Results 21 to 30 of about 56,390 (218)

COMBINE COMMUNICATIONS OPTICAL NETWORK OF SCADA OF ELECTRIC POWER STATION AND SUBSTATION

open access: yesИзвестия высших учебных заведений: Проблемы энергетики, 2019
The article discusses an economical way to deploy diagnostic monitoring systems for high-voltage electrical units through a combination of passive fiber-optic systems for collecting and transmitting technological information of SCADA with diagnostic ...
A. N. Vasev   +3 more
doaj   +1 more source

СУЧАСНІ СТАНДАРТИ З РОЗРОБЛЕННЯ ТРИВОЖНОЇ СИГНАЛІЗАЦІЇ В АВТОМАТИЗОВАНИХ СИСТЕМАХ КЕРУВАННЯ ТЕХНОЛОГІЧНИМИ ПРОЦЕСАМИ

open access: yesАвтоматизация технологических и бизнес-процессов, 2019
Автоматизована система керування технологічним процесом передбачає наявність функцій тривожної сигналізації, які виконують надзвичайно важливу роль. Від ефективності роботи підсистеми тривожної сигналізації залежить передусім безпека людей, виробництва ...
О. М. Пупена, А. В. Шишак
doaj   +1 more source

Automated post-fault diagnosis of power system disturbances [PDF]

open access: yes, 2006
In order to automate the analysis of SCADA and digital fault recorder (DFR) data for a transmission network operator in the UK, the authors have developed an industrial strength multi-agent system entitled protection engineering diagnostic agents (PEDA).
Davidson, E.M., McArthur, S.D.J.
core   +1 more source

Forensic Attacks Analysis and the Cyber Security of Safety-Critical Industrial Control Systems [PDF]

open access: yes, 2016
Industrial Control Systems (ICS) and SCADA (Supervisory Control And Data Acquisition) applications monitor and control a wide range of safety-related functions.
Evangelopoulou, Maria   +2 more
core   +2 more sources

Using WEB technology in the control and supervision of energy consumption [PDF]

open access: yesJournal on Processing and Energy in Agriculture, 2011
Modern information technology, which is an integral part of everyday life, may be applied in the field of supervision and control. Widely used technology can be applied relatively easily in the field of supervision and control, either in industrial or ...
Nikolić Perica   +3 more
doaj  

Summarized information from multiple plants in one monitoring system: Advantages and disadvantages on example of boilers [PDF]

open access: yesJournal on Processing and Energy in Agriculture, 2014
Supervisory Control And Data Acquisition (SCADA) systems reached great progress by virtue of the strong development of computer and communication technologies that allow acquisition from distributed places through modern communication networks and ...
Bugarski Vladimir   +2 more
doaj  

Design Private Cloud of Oil and Gas SCADA System

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2014
SCADA (Supervisory Control and Data Acquisition) system is computer control system based on supervisory. SCADA system is very important to oil and gas pipeline engineering.
Liu Miao, Mancang Yuan, Guodong Li
doaj   +1 more source

A Survey on IT-Techniques for a Dynamic Emergency Management in Large Infrastructures [PDF]

open access: yes, 2010
This deliverable is a survey on the IT techniques that are relevant to the three use cases of the project EMILI. It describes the state-of-the-art in four complementary IT areas: Data cleansing, supervisory control and data acquisition, wireless sensor ...
Brodt, Simon   +4 more
core   +1 more source

Embedded intelligence for electrical network operation and control [PDF]

open access: yes, 2011
Integrating multiple types of intelligent, mulitagent data analysis within a smart grid can pave the way for flexible, extensible, and robust solutions to power network ...
Catterson, Victoria   +2 more
core   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy