTS in a SCADA arrangement, (2) monitor the health and performance of all major hybrid subsystems, (3) investigate load control and battery charging strategies to maximize battery capacity and lifetime, and (4) develop satellite communication protocol. Preliminary results indicate that the hybrid design is suitable for satellite Supervisory Control and Data Acquisition. A modification to the controller software has produced a robust communication link capable of real time control and long term data collection.
7 CFR 1724.54 - Requirements for RUS approval of plans and specifications.
Code of Federal Regulations, 2012 CFR
2012-01-01
... specifications for transmission construction projects which are not based on RUS approved line design data or do...) Communications and control facilities. (1) This paragraph (g) covers microwave and powerline carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. (2) The...
7 CFR 1724.54 - Requirements for RUS approval of plans and specifications.
Code of Federal Regulations, 2014 CFR
2014-01-01
... specifications for transmission construction projects which are not based on RUS approved line design data or do...) Communications and control facilities. (1) This paragraph (g) covers microwave and powerline carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. (2) The...
7 CFR 1724.54 - Requirements for RUS approval of plans and specifications.
Code of Federal Regulations, 2013 CFR
2013-01-01
... specifications for transmission construction projects which are not based on RUS approved line design data or do...) Communications and control facilities. (1) This paragraph (g) covers microwave and powerline carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. (2) The...
Applying Water-Level Difference Control to Central Arizona Project
USDA-ARS?s Scientific Manuscript database
The Central Arizona Project (CAP) has been supplying Colorado River water to Central Arizona for roughly 25 years. The CAP canal is operated remotely with a Supervisory Control and Data Acquisition (SCADA) System. Gate position changes are made either manually or through the use of automatic control...
Design and Development of Layered Security: Future Enhancements and Directions in Transmission
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-01
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443
Design and Development of Layered Security: Future Enhancements and Directions in Transmission.
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-06
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.
Pipeline scada upgrade uses satellite terminal system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Conrad, W.; Skovrinski, J.R.
In the recent automation of its supervisory control and data acquisition (scada) system, Transwestern Pipeline Co. has become the first to use very small aperture satellite terminals (VSAT's) for scada. A subsidiary of Enron Interstate Pipeline, Houston, Transwestern moves natural gas through a 4,400-mile system from West Texas, New Mexico, and Oklahoma to southern California markets. Transwestern's modernization, begun in November 1985, addressed problems associated with its aging control equipment which had been installed when the compressor stations were built in 1960. Over the years a combination of three different systems had been added. All were cumbersome to maintain andmore » utilized outdated technology. Problems with reliability, high maintenance time, and difficulty in getting new parts were determining factors in Transwestern's decision to modernize its scada system. In addition, the pipeline was anticipating moving its control center from Roswell, N.M., to Houston and believed it would be impossible to marry the old system with the new computer equipment in Houston.« less
Application of Canal Automation at the Central Arizona Irrigation and Drainage District
USDA-ARS?s Scientific Manuscript database
The Central Arizona Irrigation and Drainage District (CAIDD) began delivering water to users in 1987. Although designed for automatic control, the system was run manually until a homemade SCADA (Supervisory Control and Data Acquisition) system was developed by a district employee. In 2002, problem...
SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gordon Rueff; Lyle Roybal; Denis Vollmer
2013-01-01
There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on howmore » to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.« less
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps.
Moya, José M; Araujo, Alvaro; Banković, Zorana; de Goyeneche, Juan-Mariano; Vallejo, Juan Carlos; Malagón, Pedro; Villanueva, Daniel; Fraga, David; Romero, Elena; Blesa, Javier
2009-01-01
The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals.
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps
Moya, José M.; Araujo, Álvaro; Banković, Zorana; de Goyeneche, Juan-Mariano; Vallejo, Juan Carlos; Malagón, Pedro; Villanueva, Daniel; Fraga, David; Romero, Elena; Blesa, Javier
2009-01-01
The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals. PMID:22291569
Quantifying the Impact of Unavailability in Cyber-Physical Environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Federick T.
2014-01-01
The Supervisory Control and Data Acquisition (SCADA) system discussed in this work manages a distributed control network for the Tunisian Electric & Gas Utility. The network is dispersed over a large geographic area that monitors and controls the flow of electricity/gas from both remote and centralized locations. The availability of the SCADA system in this context is critical to ensuring the uninterrupted delivery of energy, including safety, security, continuity of operations and revenue. Such SCADA systems are the backbone of national critical cyber-physical infrastructures. Herein, we propose adapting the Mean Failure Cost (MFC) metric for quantifying the cost of unavailability.more » This new metric combines the classic availability formulation with MFC. The resulting metric, so-called Econometric Availability (EA), offers a computational basis to evaluate a system in terms of the gain/loss ($/hour of operation) that affects each stakeholder due to unavailability.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thaule, S.B.; Postvoll, W.
Installation by den norske stats oljeselskap A.S. (Statoil) of a powerful pipeline-modeling system on Zeepipe has allowed this major North Sea gas pipeline to meet the growing demands and seasonal variations of the European gas market. The Troll gas-sales agreement (TGSA) in 1986 called for large volumes of Norwegian gas to begin arriving from the North Sea Sleipner East field in october 1993. It is important to Statoil to maintain regular gas delivers from its integrated transport network. In addition, high utilization of transport capacity maximizes profits. In advance of operations, Statoil realized that state-of-the-art supervisory control and data acquisitionmore » (scada) and pipeline-modeling systems (PMS) would be necessary to meet its goals and to remain the most efficient North Sea operator. The paper describes the linking of Troll and Zeebrugge, contractual issues, the supervisory system, the scada module, pipeline modeling, real-time model, look-ahead model, predictive model, and model performance.« less
Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hernandez Jimenez, Jarilyn M; Chen, Qian; Nichols, Jeff A.
Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report bymore » Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.« less
Lost Hills Field Trial - incorporating new technology for resevoir management
NASA Technical Reports Server (NTRS)
Fielding, E. J.; Brink, J. L.; Patzek, T. W.; Silin, D. B.
2002-01-01
This paper will discuss how Chevron U.S.A. Production Company is implementing a field trial that will use Supervisory Control and Data Acquisition (SCADA)on injection wells, in conjunction with satellite images to measure ground elevation changes, to perform real-time resevoir management in the Lost Hills Field.
2011-03-01
they can continue to leverage these capabilities (building Smart Grid infrastructure and providing Internet connectivity to every home ) while ensuring...21 Figure 9. Smart Grid Interoperability .............................................................................. 22 Figure 10. Smart ...Grid Integration .................................................................................... 24 Figure 11. National Smart Grid Initiatives
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pollet, J.
2006-07-01
This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-criticalmore » networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)« less
Detecting Peer-to-Peer Botnets in SCADA Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Huan; Cheng, Liang; Chuah, Mooi Choo
Supervisory Control and Data Acquisition (SCADA) systems monitor and control critical infrastructure such as the smart grid. As SCADA systems become increasingly interconnected and adopt more and more cyber-enabled components, the risks of cyber attacks become a major concern. Due to their decentralized organization, peer-to-peer (P2P) botnets are resilient to many existing takedown measures and can be exploited as an effective way to launch cyber attacks on SCADA systems. However, little work has been done to detect P2P botnets in SCADA systems, which carry traffic flows with characteristics significantly different from the Internet. In this paper, we design a P2P-botnetmore » detection method for SCADA systems, leveraging built-in traffic monitoring capabilities of SCADA networking devices. The proposed method consists of two stages. In the first stage, we design a simple feature test to filter out non-P2P hosts, which significantly reduces the data volume for P2P-botnet identification. In the second stage, we jointly consider flow-based and connectivity-based features that effectively set apart bots from benign hosts. We propose to use unsupervised learning for P2P-botnet identification, which not only identifies known P2P botnets but also captures newly emerged ones. Our simulation results show that the proposed system achieves high detection rates with very few false positives. Furthermore, our evaluation shows that the proposed method can detect hosts running P2P SCADA applications that are infected by P2P bots.« less
Cyber security risk assessment for SCADA and DCS networks.
Ralston, P A S; Graham, J H; Hieb, J L
2007-10-01
The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.
Secure SCADA communication by using a modified key management scheme.
Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra
2013-07-01
This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.
Terra Defender Cyber-Physical Wargame
2017-04-01
Army position unless so designated by other authorized documents. Citation of manufacturer’s or trade names does not constitute an official...person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control ...helped to achieve a better understanding of how Army supervisory control and data acquisition (SCADA) system and device security can be modeled and
Collegiate Cyber Defense Competition Effort
2018-03-01
Energy – an electrical utility company. • 2016 : ODIN Security – a small aerospace and defense contracting firm Approved for Public Release...to secure supervisory control and data acquisition (SCADA) networks. Approved for Public Release; Distribution Unlimited 7 During the 2016 NCCDC...COLLEGIATE CYBER DEFENSE COMPETITION EFFORT UNIVERSITY OF TEXAS AT SAN ANTONIO MARCH 2018 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE
2014-09-01
executable that is setuid root.4 fingerd The Morris worm exploited a buffer overflow in the fingerd program to gain unauthorized access to computer...in other taxonomies. There are still holes ; in fact, none of the vulnerabilities that Bishop discussed have a clear place in this taxonomy until a
Real-Time SCADA Cyber Protection Using Compression Techniques
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lyle G. Roybal; Gordon H Rueff
2013-11-01
The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welchmore » (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.« less
SCADA alarms processing for wind turbine component failure detection
NASA Astrophysics Data System (ADS)
Gonzalez, E.; Reder, M.; Melero, J. J.
2016-09-01
Wind turbine failure and downtime can often compromise the profitability of a wind farm due to their high impact on the operation and maintenance (O&M) costs. Early detection of failures can facilitate the changeover from corrective maintenance towards a predictive approach. This paper presents a cost-effective methodology to combine various alarm analysis techniques, using data from the Supervisory Control and Data Acquisition (SCADA) system, in order to detect component failures. The approach categorises the alarms according to a reviewed taxonomy, turning overwhelming data into valuable information to assess component status. Then, different alarms analysis techniques are applied for two purposes: the evaluation of the SCADA alarm system capability to detect failures, and the investigation of the relation between components faults being followed by failure occurrences in others. Various case studies are presented and discussed. The study highlights the relationship between faulty behaviour in different components and between failures and adverse environmental conditions.
Parris Island Wastewater Treatment Plant SCADA Upgrades Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meador, Richard J.; Hatley, Darrel D.
2004-03-18
Marine Corp Recruit Depot (MCRD), Parris Island, SC, home of the Easter Recruiting Region Marine Corp Boot Camp, found itself in a situation common to Department of Defense (DOD) facilities. It had to deal with several different types of installed energy-related control systems that could not talk to each other. This situation was being exacerbated by the installation of a new and/or unique type of control system for every new building being constructed or older facility that was being upgraded. The Wastewater Treatment Facility (WWTF) and lift station controls were badly in need of a thorough inspection and a newmore » Supervisory Control and Data Acquisition (SCADA) system upgrade to meet environmental, safety, manpower, and maintenance concerns. A project was recently completed to implement such a wastewater treatment SCADA upgrade, which is compatible with other upgrades to the energy monitoring and control systems for Parris Island buildings and the Pacific Northwest National Laboratory (PNNL) Decision Support for Operations and Maintenance (DSOM) system installed at the Central Energy Plant (CEP). This project included design, specification, procurement, installation, and testing an upgraded SCADA alarm, process monitoring, and display system; and training WWTF operators in its operation. The ultimate goal of this and the other PNNL projects at Parris Island is to allow monitoring and control of energy and environmental components from a central location.« less
Synchronization software for automation in anesthesia.
Bressan, Nadja; Castro, Ana; Brás, Susana; Oliveira, Hélder P; Ribeiro, Lénio; Ferreira, David A; Antunes, Luís; Amorim, Pedro; Nunes, Catarina S
2007-01-01
This work presents the development of a software for data acquisition and control (ASYS) on a clinical setup. Similar to the industrial Supervisory Control And Data Acquisition (SCADA) the software assembles a Target Controlled Infusion (TCI) monitoring and supervisory control data in real time from devices in a surgical room. The software is not a full controller since the TCI systems comprehend permanent interaction from the anesthesiologist. Based on pharmacokinetic models, the effect-site and plasma concentrations can be related with the drug dose infused and vice versa. The software determines the infusion rates of the drug which are given as commands to the infusion pumps. This software provides the anesthesiologist with a trustworthy tool for managing a safe and balanced anesthesia. Since it also incorporates the acquisition and display of patients brain signals.
Wang, Hao; Lau, Nathan; Gerdes, Ryan M
2018-04-01
The aim of this study was to apply work domain analysis for cybersecurity assessment and design of supervisory control and data acquisition (SCADA) systems. Adoption of information and communication technology in cyberphysical systems (CPSs) for critical infrastructures enables automated and distributed control but introduces cybersecurity risk. Many CPSs employ SCADA industrial control systems that have become the target of cyberattacks, which inflict physical damage without use of force. Given that absolute security is not feasible for complex systems, cyberintrusions that introduce unanticipated events will occur; a proper response will in turn require human adaptive ability. Therefore, analysis techniques that can support security assessment and human factors engineering are invaluable for defending CPSs. We conducted work domain analysis using the abstraction hierarchy (AH) to model a generic SCADA implementation to identify the functional structures and means-ends relations. We then adopted a case study approach examining the Stuxnet cyberattack by developing and integrating AHs for the uranium enrichment process, SCADA implementation, and malware to investigate the interactions between the three aspects of cybersecurity in CPSs. The AHs for modeling a generic SCADA implementation and studying the Stuxnet cyberattack are useful for mapping attack vectors, identifying deficiencies in security processes and features, and evaluating proposed security solutions with respect to system objectives. Work domain analysis is an effective analytical method for studying cybersecurity of CPSs for critical infrastructures in a psychologically relevant manner. Work domain analysis should be applied to assess cybersecurity risk and inform engineering and user interface design.
2006-09-01
and other forms of Internet research were used to confirm the relevance of the OUI to control system reconnaissance. I assigned a subjective level...equipment 4 = Confirmed with Internet research 5 = Suspected with Internet research OUI Organization Confidence Notes 00:00:0A Omron Tateisi...IP Vendor List 2 = Cross Referenced with IANA port list 3 = Confirmed with lab equipment 4 = Confirmed with Internet research 5 = Suspected with
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beaver, Justin M; Borges, Raymond Charles; Buckner, Mark A
Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in amore » critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.« less
Anomaly-based intrusion detection for SCADA systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, D.; Usynin, A.; Hines, J. W.
2006-07-01
Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper willmore » briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)« less
Cyber: A Flexible Deterrent Option
2013-02-14
to come on when they throw a switch and other electrical appliances throughout the house to work without any commercial power interruption. For...power plants this means maintaining the electrical grid and the supervisory control and data acquisition (SCADA) systems at a reliable rate of “99.99999...on the grid.”36 The researchers “simply instructed it to make rapid changes in the electricity cycles that powered the equipment: fast, slow, fast
Design and development of an IoT-based web application for an intelligent remote SCADA system
NASA Astrophysics Data System (ADS)
Kao, Kuang-Chi; Chieng, Wei-Hua; Jeng, Shyr-Long
2018-03-01
This paper presents a design of an intelligent remote electrical power supervisory control and data acquisition (SCADA) system based on the Internet of Things (IoT), with Internet Information Services (IIS) for setting up web servers, an ASP.NET model-view- controller (MVC) for establishing a remote electrical power monitoring and control system by using responsive web design (RWD), and a Microsoft SQL Server as the database. With the web browser connected to the Internet, the sensing data is sent to the client by using the TCP/IP protocol, which supports mobile devices with different screen sizes. The users can provide instructions immediately without being present to check the conditions, which considerably reduces labor and time costs. The developed system incorporates a remote measuring function by using a wireless sensor network and utilizes a visual interface to make the human-machine interface (HMI) more instinctive. Moreover, it contains an analog input/output and a basic digital input/output that can be applied to a motor driver and an inverter for integration with a remote SCADA system based on IoT, and thus achieve efficient power management.
America’s Achilles Heel: Defense Against High-altitude Electromagnetic Pulse-policy vs. Practice
2014-12-12
Directives SCADA Supervisory Control and Data Acquisition Systems SHIELD Act Secure High-voltage Infrastructure for Electricity from Lethal Damage Act...take place, it is important to understand the effects of the components of EMP from a high-altitude nuclear detonation. The requirements for shielding ...Mass Ejection (CME). A massive, bubble-shaped burst of plasma expanding outward from the Sun’s corona, in which large amounts of superheated
Hailey, P A; Doherty, P; Tapsell, P; Oliver, T; Aldridge, P K
1996-03-01
An automated system for the on-line monitoring of powder blending processes is described. The system employs near-infrared (NIR) spectroscopy using fibre-optics and a graphical user interface (GUI) developed in the LabVIEW environment. The complete supervisory control and data analysis (SCADA) software controls blender and spectrophotometer operation and performs statistical spectral data analysis in real time. A data analysis routine using standard deviation is described to demonstrate an approach to the real-time determination of blend homogeneity.
Kerman Photovoltaic Power Plant R&D data collection computer system operations and maintenance
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rosen, P.B.
1994-06-01
The Supervisory Control and Data Acquisition (SCADA) system at the Kerman PV Plant monitors 52 analog, 44 status, 13 control, and 4 accumulator data points in real-time. A Remote Terminal Unit (RTU) polls 7 peripheral data acquisition units that are distributed throughout the plant once every second, and stores all analog, status, and accumulator points that have changed since the last scan. The R&D Computer, which is connected to the SCADA RTU via a RS-232 serial link, polls the RTU once every 5-7 seconds and records any values that have changed since the last scan. A SCADA software package calledmore » RealFlex runs on the R&D computer and stores all updated data values taken from the RTU, along with a time-stamp for each, in a historical real-time database. From this database, averages of all analog data points and snapshots of all status points are generated every 10 minutes and appended to a daily file. These files are downloaded via modem by PVUSA/Davis staff every day, and the data is placed into the PVUSA database.« less
Renewable Energy SCADA/Training Using NASA's Advanced Technology Communication Satellite
NASA Technical Reports Server (NTRS)
Kalu, A.; Emrich, C.; Ventre, G.; Wilson, W.; Acosta, Roberto (Technical Monitor)
2000-01-01
The lack of electrical energy in the rural communities of developing countries is well known, as is the economic unfeasibility of providing much needed energy to these regions via electric grids. Renewable energy (RE) can provide an economic advantage over conventional forms in meeting some of these energy needs. The use of a Supervisory Control and Data Acquisition (SCADA) arrangement via satellite could enable experts at remote locations to provide technical assistance to local trainees while they acquire a measure of proficiency with a newly installed RE system through hands-on training programs using the same communications link. Upon full mastery of the technologies, indigenous personnel could also employ similar SCADA arrangements to remotely monitor and control their constellation of RE systems. Two separate ACTS technology verification experiments (TVEs) have demonstrated that the portability of the Ultra Small Aperture Terminal (USAT) and the versatility of NASA's Advanced Communications Technology Satellite (ACTS), as well as the advantages of Ka band satellites, can be invaluable in providing energy training via distance education (DE), and for implementing renewable energy system SCADA. What has not been tested is the capabilities of these technologies for a simultaneous implementation of renewable energy DE and SCADA. Such concurrent implementations will be useful for preparing trainees in developing countries for their eventual SCADA operations. The project described in this correspondence is the first effort, to our knowledge, in this specific TVE. The setup for this experiment consists of a one-Watt USAT located at Florida Solar Energy Center (FSEC) connected to two satellite modems tuned to different frequencies to establish two duplex ACTS Ka-band communication channels. A short training program on operation and maintenance of the system will be delivered while simultaneously monitoring and controlling the hybrid using the same satellite communications link. The trainees will include faculty and students from Savannah State University, and staff from FSEC. An interactive internet link will be used to allow faculty from the University of West Indies to participate in the training session.
An Architectural Framework for Describing Supervisory Control and Data Acquisition (SCADA) Systems
2004-09-01
having one of two possible values, described as 0 or 1. Boundary A logical segregation of related components in a system. The segregation may be based ...Depending on the sophistication of the microcontroller in the RTU, it can be configured to act as a relay station for other RTUs which cannot...communicate directly with a master station, or the microcontroller can communicate on a peer-to-peer basis with other RTUs. RTUs are generally remotely
Towards A Taxonomy Of Attacks Against Energy Control Systems
NASA Astrophysics Data System (ADS)
Fleury, Terry; Khurana, Himanshu; Welch, Von
Control systems in the energy sector (e.g., supervisory control and data acquisition (SCADA) systems) involve a hierarchy of sensing, monitoring and control devices connected to centralized control stations or centers. The incorporation of commercial off-the-shelf technologies in energy control systems makes them vulnerable to cyber attacks. A taxonomy of cyber attacks against control systems can assist the energy sector in managing the cyber threat. This paper takes the first step towards a taxonomy by presenting a comprehensive model of attacks, vulnerabilities and damage related to control systems. The model is populated based on a survey of the technical literature from industry, academia and national laboratories.
Remote Supervision and Control of Air Conditioning Systems in Different Modes
NASA Astrophysics Data System (ADS)
Rafeeq, Mohammed; Afzal, Asif; Rajendra, Sree
2018-01-01
In the era of automation, most of the application of engineering and science are interrelated with system for optimal operation. To get the efficient result of an operation and desired response, interconnected systems should be controlled by directing, regulating and commanding. Here, air conditioning (AC) system is considered for experimentation, to supervise and control its functioning in both, automated and manual mode. This paper reports the work intended to design and develop an automated and manual AC system working in remote and local mode, to increase the level of comfort, easy operation, reducing human intervention and faults occurring in the system. The Programmable Logical Controller (PLC) and Supervisory Control and Data Acquisition (SCADA) system were used for remote supervision and monitoring of AC systems using series ninety protocol and remote terminal unit modbus protocol as communication module to operate in remote mode. PLC was used as remote terminal for continuous supervision and control of AC system. SCADA software was used as a tool for designing user friendly graphical user interface. The proposed SCADA AC system successfully monitors and controls in accordance within the parameter limits like temperature, pressure, humidity and voltage. With all the features, this designed system is capable of efficient handling of the resources like the compressor, humidifier etc., with all the levels of safety and durability. This system also maintains the temperature and controls the humidity of the remote location and also looks after the health of the compressor.
NASA Technical Reports Server (NTRS)
Beach, R. F.; Kimnach, G. L.; Jett, T. A.; Trash, L. M.
1989-01-01
The Lewis Research Center's Power Management and Distribution (PMAD) System testbed and its use in the evaluation of control concepts applicable to the NASA Space Station Freedom electric power system (EPS) are described. The facility was constructed to allow testing of control hardware and software in an environment functionally similar to the space station electric power system. Control hardware and software have been developed to allow operation of the testbed power system in a manner similar to a supervisory control and data acquisition (SCADA) system employed by utility power systems for control. The system hardware and software are described.
NASA Astrophysics Data System (ADS)
McEvoy, Thomas Richard; Wolthusen, Stephen D.
Recent research on intrusion detection in supervisory data acquisition and control (SCADA) and DCS systems has focused on anomaly detection at protocol level based on the well-defined nature of traffic on such networks. Here, we consider attacks which compromise sensors or actuators (including physical manipulation), where intrusion may not be readily apparent as data and computational states can be controlled to give an appearance of normality, and sensor and control systems have limited accuracy. To counter these, we propose to consider indirect relations between sensor readings to detect such attacks through concurrent observations as determined by control laws and constraints.
Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon
2016-01-01
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351
Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon
2016-06-14
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.
SCADA-based Operator Support System for Power Plant Equipment Fault Forecasting
NASA Astrophysics Data System (ADS)
Mayadevi, N.; Ushakumari, S. S.; Vinodchandra, S. S.
2014-12-01
Power plant equipment must be monitored closely to prevent failures from disrupting plant availability. Online monitoring technology integrated with hybrid forecasting techniques can be used to prevent plant equipment faults. A self learning rule-based expert system is proposed in this paper for fault forecasting in power plants controlled by supervisory control and data acquisition (SCADA) system. Self-learning utilizes associative data mining algorithms on the SCADA history database to form new rules that can dynamically update the knowledge base of the rule-based expert system. In this study, a number of popular associative learning algorithms are considered for rule formation. Data mining results show that the Tertius algorithm is best suited for developing a learning engine for power plants. For real-time monitoring of the plant condition, graphical models are constructed by K-means clustering. To build a time-series forecasting model, a multi layer preceptron (MLP) is used. Once created, the models are updated in the model library to provide an adaptive environment for the proposed system. Graphical user interface (GUI) illustrates the variation of all sensor values affecting a particular alarm/fault, as well as the step-by-step procedure for avoiding critical situations and consequent plant shutdown. The forecasting performance is evaluated by computing the mean absolute error and root mean square error of the predictions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barker, Alan M; Killough, Stephen M; Bigelow, Tim S
2011-01-01
Power Supply Controls are being developed at Oak Ridge National Laboratory (ORNL) to test transmission line components of the Electron Cyclotron Heating (ECH) system, with a focus on gyrotrons and waveguides, in support of the International Thermonuclear Experimental Reactor (ITER). The control is performed by several Programmable Logic Controllers (PLC s) located near the different equipment. A technique of Supervisory Control and Data Acquisition (SCADA) is presented to monitor, control, and log actions of the PLC s on a PC through use of Allen Bradley s Remote I/O communication interface coupled with an Open Process Control/Object Linking and Embedding [OLE]more » for Process Control (OPC) Server/Client architecture. The OPC data is then linked to a National Instruments (NI) LabVIEW system for monitoring and control. Details of the architecture and insight into applicability to other systems are presented in the rest of this paper. Future integration with an EPICS (Experimental Physics Industrial Control System) based mini-CODAC (Control, Data Access and Communication) SCADA system is under consideration, and integration considerations will be briefly introduced.« less
LIDAR wind speed measurements at a Taiwan onshore wind park
NASA Astrophysics Data System (ADS)
Wu, Yu-Ting; Lin, Ta-Hui; Hsuan, Chung-Yao; Li, Yu-Cheng; Yang, Ya-Fei; Tai, Tzy-Hwan; Huang, Chien-Cheng
2016-04-01
Measurements of wind speed and wind direction were carried out using a Leosphere Windcube LIDAR system at a Taiwan onshore wind park. The Lidar shot a total of five laser beams to the atmosphere to collect the light-of-sight (LOS) velocity. Four beams were sent successively in four cardinal directions along a 28° scanning cone angle, followed by a fifth, vertical beam. An unchangeable sampling rate of approximately 1.2 Hz was set in the LIDAR system to collect the LOS velocity. The supervisory control and data acquisition (SCADA) data from two GE 1.5 MW wind turbines near the LIDAR deployment site were acquired for the whole measuring period from February 4 to February 16 of 2015. The SCADA data include the blade angular velocity, the wind velocity measured at hub height from an anemometer mounted on the nacelle, the wind turbine yaw angle, and power production; each parameter was recorded as averages over 1-min periods. The data analysis involving the LIDAR measurements and the SCADA data were performed to obtain the turbulent flow statistics. The results show that the turbine power production has significant dependence to the wind speed, wind direction, turbulence intensity and wind shear.
Programmable logic controller optical fibre sensor interface module
NASA Astrophysics Data System (ADS)
Allwood, Gary; Wild, Graham; Hinckley, Steven
2011-12-01
Most automated industrial processes use Distributed Control Systems (DCSs) or Programmable Logic Controllers (PLCs) for automated control. PLCs tend to be more common as they have much of the functionality of DCSs, although they are generally cheaper to install and maintain. PLCs in conjunction with a human machine interface form the basis of Supervisory Control And Data Acquisition (SCADA) systems, combined with communication infrastructure and Remote Terminal Units (RTUs). RTU's basically convert different sensor measurands in to digital data that is sent back to the PLC or supervisory system. Optical fibre sensors are becoming more common in industrial processes because of their many advantageous properties. Being small, lightweight, highly sensitive, and immune to electromagnetic interference, means they are an ideal solution for a variety of diverse sensing applications. Here, we have developed a PLC Optical Fibre Sensor Interface Module (OFSIM), in which an optical fibre is connected directly to the OFSIM located next to the PLC. The embedded fibre Bragg grating sensors, are highly sensitive and can detect a number of different measurands such as temperature, pressure and strain without the need for a power supply.
Power System Information Delivering System Based on Distributed Object
NASA Astrophysics Data System (ADS)
Tanaka, Tatsuji; Tsuchiya, Takehiko; Tamura, Setsuo; Seki, Tomomichi; Kubota, Kenji
In recent years, improvement in computer performance and development of computer network technology or the distributed information processing technology has a remarkable thing. Moreover, the deregulation is starting and will be spreading in the electric power industry in Japan. Consequently, power suppliers are required to supply low cost power with high quality services to customers. Corresponding to these movements the authors have been proposed SCOPE (System Configuration Of PowEr control system) architecture for distributed EMS/SCADA (Energy Management Systems / Supervisory Control and Data Acquisition) system based on distributed object technology, which offers the flexibility and expandability adapting those movements. In this paper, the authors introduce a prototype of the power system information delivering system, which was developed based on SCOPE architecture. This paper describes the architecture and the evaluation results of this prototype system. The power system information delivering system supplies useful power systems information such as electric power failures to the customers using Internet and distributed object technology. This system is new type of SCADA system which monitors failure of power transmission system and power distribution system with geographic information integrated way.
NASA Astrophysics Data System (ADS)
Adrian-Lucian, Cococeanu; Ioana-Alina, Cretan; Ivona, Cojocinescu Mihaela; Teodor Eugen, Man; Narcis, Pelea George
2017-10-01
The water supply system in Timisoara Municipality is insured with about 25-30 % of the water demand from wells. The underground water headed to the water treatment plant in order to ensure equal distribution and pressure to consumers. The treatment plants used are Urseni and Ronaţ, near Timisoara, in Timis County. In Timisoara groundwater represents an alternative source for water supply and complementary to the surface water source. The present paper presents a case study with proposal and solutions for rehabilitation /equipment /modernization/ automation of water drilling in order to ensure that the entire system can be monitored and controlled remotely through SCADA (Supervisory control and data acquisition) system. The data collected from the field are designed for online efficiency monitoring regarding the energy consumption and water flow intake, performance indicators such as specific energy consumption KW/m3 and also in order to create a hydraulically system of the operating area to track the behavior of aquifers in time regarding the quality and quantity aspects.
NASA Astrophysics Data System (ADS)
Mittelmeier, N.; Blodau, T.; Steinfeld, G.; Rott, A.; Kühn, M.
2016-09-01
Atmospheric conditions have a clear influence on wake effects. Stability classification is usually based on wind speed, turbulence intensity, shear and temperature gradients measured partly at met masts, buoys or LiDARs. The objective of this paper is to find a classification for stability based on wind turbine Supervisory Control and Data Acquisition (SCADA) measurements in order to fit engineering wake models better to the current ambient conditions. Two offshore wind farms with met masts have been used to establish a correlation between met mast stability classification and new aggregated statistical signals based on multiple measurement devices. The significance of these new signals on power production is demonstrated for two wind farms with met masts and validated against data from one further wind farm without a met mast. We found a good correlation between the standard deviation of active power divided by the average power of wind turbines in free flow with the ambient turbulence intensity when the wind turbines were operating in partial load.
Architecture and Methods for Substation SCADA Cybersecurity: Best Practices
DOE Office of Scientific and Technical Information (OSTI.GOV)
Albunashee, Hamdi; Al Sarray, Muthanna; McCann, Roy
There are over 3000 electricity providers in the United States, encompassing investor and publicly owned utilities as well as electric cooperatives. There has been ongoing trends to increasingly automate and provide remote control and monitoring of electric energy delivery systems. The deployment of computer network technologies has increased the efficiency and reliability of electric power infrastructure. However, the increased use of digital communications has also increased the vulnerability to malicious cyber attacks [1]. In 2004 the National Research Councils (National Academies) formed a committee of specialists to address these vulnerabilities and propose possible solutions with an objective to prioritize themore » R&D needs for developing countermeasures. The committee addressed many potential concerns in the electric power delivery system and classified them based upon different criteria and presented recommendations to minimize the gap between the academic research directions and the needs of the electric utility industry. The complexity and diversity of the electric power delivery system in the U.S. has opened many ports for attackers and intruders [1]. This complexity and diversity is attributed to the fact that power delivery system is a network of substations, transmission and distribution lines, sub-networks of controlling, sensing and monitoring units, and human operator involvement for running the system [1]. Accordingly, any incident such as the occurrence of a fault or disturbance in this complex network cannot be deferred and should be resolved within an order of milliseconds, otherwise there is risk of large-scale outages similar to the occurrences in India and the U.S. in 2003 [2]. There are three main vulnerabilities in supervisory control and data acquisition (SCADA) systems commonly identified—physical vulnerability, cyber vulnerability and personal vulnerability [1]. In terms of cyber threats, SCADA systems are the most critical elements in the electric power grid in the U.S. Unauthorized access to a SCADA system could enable/disable unexpected equipment (such as disable the protection system or a circuit breaker) which could cause large scale disruptions of electric power delivery. This paper provides an overview of power system SCADA technologies in transmission substations (Section 2) and summarizes the best practices for implementing a cyber security program. After introducing SCADA system operations in Section 2, a description of the security challenges for SCADA systems is presented in Section 3. In Section 4, NECRC Critical Infrastructure Protection standards CIP-002 through CIP-009 are summarized. An overview of industry best practices is presented in Section 5.« less
Refurbishment and Automation of the Thermal/Vacuum Facilities at the Goddard Space Flight Center
NASA Technical Reports Server (NTRS)
Donohue, John T.; Johnson, Chris; Ogden, Rick; Sushon, Janet
1998-01-01
The thermal/vacuum facilities located at the Goddard Space Flight Center (GSFC) have supported both manned and unmanned space flight since the 1960s. Of the 11 facilities, currently 10 of the systems are scheduled for refurbishment and/or replacement as part of a 5-year implementation. Expected return on investment includes the reduction in test schedules, improvements in the safety of facility operations, reduction in the complexity of a test and the reduction in personnel support required for a test. Additionally, GSFC will become a global resource renowned for expertise in thermal engineering, mechanical engineering and for the automation of thermal/vacuum facilities and thermal/vacuum tests. Automation of the thermal/vacuum facilities includes the utilization of Programmable Logic Controllers (PLCs) and the use of Supervisory Control and Data Acquisition (SCADA) systems. These components allow the computer control and automation of mechanical components such as valves and pumps. In some cases, the chamber and chamber shroud require complete replacement while others require only mechanical component retrofit or replacement. The project of refurbishment and automation began in 1996 and has resulted in the computer control of one Facility (Facility #225) and the integration of electronically controlled devices and PLCs within several other facilities. Facility 225 has been successfully controlled by PLC and SCADA for over one year. Insignificant anomalies have occurred and were resolved with minimal impact to testing and operations. The amount of work remaining to be performed will occur over the next four to five years. Fiscal year 1998 includes the complete refurbishment of one facility, computer control of the thermal systems in two facilities, implementation of SCADA and PLC systems to support multiple facilities and the implementation of a Database server to allow efficient test management and data analysis.
Hacker tracking Security system for HMI
NASA Astrophysics Data System (ADS)
Chauhan, Rajeev Kumar
2011-12-01
Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.
Controlling front-end electronics boards using commercial solutions
NASA Astrophysics Data System (ADS)
Beneyton, R.; Gaspar, C.; Jost, B.; Schmeling, S.
2002-04-01
LHCb is a dedicated B-physics experiment under construction at CERN's large hadron collider (LHC) accelerator. This paper will describe the novel approach LHCb is taking toward controlling and monitoring of electronics boards. Instead of using the bus in a crate to exercise control over the boards, we use credit-card sized personal computers (CCPCs) connected via Ethernet to cheap control PCs. The CCPCs will provide a simple parallel, I2C, and JTAG buses toward the electronics board. Each board will be equipped with a CCPC and, hence, will be completely independently controlled. The advantages of this scheme versus the traditional bus-based scheme will be described. Also, the integration of the controls of the electronics boards into a commercial supervisory control and data acquisition (SCADA) system will be shown.
Acceptance Testing of a Satellite SCADA Photovoltaic-Diesel Hybrid System
NASA Technical Reports Server (NTRS)
Kalu, A.; Emrich, C.; Ventre, G.; Wilson, W.; Acosta, Roberto (Technical Monitor)
2000-01-01
Satellite Supervisory Control and Data Acquisition (SCADA) of a Photovoltaic (PV)/diesel hybrid system was tested using NASA's Advanced Communication Technology Satellite (ACTS) and Ultra Small Aperture Terminal (USAT) ground stations. The setup consisted of a custom-designed PV/diesel hybrid system, located at the Florida Solar Energy Center (FSEC), which was controlled and monitored at a "remote" hub via Ka-band satellite link connecting two 1/4 Watt USATs in a SCADA arrangement. The robustness of the communications link was tested for remote monitoring of the health and performance of a PV/diesel hybrid system, and for investigating load control and battery charging strategies to maximize battery capacity and lifetime, and minimize loss of critical load probability. Baseline hardware performance test results demonstrated that continuous two-second data transfers can be accomplished under clear sky conditions with an error rate of less than 1%. The delay introduced by the satellite (1/4 sec) was transparent to synchronization of satellite modem as well as to the PV/diesel-hybrid computer. End-to-end communications link recovery times were less than 36 seconds for loss of power and less than one second for loss of link. The system recovered by resuming operation without any manual intervention, which is important since the 4 dB margin is not sufficient to prevent loss of the satellite link during moderate to heavy rain. Hybrid operations during loss of communications link continued seamlessly but real-time monitoring was interrupted. For this sub-tropical region, the estimated amount of time that the signal fade will exceed the 4 dB margin is about 10%. These results suggest that data rates of 4800 bps and a link margin of 4 dB with a 1/4 Watt transmitter are sufficient for end-to-end operation in this SCADA application.
An ethernet/IP security review with intrusion detection applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Laughter, S. A.; Williams, R. D.
2006-07-01
Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IPmore » networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)« less
Secure Control Systems for the Energy Sector
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Rhett; Campbell, Jack; Hadley, Mark
2012-03-31
Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use thismore » technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.« less
A storage scheme for the real-time database supporting the on-line commitment
NASA Astrophysics Data System (ADS)
Dai, Hong-bin; Jing, Yu-jian; Wang, Hui
2013-07-01
The modern SCADA (Supervisory Control and Data acquisition) systems have been applied to various aspects of everyday life. As the time goes on, the requirements of the applications of the systems vary. Thus the data structure of the real-time database, which is the core of a SCADA system, often needs modification. As a result, the commitment consisting of a sequence of configuration operations modifying the data structure of the real-time database is performed from time to time. Though it is simple to perform the off-line commitment by first stopping and then restarting the system, during which all the data in the real-time database are reconstructed. It is much more preferred or in some cases even necessary to perform the on-line commitment, during which the real-time database can still provide real-time service and the system continues working normally. In this paper, a storage scheme of the data in the real-time database is proposed. It helps the real-time database support its on-line commitment, during which real-time service is still available.
Scada Malware, a Proof of Concept
NASA Astrophysics Data System (ADS)
Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto
Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Network technologies into such complex critical systems. Of particular interest are the set of vulnerabilities related to the class of communication protocols normally known as “SCADA” protocols, under which fall all the communication protocols used to remotely control the RTU devices of an industrial system. In this paper we present a proof of concept of the potential effects of a set of computer malware specifically designed and created in order to impact, by taking advantage of some vulnerabilities of the ModBUS protocol, on a typical Supervisory Control and Data Acquisition system.
Chen, Qian; Abercrombie, Robert K; Sheldon, Frederick T.
2015-09-23
Industrial Control Systems (ICS) are commonly used in industries such as oil and natural gas, transportation, electric, water and wastewater, chemical, pharmaceutical, pulp and paper, food and beverage, as well as discrete manufacturing (e.g., automotive, aerospace, and durable goods.) SCADA systems are generally used to control dispersed assets using centralized data acquisition and supervisory control.Originally, ICS implementations were susceptible primarily to local threats because most of their components were located in physically secure areas (i.e., ICS components were not connected to IT networks or systems). The trend toward integrating ICS systems with IT networks (e.g., efficiency and the Internet ofmore » Things) provides significantly less isolation for ICS from the outside world thus creating greater risk due to external threats. Albeit, the availability of ICS/SCADA systems is critical to assuring safety, security and profitability. Such systems form the backbone of our national cyber-physical infrastructure.Herein, we extend the concept of mean failure cost (MFC) to address quantifying availability to harmonize well with ICS security risk assessment. This new measure is based on the classic formulation of Availability combined with Mean Failure Cost (MFC). Finally, the metric offers a computational basis to estimate the availability of a system in terms of the loss that each stakeholder stands to sustain as a result of security violations or breakdowns (e.g., deliberate malicious failures).« less
How Accurate Is A Hydraulic Model? | Science Inventory | US ...
Symposium paper Network hydraulic models are widely used, but their overall accuracy is often unknown. Models are developed to give utilities better insight into system hydraulic behavior, and increasingly the ability to predict the fate and transport of chemicals. Without an accessible and consistent means of validating a given model against the system it is meant to represent, the value of those supposed benefits should be questioned. Supervisory Control And Data Acquisition (SCADA) databases, though ubiquitous, are underused data sources for this type of task. Integrating a network model with a measurement database would offer professionals the ability to assess the model’s assumptions in an automated fashion by leveraging enormous amounts of data.
Joseph, Leena; Das, A P; Ravindra, Anuradha; Kulkarni, D B; Kulkarni, M S
2018-07-01
4πβ-γ coincidence method is a powerful and widely used method to determine the absolute activity concentration of radioactive solutions. A new automated liquid scintillator based coincidence system has been designed, developed, tested and established as absolute standard for radioactivity measurements. The automation is achieved using PLC (programmable logic controller) and SCADA (supervisory control and data acquisition). Radioactive solution of 60 Co was standardized to compare the performance of the automated system with proportional counter based absolute standard maintained in the laboratory. The activity concentrations determined using these two systems were in very good agreement; the new automated system can be used for absolute measurement of activity concentration of radioactive solutions. Copyright © 2018. Published by Elsevier Ltd.
Model-based approach for cyber-physical attack detection in water distribution systems.
Housh, Mashor; Ohar, Ziv
2018-08-01
Modern Water Distribution Systems (WDSs) are often controlled by Supervisory Control and Data Acquisition (SCADA) systems and Programmable Logic Controllers (PLCs) which manage their operation and maintain a reliable water supply. As such, and with the cyber layer becoming a central component of WDS operations, these systems are at a greater risk of being subjected to cyberattacks. This paper offers a model-based methodology based on a detailed hydraulic understanding of WDSs combined with an anomaly detection algorithm for the identification of complex cyberattacks that cannot be fully identified by hydraulically based rules alone. The results show that the proposed algorithm is capable of achieving the best-known performance when tested on the data published in the BATtle of the Attack Detection ALgorithms (BATADAL) competition (http://www.batadal.net). Copyright © 2018. Published by Elsevier Ltd.
Operational uses of ACTS technology
NASA Astrophysics Data System (ADS)
Gedney, Richard T.; Wright, David L.; Balombin, Joseph L.; Sohn, Philip Y.; Cashman, William F.; Stern, Alan L.; Golding, Len; Palmer, Larry
1992-03-01
The NASA Advanced Communications Technology Satellite (ACTS) provides the technologies for very high gain hopping spot beam antennas, on-board baseband routing and processing, and wideband (1 GHz) Ka-band transponders. A number of studies have recently been completed using the experience gained in developing the actual ACTS system hardware to quantify how well the ACTS technology can be used in future operational systems. This paper provides a summary of these study results including the spacecraft (S/C) weight per unit circuit for providing services by ACTS technologies as compared to present-day satellites. The uses of the ACTS technology discussed are for providing T1 VSAT mesh networks, aeronautical mobile communications, supervisory control and data acquisition (SCADA) services, and high data rate networks for supercomputer and other applications.
PV-Diesel Hybrid SCADA Experiment Network Design
NASA Technical Reports Server (NTRS)
Kalu, Alex; Durand, S.; Emrich, Carol; Ventre, G.; Wilson, W.; Acosta, R.
1999-01-01
The essential features of an experimental network for renewable power system satellite based supervisory, control and data acquisition (SCADA) are communication links, controllers, diagnostic equipment and a hybrid power system. Required components for implementing the network consist of two satellite ground stations, to satellite modems, two 486 PCs, two telephone receivers, two telephone modems, two analog telephone lines, one digital telephone line, a hybrid-power system equipped with controller and a satellite spacecraft. In the technology verification experiment (TVE) conducted by Savannah State University and Florida Solar Energy Center, the renewable energy hybrid system is the Apex-1000 Mini-Hybrid which is equipped with NGC3188 for user interface and remote control and the NGC2010 for monitoring and basic control tasks. This power system is connected to a satellite modem via a smart interface, RS232. Commands are sent to the power system control unit through a control PC designed as PC1. PC1 is thus connected to a satellite model through RS232. A second PC, designated PC2, the diagnostic PC is connected to both satellite modems via separate analog telephone lines for checking modems'health. PC2 is also connected to PC1 via a telephone line. Due to the unavailability of a second ground station for the ACTS, one ground station is used to serve both the sending and receiving functions in this experiment. Signal is sent from the control PC to the Hybrid system at a frequency f(sub 1), different from f(sub 2), the signal from the hybrid system to the control PC. f(sub l) and f(sub 2) are sufficiently separated to avoid interference.
Wind-farm simulation over moderately complex terrain
NASA Astrophysics Data System (ADS)
Segalini, Antonio; Castellani, Francesco
2017-05-01
A comparison between three independent software to estimate the power production and the flow field in a wind farm is conducted, validating them against SCADA (Supervisory, Control And Data Acquisition) data. The three software were ORFEUS, WindSim and WAsP: ORFEUS and WAsP are linearised solvers, while WindSim is fully nonlinear. A wake model (namely a prescribed velocity deficit associated to the turbines) is used by WAsP, while ORFEUS and WindSim use the actuator-disc method to account for the turbines presence. The comparison indicates that ORFEUS and WAsP perform slightly better than WindSim in the assessment of the polar efficiency. The wakes simulated with ORFEUS appear more persistent than the ones of WindSim, which uses a two-equation closure model for the turbulence effects.
Infrastructure Vulnerability Assessment Model (I-VAM).
Ezell, Barry Charles
2007-06-01
Quantifying vulnerability to critical infrastructure has not been adequately addressed in the literature. Thus, the purpose of this article is to present a model that quantifies vulnerability. Vulnerability is defined as a measure of system susceptibility to threat scenarios. This article asserts that vulnerability is a condition of the system and it can be quantified using the Infrastructure Vulnerability Assessment Model (I-VAM). The model is presented and then applied to a medium-sized clean water system. The model requires subject matter experts (SMEs) to establish value functions and weights, and to assess protection measures of the system. Simulation is used to account for uncertainty in measurement, aggregate expert assessment, and to yield a vulnerability (Omega) density function. Results demonstrate that I-VAM is useful to decisionmakers who prefer quantification to qualitative treatment of vulnerability. I-VAM can be used to quantify vulnerability to other infrastructures, supervisory control and data acquisition systems (SCADA), and distributed control systems (DCS).
Electric Motors Maintenance Planning From Its Operating Variables
NASA Astrophysics Data System (ADS)
Rodrigues, Francisco; Fonseca, Inácio; Farinha, José Torres; Ferreira, Luís; Galar, Diego
2017-09-01
The maintenance planning corresponds to an approach that seeks to maximize the availability of equipment and, consequently, increase the levels of competitiveness of companies by increasing production times. This paper presents a maintenance planning based on operating variables (number of hours worked, duty cycles, number of revolutions) to maximizing the availability of operation of electrical motors. The reading of the operating variables and its sampling is done based on predetermined sampling cycles and subsequently is made the data analysis through time series algorithms aiming to launch work orders before reaching the variables limit values. This approach is supported by tools and technologies such as logical applications that enable a graphical user interface for access to relevant information about their Physical Asset HMI (Human Machine Interface), including the control and supervision by acquisition through SCADA (Supervisory Control And data acquisition) data, also including the communication protocols among different logical applications.
Detector Control System for the AFP detector in ATLAS experiment at CERN
NASA Astrophysics Data System (ADS)
Banaś, E.; Caforio, D.; Czekierda, S.; Hajduk, Z.; Olszowska, J.; Seabra, L.; Šícho, P.
2017-10-01
The ATLAS Forward Proton (AFP) detector consists of two forward detectors located at 205 m and 217 m on either side of the ATLAS experiment. The aim is to measure the momenta and angles of diffractively scattered protons. In 2016, two detector stations on one side of the ATLAS interaction point were installed and commissioned. The detector infrastructure and necessary services were installed and are supervised by the Detector Control System (DCS), which is responsible for the coherent and safe operation of the detector. A large variety of used equipment represents a considerable challenge for the AFP DCS design. Industrial Supervisory Control and Data Acquisition (SCADA) product Siemens WinCCOA, together with the CERN Joint Control Project (JCOP) framework and standard industrial and custom developed server applications and protocols are used for reading, processing, monitoring and archiving of the detector parameters. Graphical user interfaces allow for overall detector operation and visualization of the detector status. Parameters, important for the detector safety, are used for alert generation and interlock mechanisms.
Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar
2016-01-01
In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design. PMID:26950129
Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar
2016-03-03
In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.
Refurbishment and Automation of Thermal Vacuum Facilities at NASA/GSFC
NASA Technical Reports Server (NTRS)
Dunn, Jamie; Gomez, Carlos; Donohue, John; Johnson, Chris; Palmer, John; Sushon, Janet
1999-01-01
The thermal vacuum facilities located at the Goddard Space Flight Center (GSFC) have supported both manned and unmanned space flight since the 1960s. Of the eleven facilities, currently ten of the systems are scheduled for refurbishment or replacement as part of a five-year implementation. Expected return on investment includes the reduction in test schedules, improvements in safety of facility operations, and reduction in the personnel support required for a test. Additionally, GSFC will become a global resource renowned for expertise in thermal engineering, mechanical engineering, and for the automation of thermal vacuum facilities and tests. Automation of the thermal vacuum facilities includes the utilization of Programmable Logic Controllers (PLCs), the use of Supervisory Control and Data Acquisition (SCADA) systems, and the development of a centralized Test Data Management System. These components allow the computer control and automation of mechanical components such as valves and pumps. The project of refurbishment and automation began in 1996 and has resulted in complete computer control of one facility (Facility 281), and the integration of electronically controlled devices and PLCs in multiple others.
Refurbishment and Automation of Thermal Vacuum Facilities at NASA/GSFC
NASA Technical Reports Server (NTRS)
Dunn, Jamie; Gomez, Carlos; Donohue, John; Johnson, Chris; Palmer, John; Sushon, Janet
1998-01-01
The thermal vacuum facilities located at the Goddard Space Flight Center (GSFC) have supported both manned and unmanned space flight since the 1960s. Of the eleven facilities, currently ten of the systems are scheduled for refurbishment or replacement as part of a five-year implementation. Expected return on investment includes the reduction in test schedules, improvements in safety of facility operations, and reduction in the personnel support required for a test. Additionally, GSFC will become a global resource renowned for expertise in thermal engineering, mechanical engineering, and for the automation of thermal vacuum facilities and tests. Automation of the thermal vacuum facilities includes the utilization of Programmable Logic Controllers (PLCs), the use of Supervisory Control and Data Acquisition (SCADA) systems, and the development of a centralized Test Data Management System. These components allow the computer control and automation of mechanical components such as valves and pumps. The project of refurbishment and automation began in 1996 and has resulted in complete computer control of one facility (Facility 281), and the integration of electronically controlled devices and PLCs in multiple others.
Towards a Standard for Highly Secure SCADA Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carlson, R.
1998-09-25
The critical energy inkstructures include gas, OL and electric power. These Mrastructures are complex and interdependent nmvorks that are vital to the national secwiy and social well being of our nation. Many electric power systems depend upon gas and oil, while fossil energy delive~ systems depend upon elecnic power. The control mechanisms for these Mrastructures are often referred to as SCADA (Supmivry CkmdandDaU Ac@itz&z) systems. SCADA systems provide remote monitoring and centralized control for a distributed tmnsportation infmsmucture in order to facilitate delivery of a commodi~. AIthough many of the SCADA concepts developed in this paper can be applied tomore » automotive mmsponation systems, we will use transportation to refer to the movement of electrici~, gas, and oil. \\ Recently, there have been seveml reports suggesting that the widespread and increasing use of SCADA for control of energy systems provides an increasing opportuni~ for an advers~ to cause serious darnage to the energy inbstmcturei~. This damage could arise through cyber infiltration of the SCADA networks, by physically tampering with the control networks, or through a combination of both means. SCADA system threats decompose into cyber and physical threats. One solution to the SCADA security problem is to design a standard for a highly secure KA.DA system that is both cyber, and physdly secure. Not all-physical threats are possible to guard again% but of those threats that are, high security SCADA provides confidence that the system will continue to operate in their presence. One of the most important problems in SCADA securi~ is the relationship between the cyber and physical vulnerabilities. Cyber intrusion increases physical Vulnerabilities, while in the dual problem physical tampering increases cyber vulnerabilit.ies. There is potential for feedback and the precise dynamics need to be understood. As a first step towards a stan~ the goal of this paper is to facilitate a discussion of the requirements analysis for a highly secure SCADA system. The fi-arnework for the discussion consists of the identification of SCADA security investment areas coupled with the tradeoffs that will force compromises in the solution. For example, computational and bandwidth requirements of a security standard could force the replacement of entire SCADA systems. The requirements for a real-time response in a cascading electric power failure could pose limitations on authentication and encryption mechanisms. The shortest path to the development of a high securi~ SC.ADA standard will be achieved by leveraging existing standards efforts and ensuring that security is being properly addressed in those standards. The Utility Communications Architecture 2.o (UC@, for real-time utili~ decision control, represents one such standard. The development of a SCADA secwiy specification is a complex task that will benefit from a systems engineering approach.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lelic, Muhidin; Avramovic, Bozidar; Jiang, Tony
The objective of this project was to demonstrate functionality and performance of a Direct Non-iterative State Estimator (DNSE) integrated with NYPA’s Energy Management System (EMS) and with enhanced Real Time Dynamics Monitoring System (RTDMS) synchrophasor platform from Electric Power Group (EPG). DNSE is designed to overcome a major obstacle to operational use of Synchro-Phasor Management Systems (SPMS) by providing to synchrophasor management systems (SPMS) applications a consistent and a complete synchrophasor data foundation in the same way that a traditional EMS State Estimator (SE) provides to EMS applications. Specifically, DNSE is designed to use synchrophasor measurements collected by a centralmore » PDC, Supervisory Control and Data Acquisition (SCADA) measurements, and Energy Management System (EMS) network model, to obtain the complete state of the utility’s operating model at rates that are close to the synchrophasor data rates. In this way, the system is comprehensive in that it does not only cover the part of the network that is “visible” via synchrophasors, but also the part that is only “visible” through the SCADA measurements. Visualization needs associated with the use of DNSE results are fulfilled through suitably enhanced Real Time Dynamics Monitoring System (RTDMS), with the enhancements implemented by EPG. This project had the following goals in mind: To advance the deployment of commercial grade DNSE software application that relies on synchrophasor and SCADA data ; Apply DNSE at other utilities, to address a generic and fundamental need for “clean” operational data for synchrophasor applications; Provide means for “live” estimated data access by control system operators; Enhance potential for situational awareness through full system operational model coverage; Sub-second execution rate of the Direct Non-iterative State Estimator, eventually at a near-phasor data rate execution speed, i.e. < 0.1 sec. Anticipated benefits from this projects are: Enhanced reliability and improvements in the economic efficiency of bulk power system planning and operations; Providing “clean” data to other synchrophasor applications; Enhancement of situational awareness by providing the full operational model updated at near synchrophasor rate; A production-grade software tool that incorporate synchrophasor and SCADA data; Provides a basis for development of next generation monitoring and control applications, based on both SCADA and PMU data. Quanta Technology (QT) team worked in collaboration with Electric Power Group (EPG) whose team has enhanced its commercial Real Time Dynamics Monitoring System (RTDMS) to accommodate the requirements posed by DNSE application. EPG also provided its ePDC and Model-less Data Conditioning (PDVC) software for integration with DNSE+. QT developed the system requirements for DNSE; developed system architecture and defined interfaces between internal DNSE components. The core DNSE algorithm with all surrounding interfaces was named DNSE+. Since the DNSE development was done in a simulated system environment, QT used its PMU simulator that was enhanced during this project for development and factory acceptance testing (FAT). SCADA data in this stage was simulated by commercial PSS/e software. The output of DNSE are estimates of System states in C37.118-2 format, sent to RTDMS for further processing and display. As the number of these states is large, it was necessary to expand the C37.111-2 standard to accommodate large data sets. This enhancement was implemented in RTDMS. The demonstration of pre-production DNSE technology was done at NYPA using streaming field data from NYPA PMUs and from its RTUs through their SCADA system. NYPA provided ICCP interface as well as Common Information Model (CIM). The relevance of the DNSE+ application is that it provides state estimation of the power system based on hybrid set of data, consisting of both available PMU data and SCADA measurements. As this is a direct, non-iterative method of calculation of the system states, if does not suffer from convergence issues which is potential problem for conventional state estimators. Also, it can take any available PMU measurements, so it does not need to have a high percentage of PMU coverage needed in the case of Linear State Estimator. As the DNSE calculates synchrophasors of the system states (both phase and absolute value) as sub-second rate, this application can provide a basis for development of next generation of applications based both on SCADA and PMU data.« less
Online location of a break in water distribution systems
NASA Astrophysics Data System (ADS)
Liang, Jianwen; Xiao, Di; Zhao, Xinhua; Zhang, Hongwei
2003-08-01
Breaks often occur to urban water distribution systems under severely cold weather, or due to corrosion of pipes, deformation of ground, etc., and the breaks cannot easily be located, especially immediately after the events. This paper develops a methodology to locate a break in a water distribution system by monitoring water pressure online at some nodes in the water distribution system. For the purpose of online monitoring, supervisory control and data acquisition (SCADA) technology can well be used. A neural network-based inverse analysis method is constructed for locating the break based on the variation of water pressure. The neural network is trained by using analytically simulated data from the water distribution system, and validated by using a set of data that have never been used in the training. It is found that the methodology provides a quick, effective, and practical way in which a break in a water distribution system can be located.
A Data Quality Filter for PMU Measurements: Description, Experience, and Examples
DOE Office of Scientific and Technical Information (OSTI.GOV)
Follum, James D.; Amidan, Brett G.
Networks of phasor measurement units (PMUs) continue to grow, and along with them, the amount of data available for analysis. With so much data, it is impractical to identify and remove poor quality data manually. The data quality filter described in this paper was developed for use with the Data Integrity and Situation Awareness Tool (DISAT), which analyzes PMU data to identify anomalous system behavior. The filter operates based only on the information included in the data files, without supervisory control and data acquisition (SCADA) data, state estimator values, or system topology information. Measurements are compared to preselected thresholds tomore » determine if they are reliable. Along with the filter's description, examples of data quality issues from application of the filter to nine months of archived PMU data are provided. The paper is intended to aid the reader in recognizing and properly addressing data quality issues in PMU data.« less
Compact earth stations, hubs for energy industry expanding
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shimabukuro, T.
1992-02-01
That paper reports that advances in gallium arsenide (GaAs) technology, monolithic microwave integrated circuits (MMIC) and large scale integrated (VLSF) circuits, have contributed to the mass production of very reliable small aperture terminals (VSATs). Less publicized, but equally important to multinational energy organizations, are recent developments in compact earth station design and solid-state hubs for VSAT networks made possible by the new technology. Many applications are suited for the energy industry that involve compact earth station terminals and hubs. The first group of applications describes the use of GTE's ACES earth station for the Zaire Gulf Oil Co. in Zairemore » and for AMOCO in Trinidad. The second group of applications describes the compact hub for VSAT networks, which could potentially have a number of data communication uses in the energy industry, such as, IBM/SNA, X.25, or supervisory control an data acquisition (SCADA) applications.« less
Computer assisted operations in Petroleum Development Oman (PDO)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Al-Hinai, S.H.; Mutimer, K.
1995-10-01
Petroleum Development Oman (PDO) currently produces some 750,000 bopd and 900,000 bwpd from some 74 fields in a large geographical area and diverse operating conditions. A key corporate objective is to reduce operating costs by exploiting productivity gains from proven technology. Automation is seen as a means of managing the rapid growth of well population and production facilities. the overall objective is to improve field management through continuous monitoring of wells and facilities and dissemination of data throughout the whole organization. A major upgrade of PDO`s field Supervisory Control and Data Acquisition (SCADA) system is complete providing a platform tomore » exploit new initiatives particularly for production optimization of artificial lift systems and automatic well testing using multi selector valves, coriolis flow meter measurements and multi component (oil, gas, water) flowmeter. The paper describes PDO`s experience including benefits and challenges which have to be managed when developing Computer Assisted Operations (CAO).« less
Implementation method of multi-terminal DC control system
NASA Astrophysics Data System (ADS)
Yi, Liu; Hao-Ran, Huang; Jun-Wen, Zhou; Hong-Guang, Guo; Yu-Yong, Zhou
2018-04-01
Currently the multi-terminal DC system (MTDC) has more stations. Each station needs operators to monitor and control the device. It needs much more operation and maintenance, low efficiency and small reliability; for the most important reason, multi-terminal DC system has complex control mode. If one of the stations has some problem, the control of the whole system should have problems. According to research of the characteristics of multi-terminal DC (VSC-MTDC) systems, this paper presents a strong implementation of the multi-terminal DC Supervisory Control and Data Acquisition (SCADA) system. This system is intelligent, can be networking, integration and intelligent. A master control system is added in each station to communication with the other stations to send current and DC voltage value to pole control system for each station. Based on the practical application and information feedback in the China South Power Grid research center VSC-MTDC project, this system is higher efficiency and save the cost on the maintenance of convertor station to improve the intelligent level and comprehensive effect. And because of the master control system, a multi-terminal system hierarchy coordination control strategy is formed, this make the control and protection system more efficiency and reliability.
Cybersecurity of Critical Control Networks
2015-07-14
project are included below. The tasks include work in link encryption for existing legacy SCADA equipment, where we continue to develop lightweight...language for authoring and monitoring compliance of SCADA systems, including technologies for a “policy monitor” which reports out on any observance issues...Acquisition ( SCADA ). Details of each project are included below. The tasks include work in link encryption for existing legacy SCADA equipment
Internet SCADA Utilizing API's as Data Source
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Haeng-Kon; Kim, Tai-Hoon
An Application programming interface or API is an interface implemented by a software program that enables it to interact with other software. Many companies provide free API services which can be utilized in Control Systems. SCADA is an example of a control system and it is a system that collects data from various sensors at a factory, plant or in other remote locations and then sends this data to a central computer which then manages and controls the data. In this paper, we designed a scheme for Weather Condition in Internet SCADA Environment utilizing data from external API services. The scheme was designed to double check the weather information in SCADA.
Earthquake Risk Reduction to Istanbul Natural Gas Distribution Network
NASA Astrophysics Data System (ADS)
Zulfikar, Can; Kariptas, Cagatay; Biyikoglu, Hikmet; Ozarpa, Cevat
2017-04-01
Earthquake Risk Reduction to Istanbul Natural Gas Distribution Network Istanbul Natural Gas Distribution Corporation (IGDAS) is one of the end users of the Istanbul Earthquake Early Warning (EEW) signal. IGDAS, the primary natural gas provider in Istanbul, operates an extensive system 9,867km of gas lines with 750 district regulators and 474,000 service boxes. The natural gas comes to Istanbul city borders with 70bar in 30inch diameter steel pipeline. The gas pressure is reduced to 20bar in RMS stations and distributed to district regulators inside the city. 110 of 750 district regulators are instrumented with strong motion accelerometers in order to cut gas flow during an earthquake event in the case of ground motion parameters exceeds the certain threshold levels. Also, state of-the-art protection systems automatically cut natural gas flow when breaks in the gas pipelines are detected. IGDAS uses a sophisticated SCADA (supervisory control and data acquisition) system to monitor the state-of-health of its pipeline network. This system provides real-time information about quantities related to pipeline monitoring, including input-output pressure, drawing information, positions of station and RTU (remote terminal unit) gates, slum shut mechanism status at 750 district regulator sites. IGDAS Real-time Earthquake Risk Reduction algorithm follows 4 stages as below: 1) Real-time ground motion data transmitted from 110 IGDAS and 110 KOERI (Kandilli Observatory and Earthquake Research Institute) acceleration stations to the IGDAS Scada Center and KOERI data center. 2) During an earthquake event EEW information is sent from IGDAS Scada Center to the IGDAS stations. 3) Automatic Shut-Off is applied at IGDAS district regulators, and calculated parameters are sent from stations to the IGDAS Scada Center and KOERI. 4) Integrated building and gas pipeline damage maps are prepared immediately after the earthquake event. The today's technology allows to rapidly estimate the expected level of shaking when an earthquake starts to occur. However, in Istanbul case for a potential Marmara Sea Earthquake, the time is very limited even to estimate the level of shaking. The robust threshold based EEW system is only algorithm for such a near source event to activate automatic shut-off mechanism in the critical infrastructures before the damaging waves arrive. This safety measure even with a few seconds of early warning time will help to mitigate potential damages and secondary hazards.
Online monitoring of seismic damage in water distribution systems
NASA Astrophysics Data System (ADS)
Liang, Jianwen; Xiao, Di; Zhao, Xinhua; Zhang, Hongwei
2004-07-01
It is shown that water distribution systems can be damaged by earthquakes, and the seismic damages cannot easily be located, especially immediately after the events. Earthquake experiences show that accurate and quick location of seismic damage is critical to emergency response of water distribution systems. This paper develops a methodology to locate seismic damage -- multiple breaks in a water distribution system by monitoring water pressure online at limited positions in the water distribution system. For the purpose of online monitoring, supervisory control and data acquisition (SCADA) technology can well be used. A neural network-based inverse analysis method is constructed for locating the seismic damage based on the variation of water pressure. The neural network is trained by using analytically simulated data from the water distribution system, and validated by using a set of data that have never been used in the training. It is found that the methodology provides an effective and practical way in which seismic damage in a water distribution system can be accurately and quickly located.
Enhancing the cyber-security of smart grids with applications to synchrophasor data
NASA Astrophysics Data System (ADS)
Pal, Seemita
In the power grids, Supervisory Control and Data Acquisition (SCADA) systems are used as part of the Energy Management System (EMS) for enabling grid monitoring, control and protection. In recent times, with the ongoing installation of thousands of Phasor Measurement Units (PMUs), system operators are becoming increasingly reliant on PMU-generated synchrophasor measurements for executing wide-area monitoring and real-time control. The availability of PMU data facilitates dynamic state estimation of the system, thus improving the efficiency and resiliency of the grid. Since the SCADA and PMU data are used to make critical control decisions including actuation of physical systems, the timely availability and integrity of this networked data is of paramount importance. Absence or wrong control actions can potentially lead to disruption of operations, monetary loss, damage to equipments or surroundings or even blackout. This has posed new challenges to information security especially in this age of ever-increasing cyber-attacks. In this thesis, potential cyber-attacks on smart grids are presented and effective and implementable schemes are proposed for detecting them. The focus is mainly on three kinds of cyber-attacks and their detection: (i) gray-hole attacks on synchrophasor systems, (ii) PMU data manipulation attacks and (iii) data integrity attacks on SCADA systems. In the case of gray-hole attacks, also known as packet-drop attacks, the adversary may arbitrarily drop PMU data packets as they traverse the network, resulting in unavailability of time-sensitive data for the various critical power system applications. The fundamental challenge is to distinguish packets dropped by the adversary from those that occur naturally due to network congestion.The proposed gray-hole attack detection technique is based on exploiting the inherent timing information in the GPS time-stamped PMU data packets and using the temporal trends of the latencies to classify the cause of packet-drops and finally detect attacks, if any. In the case of PMU data manipulation attacks, the attacker may modify the data in the PMU packets in order to bias the system states and influence the control center into taking wrong decisions. The proposed detection technique is based on evaluating the equivalent impedances of the transmission lines and classifying the observed anomalies to determine the presence of attack and its location. The scheme for detecting data integrity attacks on SCADA systems is based on utilizing synchrophasor measurements from available PMUs in the grid. The proposed method uses a difference measure, developed in this thesis, to determine the relative divergence and mis-correlation between the datasets. Based on the estimated difference measure, tampered and genuine data can be distinguished. The proposed detection mechanisms have demonstrated high accuracy in real-time detection of attacks of various magnitudes, simulated on real PMU data obtained from the NY grid. By performing alarm clustering, the occurrence of false alarms has been reduced to almost zero. The solutions are computationally inexpensive, low on cost, do not add any overhead, and do not require any feedback from the network.
Security Engineering and Educational Initiatives for Critical Information Infrastructures
2013-06-01
standard for cryptographic protection of SCADA communications. The United Kingdom’s National Infrastructure Security Co-ordination Centre (NISCC...has released a good practice guide on firewall deployment for SCADA systems and process control networks [17]. Meanwhile, National Institute for ...report. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED 18 The SCADA gateway collects the data gathered by sensors, translates them from
Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yan, Guanhua; Nicol, David M; Jin, Dong
2010-12-16
The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relaymore » is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.« less
Providing Situational Awareness for Pipeline Control Operations
NASA Astrophysics Data System (ADS)
Butts, Jonathan; Kleinhans, Hugo; Chandia, Rodrigo; Papa, Mauricio; Shenoi, Sujeet
A SCADA system for a single 3,000-mile-long strand of oil or gas pipeline may employ several thousand field devices to measure process parameters and operate equipment. Because of the vital tasks performed by these sensors and actuators, pipeline operators need accurate and timely information about their status and integrity. This paper describes a realtime scanner that provides situational awareness about SCADA devices and control operations. The scanner, with the assistance of lightweight, distributed sensors, analyzes SCADA network traffic, verifies the operational status and integrity of field devices, and identifies anomalous activity. Experimental results obtained using real pipeline control traffic demonstrate the utility of the scanner in industrial settings.
ADMS State of the Industry and Gap Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Agalgaonkar, Yashodhan P.; Marinovici, Maria C.; Vadari, Subramanian V.
2016-03-31
An Advanced distribution management system (ADMS) is a platform for optimized distribution system operational management. This platform comprises of distribution management system (DMS) applications, supervisory control and data acquisition (SCADA), outage management system (OMS), and distributed energy resource management system (DERMS). One of the primary objectives of this work is to study and analyze several ADMS component and auxiliary systems. All the important component and auxiliary systems, SCADA, GISs, DMSs, AMRs/AMIs, OMSs, and DERMS, are discussed in this report. Their current generation technologies are analyzed, and their integration (or evolution) with an ADMS technology is discussed. An ADMS technology statemore » of the art and gap analysis is also presented. There are two technical gaps observed. The integration challenge between the component operational systems is the single largest challenge for ADMS design and deployment. Another significant challenge noted is concerning essential ADMS applications, for instance, fault location, isolation, and service restoration (FLISR), volt-var optimization (VVO), etc. There are a relatively small number of ADMS application developers as ADMS software platform is not open source. There is another critical gap and while not being technical in nature (when compared the two above) is still important to consider. The data models currently residing in utility GIS systems are either incomplete or inaccurate or both. This data is essential for planning and operations because it is typically one of the primary sources from which power system model are created. To achieve the full potential of ADMS, the ability to execute acute Power Flow solution is an important pre-requisite. These critical gaps are hindering wider Utility adoption of an ADMS technology. The development of an open architecture platform can eliminate many of these barriers and also aid seamless integration of distribution Utility legacy systems with an ADMS.« less
A Fault Recognition System for Gearboxes of Wind Turbines
NASA Astrophysics Data System (ADS)
Yang, Zhiling; Huang, Haiyue; Yin, Zidong
2017-12-01
Costs of maintenance and loss of power generation caused by the faults of wind turbines gearboxes are the main components of operation costs for a wind farm. Therefore, the technology of condition monitoring and fault recognition for wind turbines gearboxes is becoming a hot topic. A condition monitoring and fault recognition system (CMFRS) is presented for CBM of wind turbines gearboxes in this paper. The vibration signals from acceleration sensors at different locations of gearbox and the data from supervisory control and data acquisition (SCADA) system are collected to CMFRS. Then the feature extraction and optimization algorithm is applied to these operational data. Furthermore, to recognize the fault of gearboxes, the GSO-LSSVR algorithm is proposed, combining the least squares support vector regression machine (LSSVR) with the Glowworm Swarm Optimization (GSO) algorithm. Finally, the results show that the fault recognition system used in this paper has a high rate for identifying three states of wind turbines’ gears; besides, the combination of date features can affect the identifying rate and the selection optimization algorithm presented in this paper can get a pretty good date feature subset for the fault recognition.
Culture Representation in Human Reliability Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
David Gertman; Julie Marble; Steven Novack
Understanding human-system response is critical to being able to plan and predict mission success in the modern battlespace. Commonly, human reliability analysis has been used to predict failures of human performance in complex, critical systems. However, most human reliability methods fail to take culture into account. This paper takes an easily understood state of the art human reliability analysis method and extends that method to account for the influence of culture, including acceptance of new technology, upon performance. The cultural parameters used to modify the human reliability analysis were determined from two standard industry approaches to cultural assessment: Hofstede’s (1991)more » cultural factors and Davis’ (1989) technology acceptance model (TAM). The result is called the Culture Adjustment Method (CAM). An example is presented that (1) reviews human reliability assessment with and without cultural attributes for a Supervisory Control and Data Acquisition (SCADA) system attack, (2) demonstrates how country specific information can be used to increase the realism of HRA modeling, and (3) discusses the differences in human error probability estimates arising from cultural differences.« less
NASA Astrophysics Data System (ADS)
Topolskiy, D.; Topolskiy, N.; Solomin, E.; Topolskaya, I.
2016-04-01
In the present paper the authors discuss some ways of solving energy saving problems in mechanical engineering. In authors' opinion one of the ways of solving this problem is integrated modernization of power engineering objects of mechanical engineering companies, which should be intended for the energy supply control efficiency increase and electric energy commercial accounting improvement. The author have proposed the usage of digital current and voltage transformers for these purposes. To check the compliance of this equipment with the IEC 61850 International Standard, we have built a mathematic model of the data exchange process between measuring transformers and a universal SCADA-system. The results of modeling show that the discussed equipment corresponds to the mentioned Standard requirements and the usage of the universal SCADA-system for these purposes is preferable and economically reasonable. In modeling the authors have used the following software: MasterScada, Master OPC_DI_61850, OPNET.
Cetinceviz, Yucel; Bayindir, Ramazan
2012-05-01
The network requirements of control systems in industrial applications increase day by day. The Internet based control system and various fieldbus systems have been designed in order to meet these requirements. This paper describes an Internet based control system with wireless fieldbus communication designed for distributed processes. The system was implemented as an experimental setup in a laboratory. In industrial facilities, the process control layer and the distance connection of the distributed control devices in the lowest levels of the industrial production environment are provided with fieldbus networks. In this paper, the Internet based control system that will be able to meet the system requirements with a new-generation communication structure, which is called wired/wireless hybrid system, has been designed on field level and carried out to cover all sectors of distributed automation, from process control, to distributed input/output (I/O). The system has been accomplished by hardware structure with a programmable logic controller (PLC), a communication processor (CP) module, two industrial wireless modules and a distributed I/O module, Motor Protection Package (MPP) and software structure with WinCC flexible program used for the screen of Scada (Supervisory Control And Data Acquisition), SIMATIC MANAGER package program ("STEP7") used for the hardware and network configuration and also for downloading control program to PLC. Copyright © 2012 ISA. Published by Elsevier Ltd. All rights reserved.
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept
NASA Astrophysics Data System (ADS)
Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto
We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere with the correct behavior of the system. The proposed IDS detects such attacks thanks to an internal representation of the controlled SCADA system and a corresponding rule language, powerful enough to express the system's critical states. Furthermore, we detail the implementation and provide experimental comparative results.
Resilient Control and Intrusion Detection for SCADA Systems
2014-05-01
Control. McGraw-Hill, 1996. [89] L. Greenemeier. Robots arrive at fukushima nuclear site with unclear mission. Scientific American, 2011. [90] M. Grimes...security engineering task. SCADA systems are hard real-time systems [251] because the completion of an operation after its deadline is considered useless and...that the attacker, after gaining unauthenticated access, could change the operator display values so that when an alarm actually goes off, the human
Experimental and analytical study of water pipe's rupture for damage identification purposes
NASA Astrophysics Data System (ADS)
Papakonstantinou, Konstantinos G.; Shinozuka, Masanobu; Beikae, Mohsen
2011-04-01
A malfunction, local damage or sudden pipe break of a pipeline system can trigger significant flow variations. As shown in the paper, pressure variations and pipe vibrations are two strongly correlated parameters. A sudden change in the flow velocity and pressure of a pipeline system can induce pipe vibrations. Thus, based on acceleration data, a rapid detection and localization of a possible damage may be carried out by inexpensive, nonintrusive monitoring techniques. To illustrate this approach, an experiment on a single pipe was conducted in the laboratory. Pressure gauges and accelerometers were installed and their correlation was checked during an artificially created transient flow. The experimental findings validated the correlation between the parameters. The interaction between pressure variations and pipe vibrations was also theoretically justified. The developed analytical model explains the connection among flow pressure, velocity, pressure wave propagation and pipe vibration. The proposed method provides a rapid, efficient and practical way to identify and locate sudden failures of a pipeline system and sets firm foundations for the development and implementation of an advanced, new generation Supervisory Control and Data Acquisition (SCADA) system for continuous health monitoring of pipe networks.
Wind Turbine Failures - Tackling current Problems in Failure Data Analysis
NASA Astrophysics Data System (ADS)
Reder, M. D.; Gonzalez, E.; Melero, J. J.
2016-09-01
The wind industry has been growing significantly over the past decades, resulting in a remarkable increase in installed wind power capacity. Turbine technologies are rapidly evolving in terms of complexity and size, and there is an urgent need for cost effective operation and maintenance (O&M) strategies. Especially unplanned downtime represents one of the main cost drivers of a modern wind farm. Here, reliability and failure prediction models can enable operators to apply preventive O&M strategies rather than corrective actions. In order to develop these models, the failure rates and downtimes of wind turbine (WT) components have to be understood profoundly. This paper is focused on tackling three of the main issues related to WT failure analyses. These are, the non-uniform data treatment, the scarcity of available failure analyses, and the lack of investigation on alternative data sources. For this, a modernised form of an existing WT taxonomy is introduced. Additionally, an extensive analysis of historical failure and downtime data of more than 4300 turbines is presented. Finally, the possibilities to encounter the lack of available failure data by complementing historical databases with Supervisory Control and Data Acquisition (SCADA) alarms are evaluated.
Racault, Y; Stricker, A-E; Husson, A; Gillot, S
2011-01-01
Oxygen transfer in biological wastewater treatment processes with high sludge concentration, such as membrane bioreactor (MBR), is an important issue. The variation of alpha-factor versus mixed liquor suspended solids (MLSS) concentration was investigated in a full scale MBR plant under process conditions, using mass balances. Exhaustive data from the Supervisory Control And Data Acquisition (SCADA) and from additional online sensors (COD, DO, MLSS) were used to calculate the daily oxygen consumption (OC) using a non-steady state mass balance for COD and total N on a 24-h basis. To close the oxygen balance, OC has to match the total oxygen transfer rate (OTRtot) of the system, which is provided by fine bubble (FB) diffusers in the aeration tank and coarse bubbles (CB) in separate membrane tanks. First assessing OTR(CB) then closing the balance OC = OTRtot allowed to calculate OTR(FB) and to fit an exponential relationship between OTR(FB) and MLSS. A comparison of the alpha-factor obtained by this balance method and by direct measurements with the off-gas method on the same plant is presented and discussed.
Control of Smart Building Using Advanced SCADA
NASA Astrophysics Data System (ADS)
Samuel, Vivin Thomas
For complete control of the building, a proper SCADA implementation and the optimization strategy has to be build. For better communication and efficiency a proper channel between the Communication protocol and SCADA has to be designed. This paper concentrate mainly between the communication protocol, and the SCADA implementation, for a better optimization and energy savings is derived to large scale industrial buildings. The communication channel used in order to completely control the building remotely from a distant place. For an efficient result we consider the temperature values and the power ratings of the equipment so that while controlling the equipment, we are setting a threshold values for FDD technique implementation. Building management system became a vital source for any building to maintain it and for safety purpose. Smart buildings, refers to various distinct features, where the complete automation system, office building controls, data center controls. ELC's are used to communicate the load values of the building to the remote server from a far location with the help of an Ethernet communication channel. Based on the demand fluctuation and the peak voltage, the loads operate differently increasing the consumption rate thus results in the increase in the annual consumption bill. In modern days, saving energy and reducing the consumption bill is most essential for any building for a better and long operation. The equipment - monitored regularly and optimization strategy is implemented for cost reduction automation system. Thus results in the reduction of annual cost reduction and load lifetime increase.
Advanced I&C for Fault-Tolerant Supervisory Control of Small Modular Reactors
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cole, Daniel G.
In this research, we have developed a supervisory control approach to enable automated control of SMRs. By design the supervisory control system has an hierarchical, interconnected, adaptive control architecture. A considerable advantage to this architecture is that it allows subsystems to communicate at different/finer granularity, facilitates monitoring of process at the modular and plant levels, and enables supervisory control. We have investigated the deployment of automation, monitoring, and data collection technologies to enable operation of multiple SMRs. Each unit's controller collects and transfers information from local loops and optimize that unit’s parameters. Information is passed from the each SMR unitmore » controller to the supervisory controller, which supervises the actions of SMR units and manage plant processes. The information processed at the supervisory level will provide operators the necessary information needed for reactor, unit, and plant operation. In conjunction with the supervisory effort, we have investigated techniques for fault-tolerant networks, over which information is transmitted between local loops and the supervisory controller to maintain a safe level of operational normalcy in the presence of anomalies. The fault-tolerance of the supervisory control architecture, the network that supports it, and the impact of fault-tolerance on multi-unit SMR plant control has been a second focus of this research. To this end, we have investigated the deployment of advanced automation, monitoring, and data collection and communications technologies to enable operation of multiple SMRs. We have created a fault-tolerant multi-unit SMR supervisory controller that collects and transfers information from local loops, supervise their actions, and adaptively optimize the controller parameters. The goal of this research has been to develop the methodologies and procedures for fault-tolerant supervisory control of small modular reactors. To achieve this goal, we have identified the following objectives. These objective are an ordered approach to the research: I) Development of a supervisory digital I&C system II) Fault-tolerance of the supervisory control architecture III) Automated decision making and online monitoring.« less
Long-term monitoring of a cable stayed bridge using a SCADA system
NASA Astrophysics Data System (ADS)
Torbol, Marco; Kim, Sehwan; Shinozuka, Masanobu
2012-04-01
DuraMote is a MEMS-based remote sensing system, which is developed for the NIST TIP project, Next Generation SCADA for Prevention and Mitigation of Water System Infrastructure Disaster. It is designed for supervisory control and data acquisition (SCADA) of pipe ruptures in water distribution systems. In this project, a method is developed to detect the pipe ruptures by analyzing the acceleration data gathered by DuraMote which consists of two primary components; the first, "Gopher" contains the accelerometers and are attached to the water pipe surface noninvasively, and the second, "Roocas" is placed above ground supplying the power to, and retrieving the data from the multiple Gophers, and then transmit the data through Wi-Fi to a base station. The relays support the Wi-Fi network to facilitate the transmission. A large scale bridge provides an ideal test-bet to validate the performance of such a complex monitoring system as DuraMote for its accuracy, reliability, robustness, and user friendliness. This is because a large bridge is most of the time subjected to susceptible level of ambient vibration due to passing loads, wind, etc. DuraMote can record the acceleration time history arising from the vibration making it possible to estimate the frequency values of various bridge vibration modes. These estimated frequency values are then compared with the values computed from analytical model of the bridge for the verification of the accuracy of DuraMote. It is noted that such a verification method cannot be used practically by deploying DuraMote on a water distribution network since the dynamic behavior of a pipe network, either above or underground, is too complex to model analytically for this purpose, and in addition, the network generally lacks conveniently recordable ambient vibration. In this experiment, the performance of DuraMote system was tested being installed on the Hwamyung Bridge, a 500 m long RC cable stayed bridge in Korea for long term monitoring. In total, the system consisted of 24 accelerometers, 13 Gophers, 10 Roocas, 5 relays, and 1 base station. As it happened, the bridge was subjected to heavy rain, winds, and a typhoon during the experiment allowing the DuraMote to demonstrate extra ordinary robustness and durability. Indeed, in spite of the rough weather, acceleration data was continuously recorded from which natural frequencies, mode shapes, and other structural parameters were calculated. This opportunity would not have happened if the experiment was planned for a shorter duration.
Wei, Yawei; Venayagamoorthy, Ganesh Kumar
2017-09-01
To prevent large interconnected power system from a cascading failure, brownout or even blackout, grid operators require access to faster than real-time information to make appropriate just-in-time control decisions. However, the communication and computational system limitations of currently used supervisory control and data acquisition (SCADA) system can only deliver delayed information. However, the deployment of synchrophasor measurement devices makes it possible to capture and visualize, in near-real-time, grid operational data with extra granularity. In this paper, a cellular computational network (CCN) approach for frequency situational intelligence (FSI) in a power system is presented. The distributed and scalable computing unit of the CCN framework makes it particularly flexible for customization for a particular set of prediction requirements. Two soft-computing algorithms have been implemented in the CCN framework: a cellular generalized neuron network (CCGNN) and a cellular multi-layer perceptron network (CCMLPN), for purposes of providing multi-timescale frequency predictions, ranging from 16.67 ms to 2 s. These two developed CCGNN and CCMLPN systems were then implemented on two different scales of power systems, one of which installed a large photovoltaic plant. A real-time power system simulator at weather station within the Real-Time Power and Intelligent Systems (RTPIS) laboratory at Clemson, SC, was then used to derive typical FSI results. Copyright © 2017 Elsevier Ltd. All rights reserved.
Critical Infrastructure: Control Systems and the Terrorist Threat
2004-01-20
Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL31534 Critical...http://www.pnl.gov/main/sectors/homeland.html]. 68 Rolf Carlson, “Sandia SCADA Program High-Security SCADA LDRD Final Report ,” Sandia Report SAND2002...and Industry Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to
Critical Infrastructure: Control Systems and the Terrorist Threat
2003-07-14
Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL31534 Critical...available online at [http://www.pnl.gov/main/sectors/homeland.html]. 56 Rolf Carlson, “Sandia SCADA Program High-Security SCADA LDRD Final Report ...Industry Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to
Effects of supervisory train control technology on operator attention.
DOT National Transportation Integrated Search
2005-07-31
This report describes an experiment evaluating the effects of supervisory control automation on attention allocation while operating : a train. The study compared two levels of supervisory control (partial and full) to manual control, in terms of how...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Jie; Jain, Rishabh; Hodge, Bri-Mathias
A data-driven methodology is developed to analyze how ambient and wake turbulence affect the power generation of wind turbine(s). Using supervisory control and data acquisition (SCADA) data from a wind plant, we select two sets of wind velocity and power data for turbines on the edge of the plant that resemble (i) an out-of-wake scenario and (ii) an in-wake scenario. For each set of data, two surrogate models are developed to represent the turbine(s) power generation as a function of (i) the wind speed and (ii) the wind speed and turbulence intensity. Three types of uncertainties in turbine(s) power generationmore » are investigated: (i) the uncertainty in power generation with respect to the reported power curve; (ii) the uncertainty in power generation with respect to the estimated power response that accounts for only mean wind speed; and (iii) the uncertainty in power generation with respect to the estimated power response that accounts for both mean wind speed and turbulence intensity. Results show that (i) the turbine(s) generally produce more power under the in-wake scenario than under the out-of-wake scenario with the same wind speed; and (ii) there is relatively more uncertainty in the power generation under the in-wake scenario than under the out-of-wake scenario.« less
CFD three dimensional wake analysis in complex terrain
NASA Astrophysics Data System (ADS)
Castellani, F.; Astolfi, D.; Terzi, L.
2017-11-01
Even if wind energy technology is nowadays fully developed, the use of wind energy in very complex terrain is still challenging. In particular, it is challenging to characterize the combination effects of wind ow over complex terrain and wake interactions between nearby turbines and this has a practical relevance too, for the perspective of mitigating anomalous vibrations and loads as well improving the farm efficiency. In this work, a very complex terrain site has been analyzed through a Reynolds-averaged CFD (Computational Fluid Dynamics) numerical wind field model; in the simulation the inuence of wakes has been included through the Actuator Disk (AD) approach. In particular, the upstream turbine of a cluster of 4 wind turbines having 2.3 MW of rated power is studied. The objective of this study is investigating the full three-dimensional wind field and the impact of three-dimensionality on the evolution of the waked area between nearby turbines. A post-processing method of the output of the CFD simulation is developed and this allows to estimate the wake lateral deviation and the wake width. The reliability of the numerical approach is inspired by and crosschecked through the analysis of the operational SCADA (Supervisory Control and Data Acquisition) data of the cluster of interest.
NASA Astrophysics Data System (ADS)
Santoni, Christian; Garcia-Cartagena, Edgardo J.; Zhan, Lu; Iungo, Giacomo Valerio; Leonardi, Stefano
2017-11-01
The integration of wind farm parameterizations into numerical weather prediction models is essential to study power production under realistic conditions. Nevertheless, recent models are unable to capture turbine wake interactions and, consequently, the mean kinetic energy entrainment, which are essential for the development of power optimization models. To address the study of wind turbine wake interaction, one-way nested mesoscale to large-eddy simulation (LES) were performed using the Weather Research and Forecasting model (WRF). The simulation contains five nested domains modeling the mesoscale wind on the entire North Texas Panhandle region to the microscale wind fluctuations and turbine wakes of a wind farm located at Panhandle, Texas. The wind speed, direction and boundary layer profile obtained from WRF were compared against measurements obtained with a sonic anemometer and light detection and ranging system located within the wind farm. Additionally, the power production were assessed against measurements obtained from the supervisory control and data acquisition system located in each turbine. Furthermore, to incorporate the turbines into very coarse LES, a modification to the implementation of the wind farm parameterization by Fitch et al. (2012) is proposed. This work was supported by the NSF, Grants No. 1243482 (WINDINSPIRE) and IIP 1362033 (WindSTAR), and TACC.
Human/computer control of undersea teleoperators
NASA Technical Reports Server (NTRS)
Sheridan, T. B.; Verplank, W. L.; Brooks, T. L.
1978-01-01
The potential of supervisory controlled teleoperators for accomplishment of manipulation and sensory tasks in deep ocean environments is discussed. Teleoperators and supervisory control are defined, the current problems of human divers are reviewed, and some assertions are made about why supervisory control has potential use to replace and extend human diver capabilities. The relative roles of man and computer and the variables involved in man-computer interaction are next discussed. Finally, a detailed description of a supervisory controlled teleoperator system, SUPERMAN, is presented.
NASA Astrophysics Data System (ADS)
Gibson, Wayne H.; Levesque, Daniel
2000-03-01
This paper discusses how gamma irradiation plants are putting the latest advances in computer and information technology to use for better process control, cost savings, and strategic advantages. Some irradiator operations are gaining significant benefits by integrating computer technology and robotics with real-time information processing, multi-user databases, and communication networks. The paper reports on several irradiation facilities that are making good use of client/server LANs, user-friendly graphics interfaces, supervisory control and data acquisition (SCADA) systems, distributed I/O with real-time sensor devices, trending analysis, real-time product tracking, dynamic product scheduling, and automated dosimetry reading. These plants are lowering costs by fast and reliable reconciliation of dosimetry data, easier validation to GMP requirements, optimizing production flow, and faster release of sterilized products to market. There is a trend in the manufacturing sector towards total automation using "predictive process control". Real-time verification of process parameters "on-the-run" allows control parameters to be adjusted appropriately, before the process strays out of limits. Applying this technology to the gamma radiation process, control will be based on monitoring the key parameters such as time, and making adjustments during the process to optimize quality and throughput. Dosimetry results will be used as a quality control measurement rather than as a final monitor for the release of the product. Results are correlated with the irradiation process data to quickly and confidently reconcile variations. Ultimately, a parametric process control system utilizing responsive control, feedback and verification will not only increase productivity and process efficiency, but can also result in operating within tighter dose control set points.
Wang, Shun-Yuan; Tseng, Chwan-Lu; Lin, Shou-Chuang; Chiu, Chun-Jung; Chou, Jen-Hsiang
2015-01-01
This paper presents the implementation of an adaptive supervisory sliding fuzzy cerebellar model articulation controller (FCMAC) in the speed sensorless vector control of an induction motor (IM) drive system. The proposed adaptive supervisory sliding FCMAC comprised a supervisory controller, integral sliding surface, and an adaptive FCMAC. The integral sliding surface was employed to eliminate steady-state errors and enhance the responsiveness of the system. The adaptive FCMAC incorporated an FCMAC with a compensating controller to perform a desired control action. The proposed controller was derived using the Lyapunov approach, which guarantees learning-error convergence. The implementation of three intelligent control schemes—the adaptive supervisory sliding FCMAC, adaptive sliding FCMAC, and adaptive sliding CMAC—were experimentally investigated under various conditions in a realistic sensorless vector-controlled IM drive system. The root mean square error (RMSE) was used as a performance index to evaluate the experimental results of each control scheme. The analysis results indicated that the proposed adaptive supervisory sliding FCMAC substantially improved the system performance compared with the other control schemes. PMID:25815450
Wang, Shun-Yuan; Tseng, Chwan-Lu; Lin, Shou-Chuang; Chiu, Chun-Jung; Chou, Jen-Hsiang
2015-03-25
This paper presents the implementation of an adaptive supervisory sliding fuzzy cerebellar model articulation controller (FCMAC) in the speed sensorless vector control of an induction motor (IM) drive system. The proposed adaptive supervisory sliding FCMAC comprised a supervisory controller, integral sliding surface, and an adaptive FCMAC. The integral sliding surface was employed to eliminate steady-state errors and enhance the responsiveness of the system. The adaptive FCMAC incorporated an FCMAC with a compensating controller to perform a desired control action. The proposed controller was derived using the Lyapunov approach, which guarantees learning-error convergence. The implementation of three intelligent control schemes--the adaptive supervisory sliding FCMAC, adaptive sliding FCMAC, and adaptive sliding CMAC--were experimentally investigated under various conditions in a realistic sensorless vector-controlled IM drive system. The root mean square error (RMSE) was used as a performance index to evaluate the experimental results of each control scheme. The analysis results indicated that the proposed adaptive supervisory sliding FCMAC substantially improved the system performance compared with the other control schemes.
Hybrid supervisory control using recurrent fuzzy neural network for tracking periodic inputs.
Lin, F J; Wai, R J; Hong, C M
2001-01-01
A hybrid supervisory control system using a recurrent fuzzy neural network (RFNN) is proposed to control the mover of a permanent magnet linear synchronous motor (PMLSM) servo drive for the tracking of periodic reference inputs. First, the field-oriented mechanism is applied to formulate the dynamic equation of the PMLSM. Then, a hybrid supervisory control system, which combines a supervisory control system and an intelligent control system, is proposed to control the mover of the PMLSM for periodic motion. The supervisory control law is designed based on the uncertainty bounds of the controlled system to stabilize the system states around a predefined bound region. Since the supervisory control law will induce excessive and chattering control effort, the intelligent control system is introduced to smooth and reduce the control effort when the system states are inside the predefined bound region. In the intelligent control system, the RFNN control is the main tracking controller which is used to mimic a idea control law and a compensated control is proposed to compensate the difference between the idea control law and the RFNN control. The RFNN has the merits of fuzzy inference, dynamic mapping and fast convergence speed, In addition, an online parameter training methodology, which is derived using the Lyapunov stability theorem and the gradient descent method, is proposed to increase the learning capability of the RFNN. The proposed hybrid supervisory control system using RFNN can track various periodic reference inputs effectively with robust control performance.
SUPERVISORY CONTROL FOR PEAK REDUCTION IN COMMERCIAL BUILDINGS WHILE MAINTAINING COMFORT
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nutaro, James J; Olama, Mohammed M; Kuruganti, Teja
2016-01-01
This paper describes a supervisory control strategy for limiting peak power demand by small and medium commercial buildings while still meeting the business needs of the occupants. This control strategy has two features that make it relevant to new and existing buildings. First, it is designed to operate with building equipment, such as air conditioning and refrigeration systems, as they are presently installed in most small and medium commercial buildings. Because of this, the supervisory control could be realized as a software-only retrofit to existing building management systems. Second, the proposed control acts as a supervisory management layer over existingmore » control systems, rather than replacing them outright. The primary idea of this approach is that the controls for individual building equipment request energy resources for a control action and the supervisory control examines the requests and decides which control actions to allow while satisfying a limit on peak power demand.« less
Code of Federal Regulations, 2014 CFR
2014-01-01
... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...
Code of Federal Regulations, 2012 CFR
2012-01-01
... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...
Code of Federal Regulations, 2011 CFR
2011-01-01
... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...
Code of Federal Regulations, 2013 CFR
2013-01-01
... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...
NASA Astrophysics Data System (ADS)
Zulfikar, Can; Pinar, Ali; Tunc, Suleyman; Erdik, Mustafa
2014-05-01
The Istanbul EEW network consisting of 10 inland and 5 OBS strong motion stations located close to the Main Marmara Fault zone is operated by KOERI. Data transmission between the remote stations and the base station at KOERI is provided both with satellite and fiber optic cable systems. The continuous on-line data from these stations is used to provide real time warning for emerging potentially disastrous earthquakes. The data transmission time from the remote stations to the KOERI data center is a few milliseconds through fiber optic lines and less than a second via satellites. The early warning signal (consisting three alarm levels) is communicated to the appropriate servo shut-down systems of the receipent facilities, that automatically decide proper action based on the alarm level. Istanbul Gas Distribution Corporation (IGDAS) is one of the end users of the EEW signal. IGDAS, the primary natural gas provider in Istanbul, operates an extensive system 9,867 km of gas lines with 550 district regulators and 474,000 service boxes. State of-the-art protection systems automatically cut natural gas flow when breaks in the pipelines are detected. Since 2005, buildings in Istanbul using natural gas are required to install seismometers that automatically cut natural gas flow when certain thresholds are exceeded. IGDAS uses a sophisticated SCADA (supervisory control and data acquisition) system to monitor the state-of-health of its pipeline network. This system provides real-time information about quantities related to pipeline monitoring, including input-output pressure, drawing information, positions of station and RTU (remote terminal unit) gates, slum shut mechanism status at 581 district regulator sites. The SCADA system of IGDAŞ receives the EEW signal from KOERI and decide the proper actions according to the previously specified ground acceleration levels. Presently, KOERI sends EEW signal to the SCADA system of IGDAS Natural Gas Network of Istanbul. The EEW signal of KOERI is also transmitted to the serve shut down system of the Marmaray Rail Tube Tunnel and Commuter Rail Mass Transit System in Istanbul. The Marmaray system includes an undersea railway tunnel under the Bosphorus Strait. Several strong motion instruments are installed within the tunnel for taking measurements against strong ground shaking and early warning purposes. This system is integrated with the KOERI EEW System. KOERI sends the EEW signal to the command center of Marmaray. Having received the signal, the command center put into action the previously defined measurements. For example, the trains within the tunnel will be stopped at the nearest station, no access to the tunnel will be allowed to the trains approaching the tunnel, water protective caps will be closed to protect flood closing the connection between the onshore and offshore tunnels.
Behavioral Profiling of Scada Network Traffic Using Machine Learning Algorithms
2014-03-27
BEHAVIORAL PROFILING OF SCADA NETWORK TRAFFIC USING MACHINE LEARNING ALGORITHMS THESIS Jessica R. Werling, Captain, USAF AFIT-ENG-14-M-81 DEPARTMENT...subject to copyright protection in the United States. AFIT-ENG-14-M-81 BEHAVIORAL PROFILING OF SCADA NETWORK TRAFFIC USING MACHINE LEARNING ...AFIT-ENG-14-M-81 BEHAVIORAL PROFILING OF SCADA NETWORK TRAFFIC USING MACHINE LEARNING ALGORITHMS Jessica R. Werling, B.S.C.S. Captain, USAF Approved
NASA Astrophysics Data System (ADS)
Robertson, Jamie; Shinozuka, Masanobu; Wu, Felix
2011-04-01
When a lifeline system such as a water delivery network is damaged due to a severe earthquake, it is critical to identify its location and extent of the damage in real time in order to minimize the potentially disastrous consequence such damage could otherwise entail. This paper demonstrates how the degree of such minimization can be estimated qualitatively by using the water delivery system of Irvine Water Ranch District (IRWD) as testbed, when it is subjected to magnitude 6.6 San Joaquin Hills Earthquake. In this demonstration, we consider two cases when the IRWD system is equipped or not equipped with a next generation SCADA which consists of a network of MEMS acceleration sensors densely populated and optimally located. These sensors are capable of identifying the location and extent of the damage as well as transmitting the data to the SCADA center for monitoring and control.
Designing an operator interface? Consider user`s `psychology`
DOE Office of Scientific and Technical Information (OSTI.GOV)
Toffer, D.E.
The modern operator interface is a channel of communication between operators and the plant that, ideally, provides them with information necessary to keep the plant running at maximum efficiency. Advances in automation technology have increased information flow from the field to the screen. New and improved Supervisory Control and Data Acquisition (SCADA) packages provide designers with powerful and open design considerations. All too often, however, systems go to the field designed for the software rather than the operator. Plant operators` jobs have changed fundamentally, from controlling their plants from out in the field to doing so from within control rooms.more » Control room-based operation does not denote idleness. Trained operators should be engaged in examination of plant status and cognitive evaluation of plant efficiencies. Designers who are extremely computer literate, often do not consider demographics of field operators. Many field operators have little knowledge of modern computer systems. As a result, they do not take full advantage of the interface`s capabilities. Designers often fail to understand the true nature of how operators run their plants. To aid field operators, designers must provide familiar controls and intuitive choices. To achieve success in interface design, it is necessary to understand the ways in which humans think conceptually, and to understand how they process this information physically. The physical and the conceptual are closely related when working with any type of interface. Designers should ask themselves: {open_quotes}What type of information is useful to the field operator?{close_quotes} Let`s explore an integration model that contains the following key elements: (1) Easily navigated menus; (2) Reduced chances for misunderstanding; (3) Accurate representations of the plant or operation; (4) Consistent and predictable operation; (5) A pleasant and engaging interface that conforms to the operator`s expectations. 4 figs.« less
A Queueing Model for Supervisory Control of Unmanned Autonomous Vehicles
2013-09-01
Autonomous Vehicles Joseph DiVita, PhD Robert L. Morris Maria Olinda Rodas SSC Pacific Approved...298 (Rev. 8/98) Prescribed by ANSI Std. Z39.18 09–2013 Final A Queueing Model for Supervisory Control of Unmanned Autonomous Vehicles Joseph...Mission Area: Command and Control, Queueing Model; Supervisory Control; Unmanned Autonomous Vehicles M. O. Rodas U U U U 38 (619)
Towards a new Mercator Observatory Control System
NASA Astrophysics Data System (ADS)
Pessemier, W.; Raskin, G.; Prins, S.; Saey, P.; Merges, F.; Padilla, J. P.; Van Winckel, H.; Waelkens, C.
2010-07-01
A new control system is currently being developed for the 1.2-meter Mercator Telescope at the Roque de Los Muchachos Observatory (La Palma, Spain). Formerly based on transputers, the new Mercator Observatory Control System (MOCS) consists of a small network of Linux computers complemented by a central industrial controller and an industrial real-time data communication network. Python is chosen as the high-level language to develop flexible yet powerful supervisory control and data acquisition (SCADA) software for the Linux computers. Specialized applications such as detector control, auto-guiding and middleware management are also integrated in the same Python software package. The industrial controller, on the other hand, is connected to the majority of the field devices and is targeted to run various control loops, some of which are real-time critical. Independently of the Linux distributed control system (DCS), this controller makes sure that high priority tasks such as the telescope motion, mirror support and hydrostatic bearing control are carried out in a reliable and safe way. A comparison is made between different controller technologies including a LabVIEW embedded system, a PROFINET Programmable Logic Controller (PLC) and motion controller, and an EtherCAT embedded PC (soft-PLC). As the latter is chosen as the primary platform for the lower level control, a substantial part of the software is being ported to the IEC 61131-3 standard programming languages. Additionally, obsolete hardware is gradually being replaced by standard industrial alternatives with fast EtherCAT communication. The use of Python as a scripting language allows a smooth migration to the final MOCS: finished parts of the new control system can readily be commissioned to replace the corresponding transputer units of the old control system with minimal downtime. In this contribution, we give an overview of the systems design, implementation details and the current status of the project.
SCADA data and the quantification of hazardous events for QMRA.
Nilsson, P; Roser, D; Thorwaldsdotter, R; Petterson, S; Davies, C; Signor, R; Bergstedt, O; Ashbolt, N
2007-01-01
The objective of this study was to assess the use of on-line monitoring to support the QMRA at water treatment plants studied in the EU MicroRisk project. SCADA data were obtained from three Catchment-to-Tap Systems (CTS) along with system descriptions, diary records, grab sample data and deviation reports. Particular attention was paid to estimating hazardous event frequency, duration and magnitude. Using Shewart and CUSUM we identified 'change-points' corresponding to events of between 10 min and >1 month duration in timeseries data. Our analysis confirmed it is possible to quantify hazardous event durations from turbidity, chlorine residual and pH records and distinguish them from non-hazardous variability in the timeseries dataset. The durations of most 'events' were short-term (0.5-2.3 h). These data were combined with QMRA to estimate pathogen infection risk arising from such events as chlorination failure. While analysis of SCADA data alone could identify events provisionally, its interpretation was severely constrained in the absence of diary records and other system information. SCADA data analysis should only complement traditional water sampling, rather than replace it. More work on on-line data management, quality control and interpretation is needed before it can be used routinely for event characterization.
A Testbed Environment for Buildings-to-Grid Cyber Resilience Research and Development
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sridhar, Siddharth; Ashok, Aditya; Mylrea, Michael E.
The Smart Grid is characterized by the proliferation of advanced digital controllers at all levels of its operational hierarchy from generation to end consumption. Such controllers within modern residential and commercial buildings enable grid operators to exercise fine-grained control over energy consumption through several emerging Buildings-to-Grid (B2G) applications. Though this capability promises significant benefits in terms of operational economics and improved reliability, cybersecurity weaknesses in the supporting infrastructure could be exploited to cause a detrimental effect and this necessitates focused research efforts on two fronts. First, the understanding of how cyber attacks in the B2G space could impact grid reliabilitymore » and to what extent. Second, the development and validation of cyber-physical application-specific countermeasures that are complementary to traditional infrastructure cybersecurity mechanisms for enhanced cyber attack detection and mitigation. The PNNL B2G testbed is currently being developed to address these core research needs. Specifically, the B2G testbed combines high-fidelity buildings+grid simulators, industry-grade building automation and Supervisory Control and Data Acquisition (SCADA) systems in an integrated, realistic, and reconfigurable environment capable of supporting attack-impact-detection-mitigation experimentation. In this paper, we articulate the need for research testbeds to model various B2G applications broadly by looking at the end-to-end operational hierarchy of the Smart Grid. Finally, the paper not only describes the architecture of the B2G testbed in detail, but also addresses the broad spectrum of B2G resilience research it is capable of supporting based on the smart grid operational hierarchy identified earlier.« less
Generic command interpreter for robot controllers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Werner, J.
1991-04-09
Generic command interpreter programs have been written for robot controllers at Sandia National Laboratories (SNL). Each interpreter program resides on a robot controller and interfaces the controller with a supervisory program on another (host) computer. We call these interpreter programs monitors because they wait, monitoring a communication line, for commands from the supervisory program. These monitors are designed to interface with the object-oriented software structure of the supervisory programs. The functions of the monitor programs are written in each robot controller's native language but reflect the object-oriented functions of the supervisory programs. These functions and other specifics of the monitormore » programs written for three different robots at SNL will be discussed. 4 refs., 4 figs.« less
Supervisory Control System Architecture for Advanced Small Modular Reactors
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cetiner, Sacit M; Cole, Daniel L; Fugate, David L
2013-08-01
This technical report was generated as a product of the Supervisory Control for Multi-Modular SMR Plants project within the Instrumentation, Control and Human-Machine Interface technology area under the Advanced Small Modular Reactor (SMR) Research and Development Program of the U.S. Department of Energy. The report documents the definition of strategies, functional elements, and the structural architecture of a supervisory control system for multi-modular advanced SMR (AdvSMR) plants. This research activity advances the state-of-the art by incorporating decision making into the supervisory control system architectural layers through the introduction of a tiered-plant system approach. The report provides a brief history ofmore » hierarchical functional architectures and the current state-of-the-art, describes a reference AdvSMR to show the dependencies between systems, presents a hierarchical structure for supervisory control, indicates the importance of understanding trip setpoints, applies a new theoretic approach for comparing architectures, identifies cyber security controls that should be addressed early in system design, and describes ongoing work to develop system requirements and hardware/software configurations.« less
Assessing the Impact of Low Workload in Supervisory Control of Networked Unmanned Vehicles
2010-06-01
influence is expected to contain men and women between the ages of 18 and 50 with an interest in using computers. You should read the information below...controlling land, air, and sea vehicles of all different types from the same supervisory control interface. As human supervisory control of UxVs...expressions indicated when boredom was occurring. Video coding shows that humans deal with boredom in different ways. Some individuals are more
Metrics for the National SCADA Test Bed Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.
2008-12-05
The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.
2012-01-06
Figure 2 shows the Supervisory Control and Data Acquisition and Hydromet Equipment at the Stennis Lock and Dam in Columbus. 3 Figure 2...Supervisory Control and Data Acquisition and Hydromet Equipment for the Waterway at the Stennis Lock and Dam • Tinker Air Force Base Project...Tennessee-Tombigbee Waterway, AL & MS W91278-10-C-0051 Upgrade of Supervisory Control and Data Acquisition and Hydromet Equipment for the Waterway
RivGen, Igiugig Deployment, Control System Specifications and Models
Forbush, Dominic; Cavagnaro, Robert J.; Guerra, Maricarmen; Donegan, James; McEntee, Jarlath; Thomson, Jim; Polagye, Brian; Fabien, Brian; Kilcher, Levi
2016-03-21
Control System simulation models, case studies, and processing codes for analyzing field data. Raw data files included from VFD and SCADA. MatLab and Simulink are required to open some data files and all model files.
A Taxonomy of Attacks on the DNP3 Protocol
NASA Astrophysics Data System (ADS)
East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet
Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.
This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despitemore » much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.« less
The use of pneumatically generated water pressure signals for aquifer characterization
NASA Astrophysics Data System (ADS)
Fort, M.; Roberts, R.; Chace, D.
2013-12-01
The use of pneumatically generated pressure signals for aquifer characterization Hydraulic tests are the most reliable method of obtaining estimates of hydrologic properties, such as conductivity, that are essential for flow and transport modeling. The use of a sinusoidal signal for hydraulic testing is well established, with Streltsova (1988), Rasmussen (2003) and others having developed analytic solutions. Sinusoidal tests provide a unique easily distinguished signal that reduces ambiguity during analysis and we show that a sinusoidal pressure signal propagates farther into the formation than a standard slug-test signal. If a sinusoidal test is combined with a slug and/or a constant rate test, it can further reduce uncertainty in the estimated parameter values. We demonstrate how pneumatic pressure can be used to generate all three of these signals. By positioning pressure transducers both below the water level and in the head space above the water, we can monitor the total pressure acting on the formation and the changes in water level. From the changes in water level, it is possible to calculate the flow rate in and out of the well, assuming that the well diameter and water density are known. Using gas flow controllers with a Supervisory Control And Data Acquisition (SCADA) system we are able to precisely control the pressures in the well. The use of pneumatic pressure has the advantage that it requires less equipment (no pumps) and produces no water. We also show how the numerical well test analysis program nSIGHTS can be used to analyze all three types of tests simultaneously and to assess the relative contribution of each type of test to the parameter estimation. nSIGHTS was recently released as open source by Sandia National Laboratories and is available for free.
An Integrated Simulation Module for Cyber-Physical Automation Systems †
Ferracuti, Francesco; Freddi, Alessandro; Monteriù, Andrea; Prist, Mariorosario
2016-01-01
The integration of Wireless Sensors Networks (WSNs) into Cyber Physical Systems (CPSs) is an important research problem to solve in order to increase the performances, safety, reliability and usability of wireless automation systems. Due to the complexity of real CPSs, emulators and simulators are often used to replace the real control devices and physical connections during the development stage. The most widespread simulators are free, open source, expandable, flexible and fully integrated into mathematical modeling tools; however, the connection at a physical level and the direct interaction with the real process via the WSN are only marginally tackled; moreover, the simulated wireless sensor motes are not able to generate the analogue output typically required for control purposes. A new simulation module for the control of a wireless cyber-physical system is proposed in this paper. The module integrates the COntiki OS JAva Simulator (COOJA), a cross-level wireless sensor network simulator, and the LabVIEW system design software from National Instruments. The proposed software module has been called “GILOO” (Graphical Integration of Labview and cOOja). It allows one to develop and to debug control strategies over the WSN both using virtual or real hardware modules, such as the National Instruments Real-Time Module platform, the CompactRio, the Supervisory Control And Data Acquisition (SCADA), etc. To test the proposed solution, we decided to integrate it with one of the most popular simulators, i.e., the Contiki OS, and wireless motes, i.e., the Sky mote. As a further contribution, the Contiki Sky DAC driver and a new “Advanced Sky GUI” have been proposed and tested in the COOJA Simulator in order to provide the possibility to develop control over the WSN. To test the performances of the proposed GILOO software module, several experimental tests have been made, and interesting preliminary results are reported. The GILOO module has been applied to a smart home mock-up where a networked control has been developed for the LED lighting system. PMID:27164109
An Integrated Simulation Module for Cyber-Physical Automation Systems.
Ferracuti, Francesco; Freddi, Alessandro; Monteriù, Andrea; Prist, Mariorosario
2016-05-05
The integration of Wireless Sensors Networks (WSNs) into Cyber Physical Systems (CPSs) is an important research problem to solve in order to increase the performances, safety, reliability and usability of wireless automation systems. Due to the complexity of real CPSs, emulators and simulators are often used to replace the real control devices and physical connections during the development stage. The most widespread simulators are free, open source, expandable, flexible and fully integrated into mathematical modeling tools; however, the connection at a physical level and the direct interaction with the real process via the WSN are only marginally tackled; moreover, the simulated wireless sensor motes are not able to generate the analogue output typically required for control purposes. A new simulation module for the control of a wireless cyber-physical system is proposed in this paper. The module integrates the COntiki OS JAva Simulator (COOJA), a cross-level wireless sensor network simulator, and the LabVIEW system design software from National Instruments. The proposed software module has been called "GILOO" (Graphical Integration of Labview and cOOja). It allows one to develop and to debug control strategies over the WSN both using virtual or real hardware modules, such as the National Instruments Real-Time Module platform, the CompactRio, the Supervisory Control And Data Acquisition (SCADA), etc. To test the proposed solution, we decided to integrate it with one of the most popular simulators, i.e., the Contiki OS, and wireless motes, i.e., the Sky mote. As a further contribution, the Contiki Sky DAC driver and a new "Advanced Sky GUI" have been proposed and tested in the COOJA Simulator in order to provide the possibility to develop control over the WSN. To test the performances of the proposed GILOO software module, several experimental tests have been made, and interesting preliminary results are reported. The GILOO module has been applied to a smart home mock-up where a networked control has been developed for the LED lighting system.
Susceptibility of SCADA systems and the energy sector
NASA Astrophysics Data System (ADS)
Goike, Lindsay
The research in this paper focused on analyzing SCADA systems in the energy sector for susceptibility to cyber attacks, in furtherance of providing suggestions to mitigate current and future cyber attacks. The research will be addressing the questions: how are SCADA systems susceptible to cyber attacks, and what are the suggested ways to mitigate both current and future cyber attacks. The five main categories of security vulnerabilities facing current SCADA systems were found to be: connectivity to the Internet, failure to plan, interdependency of sectors, numerous different types of threats, and outdated software. Some of the recommendations mentioned to mitigate current and future risks were: virtual private networks, risk assessments, increased physical security, updating of software, and firewalls.
Evaluation of Traditional Security Solutions in the SCADA Environment
2012-03-01
Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Robert D. Larkin, Captain, USAF AFIT/GCO/ENG/12-06 DEPARTMENT OF THE AIR...views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, Department...United States. AFIT/GCO/ENG/12-06 Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Presented to the Faculty Department of
FDI and Accommodation Using NN Based Techniques
NASA Astrophysics Data System (ADS)
Garcia, Ramon Ferreiro; de Miguel Catoira, Alberto; Sanz, Beatriz Ferreiro
Massive application of dynamic backpropagation neural networks is used on closed loop control FDI (fault detection and isolation) tasks. The process dynamics is mapped by means of a trained backpropagation NN to be applied on residual generation. Process supervision is then applied to discriminate faults on process sensors, and process plant parameters. A rule based expert system is used to implement the decision making task and the corresponding solution in terms of faults accommodation and/or reconfiguration. Results show an efficient and robust FDI system which could be used as the core of an SCADA or alternatively as a complement supervision tool operating in parallel with the SCADA when applied on a heat exchanger.
