WorldWideScience

Sample records for system scada ids

  1. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    Energy Technology Data Exchange (ETDEWEB)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  2. Power system SCADA and smart grids

    CERN Document Server

    Thomas, Mini S

    2015-01-01

    Power System SCADA and Smart Grids brings together in one concise volume the fundamentals and possible application functions of power system supervisory control and data acquisition (SCADA). The text begins by providing an overview of SCADA systems, evolution, and use in power systems and the data acquisition process. It then describes the components of SCADA systems, from the legacy remote terminal units (RTUs) to the latest intelligent electronic devices (IEDs), data concentrators, and master stations, as well as:Examines the building and practical implementation of different SCADA systemsOf

  3. Network SCADA System

    International Nuclear Information System (INIS)

    Milivojevic, Dragan R.; Tasic, Visa; Karabasevic, Dejan

    2003-01-01

    Copper Institute, Industrial Informatics department, is developing and applying network real time process monitoring and control systems. Some of these systems are already in use. The paper presents some hardware and software general remarks and performances, with special regard to communication sub-systems and network possibilities. (Author)

  4. Pipelines, utilities plan over 150 scada systems

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This paper reports that North American pipelines and utilities will spend more than $170 million on new or upgraded supervisory control and data acquisition (scada) systems during the 30-month period that commenced Sept. 1. Another $12.5 million will be spent on peripherals and consulting. Among the 699 various projects to be implemented during the period, companies will install 151 scada systems, add 154 remote-terminal units (RTUs) to existing scada units, and install 196 communications systems. Scada systems are computerized hardware and software systems that perform a set of monitoring and control functions. In gas utilities, these systems perform functions normally associated with gas transmission and distribution as well as production plant process control. In gas and oil pipelines, the systems perform these functions as well as such specialized functions as batch tracking, leak detection, and gas load flow

  5. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  6. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  7. Design Private Cloud of Oil and Gas SCADA System

    Directory of Open Access Journals (Sweden)

    Liu Miao

    2014-05-01

    Full Text Available SCADA (Supervisory Control and Data Acquisition system is computer control system based on supervisory. SCADA system is very important to oil and gas pipeline engineering. Cloud computing is fundamentally altering the expectations for how and when computing, storage and networking resources should be allocated, managed and consumed. In order to increase resource utilization, reliability and availability of oil and gas pipeline SCADA system, the SCADA system based on cloud computing is proposed in the paper. This paper introduces the system framework of SCADA system based on cloud computing and the realization details about the private cloud platform of SCADA system.

  8. SCADA system for islanded DC microgrids

    DEFF Research Database (Denmark)

    Xiao, Zhao xia; Zhijun, Guo; Guerrero, Josep M.

    2017-01-01

    intelligent modules and different communication techniques. The developed SCADA system can monitor real-time parameters such as voltages, currents, or powers, and can store the important parameters into the database. Users can get historical data realistically and effectively through SQL access. When some...... the action of the slaves. This way, it implements the combination of required monitoring and control functions. The SCADA system includes an energy management system (EMS), monitoring of state of charge (SOC) of the battery management system (BMS), and black start operation. The system is in operation...... values in the system exceed or fall below the predetermine limits, the SCADA system can pop up the alarm screen, give an alert and send a text message or call an specified person via an SMS module. The host not only can monitor the operation status of the system, but also give orders to control...

  9. Design Private Cloud of Oil and Gas SCADA System

    OpenAIRE

    Liu Miao; Mancang Yuan; Guodong Li

    2014-01-01

    SCADA (Supervisory Control and Data Acquisition) system is computer control system based on supervisory. SCADA system is very important to oil and gas pipeline engineering. Cloud computing is fundamentally altering the expectations for how and when computing, storage and networking resources should be allocated, managed and consumed. In order to increase resource utilization, reliability and availability of oil and gas pipeline SCADA system, the SCADA system based on cloud computing is propos...

  10. Handbook of SCADA/control systems security

    CERN Document Server

    Radvanovsky, Robert

    2013-01-01

    The availability and security of many services we rely upon-including water treatment, electricity, healthcare, transportation, and financial transactions-are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide. Divided into five sections, the book examines topics comprising functions within

  11. Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Hernandez Jimenez, Jarilyn M [ORNL; Chen, Qian [Savannah State University; Nichols, Jeff A. {Cyber Sciences} [ORNL; Calhoun, Chelsea [Savannah State University; Sykes, Summer [Savannah State University

    2017-01-01

    Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report by Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.

  12. Review of Supervisory Control and Data Acquisition (SCADA) Systems

    Energy Technology Data Exchange (ETDEWEB)

    Reva Nickelson; Briam Johnson; Ken Barnes

    2004-01-01

    A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.

