The Study of Substation Automation and Control Systems

2012 ◽  
Vol 203 ◽  
pp. 167-170
Author(s):  
Xue Feng Ding

The power system expansion and improvement of the level of modernization, especially in computer control technology to improve the reliability of the substation control and protection systems security line of economy and availability have become increasingly demanding, with the automation technology computer technology and development of communication technologies, substation automation technology have developed rapidly, many designed by the new principles of the new concept of integrated substation automation system put into operation, to demonstrate its strong vitality, but also to promote the integrated substation automation technology to the rapid diffusion and application, and to become power industry to implement one of the key technological advances.

Energies ◽  
2020 ◽  
Vol 13 (8) ◽  
pp. 1917 ◽  
Author(s):  
Dan-Adrian Mocanu ◽  
Viorel Bădescu ◽  
Ciprian Bucur ◽  
Iuliana Ștefan ◽  
Elena Carcadea ◽  
...  

The Stirling engine together with a solar concentrator represents a solution for increasing energy efficiency. Thus, within the National Research and Development Institute for Cryogenic and Isotopic Technologies, an automation system was designed and implemented in order to control the processes inside the solar conversion unit using a programmable logic controller from Schneider Electric. The acquired parameters from the installed sensors were monitored using Unity Pro L software. The main objective of this paper is to solve the starting, operating, and shut-down sequences in safe conditions, as well as monitor the working parameters.


Author(s):  
Adeyemi Charles Adewole ◽  
Raynitchka Tzoneva

Processes ◽  
2021 ◽  
Vol 10 (1) ◽  
pp. 21
Author(s):  
Robert Kazała ◽  
Sławomir Luściński ◽  
Paweł Strączyński ◽  
Albena Taneva

This article presents the most valuable and applicable open-source tools and communication technologies that may be employed to create models of production processes by applying the concept of Digital Twins. In recent years, many open-source technologies, including tools and protocols, have been developed to create virtual models of production systems. The authors present the evolution and role of the Digital Twin concept as one of the key technologies for implementing the Industry 4.0 paradigm in automation and control. Based on the presented structured review of valuable open-source software dedicated to various phases and tasks that should be realised while creating the whole Digital Twin system, it was demonstrated that the available solutions cover all aspects. However, the dispersion, specialisation, and lack of integration cause this software to usually not be the first choice to implement DT. Therefore, to successfully create full-fledged models of Digital Twins by proceeding with proposed open-source solutions, it is necessary to make additional efforts due to integration requirements.


2014 ◽  
Vol 8 (4) ◽  
pp. 598-610
Author(s):  
Ahmed O. Abdul Salam ◽  

Automation via the internet has recently received considerable attention. The prime objective of internetbased process automation underlies, amongmany others, the feasibility of remote monitoring and control of a wide range of distributed and collaborative experimental and manufacturing tools and machineries. Such emphasis would adopt the recent software and hardware development technologies. This paper investigates the minimal hardware and software requirements to design and implement a fully functional academic and industrial automation system that can be readily attached to the available internet/intranet infrastructure. Three tiers mainly constitute the proposed system, the instrumentation and measurement tier, the software platform (for data collection, processing, displaying, and communication), and the client-server tier. The common controllerbased techniques, such as PLC (Programmable Logic Controllers), SCADA (Supervisory Control and Data Acquisition), and DAQ (Data Acquisition) platforms can be very well employed in such applications without sophistication burdens. Eventually, the ultimate intentions of having engineers and technical operators to monitor, control, maintain, and calibrate factory equipment, or students involved in lab experimentation, from local or remote distances can be successfully achieved around the clock. Previous and current practical implementation examples will be verified to assess the feasibility range of existing techniques and their implications.


2013 ◽  
Vol 416-417 ◽  
pp. 743-747
Author(s):  
Long Gen Li

With technical means of continuous improvement and the widespread use of information technology,automatic control technology are constantly generated and development in textile machinery. The larger of the textile machinery manufacturing industry and the wider the range of products produced, the higher the internal automation technology and information technology and more automation products. This paper analyzes the means of automation technology, Dong-guan textile industry machinery used in the automation and control technology and automation control technology trends preliminary summary, and the paper also discusses the technical updates on our inspiration..


2016 ◽  
Vol 12 (1) ◽  
pp. 9 ◽  
Author(s):  
Isidro Calvo ◽  
Ismael Etxeberria-Agiriano ◽  
Miguel A Iñigo ◽  
Pablo González-Nalda

Until recently, Industrial Automation and Control Systems (IACS) were largely isolated from corporate systems by means of proprietary protocols, which facilitated their protection against cyber-attacks under the principle of security through obscurity. However, the widespread adoption of the new communication technologies, such as the Internet protocols and wireless communications has changed this scenario. During recent years there have been many evidences of cyber-attacks to IACS that exploit their vulnerabilities. Unfortunately, these attacks have increased significantly during the last five years, and we should be aware that only the tip of the iceberg comes to the public knowledge. The purpose of this article is twofold: (1) to raise awareness about the security vulnerabilities that most companies are facing at their IACS and (2) to set a starting point by proposing a roadmap that seeks to guide designers and programmers in the new and complex world of industrial cyber-security.


Sign in / Sign up

Export Citation Format

Share Document