Results 71 to 80 of about 57,287 (247)
ABSTRACT The installed wind energy capacity increases every year. However, operation and maintenance costs still make up a considerable portion of the levelized costs of electricity. This costs can be greatly reduced by the application of suitable early fault detection methods. The supervisory control and data acquisition system of wind turbines is one
Timo Lichtenstein+2 more
wiley +1 more source
Technology and Application of Multi‐Energy System: An Engineering Study in China
ABSTRACT Multi‐energy system (MES) is crucial for the development of smart cities. This paper summarises the research progress and achievements from an engineering case study in China which aims at enhancing MES energy efficiency. Key theories and technologies were tested at an MES demonstration site in Hunan, China, using both software and hardware ...
Yong Li+5 more
wiley +1 more source
Graphical user interface (GUI) for supervisory control of computer intergtated manufacturing (CIM-70A) using SCADA [PDF]
Supervisory Control system and the Acquisition Data or SCADA is generalization of effective plant monitoring and conU'ol system in meeting production needs etc.
Abu Bakar, Afarulrazi
core
Assessing and augmenting SCADA cyber security: a survey of techniques [PDF]
SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities.
Almalawi+119 more
core +2 more sources
Grid Fragility, Blackouts, and Control Co‐Design Solutions
Hierarchical grid control and GRADIENTS categories. ABSTRACT The grid is undergoing a large‐scale transformation, including a significant reduction of synchronous generators, a high penetration of inverter‐based resources and renewables, substantial demand growth, new extra‐large loads, aging infrastructure and a concerning vulnerability to ...
Mario Garcia‐Sanz+5 more
wiley +1 more source
SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems [PDF]
There is an increasing security risk in Building Automation Systems (BAS) in that its communication is unprotected, resulting in the adversary having the capability to inject spurious commands to the actuators to alter the behaviour of BAS.
Keoh, Sye Loong+3 more
core +1 more source
A SOM based Anomaly Detection Method for Wind Turbines Health Management through SCADA Data
In this paper, a data driven method for Wind Turbine system level anomaly detection and root sub-component identification is proposed. Supervisory control and data acquisition system (SCADA) data of WT is adopted and several parameters are selected based
Mian Du+5 more
doaj +1 more source
OPTIMIZATION OF WORK IN WATER TREATMENT PLANTS USED USING AUTOMATION SYSTEMS (SCADA) [PDF]
A to optimize the work in wastewater treatment plants can use the automation system consisting of PLCs and SCADA. The results are very good using PLCs if they are programed properly and efficiently. The chosen technology combines natural treatment with
COSTACHE (BIRA) Lenuta
doaj
Process Resilience under Optimal Data Injection Attacks
Abstract In this article, we study the resilience of process systems in an information‐theoretic framework, from the perspective of an attacker capable of optimally constructing data injection attacks. The attack aims to distract the stationary distributions of process variables and stay stealthy, simultaneously.
Xiuzhen Ye, Wentao Tang
wiley +1 more source
Inspection Game With Imperfect Detection Technology
ABSTRACT In this article, we investigate a generalized two‐player inspection game between an attacker and a defender who allocates multiple resources across a critical system. Specifically, the attacker targets components of the system while the defender coordinates multiple inspection units to monitor disjoint subsets of components and detect attacks.
J. Haden Boone, Mathieu Dahan
wiley +1 more source