Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
1,721 result(s) for "Supervisory control systems."
Sort by:
Cyber-physical attack recovery procedures : a step-by-step preparation and response guide
\"Provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely\"--Back cover.
Iterative algorithms for multilayer optimizing control
The book presents basic structures, concepts and algorithms in the area of multilayer optimizing control of industrial systems, as well as the results of the research that was carried out by the authors over the last two decades. The methodologies and control algorithms are thoroughly illustrated by numerous simulation examples. Also, the applications to several case study examples are presented. These include ethylene distillation column, vaporizer pilot scale plant, styrene distillation line consisting of three columns and industrial furnace pilot scale plant. A temporal decomposition is applied to the Integrated Wastewater System case study to derive multilayer dynamic optimizing controller with repetitive robust model predictive control mechanism distributed over the layers operating in different time scales.
Aeration control system design : a practical guide to energy and process optimization
\"Proper engineering and execution of aeration control systems is of prime importance to treatment plants, representing a significant savings in labor and energy costs. Taking an integrated, cross-disciplinary approach to this critical process, Aeration Control System Design comprehensively addresses the concept and system design of aeration activated wastewater treatment. Covering complete treatment of aeration system controls, processes, and instrumentation, this hands-on text provides civil and environmental engineers, mechanical engineers, and electrical/instrumentation engineers with theoretical and mathematical treatment of case histories, complete with design procedures and analysis methodology\"-- Provided by publisher.
Practical SCADA for Industry
A SCADA system gathers information, such as where a leak on a pipeline has occurred, transfers the information back to a central site, alerting the home station that the leak has occurred, carrying out necessary analysis and control, such as determining if the leak is critical, and displaying the information in a logical and organized fashion.
SCADA Security
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems—the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory management—can lead to costly financial consequences or even result in loss of life. Minimizing potential risks and responding to malicious actions requires innovative approaches for monitoring SCADA systems and protecting them from targeted attacks. SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is designed to help security and networking professionals develop and deploy accurate and effective Intrusion Detection Systems (IDS) for SCADA systems that leverage autonomous machine learning. Providing expert insights, practical advice, and up-to-date coverage of developments in SCADA security, this authoritative guide presents a new approach for efficient unsupervised IDS driven by SCADA-specific data. Organized into eight in-depth chapters, the text first discusses how traditional IT attacks can also be possible against SCADA, and describes essential SCADA concepts, systems, architectures, and main components. Following chapters introduce various SCADA security frameworks and approaches, including evaluating security with virtualization-based SCADAVT, using SDAD to extract proximity-based detection, finding a global and efficient anomaly threshold with GATUD, and more. This important book: * Provides diverse perspectives on establishing an efficient IDS approach that can be implemented in SCADA systems * Describes the relationship between main components and three generations of SCADA systems * Explains the classification of a SCADA IDS based on its architecture and implementation * Surveys the current literature in the field and suggests possible directions for future research SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is a must-read for all SCADA security and networking researchers, engineers, system architects, developers, managers, lecturers, and other SCADA security industry practitioners.
Practical modern SCADA protocols: DNP3, 60870.5 and related systems
SCADA (Supervisory Control and Data Acquisition) systems are at the heart of the modern industrial enterprise ranging from mining plants, water and electrical utility installations to oil and gas plants. In a market that is crowded with high-level monographs and reference guides, more practical information for professional engineers is required. This book covers the essentials of SCADA communication systems focussing on DNP3, the IEC 60870.5 standard and other new developments in this area. It commences with a brief review of the fundamentals of SCADA systems' hardware, software and the communications systems (such as RS-232, RS-485, Ethernet and TCP/IP) that connect the SCADA Modules together. A solid review is then done on the DNP3 and IEC 60870.5 protocols where its features, message structure, practical benefits and applications are discussed. This book provides you with the knowledge to design your next SCADA system more effectively with a focus on using the latest communications technologies available. * Covers the essentials of SCADA communication systems and other new developments in this area * Covers a wide range of specialist networking topics and other topics ideal for practicing engineers and technicians looking to further and develop their knowledge of the subject * Extremely timely subject as the industry has made a strong movement towards standard protocols in modern SCADA communications systems
Practical Modern SCADA Protocols
SCADA (Supervisory Control and Data Acquisition) systems are at the heart of the modern industrial enterprise ranging from mining plants, water and electrical utility installations to oil and gas plants.In a market that is crowded with high-level monographs and reference guides, more practical information for professional engineers is required.
Cybersecurity for Industrial Control Systems
As industrial control systems (ICS) become Internet-facing, they expose crucial services to attack. Explaining how to develop and implement an effective cybersecurity program for ICS, this book provides the tools to ensure network security without sacrificing efficiency and functionality. Starting with an introduction to ICS, it discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. It explains why security requirements differ from IT to ICS and explains when standard IT security solutions can be used and where SCADA practices are required.
Cybersecurity for Industrial Control Systems
As industrial control systems (ICS) become Internet-facing, they expose crucial services to attack. Explaining how to develop and implement an effective cybersecurity program for ICS, this book provides the tools to ensure network security without sacrificing efficiency and functionality. Starting with an introduction to ICS, it discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. It explains why security requirements differ from IT to ICS and explains when standard IT security solutions can be used and where SCADA practices are required.
Aeration Control System Design - A Practical Guide to Energy and Process Optimization
Learn how to design and implement successful aeration control systemsCombining principles and practices from mechanical, electrical, and environmental engineering, this book enables you to analyze, design, implement, and test automatic wastewater aeration control systems and processes. It brings together all the process requirements, mechanical equipment operations, instrumentation and controls, carefully explaining how all of these elements are integrated into successful aeration control systems. Moreover, The book features a host of practical, state-of-the-technology tools for determining energy and process improvements, payback calculations, system commissioning, and more.Author has three decades of hands-on experience in every phase of aeration control systems design and implementation. He presents not only the most current theory and technology, but also practical tips and techniques that can only be gained by many years of experience. Inside the book, readers will find:Full integration of process, mechanical, and electrical engineering considerationsAlternate control strategies and algorithms that provide better performance than conventional proportional-integral-derivative controlPractical considerations and analytical techniques for system evaluation and designNew feedforward control technologies and advanced process monitoring systems