Results 71 to 80 of about 57,287 (247)

Empirical Physics‐Based Normal Behavior Modeling of Drive Train Temperatures With High‐Resolution Wind Turbine Operating Data

open access: yesWind Energy, EarlyView.
ABSTRACT The installed wind energy capacity increases every year. However, operation and maintenance costs still make up a considerable portion of the levelized costs of electricity. This costs can be greatly reduced by the application of suitable early fault detection methods. The supervisory control and data acquisition system of wind turbines is one
Timo Lichtenstein   +2 more
wiley   +1 more source

Technology and Application of Multi‐Energy System: An Engineering Study in China

open access: yesEnergy Internet, EarlyView.
ABSTRACT Multi‐energy system (MES) is crucial for the development of smart cities. This paper summarises the research progress and achievements from an engineering case study in China which aims at enhancing MES energy efficiency. Key theories and technologies were tested at an MES demonstration site in Hunan, China, using both software and hardware ...
Yong Li   +5 more
wiley   +1 more source

Graphical user interface (GUI) for supervisory control of computer intergtated manufacturing (CIM-70A) using SCADA [PDF]

open access: yes, 2006
Supervisory Control system and the Acquisition Data or SCADA is generalization of effective plant monitoring and conU'ol system in meeting production needs etc.
Abu Bakar, Afarulrazi
core  

Assessing and augmenting SCADA cyber security: a survey of techniques [PDF]

open access: yes, 2017
SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities.
Almalawi   +119 more
core   +2 more sources

Grid Fragility, Blackouts, and Control Co‐Design Solutions

open access: yesAdvanced Control for Applications, Volume 7, Issue 3, September 2025.
Hierarchical grid control and GRADIENTS categories. ABSTRACT The grid is undergoing a large‐scale transformation, including a significant reduction of synchronous generators, a high penetration of inverter‐based resources and renewables, substantial demand growth, new extra‐large loads, aging infrastructure and a concerning vulnerability to ...
Mario Garcia‐Sanz   +5 more
wiley   +1 more source

SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems [PDF]

open access: yes, 2018
There is an increasing security risk in Building Automation Systems (BAS) in that its communication is unprotected, resulting in the adversary having the capability to inject spurious commands to the actuators to alter the behaviour of BAS.
Keoh, Sye Loong   +3 more
core   +1 more source

A SOM based Anomaly Detection Method for Wind Turbines Health Management through SCADA Data

open access: yesInternational Journal of Prognostics and Health Management, 2016
In this paper, a data driven method for Wind Turbine system level anomaly detection and root sub-component identification is proposed. Supervisory control and data acquisition system (SCADA) data of WT is adopted and several parameters are selected based
Mian Du   +5 more
doaj   +1 more source

OPTIMIZATION OF WORK IN WATER TREATMENT PLANTS USED USING AUTOMATION SYSTEMS (SCADA) [PDF]

open access: yesFiabilitate şi Durabilitate, 2022
A to optimize the work in wastewater treatment plants can use the automation system consisting of PLCs and SCADA. The results are very good using PLCs if they are programed properly and efficiently. The chosen technology combines natural treatment with
COSTACHE (BIRA) Lenuta
doaj  

Process Resilience under Optimal Data Injection Attacks

open access: yesAIChE Journal, Volume 71, Issue 8, August 2025.
Abstract In this article, we study the resilience of process systems in an information‐theoretic framework, from the perspective of an attacker capable of optimally constructing data injection attacks. The attack aims to distract the stationary distributions of process variables and stay stealthy, simultaneously.
Xiuzhen Ye, Wentao Tang
wiley   +1 more source

Inspection Game With Imperfect Detection Technology

open access: yesNaval Research Logistics (NRL), Volume 72, Issue 5, Page 694-712, August 2025.
ABSTRACT In this article, we investigate a generalized two‐player inspection game between an attacker and a defender who allocates multiple resources across a critical system. Specifically, the attacker targets components of the system while the defender coordinates multiple inspection units to monitor disjoint subsets of components and detect attacks.
J. Haden Boone, Mathieu Dahan
wiley   +1 more source

Home - About - Disclaimer - Privacy