  13. Low-Cost SCADA System Using Arduino and Reliance SCADA for a Stand-Alone Photovoltaic System

    Directory of Open Access Journals (Sweden)

    Ibrahim Allafi

    2018-01-01

    Full Text Available SCADA (supervisory control and data acquisition systems are currently employed in many applications, such as home automation, greenhouse automation, and hybrid power systems. Commercial SCADA systems are costly to set up and maintain; therefore those are not used for small renewable energy systems. This paper demonstrates applying Reliance SCADA and Arduino Uno on a small photovoltaic (PV power system to monitor the PV current, voltage, and battery, as well as efficiency. The designed system uses low-cost sensors, an Arduino Uno microcontroller, and free Reliance SCADA software. The Arduino Uno microcontroller collects data from sensors and communicates with a computer through a USB cable. Uno has been programmed to transmit data to Reliance SCADA on PC. In addition, Modbus library has been uploaded on Arduino to allow communication between the Arduino and our SCADA system by using MODBUS RTU protocol. The results of the experiments demonstrate that SCADA works in real time and can be effectively used in monitoring a solar energy system.

  14. Pipeline, utilities to spend $127 million on scada systems

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    Spending for new or upgraded supervisory control and data acquisition (scada) systems and for additional remote-terminal units (RTUs) by North American pipelines and utilities will exceed $165 million through February 1996. New and updated scada systems will total 122 at a cost of more than $127 million; 143 RTU add-on projects will cost more than $38 million. Pipelines and combined utilities/pipelines will spend $89.5 million for 58 scada-system projects and $30.2 million for RTU add-on projects. Scada systems are computerized hardware and software systems that perform monitoring and control functions. In gas utilities, these systems perform functions normally associated with gas transmission and distribution as well as production-plant process control. In gas and oil pipelines, the systems perform these functions as well as such specialized functions as batch tracking, leak detection, and gas load flow

  15. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  16. What SCADA systems can offer to optimize field operations

    International Nuclear Information System (INIS)

    McLean, D.J.

    1997-01-01

    A new technology developed by Kenomic Controls Ltd. of Calgary was designed to solve some of the problems associated with producing gas wells with high gas to liquids ratios. The rationale and the system architecture of the SCADA (Supervisory Control and Data Acquisition) system were described. The most common application of SCADA is the Electronic Flow Measurement (EFM) installation using a solar or thermo-electric generator as a power source for the local electronics. Benefits that the SCADA system can provide to producing fields such as increased revenue, decreased operating costs, decreased fixed capital and working capital requirements, the planning and implementation strategies for SCADA were outlined. A case history of a gas well production optimization system in the Pierceland area of northwest Saskatchewan was provided as an illustrative example. 9 figs

  17. A SCADA System for Energy Management in Intelligent Buildings

    OpenAIRE

    Figueiredo, Joao; Sá da Costa, Jose

    2012-01-01

    This paper develops an energy management platform for intelligent buildings using a SCADA system (Supervisory Control And Data Acquisition). This SCADA system integrates different types of information coming from the several technologies present in modern buildings (control of ventilation, temperature, illumination, etc.). The developed control strategy implements an hierarchical cascade controller where inner loops are performed by local PLCs (Programmable Logic Controller), and the outer...

  18. SCADA System of Physicochemical Variables in a Mixture Separator

    Directory of Open Access Journals (Sweden)

    Claudia Marcela Bustamante Álvarez

    2015-01-01

    Full Text Available This paper presents the results of a research project developed by professors from Universidad de los Llanos and Colciencias Young Researcher, whose aim is to implement the necessary instrumentation to monitor and control with a SCADA system of physicochemical variables for a mixture separation process in oily water, thereby seeking to minimize environmental damage in water sources. The project was divided into three methodological stages: the establishment of interest variables, the design and implementation of the SCADA system, and the testing for results validation. This system has sensors to capture and transfer data to a PLC (S71200 for each of the system variables such as temperature, level, flow and pH. It also has HMI interface for interacting with the system. The SCADA system greatly facilitates process monitoring and establishes the possibility of remote action, just by providing the programmable logic controller (PLC to an Ethernet network.

  19. Research and Application of a SCADA System for a Microgrid

    Directory of Open Access Journals (Sweden)

    Shuangshuang Li

    2017-03-01

    Full Text Available An effective Supervisory Control and Data Acquisition (SCADA system can improve the reliability, safety and economic benefits of a microgrid operation. In this research, the lower central controller and upper WEB (World Wide Web monitoring system are connected by the SCADA system, which is the hub of a microgrid intelligent monitoring platform. This system contains a set of specific functions programmed by Java as a middleware and can provide communication and control functions between the central controller and the upper monitoring system. For the sake of security and stability of the microgrid, the SCADA system realizes business processing on real-time data acquisition and storage, load balancing and resource recovery, concurrent security processing, and control instruction parsing and transmission. All those functions were tested and verified in actual operation.