Design of virtual SCADA simulation system for pressurized water reactor
NASA Astrophysics Data System (ADS)
Wijaksono, Umar; Abdullah, Ade Gafar; Hakim, Dadang Lukman
2016-02-01
The Virtual SCADA system is a software-based Human-Machine Interface that can visualize the process of a plant. This paper described the results of the virtual SCADA system design that aims to recognize the principle of the Nuclear Power Plant type Pressurized Water Reactor. This simulation uses technical data of the Nuclear Power Plant Unit Olkiluoto 3 in Finland. This device was developed using Wonderware Intouch, which is equipped with manual books for each component, animation links, alarm systems, real time and historical trending, and security system. The results showed that in general this device can demonstrate clearly the principles of energy flow and energy conversion processes in Pressurized Water Reactors. This virtual SCADA simulation system can be used as instructional media to recognize the principle of Pressurized Water Reactor.
Behavior coordination of mobile robotics using supervisory control of fuzzy discrete event systems.
Jayasiri, Awantha; Mann, George K I; Gosine, Raymond G
2011-10-01
In order to incorporate the uncertainty and impreciseness present in real-world event-driven asynchronous systems, fuzzy discrete event systems (DESs) (FDESs) have been proposed as an extension to crisp DESs. In this paper, first, we propose an extension to the supervisory control theory of FDES by redefining fuzzy controllable and uncontrollable events. The proposed supervisor is capable of enabling feasible uncontrollable and controllable events with different possibilities. Then, the extended supervisory control framework of FDES is employed to model and control several navigational tasks of a mobile robot using the behavior-based approach. The robot has limited sensory capabilities, and the navigations have been performed in several unmodeled environments. The reactive and deliberative behaviors of the mobile robotic system are weighted through fuzzy uncontrollable and controllable events, respectively. By employing the proposed supervisory controller, a command-fusion-type behavior coordination is achieved. The observability of fuzzy events is incorporated to represent the sensory imprecision. As a systematic analysis of the system, a fuzzy-state-based controllability measure is introduced. The approach is implemented in both simulation and real time. A performance evaluation is performed to quantitatively estimate the validity of the proposed approach over its counterparts.
Combating Memory Corruption Attacks On Scada Devices
NASA Astrophysics Data System (ADS)
Bellettini, Carlo; Rrushi, Julian
Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.
Wong, Jennifer H K; Kelloway, E Kevin
2016-04-01
We investigated the relationship between workplace supervisory social interactions and blood pressure outcomes using hourly diary entries and ambulatory blood pressure data from an experience sampling study of 55 long-term care employees. After accounting for relevant cardiovascular controls, significant effects of supervisory interactions on cardiovascular reactivity and recovery were found. Multilevel analyses revealed that negatively perceived supervisory interactions predicted higher systolic blood pressure at work (B = -1.59, p < .05, N observations = 422). Using time-lagged hierarchical regression analyses, the average perceived valence of supervisory interactions at work predicted average systolic blood pressure recovery after work (B = -14.52, p < .05, N = 33). Specifically, negatively perceived supervisory interactions at work predicted poorer cardiovascular recovery after work. Suggestions for improving practices in organizations and in experience sampling research are discussed. (c) 2016 APA, all rights reserved).
Analysis of a SCADA System Anomaly Detection Model Based on Information Entropy
2014-03-27
20 Intrusion Detection...alarms ( Rem ). ............................................................................................................. 86 Figure 25. TP% for...literature concerning the focus areas of this research. The focus areas include SCADA vulnerabilities, information theory, and intrusion detection
Design of virtual SCADA simulation system for pressurized water reactor
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wijaksono, Umar, E-mail: umar.wijaksono@student.upi.edu; Abdullah, Ade Gafar; Hakim, Dadang Lukman
The Virtual SCADA system is a software-based Human-Machine Interface that can visualize the process of a plant. This paper described the results of the virtual SCADA system design that aims to recognize the principle of the Nuclear Power Plant type Pressurized Water Reactor. This simulation uses technical data of the Nuclear Power Plant Unit Olkiluoto 3 in Finland. This device was developed using Wonderware Intouch, which is equipped with manual books for each component, animation links, alarm systems, real time and historical trending, and security system. The results showed that in general this device can demonstrate clearly the principles ofmore » energy flow and energy conversion processes in Pressurized Water Reactors. This virtual SCADA simulation system can be used as instructional media to recognize the principle of Pressurized Water Reactor.« less
On the use of high-frequency SCADA data for improved wind turbine performance monitoring
NASA Astrophysics Data System (ADS)
Gonzalez, E.; Stephen, B.; Infield, D.; Melero, J. J.
2017-11-01
SCADA-based condition monitoring of wind turbines facilitates the move from costly corrective repairs towards more proactive maintenance strategies. In this work, we advocate the use of high-frequency SCADA data and quantile regression to build a cost effective performance monitoring tool. The benefits of the approach are demonstrated through the comparison between state-of-the-art deterministic power curve modelling techniques and the suggested probabilistic model. Detection capabilities are compared for low and high-frequency SCADA data, providing evidence for monitoring at higher resolutions. Operational data from healthy and faulty turbines are used to provide a practical example of usage with the proposed tool, effectively achieving the detection of an incipient gearbox malfunction at a time horizon of more than one month prior to the actual occurrence of the failure.
Applications of Intelligent Technology to Power System Supervisory Control and Protection Systems
NASA Astrophysics Data System (ADS)
Nagata, Takeshi
Power system supervisory control and protection systems provide utilities with capabilities that are key to a planning business function, i.e., delivering power in a reliable and safe manner. A quality system solution is central to effective operation of a utility's most critical and costly generation, transmission, and distribution assets. The challenging issues for these systems today are not the same as they were few years ago. Today, there is much more placed on integration, use of new IT technologies, and access to information for more purposes. This article presents the topics of intelligent technology to the power system supervisory control and protection systems.
78 FR 65718 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-01
... maintain certain risk management controls and supervisory procedures as well as regularly review such... supervisory procedures and a written description of its risk management controls as part of its books and... providing sponsored or direct market access to customers or other persons, to implement risk management...
NASA Technical Reports Server (NTRS)
Sheridan, T. B.
1974-01-01
The various functions of a computer are considered that serve in connecting the man, with his displays and controls, to an external environment, manipulator activators and the interoceptors that are in the actuators, and to the interosensors and the motors or the actuators to drive the sensors. Projected is an improved exoskeleton mechanism with computer control and some supervisory control that may give a quadriplegic the ability to walk and run around.
Development of Solar Powered Irrigation System
NASA Astrophysics Data System (ADS)
Abdelkerim, A. I.; Sami Eusuf, M. M. R.; Salami, M. J. E.; Aibinu, A.; Eusuf, M. A.
2013-12-01
Development of a solar powered irrigation system has been discussed in this paper. This system would be SCADA-based and quite useful in areas where there is plenty of sunshine but insufficient water to carry out farming activities, such as rubber plantation, strawberry plantation, or any plantation, that requires frequent watering. The system is powered by solar system as a renewable energy which uses solar panel module to convert Sunlight into electricity. The development and implementation of an automated SCADA controlled system that uses PLC as a controller is significant to agricultural, oil and gas monitoring and control purpose purposes. In addition, the system is powered by an intelligent solar system in which solar panel targets the radiation from the Sun. Other than that, the solar system has reduced energy cost as well as pollution. The system is equipped with four input sensors; two soil moisture sensors, two level detection sensors. Soil moisture sensor measures the humidity of the soil, whereas the level detection sensors detect the level of water in the tank. The output sides consist of two solenoid valves, which are controlled respectively by two moistures sensors.
NASA Technical Reports Server (NTRS)
Hale, C.; Valentino, G. J.
1982-01-01
Supervisory decision making and control behavior within a C(3) oriented, ground based weapon system is being studied. The program involves empirical investigation of the sequence of control strategies used during engagement of aircraft targets. An engagement is conceptually divided into several stages which include initial information processing activity, tracking, and ongoing adaptive control decisions. Following a brief description of model parameters, two experiments which served as initial investigation into the accuracy of assumptions regarding the importance of situation assessment in procedure selection are outlined. Preliminary analysis of the results upheld the validity of the assumptions regarding strategic information processing and cue-criterion relationship learning. These results indicate that this model structure should be useful in studies of supervisory decision behavior.
Computer Simulated Visual and Tactile Feedback as an Aid to Manipulator and Vehicle Control,
1981-05-08
STATEMENT ........................ 8 Artificial Intellegence Versus Supervisory Control ....... 8 Computer Generation of Operator Feedback...operator. Artificial Intelligence Versus Supervisory Control The use of computers to aid human operators can be divided into two catagories: artificial ...operator. Artificial intelligence ( A. I. ) attempts to give the computer maximum intelligence and to replace all operator functions by the computer
A framework for analyzing the impact of data integrity/quality on electricity market operations
NASA Astrophysics Data System (ADS)
Choi, Dae Hyun
This dissertation examines the impact of data integrity/quality in the supervisory control and data acquisition (SCADA) system on real-time locational marginal price (LMP) in electricity market operations. Measurement noise and/or manipulated sensor errors in a SCADA system may mislead system operators about real-time conditions in a power system, which, in turn, may impact the price signals in real-time power markets. This dissertation serves as a first attempt to analytically investigate the impact of bad/malicious data on electric power market operations. In future power system operations, which will probably involve many more sensors, the impact of sensor data integrity/quality on grid operations will become increasingly important. The first part of this dissertation studies from a market participant's perspective a new class of malicious data attacks on state estimation, which subsequently influences the result of the newly emerging look-ahead dispatch models in the real-time power market. In comparison with prior work of cyber-attack on static dispatch where no inter-temporal ramping constraint is considered, we propose a novel attack strategy, named ramp-induced data (RID) attack, with which the attacker can manipulate the limits of ramp constraints of generators in look-ahead dispatch. It is demonstrated that the proposed attack can lead to financial profits via malicious capacity withholding of selected generators, while being undetected by the existing bad data detection algorithm embedded in today's state estimation software. In the second part, we investigate from a system operator's perspective the sensitivity of locational marginal price (LMP) with respect to data corruption-induced state estimation error in real-time power market. Two data corruption scenarios are considered, in which corrupted continuous data (e.g., the power injection/flow and voltage magnitude) falsify power flow estimate whereas corrupted discrete data (e.g., the on/off status of a circuit breaker) do network topology estimate, thus leading to the distortion of LMP. We present an analytical framework to quantify real-time LMP sensitivity subject to continuous and discrete data corruption via state estimation. The proposed framework offers system operators an analytical tool to identify economically sensitive buses and transmission lines to data corruption as well as find sensors that impact LMP changes significantly. This dissertation serves as a first step towards rigorous understanding of the fundamental coupling among cyber, physical and economical layers of operations in future smart grid.
NASA Astrophysics Data System (ADS)
Metcalfe, Jason S.; Alban, Jillyn; Cosenzo, Keryl; Johnson, Tony; Capstick, Erin
2010-04-01
Those applying autonomous technologies to military systems strive to enhance human-robot and robot-robot performance. Beyond performance, the military must be concerned with local area security. Characterized as "secure mobility", military systems must enable safe and effective terrain traversal concurrent with maintenance of situational awareness (SA). One approach to interleaving these objectives is supervisory control, with popular options being shared and traded control. Yet, with the scale and expense of military assets, common technical issues such as transition time and safeguarding become critical; especially as they interact with Soldier capabilities. Study is required to enable selection of control methods that optimize Soldier-system performance while safeguarding both individually. The current report describes a study utilizing experimental military vehicles and simulation systems enabling teleoperation and supervisory control. Automated triggering of SA demands was interspersed with a set of challenging driving maneuvers in a 'teleoperation-like' context to examine the influence of supervisory control on Soldier-system performance. Results indicated that direct application of supervisory control, while beneficial under particular demands, requires continued development to be perceived by Soldiers as useful. Future efforts should more tightly couple the information exchanged between the Soldier and system to overcome current challenges not addressed by standard control methods.
ERIC Educational Resources Information Center
White, J. R. H.
1978-01-01
Advocates restoring authority of supervisors to meet their responsibilities. Discusses authority conferred by organizations, personality, and knowledge. Suggests development through coaching, course preparation, and appraising. Reviews effective supervisory skills: team building, problem solving, understanding legalities, controlling multi-racial…
A computer network with scada and case tools for on-line process control in greenhouses
NASA Astrophysics Data System (ADS)
Gieling, Th. H.; van Meurs, W. Th. M.; Janssen, H. J. J.
Climate control computers in greenhouses are used to control heating and ventilation, supply water and dilute and dispense nutrients. They integrate models into optimally controlled systems. This paper describes how information technology, as in use in other sectors of industry, is applied to greenhouse control. The introduction of modern software and hardware concepts in horticulture adds power and extra opportunities to climate control in greenhouses.
A computer network with SCADA and case tools for on-line process control in greenhouses.
Gieling ThH; van Meurs WTh; Janssen, H J
1996-01-01
Climate control computers in greenhouses are used to control heating and ventilation, supply water and dilute and dispense nutrients. They integrate models into optimally controlled systems. This paper describes how information technology, as in use in other sectors of industry, is applied to greenhouse control. The introduction of modern software and hardware concepts in horticulture adds power and extra oppurtunities to climate contol in greenhouses.
NASA Astrophysics Data System (ADS)
Leahy, Kevin; Gallagher, Colm; Bruton, Ken; O'Donovan, Peter; O'Sullivan, Dominic T. J.
2017-11-01
Using 10-minute wind turbine SCADA data for fault prediction offers an attractive way of gaining additional prognostic capabilities without needing to invest in extra hardware. To use these data-driven methods effectively, the historical SCADA data must be labelled with the periods when the turbine was in faulty operation as well the sub-system the fault was attributed to. Manually identifying faults using maintenance logs can be effective, but is also highly time consuming and tedious due to the disparate nature of these logs across manufacturers, operators and even individual maintenance events. Turbine alarm systems can help to identify these periods, but the sheer volume of alarms and false positives generated makes analysing them on an individual basis ineffective. In this work, we present a new method for automatically identifying historical stoppages on the turbine using SCADA and alarms data. Each stoppage is associated with either a fault in one of the turbine’s sub-systems, a routine maintenance activity, a grid-related event or a number of other categories. This is then checked against maintenance logs for accuracy and the labelled data fed into a classifier for predicting when these stoppages will occur. Results show that the automated labelling process correctly identifies each type of stoppage, and can be effectively used for SCADA-based prediction of turbine faults.
Optimal Discrete Event Supervisory Control of Aircraft Gas Turbine Engines
NASA Technical Reports Server (NTRS)
Litt, Jonathan (Technical Monitor); Ray, Asok
2004-01-01
This report presents an application of the recently developed theory of optimal Discrete Event Supervisory (DES) control that is based on a signed real measure of regular languages. The DES control techniques are validated on an aircraft gas turbine engine simulation test bed. The test bed is implemented on a networked computer system in which two computers operate in the client-server mode. Several DES controllers have been tested for engine performance and reliability.
Development and Demonstration of a Security Core Component
DOE Office of Scientific and Technical Information (OSTI.GOV)
Turke, Andy
In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more datamore » about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from “normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.« less
Parasuraman, Raja; Kidwell, Brian; Olmstead, Ryan; Lin, Ming-Kuan; Jankord, Ryan; Greenwood, Pamela
2014-06-01
We examined whether a gene known to influence dopamine availability in the prefrontal cortex is associated with individual differences in learning a supervisory control task. Methods are needed for selection and training of human operators who can effectively supervise multiple unmanned vehicles (UVs). Compared to the valine (Val) allele, the methionine (Met) allele of the COMT gene has been linked to superior executive function, but it is not known whether it is associated with training-related effects in multi-UV supervisory control performance. Ninety-nine healthy adults were genotyped for the COMT Val158Met single nucleotide polymorphism (rs4680) and divided into Met/Met, Val/Met, and Val/Val groups. Participants supervised six UVs in an air defense mission requiring them to attack incoming enemy aircraft and protect a no-fly zone from intruders in conditions of low and high task load (numbers of enemy aircraft). Training effects were examined across four blocks of trials in each task load condition. Compared to the Val/Met and Val/Val groups, Met/Met individuals exhibited a greater increase in enemy targets destroyed and greater reduction in enemy red zone incursions across training blocks. Individuals with the COMT Met/Met genotype can acquire skill in executive function tasks, such as multi-UV supervisory control, to a higher level and/or faster than other genotype groups. Potential applications of this research include the development of individualized training methods for operators of multi-UV systems and selecting personnel for complex supervisory control tasks.
NASA Astrophysics Data System (ADS)
Ushio, Toshimitsu; Takai, Shigemasa
Supervisory control is a general framework of logical control of discrete event systems. A supervisor assigns a set of control-disabled controllable events based on observed events so that the controlled discrete event system generates specified languages. In conventional supervisory control, it is assumed that observed events are determined by internal events deterministically. But, this assumption does not hold in a discrete event system with sensor errors and a mobile system, where each observed event depends on not only an internal event but also a state just before the occurrence of the internal event. In this paper, we model such a discrete event system by a Mealy automaton with a nondeterministic output function. We introduce two kinds of supervisors: one assigns each control action based on a permissive policy and the other based on an anti-permissive one. We show necessary and sufficient conditions for the existence of each supervisor. Moreover, we discuss the relationship between the supervisors in the case that the output function is determinisitic.
47 CFR 32.5100 - Long distance message revenue.
Code of Federal Regulations, 2013 CFR
2013-10-01
... UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Instructions For Revenue Accounts § 32.5100..., signaling, remote metering, and supervisory services. (2) Private network circuits and facilities (including..., supervisory control, miscellaneous signaling and channels furnished for the purpose of extending customer...
47 CFR 32.5100 - Long distance message revenue.
Code of Federal Regulations, 2012 CFR
2012-10-01
... UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Instructions For Revenue Accounts § 32.5100..., signaling, remote metering, and supervisory services. (2) Private network circuits and facilities (including..., supervisory control, miscellaneous signaling and channels furnished for the purpose of extending customer...
Code of Federal Regulations, 2014 CFR
2014-01-01
... Banking FEDERAL HOUSING FINANCE AGENCY ORGANIZATION AND OPERATIONS AVAILABILITY OF NON-PUBLIC INFORMATION... other confidential supervisory information is the property of FHFA and is provided to the regulated... control of confidential supervisory information make public or disclose, in any manner, the confidential...
Hierarchical Discrete Event Supervisory Control of Aircraft Propulsion Systems
2004-11-01
Systems Murat Yasar, Devendra Tolani, and Asok Ray The Pennsylvania State University, University Park, Pennsylvania Neerav Shah Glenn Research Center...Hierarchical Discrete Event Supervisory Control of Aircraft Propulsion Systems Murat Yasar, Devendra Tolani, and Asok Ray The Pennsylvania State University...Systems Murat Yasar, Devendra Tolani, and Asok Ray The Pennsylvania State University University Park, Pennsylvania 16802 Neerav Shah National
Satisficing Decision-Making in Supervisory Control. Part 2.
1986-07-31
purpose of the United States Government. C-P Department of Mechanical Engineering Massachusetts Institute of Technology Cambridge, Massachusetts 02139...of Mechanical Engineering Massachusetts Institute of Technology Cambridge MA 02139 Satisficing Decision-Making in Supervisory Control Leonid Charny...example, that there are two attributes, speed and accuracy, and one is selecting a robot manipulator based -4n these two parameters. A set of alternatives
Radio Frequency Based Programmable Logic Controller Anomaly Detection
2013-09-01
include wireless radios, IEEE 802.15 Blue- tooth devices, cellular phones, and IEEE 802.11 WiFi networking devices. While wireless communication...MacKenzie, H. Shamoon Malware and SCADA Security What are the Im- pacts? . Technical Report, Tofino Security, Sep 2012. 61. Mateti,P. Hacking Techniques
Superstorm Sandy: Implications For Designing A PostCyber Attack Power Restoration System
2016-03-31
for such progress. Phillip Allison, “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems: Building Security into Your Industrial...TechSvcs/Multi-stateFleetResponseWorkshopReport-02-21-13.pdf. Allison, Phillip. “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems
Recent Experience with a Hybrid SCADA/PMU On-Line State Estimator
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rizy, D Tom
2009-01-01
PMU devices are expected to grow in number from a few to several hundreds in the next five years. Some relays are already global positioning system-capable and could provide the same type of data as any PMU. This introduces a new paradigm of very fast accurate synchrophasor measurements from across the grid in real-time that augment and parallel existing slower SCADA measurements. Control center applications will benefit from this PMU data; for example, use of PMU data in state estimation is expected to improve accuracy and robustness, which in turn will result in more timely and accurate N-1 security analysis,more » resulting in an overall improvement of grid system reliability and security. This paper describes results from a recent implementation of this technology, the benefits and future work.« less
CENTEC: Center for Excellence in Neuroergonomics, Technology, and Cognition
2016-10-26
paper, "Interactive Effects of the COMT Gene and Training on Individual Differences in Supervisory Control of Unmanned Vehicles." Awards to Raja...in the DBH gene on performance on a command-and-control task (Parasuraman et al., 2012), the effects of variation in the COMT gene on supervisory...control of unmanned vehicles (Parasuraman et al., 2014), and were the first to report the combined effect of COMT and DBH genes on extracellular
External Verification of SCADA System Embedded Controller Firmware
2012-03-01
microprocessor and read-only memory (ROM) or flash memory for storing firmware and control logic [5],[8]. A PLC typically has three software levels as shown in...implementing different firmware. Because PLCs are in effect a microprocessor device, an analysis of the current research on embedded devices is important...Electronics Engineers (IEEE) published a 15 best practices guide for firmware control on microprocessors [44]. IEEE suggests that microprocessors
Distributed intelligence for supervisory control
NASA Technical Reports Server (NTRS)
Wolfe, W. J.; Raney, S. D.
1987-01-01
Supervisory control systems must deal with various types of intelligence distributed throughout the layers of control. Typical layers are real-time servo control, off-line planning and reasoning subsystems and finally, the human operator. Design methodologies must account for the fact that the majority of the intelligence will reside with the human operator. Hierarchical decompositions and feedback loops as conceptual building blocks that provide a common ground for man-machine interaction are discussed. Examples of types of parallelism and parallel implementation on several classes of computer architecture are also discussed.
Redundant arm control in a supervisory and shared control system
NASA Technical Reports Server (NTRS)
Backes, Paul G.; Long, Mark K.
1992-01-01
The Extended Task Space Control approach to robotic operations based on manipulator behaviors derived from task requirements is described. No differentiation between redundant and non-redundant robots is made at the task level. The manipulation task behaviors are combined into a single set of motion commands. The manipulator kinematics are used subsequently in mapping motion commands into actuator commands. Extended Task Space Control is applied to a Robotics Research K-1207 seven degree-of-freedom manipulator in a supervisory telerobot system as an example.
The inherent weaknesses in industrial control systems devices; hacking and defending SCADA systems
NASA Astrophysics Data System (ADS)
Bianco, Louis J.
The North American Electric Reliability Corporation (NERC) is about to enforce their NERC Critical Infrastructure Protection (CIP) Version Five and Six requirements on July 1st 2016. The NERC CIP requirements are a set of cyber security standards designed to protect cyber assets essential the reliable operation of the electric grid. The new Version Five and Six requirements are a major revision to the Version Three (currently enforced) requirements. The new requirements also bring substations into scope alongside Energy Control Centers. When the Version Five requirements were originally drafted they were vague, causing in depth discussions throughout the industry. The ramifications of these requirements has made owners look at their systems in depth, questioning how much money it will take to meet these requirements. Some owners saw backing down from routable networks to non-routable as a means to save money as they would be held to less requirements within the standards. Some owners saw removing routable connections as a proper security move. The purpose of this research was to uncover the inherent weaknesses in Industrial Control Systems (ICS) devices; to show how ICS devices can be hacked and figure out potential protections for these Critical Infrastructure devices. In addition, this research also aimed to validate the decision to move from External Routable connectivity to Non-Routable connectivity, as a security measure and not as a means of savings. The results reveal in order to ultimately protect Industrial Control Systems they must be removed from the Internet and all bi-directional external routable connections must be removed. Furthermore; non-routable serial connections should be utilized, and these non-routable serial connections should be encrypted on different layers of the OSI model. The research concluded that most weaknesses in SCADA systems are due to the inherent weaknesses in ICS devices and because of these weaknesses, human intervention is the biggest threat to SCADA systems.
Microcontroller-Based Experimental Setup and Experiments for SCADA Education
ERIC Educational Resources Information Center
Sahin, S.; Olmez, M.; Isler, Y.
2010-01-01
In the field of automation technology, research and development for industrial applications has increased rapidly in recent years. Therefore, industrial automation and control education is a very important element of the industrialization process in developing countries, such as Turkey, which needs to keep abreast for the latest developments in…
Towards Quantifying Programmable Logic Controller Resilience Against Intentional Exploits
2012-03-22
may improve the SCADA system’s resilience against DoS and man-in-the-middle ( MITM ) attacks. DoS attacks may be mitigated by using the redundant...paths available on the network links. MITM attacks may be mitigated by the data integrity checks associated with the middleware. Figure 4 illustrates
Zhao, Junbo; Wang, Shaobu; Mili, Lamine; ...
2018-01-08
Here, this paper develops a robust power system state estimation framework with the consideration of measurement correlations and imperfect synchronization. In the framework, correlations of SCADA and Phasor Measurements (PMUs) are calculated separately through unscented transformation and a Vector Auto-Regression (VAR) model. In particular, PMU measurements during the waiting period of two SCADA measurement scans are buffered to develop the VAR model with robustly estimated parameters using projection statistics approach. The latter takes into account the temporal and spatial correlations of PMU measurements and provides redundant measurements to suppress bad data and mitigate imperfect synchronization. In case where the SCADAmore » and PMU measurements are not time synchronized, either the forecasted PMU measurements or the prior SCADA measurements from the last estimation run are leveraged to restore system observability. Then, a robust generalized maximum-likelihood (GM)-estimator is extended to integrate measurement error correlations and to handle the outliers in the SCADA and PMU measurements. Simulation results that stem from a comprehensive comparison with other alternatives under various conditions demonstrate the benefits of the proposed framework.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhao, Junbo; Wang, Shaobu; Mili, Lamine
Here, this paper develops a robust power system state estimation framework with the consideration of measurement correlations and imperfect synchronization. In the framework, correlations of SCADA and Phasor Measurements (PMUs) are calculated separately through unscented transformation and a Vector Auto-Regression (VAR) model. In particular, PMU measurements during the waiting period of two SCADA measurement scans are buffered to develop the VAR model with robustly estimated parameters using projection statistics approach. The latter takes into account the temporal and spatial correlations of PMU measurements and provides redundant measurements to suppress bad data and mitigate imperfect synchronization. In case where the SCADAmore » and PMU measurements are not time synchronized, either the forecasted PMU measurements or the prior SCADA measurements from the last estimation run are leveraged to restore system observability. Then, a robust generalized maximum-likelihood (GM)-estimator is extended to integrate measurement error correlations and to handle the outliers in the SCADA and PMU measurements. Simulation results that stem from a comprehensive comparison with other alternatives under various conditions demonstrate the benefits of the proposed framework.« less
NASA Astrophysics Data System (ADS)
Ye, Xiang; Gao, Weihua; Yan, Yanjun; Osadciw, Lisa A.
2010-04-01
Wind is an important renewable energy source. The energy and economic return from building wind farms justify the expensive investments in doing so. However, without an effective monitoring system, underperforming or faulty turbines will cause a huge loss in revenue. Early detection of such failures help prevent these undesired working conditions. We develop three tests on power curve, rotor speed curve, pitch angle curve of individual turbine. In each test, multiple states are defined to distinguish different working conditions, including complete shut-downs, under-performing states, abnormally frequent default states, as well as normal working states. These three tests are combined to reach a final conclusion, which is more effective than any single test. Through extensive data mining of historical data and verification from farm operators, some state combinations are discovered to be strong indicators of spindle failures, lightning strikes, anemometer faults, etc, for fault detection. In each individual test, and in the score fusion of these tests, we apply multidimensional scaling (MDS) to reduce the high dimensional feature space into a 3-dimensional visualization, from which it is easier to discover turbine working information. This approach gains a qualitative understanding of turbine performance status to detect faults, and also provides explanations on what has happened for detailed diagnostics. The state-of-the-art SCADA (Supervisory Control And Data Acquisition) system in industry can only answer the question whether there are abnormal working states, and our evaluation of multiple states in multiple tests is also promising for diagnostics. In the future, these tests can be readily incorporated in a Bayesian network for intelligent analysis and decision support.
Using SCADA Data, Field Studies, and Real-Time Modeling to ...
EPA has been providing technical assistance to the City of Flint and the State of Michigan in response to the drinking water lead contamination incident. Responders quickly recognized the need for a water distribution system hydraulic model to provide insight on flow patterns and water quality as well as to evaluate changes being made to the system operation to enhance corrosion control and improve chlorine residuals. EPA partnered with the City of Flint and the Michigan Department of Environmental Quality to update and calibrate an existing hydraulic model. The City provided SCADA data, GIS data, customer billing data, valve status data, design diagrams, and information on operations. Team members visited all facilities and updated pump and valve types, sizes, settings, elevations, and pump discharge curves. Several technologies were used to support this work including the EPANET-RTX based Polaris real-time modeling software, WaterGEMS, ArcGIS, EPANET, and RTX:LINK. Field studies were conducted to collect pressure and flow data from more than 25 locations throughout the distribution system. An assessment of the model performance compared model predictions for flow, pressure, and tank levels to SCADA and field data, resulting in error measurements for each data stream over the time period analyzed. Now, the calibrated model can be used with a known confidence in its performance to evaluate hydraulic and water quality problems, and the model can be easily
Gender, Parenting, and Adolescent Functioning in Bangladesh.
ERIC Educational Resources Information Center
Stewart, Sunita Mahtani; Bond, Michael Harris; Abdullah, Abu Saleh M.; Ma, Stefan S. L.
2000-01-01
Examined associations of self-esteem, relationship harmony, and academic achievement with perceptions of parents' styles and supervisory practices among 212 adolescents in Islamic Bangladesh. Found that parental supervisory practices were associated with a warm parental style for girls and parental dominating control for boys. Girls' (but not…
Medizade, Masoud [San Luis Obispo, CA; Ridgely, John Robert [Los Osos, CA
2009-12-15
An arrangement which utilizes an inexpensive flap valve/flow transducer combination and a simple local supervisory control system to monitor and/or control the operation of a positive displacement pump used to extract petroleum from geologic strata. The local supervisory control system controls the operation of an electric motor which drives a reciprocating positive displacement pump so as to maximize the volume of petroleum extracted from the well per pump stroke while minimizing electricity usage and pump-off situations. By reducing the electrical demand and pump-off (i.e., "pounding" or "fluid pound") occurrences, operating and maintenance costs should be reduced sufficiently to allow petroleum recovery from marginally productive petroleum fields. The local supervisory control system includes one or more applications to at least collect flow signal data generated during operation of the positive displacement pump. No flow, low flow and flow duration are easily evaluated using the flap valve/flow transducer arrangement.
Learning Sequential Composition Control.
Najafi, Esmaeil; Babuska, Robert; Lopes, Gabriel A D
2016-11-01
Sequential composition is an effective supervisory control method for addressing control problems in nonlinear dynamical systems. It executes a set of controllers sequentially to achieve a control specification that cannot be realized by a single controller. As these controllers are designed offline, sequential composition cannot address unmodeled situations that might occur during runtime. This paper proposes a learning approach to augment the standard sequential composition framework by using online learning to handle unforeseen situations. New controllers are acquired via learning and added to the existing supervisory control structure. In the proposed setting, learning experiments are restricted to take place within the domain of attraction (DOA) of the existing controllers. This guarantees that the learning process is safe (i.e., the closed loop system is always stable). In addition, the DOA of the new learned controller is approximated after each learning trial. This keeps the learning process short as learning is terminated as soon as the DOA of the learned controller is sufficiently large. The proposed approach has been implemented on two nonlinear systems: 1) a nonlinear mass-damper system and 2) an inverted pendulum. The results show that in both cases a new controller can be rapidly learned and added to the supervisory control structure.
Reshaping supervisory practice in home care.
Knollmueller, R N
1988-06-01
Reshaping supervisory practice in home care is not an if but a when issue. We need the best wisdom in how to reshape the practice so that it builds on the experience of the individual and the agency. It is time to deliberately plan to change from the paper-shuffling tendency among supervisors toward supporting more people-oriented activity and to rediscover the pivotal role that supervisors have in keeping a community healthy, staff stimulated, and the agency solvent. Some summary points to consider in reshaping supervisory practice include: (1) redefine supervision to reflect what is desired, needed, and possible, (2) recognize the contribution from change theory and apply it, (3) recapture the commitment and philosophy of supervision from the past, (4) reward the supervisor commensurate with the scope of practice expected, (5) reverse selection of supervisors from preservers of territory to manager as idea entrepreneur, (6) respond to varying and dynamic models of supervisory practice, (7) recharge the supervisor through timely in-service programs, continuing education, and formal academic study, (8) require educational content and practice from colleges and universities that stimulate creative supervisory skills and improve job satisfaction, (9) respect the work of the supervisor and provide appropriate support to achieve success, (10) reconsider current supervisory models and expand opportunities for professional growth among staff, and (11) reshape the supervisory role from one of controller to facilitator and innovator.
A sandwich-designed temperature-gradient incubator for studies of microbial temperature responses.
Elsgaard, Lars; Jørgensen, Leif Wagner
2002-03-01
A temperature-gradient incubator (TGI) is described, which produces a thermal gradient over 34 aluminium modules (15x30x5 cm) intersected by 2-mm layers of partly insulating graphite foil (SigraFlex Universal). The new, sandwich-designed TGI has 30 rows of six replicate sample wells for incubation of 28-ml test tubes. An electric plate heats one end of the TGI, and the other end is cooled by thermoelectric Peltier elements in combination with a liquid cooling system. The TGI is equipped with 24 calibrated Pt-100 temperature sensors and insulated by polyurethane plates. A PC-operated SCADA (Supervisory Control And Data Acquisition) software (Genesis 4.20) is applied for temperature control using three advanced control loops. The precision of the TGI temperature measurements was better than +/-0.12 degrees C, and for a 0-40 degrees C gradient, the temperature at the six replicate sample wells varied less than +/-0.04 degrees C. Temperatures measured in incubated water samples closely matched the TGI temperatures, which showed a linear relationship to the sample row number. During operation for 8 days with a gradient of 0-40 degrees C, the temperature at the cold end was stable within +/-0.02 degrees C, while the temperatures at the middle and the warm end were stable within +/-0.08 degrees C (n=2370). Using the new TGI, it was shown that the fine-scale (1 degrees C) temperature dependence of S(o) oxidation rates in agricultural soil (0-29 degrees C) could be described by the Arrhenius relationship. The apparent activation energy (E(a)) for S(o) oxidation was 79 kJ mol(-1), which corresponded to a temperature coefficient (Q(10)) of 3.1. These data demonstrated that oxidation of S(o) in soil is strongly temperature-dependent. In conclusion, the new TGI allowed a detailed study of microbial temperature responses as it produced a precise, stable, and certifiable temperature gradient by the new and combined use of sandwich-design, thermoelectric cooling, and advanced control loops. The sandwich-design alone reduced the disadvantageous thermal gradient over individual sample wells by 56%.
2015-05-07
Yerkes, R.M., and Dodson, J.D. (1908). The relation of strength of stimulus to rapidity of habit -formation. Journal of comparative neurology and psychology 18, 459-482. ...the amount of mental effort exerted (Kahneman, 1973; Beatty & Lucero-Wagoner, 2000; Andreassi, 2007). The vast majority of these studies , however...of this initial study , the authors were interested in investigating whether pupillometry data collected in a realistic UAV supervisory control
Improvement of the linear polarization resistance method for testing steel corrosion inhibitors
NASA Astrophysics Data System (ADS)
Faritov, A. T.; Rozhdestvenskii, Yu. G.; Yamshchikova, S. A.; Minnikhanova, E. R.; Tyusenkov, A. S.
2016-11-01
The linear polarization resistance method is used to improve the technique of corrosion control in liquid conducting according to GOST 9.514-99 (General Corrosion and Aging Protection System. Corrosion Inhibitors for Metals in Water Systems. Electrochemical Method of Determining the Protective Ability). Corrosion monitoring is shown to be performed by electronic devices with real-time data transfer to industrial controllers and SCADA systems.
NASA Astrophysics Data System (ADS)
Asfoor, Mostafa
The gradual decline of oil reserves and the increasing demand for energy over the past decades has resulted in automotive manufacturers seeking alternative solutions to reduce the dependency on fossil-based fuels for transportation. A viable technology that enables significant improvements in the overall energy conversion efficiencies is the hybridization of conventional vehicle drive systems. This dissertation builds on prior hybrid powertrain development at the University of Idaho. Advanced vehicle models of a passenger car with a conventional powertrain and three different hybrid powertrain layouts were created using GT-Suite. These different powertrain models were validated against a variety of standard driving cycles. The overall fuel economy, energy consumption, and losses were monitored, and a comprehensive energy analysis was performed to compare energy sources and sinks. The GT-Suite model was then used to predict the formula hybrid SAE vehicle performance. Inputs to this model were a numerically predicted engine performance map, an electric motor torque curve, vehicle geometry, and road load parameters derived from a roll-down test. In this case study, the vehicle had a supervisory controller that followed a rule-based energy management strategy to insure a proper power split during hybrid mode operation. The supervisory controller parameters were optimized using discrete grid optimization method that minimized the total amount of fuel consumed during a specific urban driving cycle with an average speed of approximately 30 [mph]. More than a 15% increase in fuel economy was achieved by adding supervisory control and managing power split. The vehicle configuration without the supervisory controller displayed a fuel economy of 25 [mpg]. With the supervisory controller this rose to 29 [mpg]. Wider applications of this research include hybrid vehicle controller designs that can extend the range and survivability of military combat platforms. Furthermore, the GT-Suite model can be easily accommodated to simulate propulsion systems that store regenerative power when braking, making it available for acceleration and off-road maneuvering.
Intelligent voltage control strategy for three-phase UPS inverters with output LC filter
NASA Astrophysics Data System (ADS)
Jung, J. W.; Leu, V. Q.; Dang, D. Q.; Do, T. D.; Mwasilu, F.; Choi, H. H.
2015-08-01
This paper presents a supervisory fuzzy neural network control (SFNNC) method for a three-phase inverter of uninterruptible power supplies (UPSs). The proposed voltage controller is comprised of a fuzzy neural network control (FNNC) term and a supervisory control term. The FNNC term is deliberately employed to estimate the uncertain terms, and the supervisory control term is designed based on the sliding mode technique to stabilise the system dynamic errors. To improve the learning capability, the FNNC term incorporates an online parameter training methodology, using the gradient descent method and Lyapunov stability theory. Besides, a linear load current observer that estimates the load currents is used to exclude the load current sensors. The proposed SFNN controller and the observer are robust to the filter inductance variations, and their stability analyses are described in detail. The experimental results obtained on a prototype UPS test bed with a TMS320F28335 DSP are presented to validate the feasibility of the proposed scheme. Verification results demonstrate that the proposed control strategy can achieve smaller steady-state error and lower total harmonic distortion when subjected to nonlinear or unbalanced loads compared to the conventional sliding mode control method.
