• Title/Summary/Keyword: Supervisory control

Search Result 351, Processing Time 0.027 seconds

The Design of Monitoring & Control(M&C) for KUS RFS in KASS (KASS 위성통신국 RF시스템 감시제어장치 설계)

  • Kim, Taehee;Sin, Cheonsig
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.50-55
    • /
    • 2017
  • In this paper, the design of the RF system monitoring and control system of KUS (KASS: KASS Uplink Station) which constitutes KASS (Korea Augmentation Satellite System) is described. The Korean satellite calibration system is named KASS and aims to develop the SBAS system of the APV-1 level SoL service level and the CAT-1 test operation technology. Software and hardware development environment, function and algorithm of supervisory control device, structure of supervisory control device, and user interface were designed to implement KUS / RFS monitoring control device. We have secured the stability and reliability of the system by using the monitoring and control system design of the COMS (Communication Ocean & Meteorological Satellite) and the Korea Satellite 5A / 7 control system, which has already been used for the design of the surveillance control system. In addition, we have made it possible to provide the user interface according to the actual operator's request more conveniently.

SCADA 시스템

  • 김종문
    • 전기의세계
    • /
    • v.36 no.6
    • /
    • pp.403-410
    • /
    • 1987
  • SCADA 시스템은 'Supervisory Control And Data Acquisition'의 약어로서 원거리에 산재하여 있는 설비들을 한곳에서 집중 감시, 제어할 수 있는 시스템을 일컫는다. SCADA 시스템은 다양한 산업설비(전력 설비, PIPE LINE 설비 및 UTILITY)가 복잡대형화 되어감에 따라 이들 설비와 계통들을 한곳에서 효과적으로 감시, 제어, 측정하여 이들 자료를 분석처리함으로서 설비 계통의 합리적 운용 및 효율적 에너지 관리를 위한 집중원방감시제어 시스템이다.

  • PDF

A study on vulnerabilities of serial based DNP in power control fields (전력 제어시스템의 시리얼 기반 DNP통신 취약점에 관한 연구)

  • Jang, Ji Woong;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1143-1156
    • /
    • 2013
  • Power control system like SCADA(Supervisory Control And Data Acquisition) is gathering information using RS232C and low-speed analog communication network. In general, these methods are known as secure because of the secure characteristics from the analog based communication network and serial communication. In this study, first we build DNP communication environment using commercial power control simulator and find some vulnerabilities by testing from the viewpoint of confidentiality, integrity and availability. Consequently, we see the necessity of a valid method for authentication and data encryption when gathering information, even though that is known as secure so far. Discussion of needs of DNP authentication and data encryption is started about several years ago, but there is still nowhere applied that on real environment because the current methods can not fully meet the security requirements of the real environment. This paper suggests a solution to the vulnerabilities, and propose some considerations for enhancing power control system's security level by applying DNP authentication and data encryption.

Research on Financial Regulations Related RPA(Robotic Process Automation) (금융회사 RPA(로봇자동화) 관련 규제 연구)

  • Han, Taek-Ryong;Lee, Kyung-ho
    • The Journal of Bigdata
    • /
    • v.4 no.2
    • /
    • pp.47-59
    • /
    • 2019
  • Recently, the RPA (Robotic Process Automation) solution, which has been spreading in Korea and overseas, allows users to easily automate their tasks with the application GUI (Graphic User Interface), and the number of Korean financial companies which Implemented for automating their business is increasing now. However, as the major supervisory regulations that financial institutions must comply with are based on the existing traditional SDLC (Software Development Life Cycle), it is not proper to be directly applied to RPA that automates end-user works on the level of user's system interface. Therefore, in this paper, we organized the important financial supervisory rules and control items that should be considered for RPA implementation, then surveyed 24 financial companies which have implemented RPA for checking how they applied them. Finally, we would like to present the necessity of revision of related compliance.

