In this paper, a model predictive controller is configured to simultaneously manipulate a small valve and a large valve, eliminating the problems inherent in split-ranged and valve-position controllers.
Everyone feels the effects of the intensely competitive global marketplace where improving plant performance is the only way to stay in the game, and where data contained withing your plant alarm systems is the key.
This tutorial presented by the University of Michigan's School of Engineering will show you the characteristics of proportional (P), integral (I), and derivative (D) controls, and how to use them to obtain a desired response.
It seems like everyone is talking about alarm system rationalization or re-engineering projects these days. But sometimes these rationalization projects have trouble getting off the ground. This White Paper describes a way to justify the alarm rationalization project by installing an on-line alarm auditing tool.
In the past, the choices for redundancy for edge-of-the-network devices were too limited, too expensive, or too complicated to be considered in most industrial systems. This White Paper, however, contends that today's dual-homing technology can changes all that. Read how.
Restoring your alarm system to a useful state can eliminate duplicate and nuisance alarms, and ensure that the necessary alarms are properly prioritized and documented. This White Paper presents a model for justifying an alarm system reengineering project, and provides two case studies showing the application of the model.
When you lift your hand to catch a ball it is very unlikely that your brain actually formulates or solves the equations of motion in working out when and where to place your hand to catch the ball. Its much more likely that you use, unconsciously, something thats much more akin to the geometrical methods underlying the all-new Geometric Process Control Technology described in this article.
The first draft of the System Protection Profile for Industrial Control Systems, designed to present a cohesive, cross-industry, baseline set of security requirements for new industrial control systems, is available for download and review.
This guideline provides suggestions for an effective cyber security patch management strategy for control systems, addresses potential risks that can apply to some electricity sector organizations, and provides practices that can help mitigate the risks.
By reducing the number of alarms and enabling the audible alarming function of its control system, GFS Computing was able to restore audible alarming on half of its operator consoles, leading to tangible, measurable improvements in productivity, safety, and cost-reduction.
This White Paper presents case studies that demonstrate how improved control system KPIs directly drive improved corporate KPIs, and how managing these factors can ensure better performance of the long-term measures.
Automation designers face many challenges and tradeoffs in the development of a successful network solution. This White Paper discusses the necessary choices in selecting a network technology appropriate for various specific applications.
This White Paper shows how the application of Active Model Capture Technology (AMCT) by a manufacturing plants problem-solving personnel reduces time wasted, and helps to focus the effort of these problem-solvers who must keep the process running at its best.
This "special to the web" White Paper provides a non-technical overview of critical infrastructure SCADA security and gives a background on SCADA systems and the history of critical infrastructure concern.
This special to the web briefing report from the Office of the Inspector General evaluates the impediments and barriers that prevent water systems and other Power-Gen plants from securing known SCADA vulnerabilities.