Supervisory control of (max,+) automata: extensions towards applications
NASA Astrophysics Data System (ADS)
Lahaye, Sébastien; Komenda, Jan; Boimond, Jean-Louis
2015-12-01
In this paper, supervisory control of (max,+) automata is studied. The synthesis of maximally permissive and just-in-time supervisor, as well as the synthesis of minimally permissive and just-after-time supervisor, are proposed. Results are also specialised to non-decreasing solutions, because only such supervisors can be realised in practice. The inherent issue of rationality raised recently is discussed. An illustration of concepts and results is presented through an example of a flexible manufacturing system.
The Supervisory Control System for the HL-2A Neutral Beam Injector
NASA Astrophysics Data System (ADS)
Li, Bo; Li, Li; Feng, Kun; Wang, Xueyun; Yang, Jiaxing; Huang, Zhihui; Kang, Zihua; Wang, Mingwei; Zhang, Guoqing; Lei, Guangjiu; Rao, Jun
2009-06-01
Supervisory control and protection system of the neutral beam injector (NBI) in the HL-2A tokamak is presented. The system is used for a safe coordination of all the main NBI subsystems. Because the system is based on computer networks with its transmission medium of optical fiber, its advantages in high operational stability, reliability, security and flexible functional expandability are clearly shown during the NBI commissioning and heating experiment in HL-2A.
Changing the Lines in the Coloring Book
2004-05-18
multitude of SCADA programmers creates a multitude of idiosyncratic programs, making it very difficult to know how to hack into large numbers of them...an observed pattern of hacking that would alert authorities seems not to have been discussed.) However, some SCADAs are not physically connected to the...normal hacking . Simultaneously, it would identify software vulnerabilities in other products and design viruses and worms for attacking them. (The
Hierarchical Discrete Event Supervisory Control of Aircraft Propulsion Systems
NASA Technical Reports Server (NTRS)
Yasar, Murat; Tolani, Devendra; Ray, Asok; Shah, Neerav; Litt, Jonathan S.
2004-01-01
This paper presents a hierarchical application of Discrete Event Supervisory (DES) control theory for intelligent decision and control of a twin-engine aircraft propulsion system. A dual layer hierarchical DES controller is designed to supervise and coordinate the operation of two engines of the propulsion system. The two engines are individually controlled to achieve enhanced performance and reliability, necessary for fulfilling the mission objectives. Each engine is operated under a continuously varying control system that maintains the specified performance and a local discrete-event supervisor for condition monitoring and life extending control. A global upper level DES controller is designed for load balancing and overall health management of the propulsion system.
NASA Astrophysics Data System (ADS)
Oswiecinska, A.; Hibbs, J.; Zajic, I.; Burnham, K. J.
2015-11-01
This paper presents conceptual control solution for reliable and energy efficient operation of heating, ventilation and air conditioning (HVAC) systems used in large volume building applications, e.g. warehouse facilities or exhibition centres. Advanced two-level scalable control solution, designed to extend capabilities of the existing low-level control strategies via remote internet connection, is presented. The high-level, supervisory controller is based on Model Predictive Control (MPC) architecture, which is the state-of-the-art for indoor climate control systems. The innovative approach benefits from using passive heating and cooling control strategies for reducing the HVAC system operational costs, while ensuring that required environmental conditions are met.
Experimental evaluation of the concept of supevisory manipulation
NASA Technical Reports Server (NTRS)
Brooks, T. L.; Sheridan, T. B.
1982-01-01
A computer-controlled teleoperator system which is based on task-referenced sensor-aided control has been developed to study supervisory manipulation. This system, called SUPERMAN, is capable of performing complicated tasks in real-time by utilizing the operator for high-level functions related to the unpredictable portions of a task, while the subordinate machine performs the more well-defined subtasks under human supervison. To determine whether supervisory control schemes such as these offer any advantage over manual control under real-time conditions, a number of experiments involving both simple and complicated tasks were performed. Six representative tasks were chosen for the study: (1) obtaining a tool from a rack, (2) returning the tool to the rack, (3) removing a nut, (4) placing samples in a storage bin, (5) opening and closing a valve, and (6) digging with a shovel. The experiments were performed under simulated conditions using four forms of manual control (i.e., switch rate, joystick rate, master-slave position control, and master-slave with force feedback), as well as supervisory control. Through these experiments the effectiveness and quality of control were evaluated on the basis of the time required to complete each portion of the task and the type and number of errors which occurred.
Discrete Event Supervisory Control Applied to Propulsion Systems
NASA Technical Reports Server (NTRS)
Litt, Jonathan S.; Shah, Neerav
2005-01-01
The theory of discrete event supervisory (DES) control was applied to the optimal control of a twin-engine aircraft propulsion system and demonstrated in a simulation. The supervisory control, which is implemented as a finite-state automaton, oversees the behavior of a system and manages it in such a way that it maximizes a performance criterion, similar to a traditional optimal control problem. DES controllers can be nested such that a high-level controller supervises multiple lower level controllers. This structure can be expanded to control huge, complex systems, providing optimal performance and increasing autonomy with each additional level. The DES control strategy for propulsion systems was validated using a distributed testbed consisting of multiple computers--each representing a module of the overall propulsion system--to simulate real-time hardware-in-the-loop testing. In the first experiment, DES control was applied to the operation of a nonlinear simulation of a turbofan engine (running in closed loop using its own feedback controller) to minimize engine structural damage caused by a combination of thermal and structural loads. This enables increased on-wing time for the engine through better management of the engine-component life usage. Thus, the engine-level DES acts as a life-extending controller through its interaction with and manipulation of the engine s operation.
Effects of Field Instructor Training on Student Competencies and the Supervisory Alliance
ERIC Educational Resources Information Center
Deal, Kathleen Holtz; Bennett, Susanne; Mohr, Jonathan; Hwang, Jeongha
2011-01-01
Objectives: This study of a field instructor (FI) training model, offered at two universities, focused on the relationship between student competencies, the supervisory alliance, and students' attachment styles. Method: The study used a pretest-posttest follow-up design of 100 randomly assigned FIs (training group = 48; control group = 52) and 64…
Auditory decision aiding in supervisory control of multiple unmanned aerial vehicles.
Donmez, Birsen; Cummings, M L; Graham, Hudson D
2009-10-01
This article is an investigation of the effectiveness of sonifications, which are continuous auditory alerts mapped to the state of a monitored task, in supporting unmanned aerial vehicle (UAV) supervisory control. UAV supervisory control requires monitoring a UAV across multiple tasks (e.g., course maintenance) via a predominantly visual display, which currently is supported with discrete auditory alerts. Sonification has been shown to enhance monitoring performance in domains such as anesthesiology by allowing an operator to immediately determine an entity's (e.g., patient) current and projected states, and is a promising alternative to discrete alerts in UAV control. However, minimal research compares sonification to discrete alerts, and no research assesses the effectiveness of sonification for monitoring multiple entities (e.g., multiple UAVs). The authors conducted an experiment with 39 military personnel, using a simulated setup. Participants controlled single and multiple UAVs and received sonifications or discrete alerts based on UAV course deviations and late target arrivals. Regardless of the number of UAVs supervised, the course deviation sonification resulted in reactions to course deviations that were 1.9 s faster, a 19% enhancement, compared with discrete alerts. However, course deviation sonifications interfered with the effectiveness of discrete late arrival alerts in general and with operator responses to late arrivals when supervising multiple vehicles. Sonifications can outperform discrete alerts when designed to aid operators to predict future states of monitored tasks. However, sonifications may mask other auditory alerts and interfere with other monitoring tasks that require divided attention. This research has implications for supervisory control display design.
The supervisory encounter and the senior GP trainee: managing for, through and with.
Brown, James; Nestel, Debra; Clement, Tim; Goldszmidt, Mark
2018-02-01
Help-seeking supervisory encounters provide important learning experiences for trainees preparing for independent practice. Although there is a body of expert opinion and theories on how supervisor encounters should happen, supporting empirical data are limited. This is particularly true for the senior general practice (GP) trainee. Without knowing what happens during these encounters, we cannot know how to maximise their educational potential. This study aimed to understand what happens when senior GP trainees call on their supervisor when caring for patients and how learning can be enhanced when this occurs. This is an analysis of data from a multi-case study of five GP supervisory pairs, each with a GP registrar and their supervisor. The data are recordings of 45 supervisory encounters, 78 post-encounter reflections and six interviews. We used Wenger's communities of practice theory and rhetorical genre theory as analytical lenses. The supervisory encounters followed a consistent format, which fitted the form of a genre. Within this genre, three dominant interactional patterns were identified, which we labelled 'managing for', 'managing through' and 'managing with'. Each pattern presented different opportunities and drew on different skills. The primary agenda was always developing a plan for the patient. Education agendas included acquiring knowledge, developing skills and achieving independence. Other agendas were issues of control, credibility and relationship building. Both supervisor and trainee could be purposeful in their supervisory engagement. For supervisors and trainees to achieve the educational potential of their supervisory encounters they require flexibility. This depends on understanding the genre of the supervisory encounter, the agendas at play, the options they have in engaging and having the skills to utilise these options. Educators can facilitate supervisors and trainees in acquiring this understanding and these skills. We recommend further research into the genre of the supervisory encounter. © 2017 John Wiley & Sons Ltd and The Association for the Study of Medical Education.
Cyber Security Testing and Training Programs for Industrial Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Daniel Noyes
2012-03-01
Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less
Testbeds for Assessing Critical Scenarios in Power Control Systems
NASA Astrophysics Data System (ADS)
Dondossola, Giovanna; Deconinck, Geert; Garrone, Fabrizio; Beitollahi, Hakem
The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility InfrastructurAL Resilience. The selected scenarios refer to power control systems encompassing information and communication security of SCADA systems for grid teleoperation, impact of attacks on inter-operator communications in power emergency conditions, impact of intentional faults on the secondary and tertiary control in power grids with distributed generators. Two testbeds have been developed for assessing the effect of the attacks and prototyping resilient architectures.
2013-12-01
21 a. Siberian Pipeline Explosion (1982) ............................21 b. Chevron Emergency Alert...the fifth domain: Are the mouse and keyboard the new weapons of conflict?,” The Economist, July 1, 2010, http://www.economist.com/node/16478792. 15...a. Siberian Pipeline Explosion (1982) In 1982, intruders planted a Trojan horse in the SCADA system that controls the Siberian Pipeline. This is the
Milestone Ratings and Supervisory Role Categorizations Swim Together, but is the Water Muddy?
Schumacher, Daniel J; Bartlett, Kathleen W; Elliott, Sean P; Michelson, Catherine; Sharma, Tanvi; Garfunkel, Lynn C; King, Beth; Schwartz, Alan
2018-06-17
This single specialty, multi-institutional study aimed to determine: 1) the association between milestone ratings for individual competencies and average milestone ratings (AMRs) and 2) the association between AMRs and recommended supervisory role categorizations made by individual clinical competency committee (CCC) members. During the 2015-16 academic year, CCC members at 14 pediatric residencies reported milestone ratings for 21 competencies and recommended supervisory role categories (may not supervise, may supervise in some settings, may supervise in all settings) for residents they reviewed. An exploratory factor analysis of competencies was conducted. The associations between individual competencies, the AMR, and supervisory role categorizations were determined by computing bivariate correlations. The relationship between AMRs and recommended supervisory role categorizations was examined using an ordinal mixed logistic regression model. 68/155 CCC members completed both milestone assignments and supervision categorizations for 451 residents. Factor analysis of individual competencies controlling for clustering of residents in raters and sites resulted in a single-factor solution (cumulative variance 0.75). All individual competencies had large positive correlations with the AMR (correlation coefficient: 0.84-0.93), except for two professionalism competencies (Prof1: 0.63 and Prof4: 0.65). When combined across training year and time points, the AMR and supervisory role categorization had a moderately positive correlation (0.56). This exploratory study identified a modest correlation between average milestone ratings and supervisory role categorization. Convergence of competencies on a single factor deserves further exploration, with possible rater effects warranting attention. Copyright © 2018. Published by Elsevier Inc.
Intelligent Rover Execution for Detecting Life in the Atacama Desert
NASA Technical Reports Server (NTRS)
Baskaran, Vijayakumar; Muscettola, Nicola; Rijsman, David; Plaunt, Chris; Fry, Chuck
2006-01-01
On-board supervisory execution is crucial for the deployment of more capable and autonomous remote explorers. Planetary science is considering robotic explorers operating for long periods of time without ground supervision while interacting with a changing and often hostile environment. Effective and robust operations require on-board supervisory control with a high level of awareness of the principles of functioning of the environment and of the numerous internal subsystems that need to be coordinated. We describe an on-board rover executive that was deployed on a rover as past of the "Limits of Life in the Atacama Desert (LITA)" field campaign sponsored by the NASA ASTEP program. The executive was built using the Intelligent Distributed Execution Architecture (IDEA), an execution framework that uses model-based and plan-based supervisory control of its fundamental computational paradigm. We present the results of the third field experiment conducted in the Atacama desert (Chile) in August - October 2005.
Direct adaptive control of wind energy conversion systems using Gaussian networks.
Mayosky, M A; Cancelo, I E
1999-01-01
Grid connected wind energy conversion systems (WECS) present interesting control demands, due to the intrinsic nonlinear characteristics of windmills and electric generators. In this paper a direct adaptive control strategy for WECS control is proposed. It is based on the combination of two control actions: a radial basis zfunction network-based adaptive controller, which drives the tracking error to zero with user specified dynamics, and a supervisory controller, based on crude bounds of the system's nonlinearities. The supervisory controller fires when the finite neural-network approximation properties cannot be guaranteed. The form of the supervisor control and the adaptation law for the neural controller are derived from a Lyapunov analysis of stability. The results are applied to a typical turbine/generator pair, showing the feasibility of the proposed solution.
Adaptive supervisory control of remote manipulation
NASA Technical Reports Server (NTRS)
Ferrell, W. R.
1977-01-01
The command language by which an operator exerts supervisory control over a general purpose remote manipulator should be designed to accommodate certain characteristics of human performance if there is to be effective communication between the operator and the machine. Some of the ways in which people formulate tasks, use language, learn and make errors are discussed and design implications are drawn. A general approach to command language design is suggested, based on the notion matching the operator's current task schema or context by appropriate program structures or 'frames' in the machine.
Modeling DNP3 Traffic Characteristics of Field Devices in SCADA Systems of the Smart Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Huan; Cheng, Liang; Chuah, Mooi Choo
In the generation, transmission, and distribution sectors of the smart grid, intelligence of field devices is realized by programmable logic controllers (PLCs). Many smart-grid subsystems are essentially cyber-physical energy systems (CPES): For instance, the power system process (i.e., the physical part) within a substation is monitored and controlled by a SCADA network with hosts running miscellaneous applications (i.e., the cyber part). To study the interactions between the cyber and physical components of a CPES, several co-simulation platforms have been proposed. However, the network simulators/emulators of these platforms do not include a detailed traffic model that takes into account the impactsmore » of the execution model of PLCs on traffic characteristics. As a result, network traces generated by co-simulation only reveal the impacts of the physical process on the contents of the traffic generated by SCADA hosts, whereas the distinction between PLCs and computing nodes (e.g., a hardened computer running a process visualization application) has been overlooked. To generate realistic network traces using co-simulation for the design and evaluation of applications relying on accurate traffic profiles, it is necessary to establish a traffic model for PLCs. In this work, we propose a parameterized model for PLCs that can be incorporated into existing co-simulation platforms. We focus on the DNP3 subsystem of slave PLCs, which automates the processing of packets from the DNP3 master. To validate our approach, we extract model parameters from both the configuration and network traces of real PLCs. Simulated network traces are generated and compared against those from PLCs. Our evaluation shows that our proposed model captures the essential traffic characteristics of DNP3 slave PLCs, which can be used to extend existing co-simulation platforms and gain further insights into the behaviors of CPES.« less
Integrity Verification for SCADA Devices Using Bloom Filters and Deep Packet Inspection
2014-03-27
prevent intrusions in smart grids [PK12]. Parthasarathy proposed an anomaly detection based IDS that takes into account system state. In his implementation...Security, 25(7):498–506, 10 2006. [LMV12] O. Linda, M. Manic, and T. Vollmer. Improving cyber-security of smart grid systems via anomaly detection and...6 2012. 114 [PK12] S. Parthasarathy and D. Kundur. Bloom filter based intrusion detection for smart grid SCADA. In Electrical & Computer Engineering
Analysis of synchronous and induction generators used at hydroelectric power plant
NASA Astrophysics Data System (ADS)
Diniş, C. M.; Popa, G. N.; lagăr, A.
2017-01-01
In this paper is presented an analysis of the operating electric generators (synchronous and induction) within a small capacity hydroelectric power plant. Such is treated the problem of monitoring and control hydropower plant using SCADA systems. Have been carried an experimental measurements in small hydropower plant for different levels of water in the lake and various settings of the operating parameters.
ERIC Educational Resources Information Center
Pelling, Nadine
2008-01-01
The relationship between supervisory identity development and supervisory experience, counseling experience, and training in supervision was examined for Association for Counselor Education and Supervision (ACES) members. Analyses indicated that supervisory experience and training were related to supervisory identity development, whilst counseling…
McKendrick, Ryan; Shaw, Tyler; de Visser, Ewart; Saqer, Haneen; Kidwell, Brian; Parasuraman, Raja
2014-05-01
Assess team performance within a net-worked supervisory control setting while manipulating automated decision aids and monitoring team communication and working memory ability. Networked systems such as multi-unmanned air vehicle (UAV) supervision have complex properties that make prediction of human-system performance difficult. Automated decision aid can provide valuable information to operators, individual abilities can limit or facilitate team performance, and team communication patterns can alter how effectively individuals work together. We hypothesized that reliable automation, higher working memory capacity, and increased communication rates of task-relevant information would offset performance decrements attributed to high task load. Two-person teams performed a simulated air defense task with two levels of task load and three levels of automated aid reliability. Teams communicated and received decision aid messages via chat window text messages. Task Load x Automation effects were significant across all performance measures. Reliable automation limited the decline in team performance with increasing task load. Average team spatial working memory was a stronger predictor than other measures of team working memory. Frequency of team rapport and enemy location communications positively related to team performance, and word count was negatively related to team performance. Reliable decision aiding mitigated team performance decline during increased task load during multi-UAV supervisory control. Team spatial working memory, communication of spatial information, and team rapport predicted team success. An automated decision aid can improve team performance under high task load. Assessment of spatial working memory and the communication of task-relevant information can help in operator and team selection in supervisory control systems.
Operational Performance Risk Assessment in Support of A Supervisory Control System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Denning, Richard S.; Muhlheim, Michael David; Cetiner, Sacit M.
Supervisory control system (SCS) is developed for multi-unit advanced small modular reactors to minimize human interventions in both normal and abnormal operations. In SCS, control action decisions made based on probabilistic risk assessment approach via Event Trees/Fault Trees. Although traditional PRA tools are implemented, their scope is extended to normal operations and application is reversed; success of non-safety related system instead failure of safety systems this extended PRA approach called as operational performance risk assessment (OPRA). OPRA helps to identify success paths, combination of control actions for transients and to quantify these success paths to provide possible actions without activatingmore » plant protection system. In this paper, a case study of the OPRA in supervisory control system is demonstrated within the context of the ALMR PRISM design, specifically power conversion system. The scenario investigated involved a condition that the feed water control valve is observed to be drifting to the closed position. Alternative plant configurations were identified via OPRA that would allow the plant to continue to operate at full or reduced power. Dynamic analyses were performed with a thermal-hydraulic model of the ALMR PRISM system using Modelica to evaluate remained safety margins. Successful recovery paths for the selected scenario are identified and quantified via SCS.« less
Application of the SCADA system in wastewater treatment plants.
Dieu, B
2001-01-01
The implementation of the SCADA system has a positive impact on the operations, maintenance, process improvement and savings for the City of Houston's Wastewater Operations branch. This paper will discuss the system's evolvement, the external/internal architecture, and the human-machine-interface graphical design. Finally, it will demonstrate the system's successes in monitoring the City's sewage and sludge collection/distribution systems, wet-weather facilities and wastewater treatment plants, complying with the USEPA requirements on the discharge, and effectively reducing the operations and maintenance costs.
Supervisory control of mobile sensor networks: math formulation, simulation, and implementation.
Giordano, Vincenzo; Ballal, Prasanna; Lewis, Frank; Turchiano, Biagio; Zhang, Jing Bing
2006-08-01
This paper uses a novel discrete-event controller (DEC) for the coordination of cooperating heterogeneous wireless sensor networks (WSNs) containing both unattended ground sensors (UGSs) and mobile sensor robots. The DEC sequences the most suitable tasks for each agent and assigns sensor resources according to the current perception of the environment. A matrix formulation makes this DEC particularly useful for WSN, where missions change and sensor agents may be added or may fail. WSN have peculiarities that complicate their supervisory control. Therefore, this paper introduces several new tools for DEC design and operation, including methods for generating the required supervisory matrices based on mission planning, methods for modifying the matrices in the event of failed nodes, or nodes entering the network, and a novel dynamic priority assignment weighting approach for selecting the most appropriate and useful sensors for a given mission task. The resulting DEC represents a complete dynamical description of the WSN system, which allows a fast programming of deployable WSN, a computer simulation analysis, and an efficient implementation. The DEC is actually implemented on an experimental wireless-sensor-network prototyping system. Both simulation and experimental results are presented to show the effectiveness and versatility of the developed control architecture.
Sixteenth Annual Conference on Manual Control
NASA Technical Reports Server (NTRS)
1982-01-01
Manual control is discussed in terms of operator modeling, measurement of human response, mental workload, pilot/operator opinion, effects of motion, aircraft displays, supervisory control, automobile driving, and remote manipulation.
View southeast of main supervisory board showing panels 3 through ...
View southeast of main supervisory board showing panels 3 through 11; panel 3 at far left contains meters for monitoring power in the system; panel 4 contains controls for controlling heaters to keep track twitches free of ice and snow; panels 5, 6, and 7 date to the 1935 installation and control the catenary in the area of the station yard. These work on 120 volts direct current; panel 8 contains circuit breakers (rupture switches) which control power to individual tracks in the station area; panels 9 and 10 house controls for the West Philadelphia sub-station; panel 11 controls sub-station 13 in South Wilmington Delaware and miscellaneous meters - Thirtieth Street Station, Power Director Center, Thirtieth & Market Streets in Amtrak Railroad Station, Philadelphia, Philadelphia County, PA
Computer aided control of a mechanical arm
NASA Technical Reports Server (NTRS)
Derocher, W. L., Jr.; Zermuehlen, r. O.
1979-01-01
A method for computer-aided remote control of a six-degree-of-freedom manipulator arm involved in the on-orbit servicing of a spacecraft is presented. The control configuration features a supervisory type of control in which each of the segments of a module exchange trajectory is controlled automatically under human supervision, with manual commands to proceed to the next step and in the event of a failure or undesirable outcome. The implementation of the supervisory system is discussed in terms of necessary onboard and ground- or Orbiter-based hardware and software, and a one-g demonstration system built to allow further investigation of system operation is described. Possible applications of the system include the construction of satellite solar power systems, environmental testing and the control of heliostat solar power stations.
Code of Federal Regulations, 2012 CFR
2012-01-01
... supervisory schedules for leader and supervisory wage employees in the Puerto Rico wage area. 532.261 Section... schedules for leader and supervisory wage employees in the Puerto Rico wage area. (a) The Department of... the Puerto Rico wage area. (c) The step 2 rate for the supervisory wage schedule shall be: (1) For...
Code of Federal Regulations, 2014 CFR
2014-01-01
... supervisory schedules for leader and supervisory wage employees in the Puerto Rico wage area. 532.261 Section... schedules for leader and supervisory wage employees in the Puerto Rico wage area. (a) The Department of... the Puerto Rico wage area. (c) The step 2 rate for the supervisory wage schedule shall be: (1) For...
Code of Federal Regulations, 2011 CFR
2011-01-01
... supervisory schedules for leader and supervisory wage employees in the Puerto Rico wage area. 532.261 Section... schedules for leader and supervisory wage employees in the Puerto Rico wage area. (a) The Department of... the Puerto Rico wage area. (c) The step 2 rate for the supervisory wage schedule shall be: (1) For...
Code of Federal Regulations, 2010 CFR
2010-01-01
... supervisory schedules for leader and supervisory wage employees in the Puerto Rico wage area. 532.261 Section... schedules for leader and supervisory wage employees in the Puerto Rico wage area. (a) The Department of... the Puerto Rico wage area. (c) The step 2 rate for the supervisory wage schedule shall be: (1) For...
Code of Federal Regulations, 2013 CFR
2013-01-01
... supervisory schedules for leader and supervisory wage employees in the Puerto Rico wage area. 532.261 Section... schedules for leader and supervisory wage employees in the Puerto Rico wage area. (a) The Department of... the Puerto Rico wage area. (c) The step 2 rate for the supervisory wage schedule shall be: (1) For...
Simulation of wake effects between two wind farms
NASA Astrophysics Data System (ADS)
Hansen, K. S.; Réthoré, P.-E.; Palma, J.; Hevia, B. G.; Prospathopoulos, J.; Peña, A.; Ott, S.; Schepers, G.; Palomares, A.; van der Laan, M. P.; Volker, P.
2015-06-01
SCADA data, recorded on the downstream wind farm, has been used to identify flow cases with visible clustering effects. The inflow condition is derived from a partly undisturbed wind turbine, due to lack of mast measurements. The SCADA data analysis concludes that centre of the deficit for the downstream wind farm with disturbed inflow has a distinct visible maximum deficit zone located only 5-10D downstream from the entrance. This zone, representing 20-30% speed reduction, increases and moves downstream for increasing cluster effect and is not visible outside a flow sector of 20-30°. The eight flow models represented in this benchmark include both RANS models, mesoscale models and engineering models. The flow cases, identified according to the wind speed level and inflow sector, have been simulated and validated with the SCADA results. The model validation concludes that all models more or less are able to predict the location and size of the deficit zone inside the downwind wind farm.
NASA Astrophysics Data System (ADS)
Molnar, John Alexander
In an effort to improve instruction and student learning, school reform efforts have become prevalent. School reformers have examined many aspects of the school experience, including learning theories such as behaviorism and constructivism, the changing roles of teachers and supervisors, and even the concept of the school itself. The theoretical framework for this study centered around constructivist learning theory. The study itself focused on the application of constructivist learning theory to the supervisory process. The study examined five areas of interest: (a) teachers' perceptions of constructivist supervisory behavior; (b) teachers' perceptions of efficacy and control in the classroom; (c) teachers' perceptions of school climate; (d) teachers' perceptions of job satisfaction, and (e) the influences of each of the aforementioned on student proficiency in mathematics, reading, and science. Data for the study was drawn from the first follow-up survey of the National Educational Longitudinal Study of 1988 (NELS: 88). NELS: 88 investigated a wide variety of factors that influence the educational process. The first follow-up focuses on environmental factors that affect teachers and students. Variables were selected from the NELS:88 data set that represented the areas to be examined. Factor analysis and correlational analysis were applied to ensure that the variables were measuring distinct constructs and to determine ways they could be grouped for analysis. Multiple linear regression analysis was applied to determine relationships among the individual and composite variables, controlling for student and teacher demographic factors. The results of the study suggest that varying relationships do exist between constructivist supervisory practices and the constructs measuring school climate and job satisfaction. The results also suggest that varying relationships exist between each of these factors and student proficiency in mathematics, reading, and science. Specifically, school climate, job satisfaction, and student proficiency were influenced by constructivist supervisory practices that included teachers' freedom to experiment with teaching and teachers' control over texts and materials.
Energy measurement using flow computers and chromatography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beeson, J.
1995-12-01
Arkla Pipeline Group (APG), along with most transmission companies, went to electronic flow measurement (EFM) to: (1) Increase resolution and accuracy; (2) Real time correction of flow variables; (3) Increase speed in data retrieval; (4) Reduce capital expenditures; and (5) Reduce operation and maintenance expenditures Prior to EFM, mechanical seven day charts were used which yielded 800 pressure and differential pressure readings. EFM yields 1.2-million readings, a 1500 time improvement in resolution and additional flow representation. The total system accuracy of the EFM system is 0.25 % compared with 2 % for the chart system which gives APG improved accuracy.more » A typical APG electronic measurement system includes a microprocessor-based flow computer, a telemetry communications package, and a gas chromatograph. Live relative density (specific gravity), BTU, CO{sub 2}, and N{sub 2} are updated from the chromatograph to the flow computer every six minutes which provides accurate MMBTU computations. Because the gas contract length has changed from years to monthly and from a majority of direct sales to transports both Arkla and its customers wanted access to actual volumes on a much more timely basis than is allowed with charts. The new electronic system allows volumes and other system data to be retrieved continuously, if EFM is on Supervisory Control and Data Acquisition (SCADA) or daily if on dial up telephone. Previously because of chart integration, information was not available for four to six weeks. EFM costs much less than the combined costs of telemetry transmitters, pressure and differential pressure chart recorders, and temperature chart recorder which it replaces. APG will install this equipment on smaller volume stations at a customers expense. APG requires backup measurement on metering facilities this size. It could be another APG flow computer or chart recorder, or the other companies flow computer or chart recorder.« less
Developing operator capacity estimates for supervisory control of autonomous vehicles.
Cummings, M L; Guerlain, Stephanie
2007-02-01
This study examined operators' capacity to successfully reallocate highly autonomous in-flight missiles to time-sensitive targets while performing secondary tasks of varying complexity. Regardless of the level of autonomy for unmanned systems, humans will be necessarily involved in the mission planning, higher level operation, and contingency interventions, otherwise known as human supervisory control. As a result, more research is needed that addresses the impact of dynamic decision support systems that support rapid planning and replanning in time-pressured scenarios, particularly on operator workload. A dual screen simulation that allows a single operator the ability to monitor and control 8, 12, or 16 missiles through high level replanning was tested on 42 U.S. Navy personnel. The most significant finding was that when attempting to control 16 missiles, participants' performance on three separate objective performance metrics and their situation awareness were significantly degraded. These results mirror studies of air traffic control that demonstrate a similar decline in performance for controllers managing 17 aircraft as compared with those managing only 10 to 11 aircraft. Moreover, the results suggest that a 70% utilization (percentage busy time) score is a valid threshold for predicting significant performance decay and could be a generalizable metric that can aid in manning predictions. This research is relevant to human supervisory control of networked military and commercial unmanned vehicles in the air, on the ground, and on and under the water.
NASA Technical Reports Server (NTRS)
Lohr, Gary W.; Williams, Daniel M.; Trujillo, Anna C.; Johnson, Edward J.; Domino, David A.
2008-01-01
A concept focusing on wind dependent departure operations has been developed the current version of this concept is called the Wake Turbulence Mitigation for Departures (WTMD). This concept takes advantage the fact that cross winds of sufficient velocity blow wakes generated by "heavy" and B757 category aircraft on the downwind runway away from the upwind runway. Supervisory Air Traffic Controllers would be responsible for authorization of the Procedure. An investigation of the information requirements necessary to for Supervisors to approve monitor and terminate the Procedure was conducted. Results clearly indicated that the requisite information is currently available in air traffic control towers and that additional information was not required.
Carrasco, Juan A; Dormido, Sebastián
2006-04-01
The use of industrial control systems in simulators facilitates the execution of engineering activities related with the installation and the optimization of the control systems in real plants. "Industrial control system" intends to be a valid term that would represent all the control systems which can be installed in an industrial plant, ranging from complex distributed control systems and SCADA packages to small single control devices. This paper summarizes the current alternatives for the development of simulators of industrial plants and presents an analysis of the process of integrating an industrial control system into a simulator, with the aim of helping in the installation of real control systems in simulators.
Algorithmic network monitoring for a modern water utility: a case study in Jerusalem.
Armon, A; Gutner, S; Rosenberg, A; Scolnicov, H
2011-01-01
We report on the design, deployment, and use of TaKaDu, a real-time algorithmic Water Infrastructure Monitoring solution, with a strong focus on water loss reduction and control. TaKaDu is provided as a commercial service to several customers worldwide. It has been in use at HaGihon, the Jerusalem utility, since mid 2009. Water utilities collect considerable real-time data from their networks, e.g. by means of a SCADA system and sensors measuring flow, pressure, and other data. We discuss how an algorithmic statistical solution analyses this wealth of raw data, flexibly using many types of input and picking out and reporting significant events and failures in the network. Of particular interest to most water utilities is the early detection capability for invisible leaks, also a means for preventing large visible bursts. The system also detects sensor and SCADA failures, various water quality issues, DMA boundary breaches, unrecorded or unintended network changes (like a valve or pump state change), and other events, including types unforeseen during system design. We discuss results from use at HaGihon, showing clear operational value.
Adopting Industry Standards for Control Systems Within Advanced Life Support
NASA Technical Reports Server (NTRS)
Young, James Scott; Boulanger, Richard
2002-01-01
This paper gives a description of OPC (Object Linking and Embedding for Process Control) standards for process control and outlines the experiences at JSC with using these standards to interface with I/O hardware from three independent vendors. The I/O hardware was integrated with a commercially available SCADA/HMI software package to make up the control and monitoring system for the Environmental Systems Test Stand (ESTS). OPC standards were utilized for communicating with I/O hardware and the software was used for implementing monitoring, PC-based distributed control, and redundant data storage over an Ethernet physical layer using an embedded din-rail mounted PC.
Supervisory control of drilling of composite materials
NASA Astrophysics Data System (ADS)
Ozaki, Motoyoshi
Composite materials have attractive features, such as high ratios of strength-to-weight and stiffness-to-weight. However, they are easily damaged when they are machined. A typical damage is delamination, which can occur when fiber reinforced composite laminates are drilled. The objective of this research is to study the drilling processes of carbon fiber reinforced laminates, and to develop and test a supervisory control strategy for their delamination-free drilling. Characterization of thrust force and torque is achieved through constant feedrate drilling experiments. The average values of thrust force and torque during the full engagement of the drill are utilized to obtain the Shaw's equations' parameters. The thrust force profile just before exit is given special attention. The Hocheng-Dharan equations, which give conservative values of delamination at the entrance and at the exit, are modified to express the influence of one lamina thickness explicitly. They are utilized not only for the characterization of thrust force but also for the determination of the thrust force reference for force control. In the design of the controllers of thrust force and torque, both thrust force and torque are assumed to be proportional to FPHR (Feed Per Half Revolution). A discrete-time dynamic model is established for the case when the time interval for a half revolution of the drill is divided by the sampling time, and the model is extended to the case of general spindle speeds. PI controllers are designed for the dynamic models of thrust force and torque. Root-locus techniques are used in the analysis. The phases of the drilling process are introduced and the control strategy at each phase is explained. The supervisory controller chooses not only the best control strategy for each phase, but also the reference value and the controller gain that are suitable at each drill position. Drilling experiments are conducted to show the usefulness of the concepts introduced in this dissertation, and to give an example of installing the control parameters, which were derived from data obtained in this research, on the supervisory controller. Efficient Delamination-free drilling is given special emphasis in the experiments.
12 CFR 1732.10 - Supervisory action.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Supervisory action. 1732.10 Section 1732.10... DEVELOPMENT SAFETY AND SOUNDNESS RECORD RETENTION Supervisory Action § 1732.10 Supervisory action. (a) Supervisory action. Failure by an Enterprise to comply with this part may subject the Enterprise or the board...
Proceedings, 13th Annual Conference on Manual Control
NASA Technical Reports Server (NTRS)
1977-01-01
Theoretical aspects of manual control theory are discussed. Specific topics covered include: tracking; performance, attention allocation, and mental load; surface vehicle control; monitoring behavior and supervisory control; manipulators and prosthetics; aerospace vehicle control; motion and visual cues; and displays and controls.
Part-task vs. whole-task training on a supervisory control task
NASA Technical Reports Server (NTRS)
Battiste, Vernol
1987-01-01
The efficacy of a part-task training for the psychomotor portion of a supervisory control simulation was compared to that of the whole-task training, using six subjects in each group, who were asked to perform a task as quickly as possible. Part-task training was provided with the cursor-control device prior to transition to the whole-task. The analysis of both the training and experimental trials demonstrated a significant performance advantage for the part-task group: the tasks were performed better and at higher speed. Although the subjects finally achieved the same level of performance in terms of score, the part-task method was preferable for economic reasons, since simple pretraining systems are significantly less expensive than the whole-task training systems.
US-CERT Control System Center Input/Output (I/O) Conceputal Design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2005-02-01
This document was prepared for the US-CERT Control Systems Center of the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs the federal departments to identify and prioritize critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the NCSD to address the control system security component addressed in the National Strategy to Secure Cyberspace andmore » the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems; the I/O upgrade described in this document supports these goals. The vulnerability assessment Test Bed, located in the Information Operations Research Center (IORC) facility at Idaho National Laboratory (INL), consists of a cyber test facility integrated with multiple test beds that simulate the nation's critical infrastructure. The fundamental mission of the Test Bed is to provide industry owner/operators, system vendors, and multi-agency partners of the INL National Security Division a platform for vulnerability assessments of control systems. The Input/Output (I/O) upgrade to the Test Bed (see Work Package 3.1 of the FY-05 Annual Work Plan) will provide for the expansion of assessment capabilities within the IORC facility. It will also provide capabilities to connect test beds within the Test Range and other Laboratory resources. This will allow real time I/O data input and communication channels for full replications of control systems (Process Control Systems [PCS], Supervisory Control and Data Acquisition Systems [SCADA], and components). This will be accomplished through the design and implementation of a modular infrastructure of control system, communications, networking, computing and associated equipment, and measurement/control devices. The architecture upgrade will provide a flexible patching system providing a quick ''plug and play''configuration through various communication paths to gain access to live I/O running over specific protocols. This will allow for in-depth assessments of control systems in a true-to-life environment. The full I/O upgrade will be completed through a two-phased approach. Phase I, funded by DHS, expands the capabilities of the Test Bed by developing an operational control system in two functional areas, the Science & Technology Applications Research (STAR) Facility and the expansion of various portions of the Test Bed. Phase II (see Appendix A), funded by other programs, will complete the full I/O upgrade to the facility.« less
Hamilton, Ryan; Tamminana, Krishna; Boyd, John; Sasaki, Gen; Toda, Alex; Haskell, Sid; Danbe, Elizabeth
2013-04-01
We present a software platform developed by Genentech and MathWorks Consulting Group that allows arbitrary MATLAB (MATLAB is a registered trademark of The MathWorks, Inc.) functions to perform supervisory control of process equipment (in this case, fermentors) via the OLE for process control (OPC) communication protocol, under the direction of an industrial automation layer. The software features automated synchronization and deployment of server control code and has been proven to be tolerant of OPC communication interruptions. Since deployment in the spring of 2010, this software has successfully performed supervisory control of more than 700 microbial fermentations in the Genentech pilot plant and has enabled significant reductions in the time required to develop and implement novel control strategies (months reduced to days). The software is available for download at the MathWorks File Exchange Web site at http://www.mathworks.com/matlabcentral/fileexchange/36866.
Fitchett, George; Altenbaumer, Mary L; Atta, Osofo Kwesi; Stowman, Sheryl Lyndes; Vlach, Kyle
2014-12-01
Revisions to the processes for training and certifying supervisors continue to be debated within the Association for Clinical Pastoral Education (ACPE). In 2012 Ragsdale and colleagues published, "Mutually engaged supervisory processes," a qualitative research study utilizing grounded theory based on interviews with 19 recently certified Associate CPE Supervisors, of nine components that facilitate the development of CPE supervisory education students. In this article we critically engage this theory and the research upon which it is based. We also reflect on three issues highlighted by the theory: personal transformation in CPE supervisory education, how CPE supervisory education students develop theoretical foundations for their work, and engaging multicultural issues in supervisory education. We conclude that this theory offers ACPE the possibility of using research to guide future modifications to its practice of Supervisory education. © 2014 Journal of Pastoral Care Publications Inc.
Modeling And Detecting Anomalies In Scada Systems
NASA Astrophysics Data System (ADS)
Svendsen, Nils; Wolthusen, Stephen
The detection of attacks and intrusions based on anomalies is hampered by the limits of specificity underlying the detection techniques. However, in the case of many critical infrastructure systems, domain-specific knowledge and models can impose constraints that potentially reduce error rates. At the same time, attackers can use their knowledge of system behavior to mask their manipulations, causing adverse effects to observed only after a significant period of time. This paper describes elementary statistical techniques that can be applied to detect anomalies in critical infrastructure networks. A SCADA system employed in liquefied natural gas (LNG) production is used as a case study.
NASA Technical Reports Server (NTRS)
Ganzy, Ethan G.
2014-01-01
All devices attached to the NASA KSC network are subject to security vulnerability scanning and/or penetration testing. In today's changing environment, vulnerable and/or unprotected systems can easily be overlooked. Systems that are not properly managed can become a potential threat to the operational integrity of our systems and networks. This includes all NASA (internal and external) information systems within NASA KSC Internet Protocol (IP) address space, and NASA KSC facilities. The Office of the Chief Information Officer (OCIO) recommends that all NASA Centers and information systems be subject to penetration testing on a regular interval in accordance with the guidelines identified by the National Institute of Standards and Technology (NIST). (ITS-HBK-2810.04-02A) Protecting information and equipment at NASA is an area of increasing concern. In addition to the CPU's on the network; Supervisory, Control and Data Acquisition (SCADA) systems are especially vulnerable because these systems have lacked standards, use embedded controllers with little computational power and informal software, are connected to physical processes, have few operators, and are increasingly also being connected to corporate networks. The scope of work is comprised of several individual components which together build upon previous work by Drew Branch, NASA KSC Intern. The Pwn Plug is the selected COTS (Commercial-Off-The-Shelf) device chosen to test simplification of mandatory IT Security tasks. The device will be utilized to provide services to NASA KSC and enable an assessment of infrastructure soundness and regulatory compliance in an efficient, economical, and business responsive manner. The Pwn Plug is designed as a pen testing appliance which provides a hardware platform that can support commercial penetration testing efforts at significantly reduced costs. The expected outcomes are: 1) External Penetration Testing, 2) Social Engineering, 3) Procedural Documentation, 4) Recommended Remediation Action Plan, 5) System Retest & Remediation Attestation and 6) Final Reports, out briefing and Presentation. Due to physical and material constraints beyond intern and mentor control, the project was redefined as a working pen-test scenario. Limitations of lab availability and tools dictated an academic exercise. This report was developed within the scenario guidelines suggested by the project mentor. The guidelines were to be creative in developing a Pen Test program for a client.
NASA Astrophysics Data System (ADS)
Li, Dazhi; Hendricks-Franssen, Harrie-Jan; Han, Xujun; Jiménez Bello, Miguel Angel; Martínez Alzamora, Fernando; Vereecken, Harry
2017-04-01
Irrigated agriculture accounts worldwide for 40% of food production and 70% of fresh water withdrawals. Irrigation scheduling aims to minimize water use while maintaining the agricultural production. In this study we were concerned with the real-time automatic control of irrigation, which calculates daily water allocation by combining information from soil moisture sensors and a land surface model. The combination of soil moisture measurements and predictions by the Community Land Model (CLM) using sequential data assimilation (DA) is a promising alternative to improve the estimate of soil and plant water status. The LETKF (Local Ensemble Transform Kalman Filter) was chosen to assimilate soil water content measured by FDR (Frequency Domain Reflectometry) into CLM and improve the initial (soil moisture) conditions for the next model run. In addition, predictions by the GFS (Global Forecast System) atmospheric simulation model were used as atmospheric input data for CLM to predict an ensemble of possible soil moisture evolutions for the next days. The difference between predicted and target soil water content is defined as the water deficit, and the irrigation amount was calculated by the integrated water deficit over the root zone. The corresponding irrigation time to apply the required water was introduced in SCADA (supervisory control and data acquisition system) for each citrus field. In total 6 fields were irrigated according our optimization approach including data assimilation (CLM-DA) and there were also 2 fields following the FAO (Food and Agriculture Organization) water balance method and 4 fields controlled by farmers as reference. During the real-time irrigation campaign in Valencia from July to October in 2015 and June to October in 2016, the applied irrigation amount, stem water potential and soil moisture content were recorded. The data indicated that 5% 20% less irrigation water was needed for the CLM-DA scheduled fields than for the other fields following the FAO or farmers' method. Stem water potential data indicated that the CLM-DA fields were not suffering from water stress during most of the irrigation period. Even though the CLM-DA fields received the least irrigation water, the orange production was not suppressed either. Our results show the water saving potential of the CLM-DA method compared to other traditional irrigation methods.
The 3D model control of image processing
NASA Technical Reports Server (NTRS)
Nguyen, An H.; Stark, Lawrence
1989-01-01
Telerobotics studies remote control of distant robots by a human operator using supervisory or direct control. Even if the robot manipulators has vision or other senses, problems arise involving control, communications, and delay. The communication delays that may be expected with telerobots working in space stations while being controlled from an Earth lab have led to a number of experiments attempting to circumvent the problem. This delay in communication is a main motivating factor in moving from well understood instantaneous hands-on manual control to less well understood supervisory control; the ultimate step would be the realization of a fully autonomous robot. The 3-D model control plays a crucial role in resolving many conflicting image processing problems that are inherent in resolving in the bottom-up approach of most current machine vision processes. The 3-D model control approach is also capable of providing the necessary visual feedback information for both the control algorithms and for the human operator.
NASA Astrophysics Data System (ADS)
Gu, Fei; Brouwer, Jack; Samuelsen, Scott
2013-09-01
Recent advances in inverter technology have enabled ancillary services such as volt/VAR regulation, SCADA communications, and active power filtering. Smart inverters can not only provide real power, but can be controlled to use excess capacity to provide reactive power compensation, power flow control, and active power filtering without supplementary inverter hardware. A transient level inverter model based on the Solectria 7700 inverter is developed and used to assess these control strategies using field data from an existing branch circuit containing two Amonix 68kW CPV-7700 systems installed at the University of California, Irvine.
Code of Federal Regulations, 2010 CFR
2010-01-01
... available to supervised financial institutions and financial institution supervisory agencies. 261.20... Supervised Institutions, Financial Institution Supervisory Agencies, Law Enforcement Agencies, and Others in Certain Circumstances § 261.20 Confidential supervisory information made available to supervised financial...
Hierarchical fuzzy control of low-energy building systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yu, Zhen; Dexter, Arthur
2010-04-15
A hierarchical fuzzy supervisory controller is described that is capable of optimizing the operation of a low-energy building, which uses solar energy to heat and cool its interior spaces. The highest level fuzzy rules choose the most appropriate set of lower level rules according to the weather and occupancy information; the second level fuzzy rules determine an optimal energy profile and the overall modes of operation of the heating, ventilating and air-conditioning system (HVAC); the third level fuzzy rules select the mode of operation of specific equipment, and assign schedules to the local controllers so that the optimal energy profilemore » can be achieved in the most efficient way. Computer simulation is used to compare the hierarchical fuzzy control scheme with a supervisory control scheme based on expert rules. The performance is evaluated by comparing the energy consumption and thermal comfort. (author)« less
A Measurement and Power Line Communication System Design for Renewable Smart Grids
NASA Astrophysics Data System (ADS)
Kabalci, E.; Kabalci, Y.
2013-10-01
The data communication over the electric power lines can be managed easily and economically since the grid connections are already spread around all over the world. This paper investigates the applicability of Power Line Communication (PLC) in an energy generation system that is based on photovoltaic (PV) panels with the modeling study in Matlab/Simulink. The Simulink model covers the designed PV panels, boost converter with Perturb and Observe (P&O) control algorithm, full bridge inverter, and the binary phase shift keying (BPSK) modem that is utilized to transfer the measured data over the power lines. This study proposes a novel method to use the electrical power lines not only for carrying the line voltage but also to transmit the measurements of the renewable energy generation plants. Hence, it is aimed at minimizing the additional monitoring costs such as SCADA, Ethernet-based or GSM based systems by using the proposed technique. Although this study is performed with solar power plants, the proposed model can be applied to other renewable generation systems. Consequently, the usage of the proposed technique instead of SCADA or Ethernet-based systems eliminates additional monitoring costs.
Supervisory Options for Instructional Leaders in Education
ERIC Educational Resources Information Center
Fritz, Carrie; Miller, Greg
2003-01-01
The principal purpose of this article was to identify supervisory approaches available to instructional leaders in education. Selected supervisory approaches served as the basis for creating the Supervisory Options for Instructional Leaders (SOIL) Model. Instructional leaders in a variety of educational settings could use this model. The SOIL…
Man-Machine Communication in Remote Manipulation: Task-Oriented Supervisory Command Language (TOSC).
1980-03-01
ORIENTED SUPERVISORY CONTROL SYSTEM METHODOLOGY 3-1 3.1 Overview 3-1 3.2 Background 3-3 3.2.1 General 3-3 3.2.2 Preliminary Principles of Command Language...Design 3-4 3.2.3 Preliminary Principles of Feedback Display Design 3-9 3.3 Man-Machine Communication Models 3-12 3.3.1 Background 3-12 3.3.2 Adapted...and feedback mode. The work ends with the presentation of a performance prediction model and a set of principles and guidelines, applicable to the
12 CFR 715.7 - Supervisory Committee audit alternatives to a financial statement audit.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Supervisory Committee audit alternatives to a financial statement audit. 715.7 Section 715.7 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SUPERVISORY COMMITTEE AUDITS AND VERIFICATIONS § 715.7 Supervisory...
32 CFR 776.53 - Responsibilities of the Judge Advocate General and supervisory attorneys.
Code of Federal Regulations, 2010 CFR
2010-07-01
... of the Judge Advocate General and supervisory attorneys. (a) Responsibilities of the Judge Advocate General and supervisory attorneys. (1) The JAG and supervisory attorneys shall make reasonable efforts to... 32 National Defense 5 2010-07-01 2010-07-01 false Responsibilities of the Judge Advocate General...
32 CFR 516.16 - Individual and supervisory procedures upon commencement of legal proceedings.
Code of Federal Regulations, 2013 CFR
2013-07-01
... litigation. (b) Supervisory procedures. When supervisors learn that legal proceedings in which the United... 32 National Defense 3 2013-07-01 2013-07-01 false Individual and supervisory procedures upon... to HQDA § 516.16 Individual and supervisory procedures upon commencement of legal proceedings. (a...
32 CFR 516.16 - Individual and supervisory procedures upon commencement of legal proceedings.
Code of Federal Regulations, 2012 CFR
2012-07-01
... litigation. (b) Supervisory procedures. When supervisors learn that legal proceedings in which the United... 32 National Defense 3 2012-07-01 2009-07-01 true Individual and supervisory procedures upon... to HQDA § 516.16 Individual and supervisory procedures upon commencement of legal proceedings. (a...
32 CFR 516.16 - Individual and supervisory procedures upon commencement of legal proceedings.
Code of Federal Regulations, 2014 CFR
2014-07-01
... litigation. (b) Supervisory procedures. When supervisors learn that legal proceedings in which the United... 32 National Defense 3 2014-07-01 2014-07-01 false Individual and supervisory procedures upon... to HQDA § 516.16 Individual and supervisory procedures upon commencement of legal proceedings. (a...
30 CFR 77.1703 - First-Aid training; supervisory employees.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 30 Mineral Resources 1 2010-07-01 2010-07-01 false First-Aid training; supervisory employees. 77... UNDERGROUND COAL MINES Miscellaneous § 77.1703 First-Aid training; supervisory employees. The mine operator shall conduct first-aid training courses for selected supervisory employees at the mine. Within 60 days...
12 CFR 1233.6 - Supervisory action.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Supervisory action. 1233.6 Section 1233.6 Banks... INSTRUMENTS § 1233.6 Supervisory action. Failure by a regulated entity to comply with this part may subject the regulated entity or the board members, officers, or employees thereof to supervisory action by...
Supervisory autonomous local-remote control system design: Near-term and far-term applications
NASA Technical Reports Server (NTRS)
Zimmerman, Wayne; Backes, Paul
1993-01-01
The JPL Supervisory Telerobotics Laboratory (STELER) has developed a unique local-remote robot control architecture which enables management of intermittent bus latencies and communication delays such as those expected for ground-remote operation of Space Station robotic systems via the TDRSS communication platform. At the local site, the operator updates the work site world model using stereo video feedback and a model overlay/fitting algorithm which outputs the location and orientation of the object in free space. That information is relayed to the robot User Macro Interface (UMI) to enable programming of the robot control macros. The operator can then employ either manual teleoperation, shared control, or supervised autonomous control to manipulate the object under any degree of time-delay. The remote site performs the closed loop force/torque control, task monitoring, and reflex action. This paper describes the STELER local-remote robot control system, and further describes the near-term planned Space Station applications, along with potential far-term applications such as telescience, autonomous docking, and Lunar/Mars rovers.
2015-09-17
network intrusion detection systems NIST National Institute of Standards and Technology p-tree protocol tree PI protocol informatics PLC programmable logic...electrical, water, oil , natural gas, manufacturing, and pharmaceutical industries, to name a few. The differences between SCADA and DCS systems are often... Oil Company, also known as Saudi Aramco, suffered huge data loss that resulted in the disruption of daily operations for nearly two weeks [BTR13]. As it
Snyder, Susan M; Merritt, Darcey H
2015-01-01
This study is the first to explore how child supervisory neglect influences patterns of substance use among young adults. This study investigated patterns of substance use among males and females, 18 to 24 years old, after controlling for adolescent parental drinking, living with parents, relationship status, delinquency, and depression. The study sample (N=10,618) included individuals who participated in Waves I (1994-1995) and III (2001-2002) of the National Longitudinal Study of Adolescent Health (Add Health). The study used latent class analysis to ascertain how patterns of substance use emerged as distinct classes. For both males and females, we identified the following 4 classes of substance use: (1) heavy polysubstance use, (2) moderate polysubstance use, (3) alcohol and marijuana, and (4) low-use substance use patterns. Multinomial logistic regression indicated that, for both males and females 18 to 24 years old, experiencing supervisory neglect, being depressed, being single, and engaging in adolescent delinquency serve as risk factors for heavy polysubstance use class membership. Conversely, being black or Hispanic lowered the likelihood of polysubstance use for males and females. For females only, living with parents served as a protective factor that reduced the risk of membership in heavy polysubstance use, moderate polysubstance use, and alcohol and marijuana classes. For males only, being less educated increased the risk of heavy polysubstance use class membership. Results from this exploratory study underscore the enduring effect of supervisory neglect on substance use among male and female young adults. Future studies should explore whether these relationships hold over time.
NASA Technical Reports Server (NTRS)
Bole, Brian; Teubert, Christopher Allen; Cuong Chi, Quach; Hogge, Edward; Vazquez, Sixto; Goebel, Kai; George, Vachtsevanos
2013-01-01
Software-in-the-loop and Hardware-in-the-loop testing of failure prognostics and decision making tools for aircraft systems will facilitate more comprehensive and cost-effective testing than what is practical to conduct with flight tests. A framework is described for the offline recreation of dynamic loads on simulated or physical aircraft powertrain components based on a real-time simulation of airframe dynamics running on a flight simulator, an inner-loop flight control policy executed by either an autopilot routine or a human pilot, and a supervisory fault management control policy. The creation of an offline framework for verifying and validating supervisory failure prognostics and decision making routines is described for the example of battery charge depletion failure scenarios onboard a prototype electric unmanned aerial vehicle.
Control Reconfiguration of Command and Control Systems
2007-01-01
decision errors and control action delays upon entering a state. These two undesirable effects can be intertwined. To quantify their individual impact...19 6) Effect of...Study of the Effect of Supervisory Control on a Redundant Database Unit . . . . . . . . . . . . . . 32 (Metzler and Wu, Report to AFRL 2005) 9.1) Problem
75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-26
... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wetherington Jr, G Randall; Vineyard, Edward Allan; Mahderekal, Isaac
A preliminary evaluation of the performance of a consumer-based control system was conducted by the Oak Ridge National Laboratory (ORNL) and Southwest Gas as part of a cooperative research and development agreement (CRADA) authorized by the Department of Energy (DOE) (Mahderekal et al. (2013). The goal of the research was to evaluate the low-cost approach as a solution for implementing a supervisory control system for a residential gas-operated heat pump. The design incorporated two consumer-based micro-controllers; the Arduino Mega-2650 and the BeagleBone (white). Ten five-ton heat pump systems were designed, fabricated, and operationally tested in the Las Vega NV region.more » A robust data set was produced that allowed detailed assessment of the reliability and the operational perfromance of the newly developed control system. Experiences gained from the test provided important points of improvement for subsequent evolution of the heat pump technology.« less
Definition of a Robust Supervisory Control Scheme for Sodium-Cooled Fast Reactors
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ponciroli, R.; Passerini, S.; Vilim, R. B.
In this work, an innovative control approach for metal-fueled Sodium-cooled Fast Reactors is proposed. With respect to the classical approach adopted for base-load Nuclear Power Plants, an alternative control strategy for operating the reactor at different power levels by respecting the system physical constraints is presented. In order to achieve a higher operational flexibility along with ensuring that the implemented control loops do not influence the system inherent passive safety features, a dedicated supervisory control scheme for the dynamic definition of the corresponding set-points to be supplied to the PID controllers is designed. In particular, the traditional approach based onmore » the adoption of tabulated lookup tables for the set-point definition is found not to be robust enough when failures of the implemented SISO (Single Input Single Output) actuators occur. Therefore, a feedback algorithm based on the Reference Governor approach, which allows for the optimization of reference signals according to the system operating conditions, is proposed.« less
NASA Technical Reports Server (NTRS)
Fisher, J. E.; Lawrence, D. A.; Zhu, J. J.; Jackson, Scott (Technical Monitor)
2002-01-01
This paper presents a hierarchical architecture for integrated guidance and control that achieves risk and cost reduction for NASA's 2d generation reusable launch vehicle (RLV). Guidance, attitude control, and control allocation subsystems that heretofore operated independently will now work cooperatively under the coordination of a top-level autocommander. In addition to delivering improved performance from a flight mechanics perspective, the autocommander is intended to provide an autonomous supervisory control capability for traditional mission management under nominal conditions, G&C reconfiguration in response to effector saturation, and abort mode decision-making upon vehicle malfunction. This high-level functionality is to be implemented through the development of a relational database that is populated with the broad range of vehicle and mission specific data and translated into a discrete event system model for analysis, simulation, and onboard implementation. A Stateflow Autocoder software tool that translates the database into the Stateflow component of a Matlab/Simulink simulation is also presented.
NASA Technical Reports Server (NTRS)
Sheridan, T. B.
1987-01-01
Ongoing MIT research in telerobotics (vehicles capable of some autonomous sensing and manipulating, having some remote supervisory control by people) and teleoperation (vehicles for sensing and manipulating which are fully controlled remotely by people) is discussed. The current efforts mix human and artificial intelligence/control. The idea of adjustable impedance at either end of pure master-slave teleoperation, and simultaneous coordinated control of teleoperator/telerobotic systems which have more than six degrees of freedom (e.g., a combined vehicle and arm, each with five or six DOF) are discussed. A new cable-controlled parallel link arm which offers many advantages over conventional arms for space is briefly described. Predictor displays to compensate for time delay in teleoperator loops, the use of state estimation to help human control decisions in space, and ongoing research in supervisory command language are covered. Finally, efforts to build a human flyable real-time dynamic computer-graphic telerobot simulator are described. These projects represent most, but not all, of the telerobotics research in our laboratory, supported by JPL, NASA Ames and NOAA.
Code of Federal Regulations, 2012 CFR
2012-01-01
... the supervisory employee learns that any of the following related persons are seeking or have sought... 5 Administrative Personnel 3 2012-01-01 2012-01-01 false Prohibition on supervisory employees... EMPLOYEES OF THE BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM § 6801.106 Prohibition on supervisory...
Code of Federal Regulations, 2013 CFR
2013-01-01
... the supervisory employee learns that any of the following related persons are seeking or have sought... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Prohibition on supervisory employees... EMPLOYEES OF THE BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM § 6801.106 Prohibition on supervisory...
Code of Federal Regulations, 2014 CFR
2014-01-01
... the supervisory employee learns that any of the following related persons are seeking or have sought... 5 Administrative Personnel 3 2014-01-01 2014-01-01 false Prohibition on supervisory employees... EMPLOYEES OF THE BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM § 6801.106 Prohibition on supervisory...
Code of Federal Regulations, 2011 CFR
2011-01-01
... the supervisory employee learns that any of the following related persons are seeking or have sought... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Prohibition on supervisory employees... EMPLOYEES OF THE BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM § 6801.106 Prohibition on supervisory...
Zheng, Shiqi; Tang, Xiaoqi; Song, Bao; Lu, Shaowu; Ye, Bosheng
2013-07-01
In this paper, a stable adaptive PI control strategy based on the improved just-in-time learning (IJITL) technique is proposed for permanent magnet synchronous motor (PMSM) drive. Firstly, the traditional JITL technique is improved. The new IJITL technique has less computational burden and is more suitable for online identification of the PMSM drive system which is highly real-time compared to traditional JITL. In this way, the PMSM drive system is identified by IJITL technique, which provides information to an adaptive PI controller. Secondly, the adaptive PI controller is designed in discrete time domain which is composed of a PI controller and a supervisory controller. The PI controller is capable of automatically online tuning the control gains based on the gradient descent method and the supervisory controller is developed to eliminate the effect of the approximation error introduced by the PI controller upon the system stability in the Lyapunov sense. Finally, experimental results on the PMSM drive system show accurate identification and favorable tracking performance. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.
78 FR 52808 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-26
... access to customers or other persons, to implement risk management controls and supervisory procedures... requires brokers or dealers to establish, document, and maintain certain risk management controls and... of its risk management controls as part of its books and records in a manner consistent with Rule 17a...
Integration and Assessment of Component Health Prognostics in Supervisory Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ramuhalli, Pradeep; Bonebrake, Christopher A.; Dib, Gerges
Enhanced risk monitors (ERMs) for active components in advanced reactor concepts use predictive estimates of component failure to update, in real time, predictive safety and economic risk metrics. These metrics have been shown to be capable of use in optimizing maintenance scheduling and managing plant maintenance costs. Integrating this information with plant supervisory control systems increases the potential for making control decisions that utilize real-time information on component conditions. Such decision making would limit the possibility of plant operations that increase the likelihood of degrading the functionality of one or more components while maintaining the overall functionality of the plant.more » ERM uses sensor data for providing real-time information about equipment condition for deriving risk monitors. This information is used to estimate the remaining useful life and probability of failure of these components. By combining this information with plant probabilistic risk assessment models, predictive estimates of risk posed by continued plant operation in the presence of detected degradation may be estimated. In this paper, we describe this methodology in greater detail, and discuss its integration with a prototypic software-based plant supervisory control platform. In order to integrate these two technologies and evaluate the integrated system, software to simulate the sensor data was developed, prognostic models for feedwater valves were developed, and several use cases defined. The full paper will describe these use cases, and the results of the initial evaluation.« less
Providing security for automated process control systems at hydropower engineering facilities
NASA Astrophysics Data System (ADS)
Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.
2016-12-01
This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.
DOT National Transportation Integrated Search
2012-07-01
Previous research demonstrated that an empirically-keyed, response-option scored biographical data (biodata) : scale predicted supervisory ratings of air traffic control specialist (ATCS) job performance (Dean & Broach, : 2011). This research f...
Sex Role Flexibility, Locus of Control, and Occupational Status.
ERIC Educational Resources Information Center
Kapalka, George M.; Lachenmeyer, Juliana Rasic
1988-01-01
Examination of 69 men and women revealed that individuals employed in supervisory leadership positions were more androgynous and obtained more internal locus of control scores than those in nonsupervisory positions. Sex differences were noted. Implications are discussed. (Author/BJV)
12 CFR Appendix B to Part 3 - Risk-Based Capital Guidelines; Market Risk
Code of Federal Regulations, 2013 CFR
2013-01-01
... Specific Risk Section 11Simplified Supervisory Formula Approach Section 12Market Risk Disclosures Section 1... respect to a company means any company that controls, is controlled by, or is under common control with... organization. Control A person or company controls a company if it: (1) Owns, controls, or holds with power to...
12 CFR Appendix B to Part 3 - Risk-Based Capital Guidelines; Market Risk
Code of Federal Regulations, 2014 CFR
2014-01-01
... 11Simplified Supervisory Formula Approach Section 12Market Risk Disclosures Section 1. Purpose, Applicability... respect to a company means any company that controls, is controlled by, or is under common control with... organization. Control A person or company controls a company if it: (1) Owns, controls, or holds with power to...
A computer simulation experiment of supervisory control of remote manipulation. M.S. Thesis
NASA Technical Reports Server (NTRS)
Mccandlish, S. G.
1966-01-01
A computer simulation of a remote manipulation task and a rate-controlled manipulator is described. Some low-level automatic decision making ability which could be used at the operator's discretion to augment his direct continuous control was built into the manipulator. Experiments were made on the effect of transmission delay, dynamic lag, and intermittent vision on human manipulative ability. Delay does not make remote manipulation impossible. Intermittent visual feedback, and the absence of rate information in the display presented to the operator do not seem to impair the operator's performance. A small-capacity visual feedback channel may be sufficient for remote manipulation tasks, or one channel might be time-shared between several operators. In other experiments the operator called in sequence various on-site automatic control programs of the machine, and thereby acted as a supervisor. The supervisory mode of operation has some advantages when the task to be performed is difficult for a human controlling directly.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McGoldrick, P.R.
1981-01-01
The Mirror Fusion Test Facility (MFTF) is a complex facility requiring a highly-computerized Supervisory Control and Diagnostics System (SCDS) to monitor and provide control over ten subsystems; three of which require true process control. SCDS will provide physicists with a method of studying machine and plasma behavior by acquiring and processing up to four megabytes of plasma diagnostic information every five minutes. A high degree of availability and throughput is provided by a distributed computer system (nine 32-bit minicomputers on shared memory). Data, distributed across SCDS, is managed by a high-bandwidth Distributed Database Management System. The MFTF operators' control roommore » consoles use color television monitors with touch sensitive screens; this is a totally new approach. The method of handling deviations to normal machine operation and how the operator should be notified and assisted in the resolution of problems has been studied and a system designed.« less
Analysis of data throughput in communication between PLCs and HMI/SCADA systems
NASA Astrophysics Data System (ADS)
Mikolajek, Martin; Koziorek, Jiri
2016-09-01
This paper is focused on Analysis of data throughout in communication between PLCs and HMI/SCADA systems. The first part of paper discusses basic problematic communication between PLC and HMI systems. Next part is about specific types of communications PLC - HMI requests. For those cases paper is talking about response and data throughput1-3 . Subsequent section of this article contains practical parts with various data exchanges between PLC Siemens and HMI. The possibilities of communication that are described in this article are focused on using OPC server for visualization software, custom HMI system and own application created by using .NET with Technology. The last part of this article contains some communication solutions.
Anomaly Detection in Power Quality at Data Centers
NASA Technical Reports Server (NTRS)
Grichine, Art; Solano, Wanda M.
2015-01-01
The goal during my internship at the National Center for Critical Information Processing and Storage (NCCIPS) is to implement an anomaly detection method through the StruxureWare SCADA Power Monitoring system. The benefit of the anomaly detection mechanism is to provide the capability to detect and anticipate equipment degradation by monitoring power quality prior to equipment failure. First, a study is conducted that examines the existing techniques of power quality management. Based on these findings, and the capabilities of the existing SCADA resources, recommendations are presented for implementing effective anomaly detection. Since voltage, current, and total harmonic distortion demonstrate Gaussian distributions, effective set-points are computed using this model, while maintaining a low false positive count.
8 CFR 204.5 - Petitions for employment-based immigrants.
Code of Federal Regulations, 2013 CFR
2013-01-01
... parent or individual; (B) One of two legal entities owned and controlled by the same group of individuals... controls the work of other supervisory, professional, or managerial employees, or manages an essential..., directly or indirectly, more than half of the entity and controls the entity; or owns, directly or...
12 CFR Appendix E to Part 208 - Risk-Based Capital Guidelines; Market Risk
Code of Federal Regulations, 2014 CFR
2014-01-01
... 11Simplified Supervisory Formula Approach Section 12Market Risk Disclosures Section 1. Purpose, Applicability... apply: Affiliate with respect to a company means any company that controls, is controlled by, or is under common control with, the company. Backtesting means the comparison of a bank's internal estimates...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-02
... Change Relating to New Market Access Risk Management Service, EdgeRisk Controls SM June 26, 2012... access risk management service, called EdgeRisk Controls\\SM\\ (the ``Service''). II. Self-Regulatory... and maintain a system of risk management controls and supervisory procedures that are reasonably...
Commerce Supervisory Course: Discussion Guide. Guidelines, Objectives.
ERIC Educational Resources Information Center
McDonald, Miller; And Others
Guidelines for the complete Commerce Supervisory Course are presented. The four unit headings in this guide are: Introductory to Supervision, Personnel Management for Supervisors, Individual and Group Performance, and Supervisory Operational Activities. (NF)
Utilization of Historic Information in an Optimisation Task
NASA Technical Reports Server (NTRS)
Boesser, T.
1984-01-01
One of the basic components of a discrete model of motor behavior and decision making, which describes tracking and supervisory control in unitary terms, is assumed to be a filtering mechanism which is tied to the representational principles of human memory for time-series information. In a series of experiments subjects used the time-series information with certain significant limitations: there is a range-effect; asymmetric distributions seem to be recognized, but it does not seem to be possible to optimize performance based on skewed distributions. Thus there is a transformation of the displayed data between the perceptual system and representation in memory involving a loss of information. This rules out a number of representational principles for time-series information in memory and fits very well into the framework of a comprehensive discrete model for control of complex systems, modelling continuous control (tracking), discrete responses, supervisory behavior and learning.
NASA Astrophysics Data System (ADS)
Letizia, Stefano; Puccioni, Matteo; Zhan, Lu; Viola, Francesco; Camarri, Simone; Iungo, Giacomo Valerio
2017-11-01
Numerical simulations of wakes produced by utility-scale wind turbines still present challenges related to the variability of the atmospheric conditions and, in the most of the cases, the lack of information about the geometry and aerodynamic performance of the wind turbine blades. In order to overcome the mentioned difficulties, we propose a RANS solver for which turbine aerodynamic forcing and turbulence closure are calibrated through LiDAR and SCADA data acquired for an onshore wind farm. The wind farm under examination is located in North Texas over a relatively flat terrain. The experimental data are leveraged to maximize accuracy of the RANS predictions in terms of wake velocity field and power capture for different atmospheric stability conditions and settings of the wind turbines. The optimization of the RANS parameters is performed through an adjoint-RANS formulation and a gradient-based procedure. The optimally-tuned aerodynamic forcing and turbulence closure are then analyzed in order to investigate effects of the atmospheric stability on the evolution of wind turbine wakes and power performance. The proposed RANS solver has low computational costs comparable to those of wake engineering models, which make it a compelling tool for wind farm control and optimization. Acknowledgments: NSF I/UCRC WindSTAR IIP 1362033 and TACC.
Snyder, Susan M.; Merritt, Darcey H.
2016-01-01
Background This study is the first to explore how child supervisory neglect influences patterns of substance use among young adults. This study investigated patterns of substance use among males and females, 18 to 24 years old, after controlling for adolescent parental drinking, living with parents, relationship status, delinquency, and depression. Methods The study sample (N = 10,618) included individuals who participated in Waves I (1994–1995) and III (2001–2002) of the National Longitudinal Study of Adolescent Health (Add Health). The study used latent class analysis to ascertain how patterns of substance use emerged as distinct classes. Results For both males and females, we identified the following 4 classes of substance use: (1) heavy polysubstance use, (2) moderate polysubstance use, (3) alcohol and marijuana, and (4) low-use substance use patterns. Multinomial logistic regression indicated that, for both males and females 18 to 24 years old, experiencing supervisory neglect, being depressed, being single, and engaging in adolescent delinquency serve as risk factors for heavy polysubstance use class membership. Conversely, being black or Hispanic lowered the likelihood of polysubstance use for males and females. For females only, living with parents served as a protective factor that reduced the risk of membership in heavy polysubstance use, moderate polysubstance use, and alcohol and marijuana classes. For males only, being less educated increased the risk of heavy polysubstance use class membership. Conclusions Results from this exploratory study underscore the enduring effect of supervisory neglect on substance use among male and female young adults. Future studies should explore whether these relationships hold over time. PMID:25775372
Full load estimation of an offshore wind turbine based on SCADA and accelerometer data
NASA Astrophysics Data System (ADS)
Noppe, N.; Iliopoulos, A.; Weijtjens, W.; Devriendt, C.
2016-09-01
As offshore wind farms (OWFs) grow older, the optimal use of the actual fatigue lifetime of an offshore wind turbine (OWT) and predominantly its foundation will get more important. In case of OWTs, both quasi-static wind/thrust loads and dynamic loads, as induced by turbulence, waves and the turbine's dynamics, contribute to its fatigue life progression. To estimate the remaining useful life of an OWT, the stresses acting on the fatigue critical locations within the structure should be monitored continuously. Unfortunately, in case of the most common monopile foundations these locations are often situated below sea-level and near the mud line and thus difficult or even impossible to access for existing OWTs. Actual strain measurements taken at accessible locations above the sea level show a correlation between thrust load and several SCADA parameters. Therefore a model is created to estimate the thrust load using SCADA data and strain measurements. Afterwards the thrust load acting on the OWT is estimated using the created model and SCADA data only. From this model the quasi static loads on the foundation can be estimated over the lifetime of the OWT. To estimate the contribution of the dynamic loads a modal decomposition and expansion based virtual sensing technique is applied. This method only uses acceleration measurements recorded at accessible locations on the tower. Superimposing both contributions leads to a so-called multi-band virtual sensing. The result is a method that allows to estimate the strain history at any location on the foundation and thus the full load, being a combination of both quasi-static and dynamic loads, acting on the entire structure. This approach is validated using data from an operating Belgian OWF. An initial good match between measured and predicted strains for a short period of time proofs the concept.
Factors Influencing New RNs' Supervisory Performance in Long-Term Care Facilities.
Prentice, Dawn; Boscart, Veronique; McGilton, Katherine S; Escrig, Astrid
2017-12-01
In long-term care facilities (LTCF), registered nurses (RNs) perform both clinical and supervisory roles as part of a team aiming to provide high-quality care to residents. The residents have several co-morbidities and complex care needs. Unfortunately, new RNs receive minimal preparation in gerontology and supervisory experience during their program, leading to low retention rates and affecting resident outcomes. This qualitative study explored factors that influence supervisory performance of new RNs in LTCF from the perspective of 24 participants from Ontario, Canada. Data were collected through individual interviews, followed by a directed content analysis. Three levels of influences were identified: personal influences, organizational influences, and external influences. Each level presented with sub-elements, further describing the factors that impact the supervisory performance of the new RN. To retain new RNs in LTC, organizations must provide additional gerontological education and mentoring for new RNs to flourish in their supervisory roles.
Method for routing events from key strokes in a multi-processing computer systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rhodes, D.A.; Rustici, E.; Carter, K.H.
1990-01-23
The patent describes a method of routing user input in a computer system which concurrently runs a plurality of processes. It comprises: generating keycodes representative of keys typed by a user; distinguishing generated keycodes by looking up each keycode in a routing table which assigns each possible keycode to an individual assigned process of the plurality of processes, one of which processes being a supervisory process; then, sending each keycode to its assigned process until a keycode assigned to the supervisory process is received; sending keycodes received subsequent to the keycode assigned to the supervisory process to a buffer; next,more » providing additional keycodes to the supervisory process from the buffer until the supervisory process has completed operation; and sending keycodes stored in the buffer to processes assigned therewith after the supervisory process has completedoperation.« less
Development of an automatic subsea blowout preventer stack control system using PLC based SCADA.
Cai, Baoping; Liu, Yonghong; Liu, Zengkai; Wang, Fei; Tian, Xiaojie; Zhang, Yanzhen
2012-01-01
An extremely reliable remote control system for subsea blowout preventer stack is developed based on the off-the-shelf triple modular redundancy system. To meet a high reliability requirement, various redundancy techniques such as controller redundancy, bus redundancy and network redundancy are used to design the system hardware architecture. The control logic, human-machine interface graphical design and redundant databases are developed by using the off-the-shelf software. A series of experiments were performed in laboratory to test the subsea blowout preventer stack control system. The results showed that the tested subsea blowout preventer functions could be executed successfully. For the faults of programmable logic controllers, discrete input groups and analog input groups, the control system could give correct alarms in the human-machine interface. Copyright © 2011 ISA. Published by Elsevier Ltd. All rights reserved.
External access to ALICE controls conditions data
NASA Astrophysics Data System (ADS)
Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.
2014-06-01
ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.
Bankole, Temitayo; Jones, Dustin; Bhattacharyya, Debangsu; ...
2017-11-03
In this study, a two-level control methodology consisting of an upper-level scheduler and a lower-level supervisory controller is proposed for an advanced load-following energy plant with CO 2 capture. With the use of an economic objective function that considers fluctuation in electricity demand and price at the upper level, optimal scheduling of energy plant electricity production and carbon capture with respect to several carbon tax scenarios is implemented. The optimal operational profiles are then passed down to corresponding lower-level supervisory controllers designed using a methodological approach that balances control complexity with performance. Finally, it is shown how optimal carbon capturemore » and electricity production rate profiles for an energy plant such as the integrated gasification combined cycle (IGCC) plant are affected by electricity demand and price fluctuations under different carbon tax scenarios. As a result, the paper also presents a Lyapunov stability analysis of the proposed scheme.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bankole, Temitayo; Jones, Dustin; Bhattacharyya, Debangsu
In this study, a two-level control methodology consisting of an upper-level scheduler and a lower-level supervisory controller is proposed for an advanced load-following energy plant with CO 2 capture. With the use of an economic objective function that considers fluctuation in electricity demand and price at the upper level, optimal scheduling of energy plant electricity production and carbon capture with respect to several carbon tax scenarios is implemented. The optimal operational profiles are then passed down to corresponding lower-level supervisory controllers designed using a methodological approach that balances control complexity with performance. Finally, it is shown how optimal carbon capturemore » and electricity production rate profiles for an energy plant such as the integrated gasification combined cycle (IGCC) plant are affected by electricity demand and price fluctuations under different carbon tax scenarios. As a result, the paper also presents a Lyapunov stability analysis of the proposed scheme.« less
12 CFR Appendix C to Part 325 - Risk-Based Capital for State Nonmember Banks: Market Risk
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10Standardized Measurement Method for Specific Risk Section 11Simplified Supervisory Formula Approach Section... apply: Affiliate with respect to a company means any company that controls, is controlled by, or is under common control with, the company. Backtesting means the comparison of a bank's internal estimates...