  • PDF

Building IEC 61850 SCADA system based on TETRA (TETRA 기반 IEC 61850 SCADA 시스템 구축)

  • Song, Byung-Kwen;Jeong, Tae-Ui
    • Journal of IKEEE
    • /
    • v.13 no.3
    • /
    • pp.87-94
    • /
    • 2009
  • TETRA(TErrestrial Trunked RAdio) is the wireless communication system generally adopted to public network and backbone network, as the technology of Trunked Radio System specified by ETSI(European Telecommunications Standards Institute) and currently adopted to the Electric Power IT Backbone Network in Korea. IEC 61850 is the protocol proposed for SAS(Substation Automation System) of SCADA(Supervisory Control And Data Acquisition) system. In this paper, IEC 61850 Server and Client simulator are used based on Linux operating system. The multi-functional gateway, which transforms the communication based on TCP/IP between IEC 61850 Server Simulator and Client Simulator to the one based on TETRA Packet Data Service, is developed such that IEC 61850 SCADA system is constructed based on TETRA.

  • PDF

Implementation of Intelligent Container System and Information Processing Using Fuzzy Logic (지능형 컨테이너 시스템의 구현과 퍼지 논리를 이용한 정보처리)

  • Son, Sang-Hyuk;Kang, Geun-Taek;Lee, Won-Chang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.3
    • /
    • pp.398-403
    • /
    • 2009
  • The recent trend of logistics demands for improved monitoring system of the inside of containers including current temperature and other environmental conditions. This paper presents an information processing technique with fuzzy logic that recognizes the current situations inside the target container and can be implemented on intelligent container systems. The ZigBee modules are used to collect information such as temperature, humidity, and shock inside the container in ubiquitous environment. The information processing system using fuzzy logic and the InTouch, one of SCADA(Supervisory Control and Data Acquisition) systems, is implemented to monitor the inside of the container and predict the emergency state.

Security Issues in SCADA Network (SCADA 네트워크 보안 이슈)

  • Kim, Hak-Man;Kang, Dong-Joo
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.46-47
    • /
    • 2007
  • SCADA (Supervisory Control and Data Acquisition) system has been used fur remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks. SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism. Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, we introduce recent security issue of SCADA network and propose the application of encryption method to Korea SCADA network.

  • PDF

A study on the computer application for efficient management of the power distribution system (효율적인 배전관리를 위한 컴퓨터 응용연구)

  • 이병철;서영노;정진현;고윤석;김호용
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1993.10a
    • /
    • pp.975-980
    • /
    • 1993
  • In accordance with increase, if electronic power demanded, more efficient supervisory control of distribution system will be required. This study contains development of MMI(man-machine-interface) system with GUI(graphic-user-interface), for the automatic power distribution system. The main function of MMI system is to edit network of power distribution and to management of data base for network. The GUI function of MMI system enables more efficient management of power distribution system.

  • PDF

Approximation of the functional by neural network and its application to dynamic systems (신경회로망을 이용한 함수의 근사와 동적 시스템에의 응용)

  • 엄태덕;홍선기;김성우;이주장
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1994.10a
    • /
    • pp.313-318
    • /
    • 1994
  • It is well known that the neural network can be used as an universal approximater for functions and functionals. But these theoretical results are just an existence theorem and do not lead to decide the suitable network structure. This doubfulness whether a certain network can approximate a given function or not, brings about serious stability problems when it is used to identify a system. To overcome the stability problem, We suggest successive identification and control scheme with supervisory controller which always assures the identification process within a basin of attraction of one stable equilibrium point regardless of fittness of the network.

  • PDF

Optimal supervisory control for multiple-modelled discrete event systems

  • Lee, Moon-Sang;Lim, Jong-Tae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.73.5-73
    • /
    • 2001
  • In this paper, we present a procedure to design the robust optimal supervisor which has the minimal cost in the sense of average for a given multiple-modelled discrete event system DES. In order to design the robust optimal supervisor, we extend the optimal supervisor design algorithm for a deterministic DES to the case of multiple-modelled DESs. In addition, using the proposed algorithm with modified costs of events and penalities of states, we can show whether a robust supervisor for a given multiple-modelled DES exists and design the minimally restricted robust supervisor.

  • PDF