12 CFR Appendix C to Part 325 - Risk-Based Capital for State Nonmember Banks: Market Risk
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10Standardized Measurement Method for Specific Risk Section 11Simplified Supervisory Formula Approach Section... apply: Affiliate with respect to a company means any company that controls, is controlled by, or is under common control with, the company. Backtesting means the comparison of a bank's internal estimates...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-02
... Change Relating to New Market Access Risk Management Service, EdgeRisk Controls SM June 26, 2012... access risk management service, called EdgeRisk Controls SM (the ``Service''). II. Self-Regulatory..., document and maintain a system of risk management controls and supervisory procedures that are reasonably...
Intelligent control of mixed-culture bioprocesses
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stoner, D.L.; Larsen, E.D.; Miller, K.S.
A hierarchical control system is being developed and applied to a mixed culture bioprocess in a continuous stirred tank reactor. A bioreactor, with its inherent complexity and non-linear behavior was an interesting, yet, difficult application for control theory. The bottom level of the hierarchy was implemented as a number of integrated set point controls and data acquisition modules. Within the second level was a diagnostic system that used expert knowledge to determine the operational status of the sensors, actuators, and control modules. A diagnostic program was successfully implemented for the detection of stirrer malfunctions, and to monitor liquid delivery ratesmore » and recalibrate the pumps when deviations from desired flow rates occurred. The highest control level was a supervisory shell that was developed using expert knowledge and the history of the reactor operation to determine the set points required to meet a set of production criteria. At this stage the supervisory shell analyzed the data to determine the state of the system. In future implementations, this shell will determine the set points required to optimize a cost function using expert knowledge and adaptive learning techniques.« less
Rankin, J; McGuire, C; Matthews, L; Russell, M; Ray, D
2016-04-01
To explore the experiences of senior charge nurses provided with 'increased supervisory hours'. Designated supervisory time is essential for senior charge nurses to provide effective clinical leadership. It is important to explore the impact arises of such an increase. An online questionnaire collected exploratory data from senior charge nurses (n = 60). Semi-structured interviews gathered in-depth qualitative data (n = 12). Findings were analysed for common themes associated with implementation of the increased senior charge nurse supervisory role. The majority of senior charge nurses were unable to use their full allocation of supervisory time. They struggled to accomplish leadership goals because of managing staffing levels, increased workload, time constraints and limited support. Factors that facilitated the role included preparation and support, adequate staff capacity, effective leadership skills and availability of supervisory time. The senior charge nurses took pride in providing clinical leadership, promoting staff development and delivering patient care. Support, in terms of preparation, capacity building and ongoing mentoring, was a key factor for achieving senior charge nurse goals. Senior charge nurses should be supported to maximise supervisory time through the provision of an induction programme, formal coaching and ongoing training and development. Preparation and support is essential for senior charge nurses to deliver enhanced clinical leadership through increased supervisory time. © 2015 The Authors Journal of Nursing Management Published by John Wiley & Sons Ltd.
Miller, Christopher A; Parasuraman, Raja
2007-02-01
To develop a method enabling human-like, flexible supervisory control via delegation to automation. Real-time supervisory relationships with automation are rarely as flexible as human task delegation to other humans. Flexibility in human-adaptable automation can provide important benefits, including improved situation awareness, more accurate automation usage, more balanced mental workload, increased user acceptance, and improved overall performance. We review problems with static and adaptive (as opposed to "adaptable") automation; contrast these approaches with human-human task delegation, which can mitigate many of the problems; and revise the concept of a "level of automation" as a pattern of task-based roles and authorizations. We argue that delegation requires a shared hierarchical task model between supervisor and subordinates, used to delegate tasks at various levels, and offer instruction on performing them. A prototype implementation called Playbook is described. On the basis of these analyses, we propose methods for supporting human-machine delegation interactions that parallel human-human delegation in important respects. We develop an architecture for machine-based delegation systems based on the metaphor of a sports team's "playbook." Finally, we describe a prototype implementation of this architecture, with an accompanying user interface and usage scenario, for mission planning for uninhabited air vehicles. Delegation offers a viable method for flexible, multilevel human-automation interaction to enhance system performance while maintaining user workload at a manageable level. Most applications of adaptive automation (aviation, air traffic control, robotics, process control, etc.) are potential avenues for the adaptable, delegation approach we advocate. We present an extended example for uninhabited air vehicle mission planning.
[Hospital governance and the structure of German hospital supervisory boards].
Kuntz, L; Pulm, J; Wittland, M
2014-06-01
When thinking about corporate governance frequently the supervisory board comes to mind. The aim of this study is to investigate the relationship between the participation of single professions in the supervisory board and hospital financial performance. Based on governance codes, relevant professions that should be part of the supervisory board are identified. With the help of a multiple regression, the relationship between the fractions of these professions in the supervisory board and the return on assets in the year 2009 is examined. The sample consists of 182 hospitals. The study shows that participation of physicians in the supervisory board is related to a higher return on assets. Furthermore, the association between the fractions of nurses and politicians and hospitals financial performance is negative. The composition of the supervisory board has a significant effect on hospital performance; it is an important issue for hospital owners. The present study identifies only one positive relationship between the involvement of physicians and financial performance. Other professions could be relevant in achieving other objectives. Further studies are necessary to analyse the effects on other dimensions of hospital performance, e. g., on quality. © Georg Thieme Verlag KG Stuttgart · New York.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-23
... Guidelines for Appeals of Material Supervisory Determinations (``guidelines'') describe the types of... FEDERAL DEPOSIT INSURANCE CORPORATION Intra-Agency Appeal Process: Guidelines for Appeals of Material Supervisory Determinations and Guidelines for Appeals of Deposit Insurance Assessment...
The Optimum Level of Argumentativeness for Employed Women.
ERIC Educational Resources Information Center
Schullery, Nancy M.
1998-01-01
Examines the relationship between argumentativeness and women's supervisory level in organizations. Finds no simple relationship between supervisory level and argumentativeness for women, but indicates that moderation in argumentativeness increases with supervisory level. Notes implications for pedagogy: would-be female executives should be…
Supervisor Expertise, Teacher Autonomy and Environmental Robustness.
ERIC Educational Resources Information Center
Street, Sue; Licata, Joseph W.
This study examines the collective perspective that teachers in schools have about the relationship between the supervisory expertise of the principal, teacher work autonomy, and school environmental robustness. Supervisory expertise, and teachers' satisfaction with the supervisory process, is measured with the "Fidelity of Supervision…
Supervisory Styles: A Contingency Framework
ERIC Educational Resources Information Center
Boehe, Dirk Michael
2016-01-01
While the contingent nature of doctoral supervision has been acknowledged, the literature on supervisory styles has yet to deliver a theory-based contingency framework. A contingency framework can assist supervisors and research students in identifying appropriate supervisory styles under varying circumstances. The conceptual study reported here…
19 CFR 10.877 - Direct costs of processing operations.
Code of Federal Regulations, 2011 CFR
2011-04-01
..., supervisory, quality control, and similar personnel; (2) Tools, dies, molds, and other indirect materials, and... are not limited to: (1) Profit; and (2) General expenses of doing business that are either not...
19 CFR 10.814 - Direct costs of processing operations.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., supervisory, quality control, and similar personnel; (2) Tools, dies, molds, and other indirect materials, and... are not limited to: (1) Profit; and (2) General expenses of doing business that are either not...
19 CFR 10.774 - Direct costs of processing operations.
Code of Federal Regulations, 2011 CFR
2011-04-01
..., supervisory, quality control, and similar personnel; (2) Tools, dies, molds, and other indirect materials, and... are not limited to: (1) Profit; and (2) General expenses of doing business that are either not...
19 CFR 10.814 - Direct costs of processing operations.
Code of Federal Regulations, 2011 CFR
2011-04-01
..., supervisory, quality control, and similar personnel; (2) Tools, dies, molds, and other indirect materials, and... are not limited to: (1) Profit; and (2) General expenses of doing business that are either not...
19 CFR 10.774 - Direct costs of processing operations.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., supervisory, quality control, and similar personnel; (2) Tools, dies, molds, and other indirect materials, and... are not limited to: (1) Profit; and (2) General expenses of doing business that are either not...
Self-Disclosure as a Predictor of EAP Supervisory Utilization
NASA Technical Reports Server (NTRS)
Donohoe, Timothy L.; Johnson, James T.; Taquino, Maurice A.
1999-01-01
The value of Employee Assistance Programs (EAPS) has been cited in a variety of published papers and articles. An important managerial element relative to the assessment and referral of troubled employees has been supervisory training. There has been numerous studies highlighting the various factors and circumstances associated with supervisory behavior and EAP referrals. The inclusion of emotional awareness factors in EAP supervisory utilization has not been thoroughly investigated, although frequently found in the literature as a training and development objective for managers in business and education. The present study sought to determine what role supervisory denial and anxiety avoidance plays in confrontation of troubled employees and if admission of specific, internal emotional events is a characteristic among EAP utilizing supervisors.
Harahan, Mary F.; Sanders, Alisha; Stone, Robyn I.; Bowers, Barbara J.; Nolet, Kimberly A.; Krause, Melanie R.; Gilmore, Andrea L.
2014-01-01
Licensed practical/vocational nurses (LVNs) play an important role in U.S. nursing homes with primary responsibility for supervising unlicensed nursing home staff. Research has shown that the relationship between supervisors and nurse aides has a significant impact on nurse aide job satisfaction and turnover as well as quality of care, yet nurses rarely receive supervisory training. The purpose of this project was to develop, pilot, and evaluate a leadership/supervisory training program for LVNs. Upon completion of the training program, many LVNs expressed and demonstrated a new understanding of their supervisory leadership and supervisory responsibilities. Directors of staff development are a potential vehicle for supporting LVNs in developing as supervisors. PMID:21417197
Professional Development through Clinical Supervision
ERIC Educational Resources Information Center
Farhat, Amal
2016-01-01
Studies have shown that clinical supervisory practices result in implementation of new skills in teachers' classroom performance. This study examines the impact of two clinical supervisory cycles on teachers' performance in classroom management. Multiple data collection tools were used to determine the impact of clinical supervisory interventions…
25 CFR 163.72 - Supervisory relationship.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 25 Indians 1 2011-04-01 2011-04-01 false Supervisory relationship. 163.72 Section 163.72 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAND AND WATER GENERAL FORESTRY REGULATIONS Cooperative Agreements § 163.72 Supervisory relationship. In any agreement authorized by the Secretary, Indian...
25 CFR 163.72 - Supervisory relationship.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false Supervisory relationship. 163.72 Section 163.72 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAND AND WATER GENERAL FORESTRY REGULATIONS Cooperative Agreements § 163.72 Supervisory relationship. In any agreement authorized by the Secretary, Indian...
Methods and tools for profiling and control of distributed systems
NASA Astrophysics Data System (ADS)
Sukharev, R.; Lukyanchikov, O.; Nikulchev, E.; Biryukov, D.; Ryadchikov, I.
2018-02-01
This article is devoted to the topic of profiling and control of distributed systems. Distributed systems have a complex architecture, applications are distributed among various computing nodes, and many network operations are performed. Therefore, today it is important to develop methods and tools for profiling distributed systems. The article analyzes and standardizes methods for profiling distributed systems that focus on simulation to conduct experiments and build a graph model of the system. The theory of queueing networks is used for simulation modeling of distributed systems, receiving and processing user requests. To automate the above method of profiling distributed systems the software application was developed with a modular structure and similar to a SCADA-system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
STADLER, MICHAEL; MASHAYEKH, SALMAN; DEFOREST, NICHOLAS
The ODC Microgrid Controller is an optimization-based model predicative microgrid controller (MPMC) to minimize operation cost (and/or CO2 emissions) in a microgrid in the grid-connected mode. It is composed of several modules, including a) forecasting, b) optimization, c) data exchange and d) power balancing modules. In the presence of a multi-layered control system architecture, these modules will reside in the supervisory control layer.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-22
... information that is used to assess inherent risks and internal control processes. Such activities include... management and information systems; and internal controls. The financial condition rating is supported by... appropriate standards of capitalization, liquidity, and risk management consistent with the principles of...
75 FR 69791 - Risk Management Controls for Brokers or Dealers With Market Access
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-15
... relationship with the ultimate customer, can more effectively implement them. In addition, a broker or dealer... specific risk management controls and supervisory procedures to a customer that is a registered broker... such customer, based on its position in the transaction and relationship with the ultimate customer...
21 CFR 58.185 - Reporting of nonclinical laboratory study results.
Code of Federal Regulations, 2010 CFR
2010-04-01
...) Statistical methods employed for analyzing the data. (4) The test and control articles identified by name... characteristics. (5) Stability of the test and control articles under the conditions of administration. (6) A... scientists or professionals, and the names of all supervisory personnel, involved in the study. (11) A...
An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems
NASA Astrophysics Data System (ADS)
Hieb, Jeffrey; Graham, James; Guan, Jian
This paper presents an ontological framework that permits formal representations of process control systems, including elements of the process being controlled and the control system itself. A fault diagnosis algorithm based on the ontological model is also presented. The algorithm can identify traditional process elements as well as control system elements (e.g., IP network and SCADA protocol) as fault sources. When these elements are identified as a likely fault source, the possibility exists that the process fault is induced by a cyber intrusion. A laboratory-scale distillation column is used to illustrate the model and the algorithm. Coupled with a well-defined statistical process model, this fault diagnosis approach provides cyber security enhanced fault diagnosis information to plant operators and can help identify that a cyber attack is underway before a major process failure is experienced.
Investigating Supervisory Relationships and Therapeutic Alliances Using Structural Equation Modeling
ERIC Educational Resources Information Center
DePue, Mary Kristina; Lambie, Glenn W.; Liu, Ren; Gonzalez, Jessica
2016-01-01
The authors used structural equation modeling to examine the contribution of supervisees' supervisory relationship levels to therapeutic alliance (TA) scores with their clients in practicum. Results showed that supervisory relationship scores positively contributed to the TA. Client and counselor ratings of the TA also differed.
12 CFR 1777.12 - Other supervisory action.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Other supervisory action. 1777.12 Section 1777.12 Banks and Banking OFFICE OF FEDERAL HOUSING ENTERPRISE OVERSIGHT, DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT SAFETY AND SOUNDNESS PROMPT CORRECTIVE ACTION Prompt Supervisory Response § 1777.12 Other...
12 CFR 1235.7 - Supervisory action.
Code of Federal Regulations, 2013 CFR
2013-01-01
... and Banking FEDERAL HOUSING FINANCE AGENCY ENTITY REGULATIONS RECORD RETENTION FOR REGULATED ENTITIES AND OFFICE OF FINANCE § 1235.7 Supervisory action. (a) Supervisory action. Failure by a regulated entity or the Office of Finance to comply with this part may subject the regulated entity or the Office...
12 CFR 1235.7 - Supervisory action.
Code of Federal Regulations, 2012 CFR
2012-01-01
... and Banking FEDERAL HOUSING FINANCE AGENCY ENTITY REGULATIONS RECORD RETENTION FOR REGULATED ENTITIES AND OFFICE OF FINANCE § 1235.7 Supervisory action. (a) Supervisory action. Failure by a regulated entity or the Office of Finance to comply with this part may subject the regulated entity or the Office...
12 CFR 1777.11 - Supervisory response.
Code of Federal Regulations, 2011 CFR
2011-01-01
... section is warranted. (c) Level III supervisory response—(1) Action plan. In addition to any other... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Supervisory response. 1777.11 Section 1777.11 Banks and Banking OFFICE OF FEDERAL HOUSING ENTERPRISE OVERSIGHT, DEPARTMENT OF HOUSING AND URBAN...
12 CFR 1777.11 - Supervisory response.
Code of Federal Regulations, 2012 CFR
2012-01-01
... section is warranted. (c) Level III supervisory response—(1) Action plan. In addition to any other... 12 Banks and Banking 9 2012-01-01 2012-01-01 false Supervisory response. 1777.11 Section 1777.11 Banks and Banking OFFICE OF FEDERAL HOUSING ENTERPRISE OVERSIGHT, DEPARTMENT OF HOUSING AND URBAN...
The Supervisory Process of EFL Teachers: A Case Study
ERIC Educational Resources Information Center
Chen, Cheryl Wei-Yu; Cheng, Yuh-show
2013-01-01
Supervision is an essential part of language teachers' professional experiences. The literature on language teacher supervision from the past few decades consists largely of descriptions of supervisory approaches (Bailey, 2009) and analysis of the supervisory discourse (Hooton, 2008; Wajnryb, 1994; 1995; 1998; Wallace & Woolger, 1991). This…
The Supervisory Relationship: A Conceptual and Psychometric Review of Measures
ERIC Educational Resources Information Center
Tangen, Jodi L.; Borders, DiAnne
2016-01-01
To date, a comprehensive review of supervisory relationship measures has yet to be published. In this article, the authors explore conceptualizations of the supervisory relationship, describe and critique 11 measures, provide recommendations for researchers and practitioners when selecting measures, and offer suggestions regarding future measure…
NASA Astrophysics Data System (ADS)
Iungo, Giacomo Valerio; Camarri, Simone; Ciri, Umberto; El-Asha, Said; Leonardi, Stefano; Rotea, Mario A.; Santhanagopalan, Vignesh; Viola, Francesco; Zhan, Lu
2016-11-01
Site conditions, such as topography and local climate, as well as wind farm layout strongly affect performance of a wind power plant. Therefore, predictions of wake interactions and their effects on power production still remain a great challenge in wind energy. For this study, an onshore wind turbine array was monitored through lidar measurements, SCADA and met-tower data. Power losses due to wake interactions were estimated to be approximately 4% and 2% of the total power production under stable and convective conditions, respectively. This dataset was then leveraged for the calibration of a data driven RANS (DDRANS) solver, which is a compelling tool for prediction of wind turbine wakes and power production. DDRANS is characterized by a computational cost as low as that for engineering wake models, and adequate accuracy achieved through data-driven tuning of the turbulence closure model. DDRANS is based on a parabolic formulation, axisymmetry and boundary layer approximations, which allow achieving low computational costs. The turbulence closure model consists in a mixing length model, which is optimally calibrated with the experimental dataset. Assessment of DDRANS is then performed through lidar and SCADA data for different atmospheric conditions. This material is based upon work supported by the National Science Foundation under the I/UCRC WindSTAR, NSF Award IIP 1362033.
Tappura, K
2001-08-15
An adjustable-barrier dihedral angle potential was added as an extension to a novel, previously presented soft-core potential to study its contribution to the efficacy of the search of the conformational space in molecular dynamics. As opposed to the conventional soft-core potential functions, the leading principle in the design of the new soft-core potential, as well as of its extension, the soft-core and adjustable-barrier dihedral angle (SCADA) potential (referred as the SCADA potential), was to maintain the main equilibrium properties of the original force field. This qualifies the methods for a variety of a priori modeling problems without need for additional restraints typically required with the conventional soft-core potentials. In the present study, the different potential energy functions are applied to the problem of predicting loop conformations in proteins. Comparison of the performance of the soft-core and SCADA potential showed that the main hurdles for the efficient sampling of the conformational space of (loops in) proteins are related to the high-energy barriers caused by the Lennard-Jones and Coulombic energy terms, and not to the rotational barriers, although the conformational search can be further enhanced by lowering the rotational barriers of the dihedral angles. Finally, different evaluation methods were studied and a few promising criteria found to distinguish the near-native loop conformations from the wrong ones.
12 CFR Appendix E to Part 225 - Capital Adequacy Guidelines for Bank Holding Companies: Market Risk
Code of Federal Regulations, 2013 CFR
2013-01-01
... CONTROL (REGULATION Y) Pt. 225, App. E Appendix E to Part 225—Capital Adequacy Guidelines for Bank Holding... Method for Specific Risk Section 11Simplified Supervisory Formula Approach Section 12Market Risk... apply: Affiliate with respect to a company means any company that controls, is controlled by, or is...
12 CFR Appendix E to Part 225 - Capital Adequacy Guidelines for Bank Holding Companies: Market Risk
Code of Federal Regulations, 2014 CFR
2014-01-01
... CONTROL (REGULATION Y) Pt. 225, App. E Appendix E to Part 225—Capital Adequacy Guidelines for Bank Holding... Measurement Method for Specific Risk Section 11 Simplified Supervisory Formula Approach Section 12 Market Risk... apply: Affiliate with respect to a company means any company that controls, is controlled by, or is...
Wavefront control system for the Keck telescope
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brase, J. M., LLNL
1998-03-01
The laser guide star adaptive optics system currently being developed for the Keck 2 telescope consists of several major subsystems: the optical bench, wavefront control, user interface and supervisory control, and the laser system. The paper describes the design and implementation of the wavefront control subsystem that controls a 349 actuator deformable mirror for high order correction and tip-tilt mirrors for stabilizing the image and laser positions.
Perceptions of Interview Behavior and Relationships in Counseling Supervision.
ERIC Educational Resources Information Center
Santoro, David A.
This research explores possible connections between supervisory activity and the quality of the supervisory relationship. An effort was made to answer the following three questions: (1) What is the nature of the perceived interview behavior between supervisor and trainee? (2) What is the nature of the perceived supervisory relationship between…
Impaired Job Performance and Critical Incidents: Factors Influencing Supervisory EAP Referrals.
ERIC Educational Resources Information Center
Harley, David A.
Relatively little empirical research has been done on the supervisory referral of employees to employee assistance programs (EAPs). Inclusion of constructive confrontation (supervisory referral) into program standards and its continued promotion as a "central strategy" of program theory and operation calls for critical investigation of…
30 CFR 75.1713-3 - First-Aid training; supervisory employees.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 30 Mineral Resources 1 2010-07-01 2010-07-01 false First-Aid training; supervisory employees. 75... First-Aid training; supervisory employees. The mine operator shall conduct first-aid training courses... employee and date on which the employee satisfactorily completed the first-aid training course. The...
29 CFR 1918.98 - Qualifications of machinery operators and supervisory training.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 29 Labor 7 2013-07-01 2013-07-01 false Qualifications of machinery operators and supervisory... General Working Conditions. § 1918.98 Qualifications of machinery operators and supervisory training. (a) Qualification of machinery operators. (1) Only an employee determined by the employer to be competent by reason...
29 CFR 1918.98 - Qualifications of machinery operators and supervisory training.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 29 Labor 7 2012-07-01 2012-07-01 false Qualifications of machinery operators and supervisory... General Working Conditions. § 1918.98 Qualifications of machinery operators and supervisory training. (a) Qualification of machinery operators. (1) Only an employee determined by the employer to be competent by reason...
29 CFR 1918.98 - Qualifications of machinery operators and supervisory training.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 29 Labor 7 2014-07-01 2014-07-01 false Qualifications of machinery operators and supervisory... General Working Conditions. § 1918.98 Qualifications of machinery operators and supervisory training. (a) Qualification of machinery operators. (1) Only an employee determined by the employer to be competent by reason...
29 CFR 1918.98 - Qualifications of machinery operators and supervisory training.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 29 Labor 7 2011-07-01 2011-07-01 false Qualifications of machinery operators and supervisory... General Working Conditions. § 1918.98 Qualifications of machinery operators and supervisory training. (a) Qualification of machinery operators. (1) Only an employee determined by the employer to be competent by reason...
76 FR 3674 - Guidelines for the Supervisory Review Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-20
... process to review material supervisory determinations, entitled ``Supervisory Review Committee'' (IRPS 95... would consider expanding the disputes covered by the Committee's review process at a later date. 60 FR... ), qualifying credit unions that have applied for and been granted a TAG may purchase goods or spend the funds...
DOE Office of Scientific and Technical Information (OSTI.GOV)
2012-08-09
Sophia Daemon Version 12 contains the code that is exclusively used by the sophiad application. It runs as a service on a Linux host and analyzes network traffic obtained from libpcap and produces a network fingerprint based on hosts and channels. Sophia Daemon Version 12 can, if desired by the user, produce alerts when its fingerprint changes. Sophia Daemon Version 12 can receive data from another Sophia Daemon or raw packet data. It can output data to another Sophia Daemon Version 12, OglNet Version 12 or MySQL. Sophia Daemon Version 12 runs in a passive real-time manner that allows itmore » to be used on a SCADA network. Its network fingerprint is designed to be applicable to SCADA networks rather than general IT networks.« less
PC/AT-based architecture for shared telerobotic control
NASA Astrophysics Data System (ADS)
Schinstock, Dale E.; Faddis, Terry N.; Barr, Bill G.
1993-03-01
A telerobotic control system must include teleoperational, shared, and autonomous modes of control in order to provide a robot platform for incorporating the rapid advances that are occurring in telerobotics and associated technologies. These modes along with the ability to modify the control algorithms are especially beneficial for telerobotic control systems used for research purposes. The paper describes an application of the PC/AT platform to the control system of a telerobotic test cell. The paper provides a discussion of the suitability of the PC/AT as a platform for a telerobotic control system. The discussion is based on the many factors affecting the choice of a computer platform for a real time control system. The factors include I/O capabilities, simplicity, popularity, computational performance, and communication with external systems. The paper also includes a description of the actuation, measurement, and sensor hardware of both the master manipulator and the slave robot. It also includes a description of the PC-Bus interface cards. These cards were developed by the researchers in the KAT Laboratory, specifically for interfacing to the master manipulator and slave robot. Finally, a few different versions of the low level telerobotic control software are presented. This software incorporates shared control by supervisory systems and the human operator and traded control between supervisory systems and the human operator.
NASA Astrophysics Data System (ADS)
Koestner, Stefan
2009-09-01
With the increasing size and degree of complexity of today's experiments in high energy physics the required amount of work and complexity to integrate a complete subdetector into an experiment control system is often underestimated. We report here on the layered software structure and protocols used by the LHCb experiment to control its detectors and readout boards. The experiment control system of LHCb is based on the commercial SCADA system PVSS II. Readout boards which are outside the radiation area are accessed via embedded credit card sized PCs which are connected to a large local area network. The SPECS protocol is used for control of the front end electronics. Finite state machines are introduced to facilitate the control of a large number of electronic devices and to model the whole experiment at the level of an expert system.
POPEYE: A production rule-based model of multitask supervisory control (POPCORN)
NASA Technical Reports Server (NTRS)
Townsend, James T.; Kadlec, Helena; Kantowitz, Barry H.
1988-01-01
Recent studies of relationships between subjective ratings of mental workload, performance, and human operator and task characteristics have indicated that these relationships are quite complex. In order to study the various relationships and place subjective mental workload within a theoretical framework, we developed a production system model for the performance component of the complex supervisory task called POPCORN. The production system model is represented by a hierarchial structure of goals and subgoals, and the information flow is controlled by a set of condition-action rules. The implementation of this production system, called POPEYE, generates computer simulated data under different task difficulty conditions which are comparable to those of human operators performing the task. This model is the performance aspect of an overall dynamic psychological model which we are developing to examine and quantify relationships between performance and psychological aspects in a complex environment.
POPCORN: a Supervisory Control Simulation for Workload and Performance Research
NASA Technical Reports Server (NTRS)
Hart, S. G.; Battiste, V.; Lester, P. T.
1984-01-01
A multi-task simulation of a semi-automatic supervisory control system was developed to provide an environment in which training, operator strategy development, failure detection and resolution, levels of automation, and operator workload can be investigated. The goal was to develop a well-defined, but realistically complex, task that would lend itself to model-based analysis. The name of the task (POPCORN) reflects the visual display that depicts different task elements milling around waiting to be released and pop out to be performed. The operator's task was to complete each of 100 task elements that ere represented by different symbols, by selecting a target task and entering the desired a command. The simulated automatic system then completed the selected function automatically. Highly significant differences in performance, strategy, and rated workload were found as a function of all experimental manipulations (except reward/penalty).
77 FR 62378 - Supervisory and Company-Run Stress Test Requirements for Covered Companies
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-12
... to Both Supervisory and Company-Run Stress Tests The Board designed the final rule in a manner to... to conduct supervisory stress test; and project a company's losses, pre-provision net revenue...-Run Stress Test Requirements; Final Rules #0;#0;Federal Register / Vol. 77 , No. 198 / Friday, October...
Successful Supervision from the Student-Teachers' Perspective: An Analysis of Supervisory Talk
ERIC Educational Resources Information Center
Gulden, Ilin; Julide, Inozu; Rana, Yildirim
2007-01-01
This study aims at analyzing supervisory talk and student- teachers' interpretations of it in order to find out the qualities that characterize successful supervision which leads to a change in student- teachers' beliefs. To achieve this, supervisory feedback sessions with four supervisors were recorded, transcribed and then analyzed for…
INTRODUCTION TO MANAGEMENT FOR INDUSTRIAL SUPERVISORS.
ERIC Educational Resources Information Center
Louisiana State Vocational Curriculum Development and Research Center, Natchitoches.
SUBJECT MATTER AND SUPPLEMENTAL MATERIALS FOR USE IN CONDUCTING A 10-HOUR INDUSTRIAL SUPERVISORY TRAINING CONFERENCE IN BASIC MANAGEMENT FUNDAMENTALS AND CONCEPTS ARE PRESENTED IN THIS TEACHER GUIDE. IT WAS DEVELOPED BY A STATE COMMITTEE AS A FIRST COURSE IN A SERIES FOR SUPERVISORY PERSONNEL WHO HAVE HAD LITTLE OR NO PREVIOUS SUPERVISORY TRAINING…
ERIC Educational Resources Information Center
Gnilka, Philip B.; Chang, Catherine Y.; Dew, Brian J.
2012-01-01
The authors examined the relationship of perceived stress, specific types of coping resources, the working alliance, and the supervisory working alliance among 232 counselor supervisees. The working alliance and the supervisory working alliance were negatively related to perceived stress and positively related to multiple coping resources. Two…
ERIC Educational Resources Information Center
Gedamu, Abate Demissie
2018-01-01
Thesis supervisor supervisory styles play central roles in enhancing timely and quality completion of thesis works. To this effect, this study aimed at exploring TEFL graduate supervisees' perception of their thesis supervisors' supervisory style(s), the supervisees' level of satisfaction with thesis supervision, and the association between…
Code of Federal Regulations, 2012 CFR
2012-01-01
..., engineering, and supervisory services. 1717.611 Section 1717.611 Agriculture Regulations of the Department of... expenditures for legal, accounting, engineering, and supervisory services. (a) If a borrower's mortgage or loan... engineering services, such approval is hereby granted if such services will not be financed by RUS. Approval...
Code of Federal Regulations, 2010 CFR
2010-01-01
..., engineering, and supervisory services. 1717.611 Section 1717.611 Agriculture Regulations of the Department of... expenditures for legal, accounting, engineering, and supervisory services. (a) If a borrower's mortgage or loan... engineering services, such approval is hereby granted if such services will not be financed by RUS. Approval...
Code of Federal Regulations, 2011 CFR
2011-01-01
..., engineering, and supervisory services. 1717.611 Section 1717.611 Agriculture Regulations of the Department of... expenditures for legal, accounting, engineering, and supervisory services. (a) If a borrower's mortgage or loan... engineering services, such approval is hereby granted if such services will not be financed by RUS. Approval...
Code of Federal Regulations, 2013 CFR
2013-01-01
..., engineering, and supervisory services. 1717.611 Section 1717.611 Agriculture Regulations of the Department of... expenditures for legal, accounting, engineering, and supervisory services. (a) If a borrower's mortgage or loan... engineering services, such approval is hereby granted if such services will not be financed by RUS. Approval...
Code of Federal Regulations, 2014 CFR
2014-01-01
..., engineering, and supervisory services. 1717.611 Section 1717.611 Agriculture Regulations of the Department of... expenditures for legal, accounting, engineering, and supervisory services. (a) If a borrower's mortgage or loan... engineering services, such approval is hereby granted if such services will not be financed by RUS. Approval...
Parallel Process and Isomorphism: A Model for Decision Making in the Supervisory Triad
ERIC Educational Resources Information Center
Koltz, Rebecca L.; Odegard, Melissa A.; Feit, Stephen S.; Provost, Kent; Smith, Travis
2012-01-01
Parallel process and isomorphism are two supervisory concepts that are often discussed independently but rarely discussed in connection with each other. These two concepts, philosophically, have different historical roots, as well as different implications for interventions with regard to the supervisory triad. The authors examine the difference…
ERIC Educational Resources Information Center
Smith, Deirdre M.; Qua-Hiansen, Jessica
2015-01-01
An exploration of the collaborative reconceptualization of a provincial Supervisory Officer's Qualification Program (SOQP) through the use of dialogic approaches is the focus of this inquiry. The stories, perspectives, and lived experiences of supervisory officers, principals, teachers, parents, students, and members of the public in Ontario were…
Code of Federal Regulations, 2010 CFR
2010-07-01
... 30 Mineral Resources 1 2010-07-01 2010-07-01 false First-aid training program; retraining of...-UNDERGROUND COAL MINES Miscellaneous § 75.1713-5 First-aid training program; retraining of supervisory... shall conduct refresher first-aid training courses each calendar year for all selected supervisory...
Postgraduate students experience in research supervision
NASA Astrophysics Data System (ADS)
Mohamed, Hazura; Judi, Hairulliza Mohamad; Mohammad, Rofizah
2017-04-01
The success and quality of postgraduate education depends largely on the effective and efficient supervision of postgraduate students. The role of the supervisor becomes more challenging with supervisory expectations rising high quality graduates. The main objective of this study was to examine the experiences of postgraduate students towards supervisory services for the duration of their studies. It also examines whether supervisory experience varies based on demographic variables such as level of study and nationality. This study uses a quantitative approach in the form of survey. Questionnaires were distributed to 96 postgraduate students of the Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia. Data collected were analyzed using Statistical Package for the Social Science (SPSS 23.0) to get the frequency, mean and standard deviation. T-test was used to find the difference between demographic variables and supervisory experience. The findings overall showed that postgraduate students gave positive response to the supervisory services. However, there were differences supervisory experiences based on the level of study and nationality. The results of this study hope the parties involved could provide a better support to improve the quality of supervision.
Ambrose, Maureen L; Schminke, Marshall
2003-04-01
Organizational justice researchers recognize the important role organization context plays in justice perceptions, yet few studies systematically examine contextual variables. This article examines how 1 aspect of context--organizational structure--affects the relationship between justice perceptions and 2 types of social exchange relationships, organizational and supervisory. The authors suggest that under different structural conditions, procedural and interactional justice will play differentially important roles in determining the quality of organizational social exchange (as evidenced by perceived organizational support [POS]) and supervisory social exchange (as evidenced by supervisory trust). In particular, the authors hypothesized that the relationship between procedural justice and POS would be stronger in mechanistic organizations and that the relationship between interactional justice and supervisory trust would be stronger in organic organizations. The authors' results support these hypotheses.
Human Information Processing and Supervisory Control.
1980-05-01
interpretation of information .............. 16 Sampling strategies .............................. 17 Speed-accuracy tradeoff ................... 23...operator is usually highly trained, and largely controls the tasks, being allowed to use what strategies he will.. Risk is incurred in ways which can...his search less than optimally effective. Hence from matters of tactics and strategy which will be discussed below, straightforward questions of
7 CFR Exhibit A to Subpart K of... - Grant Agreement-Technical and Supervisory Assistance
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 13 2011-01-01 2009-01-01 true Grant Agreement-Technical and Supervisory Assistance A Exhibit A to Subpart K of Part 1944 Agriculture Regulations of the Department of Agriculture (Continued... Supervisory Assistance Grants Pt. 1944, Subpt. K, Exh. A Exhibit A to Subpart K of Part 1944—Grant Agreement...
7 CFR Exhibit A to Subpart K of... - Grant Agreement-Technical and Supervisory Assistance
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 13 2012-01-01 2012-01-01 false Grant Agreement-Technical and Supervisory Assistance A Exhibit A to Subpart K of Part 1944 Agriculture Regulations of the Department of Agriculture... and Supervisory Assistance Grants Pt. 1944, Subpt. K, Exh. A Exhibit A to Subpart K of Part 1944—Grant...
7 CFR Exhibit A to Subpart K of... - Grant Agreement-Technical and Supervisory Assistance
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 13 2013-01-01 2013-01-01 false Grant Agreement-Technical and Supervisory Assistance A Exhibit A to Subpart K of Part 1944 Agriculture Regulations of the Department of Agriculture... and Supervisory Assistance Grants Pt. 1944, Subpt. K, Exh. A Exhibit A to Subpart K of Part 1944—Grant...
7 CFR Exhibit A to Subpart K of... - Grant Agreement-Technical and Supervisory Assistance
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 13 2014-01-01 2013-01-01 true Grant Agreement-Technical and Supervisory Assistance A Exhibit A to Subpart K of Part 1944 Agriculture Regulations of the Department of Agriculture (Continued... Supervisory Assistance Grants Pt. 1944, Subpt. K, Exh. A Exhibit A to Subpart K of Part 1944—Grant Agreement...
7 CFR Exhibit A to Subpart K of... - Grant Agreement-Technical and Supervisory Assistance
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 13 2010-01-01 2009-01-01 true Grant Agreement-Technical and Supervisory Assistance A Exhibit A to Subpart K of Part 1944 Agriculture Regulations of the Department of Agriculture (Continued... Supervisory Assistance Grants Pt. 1944, Subpt. K, Exh. A Exhibit A to Subpart K of Part 1944—Grant Agreement...
ERIC Educational Resources Information Center
Pyhältö, Kirsi; Vekkaila, Jenna; Keskinen, Jenni
2015-01-01
Although supervision has been identified as one of the central determinants of the doctoral experience, there is still an insufficient understanding of the ways in which supervisors and doctoral students perceive supervisory activities. The study focuses on exploring the fit between doctoral students' and supervisors' perceptions of who are…
ERIC Educational Resources Information Center
Ayeni, Adeolu Joshua
2012-01-01
This study identified the nature of principals' supervisory roles and the perceived effectiveness of principals in the supervision of teachers' instructional tasks. Furthermore, it investigated the constraints faced by principals in the performance of supervisory duties in the teaching-learning process. This was with a view to providing…
ERIC Educational Resources Information Center
Esia-Donkoh, Kweku; Baffoe, Stella
2018-01-01
The study examined the supervisory practices of headteachers and how these supervisory practices relate with teacher motivation in public basic schools in the Anomabo Education Circuit of the Mfantseman Municipality in the Central Region of Ghana. Quantitative approach of the cross-sectional survey design was adopted. Using purposive and…
Code of Federal Regulations, 2011 CFR
2011-01-01
... Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) FEDERAL EMPLOYEES... made for a distinct period of service; however, such a deposit shall be ineffective if deposits are not...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) FEDERAL EMPLOYEES... made for a distinct period of service; however, such a deposit shall be ineffective if deposits are not...
Guidance and control for unmanned ground vehicles
NASA Astrophysics Data System (ADS)
Bateman, Peter J.
1994-06-01
Techniques for the guidance, control, and navigation of unmanned ground vehicles are described in terms of the communication bandwidth requirements for driving and control of a vehicle remote from the human operator. Modes of operation are conveniently classified as conventional teleoperation, supervisory control, and fully autonomous control. The fundamental problem of maintaining a robust non-line-of-sight communications link between the human controller and the remote vehicle is discussed, as this provides the impetus for greater autonomy in the control system and the greatest scope for innovation. While supervisory control still requires the man to be providing the primary navigational intelligence, fully autonomous operation requires that mission navigation is provided solely by on-board machine intelligence. Methods directed at achieving this performance are described using various active and passive sensing of the terrain for route navigation and obstacle detection. Emphasis is given to TV imagery and signal processing techniques for image understanding. Reference is made to the limitations of current microprocessor technology and suitable computer architectures. Some of the more recent control techniques involve the use of neural networks, fuzzy logic, and data fusion and these are discussed in the context of road following and cross country navigation. Examples of autonomous vehicle testbeds operated at various laboratories around the world are given.
Cryogenic Control System Migration and Developments towards the UNICOS CERN Standard at INFN
NASA Astrophysics Data System (ADS)
Modanese, Paolo; Calore, Andrea; Contran, Tiziano; Friso, Alessandro; Pengo, Marco; Canella, Stefania; Burioli, Sergio; Gallese, Benedetto; Inglese, Vitaliano; Pezzetti, Marco; Pengo, Ruggero
The cryogenic control systems at Laboratori Nazionali di Legnaro (LNL) are undergoing an important and radical modernization, allowing all the plants controls and supervision systems to be renewed in a homogeneous way towards the CERN-UNICOS standard. Before the UNICOS migration project started there were as many as 7 different types of PLC and 7 different types of SCADA, each one requiring its own particular programming language. In these conditions, even a simple modification and/or integration on the program or on the supervision, required the intervention of a system integrator company, specialized in its specific control system. Furthermore it implied that the operators have to be trained to learn the different types of control systems. The CERN-UNICOS invented for LHC [1] has been chosen due to its reliability and planned to run and be maintained for decades on. The complete migration is part of an agreement between CERN and INFN.
Cell-phone based assistance for waterworks/sewage plant maintenance.
Kawada, T; Nakamichi, K; Hisano, N; Kitamura, M; Miyahara, K
2006-01-01
Cell-phones are now incorporating the functions necessary for them to be used as mobile IT devices. In this paper, we present our results of the evaluation of cell-phones as the mobile IT device to assist workers in industrial plants. We use waterworks and sewage plants as examples. By employing techniques to squeeze the SCADA screen on CRT into a small cell-phone LCD, we have made it easier for a plant's field workers to access the information needed for effective maintenance, regardless of location. An idea to link SCADA information and the plant facility information on the cell-phone is also presented. Should an accident or emergency situation arise, these cell-phone-based IT systems can efficiently deliver the latest plant information, thus the worker out in the field can respond to and resolve the emergency.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false How can a state supervisory authority obtain an... and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS CREDIT UNION SERVICE ORGANIZATIONS (CUSOs) § 712.10 How can a state supervisory authority obtain an exemption for state...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 13 2012-01-01 2012-01-01 false Amendment to Technical and Supervisory Assistance Grant Agreement D Exhibit D to Subpart K of Part 1944 Agriculture Regulations of the Department of... Technical and Supervisory Assistance Grants Pt. 1944, Subpt. K, Exh. D Exhibit D to Subpart K of Part 1944...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 13 2013-01-01 2013-01-01 false Amendment to Technical and Supervisory Assistance Grant Agreement D Exhibit D to Subpart K of Part 1944 Agriculture Regulations of the Department of... Technical and Supervisory Assistance Grants Pt. 1944, Subpt. K, Exh. D Exhibit D to Subpart K of Part 1944...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 13 2014-01-01 2013-01-01 true Amendment to Technical and Supervisory Assistance Grant Agreement D Exhibit D to Subpart K of Part 1944 Agriculture Regulations of the Department of... Technical and Supervisory Assistance Grants Pt. 1944, Subpt. K, Exh. D Exhibit D to Subpart K of Part 1944...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 13 2011-01-01 2009-01-01 true Amendment to Technical and Supervisory Assistance Grant Agreement D Exhibit D to Subpart K of Part 1944 Agriculture Regulations of the Department of... Technical and Supervisory Assistance Grants Pt. 1944, Subpt. K, Exh. D Exhibit D to Subpart K of Part 1944...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 13 2010-01-01 2009-01-01 true Amendment to Technical and Supervisory Assistance Grant Agreement D Exhibit D to Subpart K of Part 1944 Agriculture Regulations of the Department of... Technical and Supervisory Assistance Grants Pt. 1944, Subpt. K, Exh. D Exhibit D to Subpart K of Part 1944...
The impact of supervision training on genetic counselor supervisory identity development.
Atzinger, Carrie L; Lewis, Kimberly; Martin, Lisa J; Yager, Geoffrey; Ramstetter, Catherine; Wusik, Katie
2014-12-01
Supervision is critical to the training of genetic counselors. Limited research exists on the influence of supervision training and experience on the development of genetic counseling supervisors. The purpose of this study was to investigate the impact of supervision training in addition to supervisory and clinical experience on supervisory identity development, and the perceived confidence and competence supervisors have in their own supervisory skills. In addition, we explored genetic counselors' (N = 291) interest in and barriers to training as well as perspectives on requirements for supervisors. Results indicated clinical experience, supervision experience, and formal supervision training are positively associated with genetic counselors' supervisory identity development as measured by the Psychotherapy Supervisory Development Scale (PSDS) (p < 0.05). Despite a moderate correlation between supervision experience and formal training (ρ = 0.42, p < 0.001), both had independent effects on PSDS scores (p < 0.04). A majority of genetic counselors were interested in receiving supervision training but noted lack of available training as a barrier. The majority of participants indicated that supervisors should be certified as genetic counselors, but there was no consensus on training requirements. Development of additional supervision training opportunities for genetic counselors should be considered.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Huan; Cheng, Liang; Chuah, Mooi Choo
In the generation, transmission, and distribution sectors of the smart grid, intelligence of field devices is realized by programmable logic controllers (PLCs). Many smart-grid subsystems are essentially cyber-physical energy systems (CPES): For instance, the power system process (i.e., the physical part) within a substation is monitored and controlled by a SCADA network with hosts running miscellaneous applications (i.e., the cyber part). To study the interactions between the cyber and physical components of a CPES, several co-simulation platforms have been proposed. However, the network simulators/emulators of these platforms do not include a detailed traffic model that takes into account the impactsmore » of the execution model of PLCs on traffic characteristics. As a result, network traces generated by co-simulation only reveal the impacts of the physical process on the contents of the traffic generated by SCADA hosts, whereas the distinction between PLCs and computing nodes (e.g., a hardened computer running a process visualization application) has been overlooked. To generate realistic network traces using co-simulation for the design and evaluation of applications relying on accurate traffic profiles, it is necessary to establish a traffic model for PLCs. In this work, we propose a parameterized model for PLCs that can be incorporated into existing co-simulation platforms. We focus on the DNP3 subsystem of slave PLCs, which automates the processing of packets from the DNP3 master. To validate our approach, we extract model parameters from both the configuration and network traces of real PLCs. Simulated network traces are generated and compared against those from PLCs. Our evaluation shows that our proposed model captures the essential traffic characteristics of DNP3 slave PLCs, which can be used to extend existing co-simulation platforms and gain further insights into the behaviors of CPES.« less
Computer interface for mechanical arm
NASA Technical Reports Server (NTRS)
Derocher, W. L.; Zermuehlen, R. O.
1978-01-01
Man/machine interface commands computer-controlled mechanical arm. Remotely-controlled arm has six degrees of freedom and is controlled through "supervisory-control" mode, in which all motions of arm follow set of preprogramed sequences. For simplicity, few prescribed commands are required to accomplish entire operation. Applications include operating computer-controlled arm to handle radioactive of explosive materials or commanding arm to perform functions in hostile environments. Modified version using displays may be applied in medicine.
Nuclear propulsion control and health monitoring
NASA Technical Reports Server (NTRS)
Walter, P. B.; Edwards, R. M.
1993-01-01
An integrated control and health monitoring architecture is being developed for the Pratt & Whitney XNR2000 nuclear rocket. Current work includes further development of the dynamic simulation modeling and the identification and configuration of low level controllers to give desirable performance for the various operating modes and faulted conditions. Artificial intelligence and knowledge processing technologies need to be investigated and applied in the development of an intelligent supervisory controller module for this control architecture.
Nuclear propulsion control and health monitoring
NASA Astrophysics Data System (ADS)
Walter, P. B.; Edwards, R. M.
1993-11-01
An integrated control and health monitoring architecture is being developed for the Pratt & Whitney XNR2000 nuclear rocket. Current work includes further development of the dynamic simulation modeling and the identification and configuration of low level controllers to give desirable performance for the various operating modes and faulted conditions. Artificial intelligence and knowledge processing technologies need to be investigated and applied in the development of an intelligent supervisory controller module for this control architecture.
Human-Robot Interaction: Status and Challenges.
Sheridan, Thomas B
2016-06-01
The current status of human-robot interaction (HRI) is reviewed, and key current research challenges for the human factors community are described. Robots have evolved from continuous human-controlled master-slave servomechanisms for handling nuclear waste to a broad range of robots incorporating artificial intelligence for many applications and under human supervisory control. This mini-review describes HRI developments in four application areas and what are the challenges for human factors research. In addition to a plethora of research papers, evidence of success is manifest in live demonstrations of robot capability under various forms of human control. HRI is a rapidly evolving field. Specialized robots under human teleoperation have proven successful in hazardous environments and medical application, as have specialized telerobots under human supervisory control for space and repetitive industrial tasks. Research in areas of self-driving cars, intimate collaboration with humans in manipulation tasks, human control of humanoid robots for hazardous environments, and social interaction with robots is at initial stages. The efficacy of humanoid general-purpose robots has yet to be proven. HRI is now applied in almost all robot tasks, including manufacturing, space, aviation, undersea, surgery, rehabilitation, agriculture, education, package fetch and delivery, policing, and military operations. © 2016, Human Factors and Ergonomics Society.
Institutional Controls and Educational Research.
ERIC Educational Resources Information Center
Homan, Roger
1990-01-01
Recognizing tendencies toward contract research and possible consequences, advocates creating a conduct code to regulate educational research and protect its integrity. Reports survey responses from 48 British institutions, showing no systematic code. States confidence in supervisory discretion currently guides research. Proposes a specific code…
Modeling Human Supervisory Control in Heterogeneous Unmanned Vehicle Systems
2009-02-01
events through a queue, nominally due to another queue having reached its capacity limitation (Balsamo, Persone, & Onvural, 2001; Onvural, 1990; Perros ...Communication and Coordination, Athens, Greece. Perros , H. G. (1984). Queuing Networks with Blocking: A Bibliography. ACM Sigmetrics, Performance Evaluation
DOE Office of Scientific and Technical Information (OSTI.GOV)
McGoldrick, P.R.
1980-12-11
The Interprocess Communications System (IPCS) was written to provide a virtual machine upon which the Supervisory Control and Diagnostic System (SCDS) for the Mirror Fusion Test Facility (MFTF) could be built. The hardware upon which the IPCS runs consists of nine minicomputers sharing some common memory.
DOT National Transportation Integrated Search
1991-12-01
The objective of this summative evaluation of the Airway Science Curriculum Demonstration Project (ASCDP) was to compare the performance, job attitudes, retention rates, and perceived supervisory potential of graduates from recognized Airway Science ...
Multi-UAV Supervisory Control Interface Technology (MUSCIT)
2012-09-01
similar capability into the Vigilant Spirit Control Station ( VSCS ). During operations each vehicle is placed in its loiter mode. While in loiter mode...the vehicle will maintain a loiter over its designated loiter position. During pervious spirals, VSCS included a Loiter Slave mode where the sensor...available control station features. Prior to Spiral 3 simulation, VSCS developers had been working with Real Time Video Systems (RTVS) and had
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-18
... applicable in connection with market access.\\9\\ The required financial risk management controls and... Act of 1934 August 15, 2011. I. Introduction Pursuant to Rule 15c3-5(f) under the Securities Exchange... maintain a system of risk management controls and supervisory procedures that, among other things, is...
NASA Technical Reports Server (NTRS)
1980-01-01
A consistent approach was sought for both hardware and software which will handle the monitoring and control necessary to integrate a number of different DSG technologies into a common distribution dispatch network. It appears that the control of each of the DSG technologies is compatible with a supervisory control method of operation that lends itself to remote control from a distribution dispatch center.
Educating CPE supervisors: a grounded theory study.
Ragsdale, Judith R; Holloway, Elizabeth L; Ivy, Steven S
2009-01-01
This qualitative study was designed to cull the wisdom of CPE supervisors doing especially competent supervisory education and to develop a theory of CPE supervisory education. Grounded theory methodology included interviewing 11 supervisors and coding the data to identify themes. Four primary dimensions emerged along with a reciprocal core dimension, Supervisory Wisdom, which refers to work the supervisors do in terms of their continuing growth and development.
12 CFR 1214.2 - Purpose and scope.
Code of Federal Regulations, 2014 CFR
2014-01-01
... and Banking FEDERAL HOUSING FINANCE AGENCY ORGANIZATION AND OPERATIONS AVAILABILITY OF NON-PUBLIC INFORMATION § 1214.2 Purpose and scope. (a) Purpose. The purpose of this part is to control the dissemination of non-public information, which includes confidential supervisory information, and maintain its...
46 CFR 11.470 - National officer endorsements as offshore installation manager.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., mechanical supervisor, electrician, crane operator, ballast control operator, or equivalent supervisory... from a program in engineering or engineering technology which is accredited by the Accreditation Board for Engineering and Technology (ABET). The National Maritime Center will give consideration to...
47 CFR 32.5100 - Long distance message revenue.
Code of Federal Regulations, 2010 CFR
2010-10-01
... UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Instructions For Revenue Accounts § 32.5100... terminate beyond the basic service area of the originating wire center and are individually priced. This..., supervisory control, miscellaneous signaling and channels furnished for the purpose of extending customer...
7 CFR 272.4 - Program administration and personnel requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Administration offices, community action agencies, planning agencies, migrant service organizations, and school... area. (c) Internal controls—(1) Requirements. In order to safeguard certification and issuance records... unit to another, supervisory controls should be sufficient to assure that the unauthorized creation or...
7 CFR 272.4 - Program administration and personnel requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Administration offices, community action agencies, planning agencies, migrant service organizations, and school... area. (c) Internal controls—(1) Requirements. In order to safeguard certification and issuance records... unit to another, supervisory controls should be sufficient to assure that the unauthorized creation or...
7 CFR 272.4 - Program administration and personnel requirements.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Administration offices, community action agencies, planning agencies, migrant service organizations, and school... area. (c) Internal controls—(1) Requirements. In order to safeguard certification and issuance records... unit to another, supervisory controls should be sufficient to assure that the unauthorized creation or...
7 CFR 272.4 - Program administration and personnel requirements.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Administration offices, community action agencies, planning agencies, migrant service organizations, and school... area. (c) Internal controls—(1) Requirements. In order to safeguard certification and issuance records... unit to another, supervisory controls should be sufficient to assure that the unauthorized creation or...
Expert Maintenance Advisor Development for Navy Shipboard Systems
1994-01-01
Estoril (EDEN) Chair: Xavier Alaman, Instituto de Ingenieria del Conocimiento, SPAIN "A Model of Handling Uncertainty in Expert Systems," 01 Zhao...for Supervisory Process Control," Xavier Alaman, Instituto de Ingenieria del Conocimiento, SPAIN - (L) INTEGRATED KNOWLEDGE BASED SYSTEMS IN POWER
Code of Federal Regulations, 2010 CFR
2010-01-01
...; Supervisory Criminal Investigators, Anti-Smuggling; Regional Directors; Service Center Directors; Assistant..., Investigations; Supervisory Criminal Investigator, Anti-Smuggling; Regional Director; Special Agent in Charge...
Bell, Jennifer L; Taylor, Matthew A; Chen, Guang-Xiang; Kirk, Rachel D; Leatherman, Erin R
2017-02-01
Roadway incidents are the leading cause of work-related death in the United States. The objective of this research was to evaluate whether two types of feedback from a commercially available in-vehicle monitoring system (IVMS) would reduce the incidence of risky driving behaviors in drivers from two companies. IVMS were installed in 315 vehicles representing the industries of local truck transportation and oil and gas support operations, and data were collected over an approximate two-year period in intervention and control groups. In one period, intervention group drivers were given feedback from in-cab warning lights from an IVMS that indicated occurrence of harsh vehicle maneuvers. In another period, intervention group drivers viewed video recordings of their risky driving behaviors with supervisors, and were coached by supervisors on safe driving practices. Risky driving behaviors declined significantly more during the period with coaching plus instant feedback with lights in comparison to the period with lights-only feedback (ORadj=0.61 95% CI 0.43-0.86; Holm-adjusted p=0.035) and the control group (ORadj=0.52 95% CI 0.33-0.82; Holm-adjusted p=0.032). Lights-only feedback was not found to be significantly different than the control group's decline from baseline (ORadj=0.86 95% CI 0.51-1.43; Holm-adjusted p>0.05). The largest decline in the rate of risky driving behaviors occurred when feedback included both supervisory coaching and lights. Supervisory coaching is an effective form of feedback to improve driving habits in the workplace. The potential advantages and limitations of this IVMS-based intervention program are discussed. Published by Elsevier Ltd.
Bell, Jennifer L.; Taylor, Matthew A.; Chen, Guang-Xiang; Kirk, Rachel D.; Leatherman, Erin R.
2017-01-01
Problem Roadway incidents are the leading cause of work-related death in the United States. Methods The objective of this research was to evaluate whether two types of feedback from a commercially available in-vehicle monitoring system (IVMS) would reduce the incidence of risky driving behaviors in drivers from two companies. IVMS were installed in 315 vehicles representing the industries of local truck transportation and oil and gas support operations, and data were collected over an approximate two-year period in intervention and control groups. In one period, intervention group drivers were given feedback from in-cab warning lights from an IVMS that indicated occurrence of harsh vehicle maneuvers. In another period, intervention group drivers viewed video recordings of their risky driving behaviors with supervisors, and were coached by supervisors on safe driving practices. Results Risky driving behaviors declined significantly more during the period with coaching plus instant feedback with lights in comparison to the period with lights-only feedback (ORadj = 0.61 95% CI 0.43–0.86; Holm-adjusted p = 0.035) and the control group (ORadj = 0.52 95% CI 0.33–0.82; Holm-adjusted p = 0.032). Lights-only feedback was not found to be significantly different than the control group's decline from baseline (ORadj = 0.86 95% CI 0.51–1.43; Holm-adjusted p > 0.05). Conclusions The largest decline in the rate of risky driving behaviors occurred when feedback included both supervisory coaching and lights. Practical applications Supervisory coaching is an effective form of feedback to improve driving habits in the workplace. The potential advantages and limitations of this IVMS-based intervention program are discussed. PMID:28160807
ERIC Educational Resources Information Center
DUBIN, SAMUEL S.; AND OTHERS
TO DETERMINE TRAINING NEEDS OF MANAGERIAL AND SUPERVISORY PERSONNEL IN PENNSYLVANIA BUSINESS AND INDUSTRY AND TO RECOMMEND METHODS OF MEETING THESE NEEDS, 3,620 TOP AND MIDDLE MANAGERS AND FIRST-LINE SUPERVISORS FROM 250 COMPANIES COMPLETED QUESTIONNAIRES. DATA ON COURSES NEEDED, EDUCATIONAL BACKGROUND AND PLANS, KIND OF UPDATING USED, EDUCATIONAL…
Object-Oriented Technology-Based Software Library for Operations of Water Reclamation Centers
NASA Astrophysics Data System (ADS)
Otani, Tetsuo; Shimada, Takehiro; Yoshida, Norio; Abe, Wataru
SCADA systems in water reclamation centers have been constructed based on hardware and software that each manufacturer produced according to their design. Even though this approach used to be effective to realize real-time and reliable execution, it is an obstacle to cost reduction about system construction and maintenance. A promising solution to address the problem is to set specifications that can be used commonly. In terms of software, information model approach has been adopted in SCADA systems in other field, such as telecommunications and power systems. An information model is a piece of software specification that describes a physical or logical object to be monitored. In this paper, we propose information models for operations of water reclamation centers, which have not ever existed. In addition, we show the feasibility of the information model in terms of common use and processing performance.
Sharing control with haptics: seamless driver support from manual to automatic control.
Mulder, Mark; Abbink, David A; Boer, Erwin R
2012-10-01
Haptic shared control was investigated as a human-machine interface that can intuitively share control between drivers and an automatic controller for curve negotiation. As long as automation systems are not fully reliable, a role remains for the driver to be vigilant to the system and the environment to catch any automation errors. The conventional binary switches between supervisory and manual control has many known issues, and haptic shared control is a promising alternative. A total of 42 respondents of varying age and driving experience participated in a driving experiment in a fixed-base simulator, in which curve negotiation behavior during shared control was compared to during manual control, as well as to three haptic tunings of an automatic controller without driver intervention. Under the experimental conditions studied, the main beneficial effect of haptic shared control compared to manual control was that less control activity (16% in steering wheel reversal rate, 15% in standard deviation of steering wheel angle) was needed for realizing an improved safety performance (e.g., 11% in peak lateral error). Full automation removed the need for any human control activity and improved safety performance (e.g., 35% in peak lateral error) but put the human in a supervisory position. Haptic shared control kept the driver in the loop, with enhanced performance at reduced control activity, mitigating the known issues that plague full automation. Haptic support for vehicular control ultimately seeks to intuitively combine human intelligence and creativity with the benefits of automation systems.
The ALICE-HMPID Detector Control System: Its evolution towards an expert and adaptive system
NASA Astrophysics Data System (ADS)
De Cataldo, G.; Franco, A.; Pastore, C.; Sgura, I.; Volpe, G.
2011-05-01
The High Momentum Particle IDentification (HMPID) detector is a proximity focusing Ring Imaging Cherenkov (RICH) for charged hadron identification. The HMPID is based on liquid C 6F 14 as the radiator medium and on a 10 m 2 CsI coated, pad segmented photocathode of MWPCs for UV Cherenkov photon detection. To ensure full remote control, the HMPID is equipped with a detector control system (DCS) responding to industrial standards for robustness and reliability. It has been implemented using PVSS as Slow Control And Data Acquisition (SCADA) environment, Programmable Logic Controller as control devices and Finite State Machines for modular and automatic command execution. In the perspective of reducing human presence at the experiment site, this paper focuses on DCS evolution towards an expert and adaptive control system, providing, respectively, automatic error recovery and stable detector performance. HAL9000, the first prototype of the HMPID expert system, is then presented. Finally an analysis of the possible application of the adaptive features is provided.
Virtual Teleoperation for Unmanned Aerial Vehicles
2012-01-24
Gilbert, S., “Wayfinder: Evaluating Multitouch Interaction in Supervisory Control of Unmanned Vehicles,” Proceedings of ASME 2nd World Conference on... interactive virtual reality environment that fuses available information into a coherent picture that can be viewed from multiple perspectives and scales...for multimodal interaction • Generally abstracted controller hardware and graphical interfaces facilitating deployment on a variety of VR platform
Scheduling Dependent Real-Time Activities
1990-08-01
dependency relationships in a way that is suitable for all real - time systems . This thesis provides an algorithm, called DASA, that is effective for...scheduling the class of real - time systems known as supervisory control systems. Simulation experiments that account for the time required to make scheduling
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Principal. 1404.995 Section 1404.995 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT... investigator, or other person within a participant with management or supervisory responsibilities related to a...
7 CFR 225.14 - Requirements for sponsor participation.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Youth Sports Program; and (5) Private nonprofit organizations as defined in § 225.2. (c) General... camp; (4) Has adequate supervisory and operational personnel for overall monitoring and management of..., terminating, and determining conditions of employment for site staff; and (ii) Exercising management control...
7 CFR 225.14 - Requirements for sponsor participation.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Youth Sports Program; and (5) Private nonprofit organizations as defined in § 225.2. (c) General... camp; (4) Has adequate supervisory and operational personnel for overall monitoring and management of..., terminating, and determining conditions of employment for site staff; and (ii) Exercising management control...
7 CFR 225.14 - Requirements for sponsor participation.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Youth Sports Program; and (5) Private nonprofit organizations as defined in § 225.2. (c) General... camp; (4) Has adequate supervisory and operational personnel for overall monitoring and management of..., terminating, and determining conditions of employment for site staff; and (ii) Exercising management control...
Experimental Validation of a Resilient Monitoring and Control System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wen-Chiao Lin; Kris R. E. Villez; Humberto E. Garcia
2014-05-01
Complex, high performance, engineering systems have to be closely monitored and controlled to ensure safe operation and protect public from potential hazards. One of the main challenges in designing monitoring and control algorithms for these systems is that sensors and actuators may be malfunctioning due to malicious or natural causes. To address this challenge, this paper addresses a resilient monitoring and control (ReMAC) system by expanding previously developed resilient condition assessment monitoring systems and Kalman filter-based diagnostic methods and integrating them with a supervisory controller developed here. While the monitoring and diagnostic algorithms assess plant cyber and physical health conditions,more » the supervisory controller selects, from a set of candidates, the best controller based on the current plant health assessments. To experimentally demonstrate its enhanced performance, the developed ReMAC system is then used for monitoring and control of a chemical reactor with a water cooling system in a hardware-in-the-loop setting, where the reactor is computer simulated and the water cooling system is implemented by a machine condition monitoring testbed at Idaho National Laboratory. Results show that the ReMAC system is able to make correct plant health assessments despite sensor malfunctioning due to cyber attacks and make decisions that achieve best control actions despite possible actuator malfunctioning. Monitoring challenges caused by mismatches between assumed system component models and actual measurements are also identified for future work.« less
NASA Astrophysics Data System (ADS)
Devaraj, Rajesh; Sarkar, Arnab; Biswas, Santosh
2015-11-01
In the article 'Supervisory control for fault-tolerant scheduling of real-time multiprocessor systems with aperiodic tasks', Park and Cho presented a systematic way of computing a largest fault-tolerant and schedulable language that provides information on whether the scheduler (i.e., supervisor) should accept or reject a newly arrived aperiodic task. The computation of such a language is mainly dependent on the task execution model presented in their paper. However, the task execution model is unable to capture the situation when the fault of a processor occurs even before the task has arrived. Consequently, a task execution model that does not capture this fact may possibly be assigned for execution on a faulty processor. This problem has been illustrated with an appropriate example. Then, the task execution model of Park and Cho has been modified to strengthen the requirement that none of the tasks are assigned for execution on a faulty processor.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meador, Richard J.; Hatley, Darrel D.
2004-06-01
PNNL DSOM technology coordinates efficient steam plant operation with EMCS and SCADA systems, providing generation support and automated load shedding to meet peak demand limits saving over $1M in two years.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-30
... $50 billion in total assets and nonbank systemically important financial institutions, subject to annual supervisory stress tests and semi- annual company-run stress tests; ``other financial companies... Board informed as to--(i) its financial condition, [and] systems for monitoring and controlling...
Puig, V; Cembrano, G; Romera, J; Quevedo, J; Aznar, B; Ramón, G; Cabot, J
2009-01-01
This paper deals with the global control of the Riera Blanca catchment in the Barcelona sewer network using a predictive optimal control approach. This catchment has been modelled using a conceptual modelling approach based on decomposing the catchments in subcatchments and representing them as virtual tanks. This conceptual modelling approach allows real-time model calibration and control of the sewer network. The global control problem of the Riera Blanca catchment is solved using a optimal/predictive control algorithm. To implement the predictive optimal control of the Riera Blanca catchment, a software tool named CORAL is used. The on-line control is simulated by interfacing CORAL with a high fidelity simulator of sewer networks (MOUSE). CORAL interchanges readings from the limnimeters and gate commands with MOUSE as if it was connected with the real SCADA system. Finally, the global control results obtained using the predictive optimal control are presented and compared against the results obtained using current local control system. The results obtained using the global control are very satisfactory compared to those obtained using the local control.
Wagner, S L; White, M I; Schultz, I Z; Williams-Whitt, K; Koehn, C; Dionne, C E; Koehoorn, M; Harder, H G; Pasca, R; Wärje, O; Hsu, V; McGuire, L; Lama, I; Schulz, W; Kube, D; Wright, M D
2015-10-01
There is controversy surrounding the impact of workplace interventions aimed at improving social support and supervisory quality on absenteeism, productivity and financial outcomes. To determine the value of social support interventions for work outcomes. Databases were searched for systematic reviews between 2000 and 2012 to complete a synthesis of systematic reviews guided by the PRISMA statement and the IOM guidelines for systematic reviews. Assessment of articles for inclusion and methodological quality was conducted independently by at least two researchers, with differences resolved by consensus. The search resulted in 3363 titles of which 3248 were excluded following title/abstract review, leaving 115 articles that were retrieved and underwent full article review. 10 articles met the set inclusion criteria, with 7 focusing on social support, 2 on supervisory quality and 1 on both. We found moderate and limited evidence, respectively, that social support and supervisory quality interventions positively impact workplace outcomes. There is moderate evidence that social support and limited evidence that supervisory quality interventions have a positive effect on work outcomes.
A cross-cultural comparison of clinical supervision in South Korea and the United States.
Son, Eunjung; Ellis, Michael V
2013-06-01
We investigated similarities and differences in clinical supervision in two cultures: South Korea and the United States The study had two parts: (1) a test of the cross-cultural equivalence of four supervision measures; and (2) a test of two competing models of cultural differences in the relations among supervisory style, role difficulties, supervisory working alliance, and satisfaction with supervision. Participants were 191 South Korean and 187 U.S. supervisees currently engaged in clinical supervision. The U.S. measures demonstrated sufficient measurement equivalence for use in South Korea. Cultural differences moderated the relations among supervisory styles, role difficulties, supervisory working alliance, and supervision satisfaction. Specifically, the relations among these variables were significantly stronger for U.S. than for South Korean supervisees. Implications for theory, research, and practice were discussed.
A threat intelligence framework for access control security in the oil industry
NASA Astrophysics Data System (ADS)
Alaskandrani, Faisal T.
The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.
Freisthler, Bridget; Johnson-Motoyama, Michelle; Kepple, Nancy J.
2014-01-01
Supervisory neglect, or the failure of a caregiver to appropriately supervise a child, is one of the predominant types of neglectful behaviors, with alcohol use being considered a key antecedent to inadequate supervision of children. The current study builds on previous work by examining the role of parental drinking and alcohol outlet densities while controlling for caregiver and child characteristics. Data were obtained from 3,023 participants via a telephone survey from 50 cities throughout California. The telephone survey included items on neglectful parenting practices, drinking behaviors, and socio-demographic characteristics. Densities of alcohol outlets were measured for each of the 202 zip codes in the study. Multilevel Bernoulli models were used to analyze the relationship between four supervisory neglect parenting practices and individual-level and zip code-level variables. In our study, heavy drinking was only significantly related to one of our four outcome variables (leaving a child where he or she may not be safe). The density of on premise alcohol outlets was positively related to leaving a child home alone when an adult should be present. This study demonstrates that discrete relationships exist between alcohol related variables, social support, and specific supervisory neglect subtypes at the ecological and individual levels. PMID:25061256
Health, supervisory support, and workplace culture in relation to work-family conflict and synergy.
Beutell, Nicholas J
2010-08-01
This research examined health, supervisory support, and workplace culture as predictors of work interfering with family, family interfering with work, and work-family synergy. The analysis of data from 2,796 respondents from the 2002 National Study of the Changing Workforce yielded significant relations among measures of mental health, self-rated health, supervisory support, and work-family culture with a focus on career concerns. Support was found for a measure of work-family synergy. Implications and directions for research are discussed.
Spatial Disorientation: Past, Present, and Future
2014-03-27
NJ: Pearson Education, Inc. 10. Stanton, N.A., Booth, R.T., and Stammers , R.B., 1992, “Alarms in human supervisory control: a human factors...perspective,” International Journal of Computer Integrated Manufacturing, 5(2), 81-93. 11. Dismukes, R.K., Berman, B.A., and Loukopoulos, L.D., 2007 , The
78 FR 76297 - Social Media: Consumer Compliance Risk Management Guidance
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-17
... controls should apply to all customers, products and services, including customers engaging in electronic banking (e-banking) through the use of social media, and e- banking products and services offered in the...., Washington DC 20219, (202) 649-7181. Board: Lanette Meister, Senior Supervisory Consumer Financial Services...
12 CFR 347.211 - Examination of branches of foreign banks.
Code of Federal Regulations, 2011 CFR
2011-01-01
... section, if the insured branch: (i) Has total assets of less than $500 million; (ii) Has received a composite ROCA supervisory rating (which rates risk management, operational controls, compliance, and asset quality) of 1 or 2 at its most recent examination; (iii) Satisfies the requirement of either the following...
Networked Interactive Video for Group Training
ERIC Educational Resources Information Center
Eary, John
2008-01-01
The National Computing Centre (NCC) has developed an interactive video training system for the Scottish Police College to help train police supervisory officers in crowd control at major spectator events, such as football matches. This approach involves technology-enhanced training in a group-learning environment, and may have significant impact…
Predictive Models of Procedural Human Supervisory Control Behavior
2011-01-01
Campbell in Australia and Prof. Axel Schulte in Germany: they say a mind stretched by an idea never goes back to its original size, thank you for...recurrent neural network (RNN). Neural nets have been successfully used in diverse applications such as handwriting recognition (Gader, Mohamed et al
Nursing and the Management Function.
ERIC Educational Resources Information Center
Sherman, V. Clayton
The report describes a study designed to analyze nurses' management duties and to identify their tasks in planning, organizing, staffing. leading, communication, decision making, and controlling. A total of 117 supervisory nurses and unit managers from four Western Michigan short-term general hospitals in the 410-540 bed range participated in the…
Managing operational documentation in the ALICE Detector Control System
NASA Astrophysics Data System (ADS)
Lechman, M.; Augustinus, A.; Bond, P.; Chochula, P.; Kurepin, A.; Pinazza, O.; Rosinsky, P.
2012-12-01
ALICE (A Large Ion Collider Experiment) is one of the big LHC (Large Hadron Collider) experiments at CERN in Geneve, Switzerland. The experiment is composed of 18 sub-detectors controlled by an integrated Detector Control System (DCS) that is implemented using the commercial SCADA package PVSSII. The DCS includes over 1200 network devices, over 1,000,000 monitored parameters and numerous custom made software components that are prepared by over 100 developers from all around the world. This complex system is controlled by a single operator via a central user interface. One of his/her main tasks is the recovery of anomalies and errors that may occur during operation. Therefore, clear, complete and easily accessible documentation is essential to guide the shifter through the expert interfaces of different subsystems. This paper describes the idea of the management of the operational documentation in ALICE using a generic repository that is built on a relational database and is integrated with the control system. The experience gained and the conclusions drawn from the project are also presented.
NASA Astrophysics Data System (ADS)
Hanai, Yuji; Hayashi, Yasuhiro; Matsuki, Junya
The line voltage control in a distribution network is one of the most important issues for a penetration of Renewable Energy Sources (RES). A loop distribution network configuration is an effective solution to resolve voltage and distribution loss issues concerned about a penetration of RES. In this paper, for a loop distribution network, the authors propose a voltage control method based on tap change control of LRT and active/reactive power control of RES. The tap change control of LRT takes a major role of the proposed voltage control. Additionally the active/reactive power control of RES supports the voltage control when voltage deviation from the upper or lower voltage limit is unavoidable. The proposed method adopts SCADA system based on measured data from IT switches, which are sectionalizing switch with sensor installed in distribution feeder. In order to check the validity of the proposed voltage control method, experimental simulations using a distribution system analog simulator “ANSWER” are carried out. In the simulations, the voltage maintenance capability in the normal and the emergency is evaluated.
Dickson, Joanne M; Moberly, Nicholas J; Marshall, Yehuda; Reilly, James
2011-01-01
Although the supervisory relationship is thought to be critical in training clinical psychologists, little is known about factors affecting the supervisory alliance. We conducted an Internet survey of British clinical doctoral trainees (N = 259) in which participants rated their supervisory working alliance, parental style during childhood, pathological adult attachment behaviours and attachment style for themselves and their supervisors. Trainees' ratings of the working alliance were associated with perceptions of supervisors' attachment style, but not with perceptions of trainees' own attachment styles. Path analysis supported a causal chain linking parental indifference, compulsive self-reliance, insecure supervisor attachment style and lower ratings of the working alliance. Our results broadly replicate data from a US sample and suggest that attachment theory is helpful in understanding clinical supervisory processes. Copyright © 2010 John Wiley & Sons, Ltd.
Evaluation of Post-Trial Reviews of Courts-Martial within the Department of the Navy
2010-12-10
subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE...Moreno case in an effort to take control of a situation the Navy and Marine Corps would not address. Over the years, the appellate courts repeatedly...inexperienced, first-tour lieutenants. Consequently, having senior, experienced counsel in supervisory positions is essential to controlling quality
2010-08-01
Belkin n52te, the Saitek Cyborg Command Unit, the Wacom Bamboo Fun with stylus, the Wacom Bamboo Fun with touch, and the Xbox 360 controller...4 4 Saitek Cyborg Command Unit function mapping ....................................... 4 iv 5 Wacom Bamboo Fun with stylus and touch...versus Belkin n52te by task . 30 B-2 Participants’ preferences for standard mouse versus Saitek Cyborg Command Unit by task
On an LAS-integrated soft PLC system based on WorldFIP fieldbus.
Liang, Geng; Li, Zhijun; Li, Wen; Bai, Yan
2012-01-01
Communication efficiency is lowered and real-time performance is not good enough in discrete control based on traditional WorldFIP field intelligent nodes in case that the scale of control in field is large. A soft PLC system based on WorldFIP fieldbus was designed and implemented. Link Activity Scheduler (LAS) was integrated into the system and field intelligent I/O modules acted as networked basic nodes. Discrete control logic was implemented with the LAS-integrated soft PLC system. The proposed system was composed of configuration and supervisory sub-systems and running sub-systems. The configuration and supervisory sub-system was implemented with a personal computer or an industrial personal computer; running subsystems were designed and implemented based on embedded hardware and software systems. Communication and schedule in the running subsystem was implemented with an embedded sub-module; discrete control and system self-diagnosis were implemented with another embedded sub-module. Structure of the proposed system was presented. Methodology for the design of the sub-systems was expounded. Experiments were carried out to evaluate the performance of the proposed system both in discrete and process control by investigating the effect of network data transmission delay induced by the soft PLC in WorldFIP network and CPU workload on resulting control performances. The experimental observations indicated that the proposed system is practically applicable. Copyright © 2011 ISA. Published by Elsevier Ltd. All rights reserved.