  20. Design of virtual SCADA simulation system for pressurized water reactor

    International Nuclear Information System (INIS)

    Wijaksono, Umar; Abdullah, Ade Gafar; Hakim, Dadang Lukman

    2016-01-01

    The Virtual SCADA system is a software-based Human-Machine Interface that can visualize the process of a plant. This paper described the results of the virtual SCADA system design that aims to recognize the principle of the Nuclear Power Plant type Pressurized Water Reactor. This simulation uses technical data of the Nuclear Power Plant Unit Olkiluoto 3 in Finland. This device was developed using Wonderware Intouch, which is equipped with manual books for each component, animation links, alarm systems, real time and historical trending, and security system. The results showed that in general this device can demonstrate clearly the principles of energy flow and energy conversion processes in Pressurized Water Reactors. This virtual SCADA simulation system can be used as instructional media to recognize the principle of Pressurized Water Reactor

  1. Design of virtual SCADA simulation system for pressurized water reactor

    Energy Technology Data Exchange (ETDEWEB)

    Wijaksono, Umar, E-mail: umar.wijaksono@student.upi.edu; Abdullah, Ade Gafar; Hakim, Dadang Lukman [Electrical Power System Research Group, Department of Electrical Engineering Education, Jl. Dr. Setiabudi No. 207 Bandung, Indonesia 40154 (Indonesia)

    2016-02-08

    The Virtual SCADA system is a software-based Human-Machine Interface that can visualize the process of a plant. This paper described the results of the virtual SCADA system design that aims to recognize the principle of the Nuclear Power Plant type Pressurized Water Reactor. This simulation uses technical data of the Nuclear Power Plant Unit Olkiluoto 3 in Finland. This device was developed using Wonderware Intouch, which is equipped with manual books for each component, animation links, alarm systems, real time and historical trending, and security system. The results showed that in general this device can demonstrate clearly the principles of energy flow and energy conversion processes in Pressurized Water Reactors. This virtual SCADA simulation system can be used as instructional media to recognize the principle of Pressurized Water Reactor.

  2. Susceptibility of SCADA systems and the energy sector

    Science.gov (United States)

    Goike, Lindsay

    The research in this paper focused on analyzing SCADA systems in the energy sector for susceptibility to cyber attacks, in furtherance of providing suggestions to mitigate current and future cyber attacks. The research will be addressing the questions: how are SCADA systems susceptible to cyber attacks, and what are the suggested ways to mitigate both current and future cyber attacks. The five main categories of security vulnerabilities facing current SCADA systems were found to be: connectivity to the Internet, failure to plan, interdependency of sectors, numerous different types of threats, and outdated software. Some of the recommendations mentioned to mitigate current and future risks were: virtual private networks, risk assessments, increased physical security, updating of software, and firewalls.

  3. SCADA systems in the industrial automation

    Directory of Open Access Journals (Sweden)

    Esteban Pérez-López

    2015-12-01

    Este tipo de software constituye un avance de gran impacto en la automatización industrial, ya que permite ilustrar gráficamente los procesos productivos en pantalla y crear alarmas y advertencias en tiempo real, para el manejo confiado y pleno del proceso que se desea controlar. Se presentan los ejemplos de dos industrias que han aplicado SCADA con el fin de mejorar sus procesos, obteniendo muy buenos resultados.

  4. SCADA system with predictive controller applied to irrigation canals

    OpenAIRE

    Figueiredo, João; Botto, Miguel; Rijo, Manuel

    2013-01-01

    This paper applies a model predictive controller (MPC) to an automatic water canal with sensors and actuators controlled by a network (programmable logic controller), and supervised by a SCADA system (supervisory control and a data acquisition). This canal is composed by a set of distributed sub-systems that control the water level in each canal pool, constrained by discharge gates (control variables) and water off-takes (disturbances). All local controllers are available through an industria...

  5. An Integrated Dynamic Weighing System Based on SCADA

    Directory of Open Access Journals (Sweden)

    Piotr Bazydło

    2015-01-01

    Full Text Available A prototyped dynamic weighing system has been presented which integrates together three advanced software environments: MATLAB, LabVIEW and iFIX SCADA. They were used for advanced signal processing, data acquisition, as well as visualization and process control. Dynamic weighing is a constantly developing field of metrology. Because of the highly complicated structure of any electronic weighing module, it is vulnerable to many sources of environmental disturbances. For this reason, there is a lot of research concerned with weighing signal processing, mechanical matters and functionality of the system. In the paper, some issues connected with dynamic weighing have been presented, and the necessity of implementing signal processing methods has been discussed. Implementation of this feature is impossible in the majority of SCADA systems. The integration of the three environments mentioned above is an attempt to create an industrial system with capabilities to deal with major dynamic weighing problems. It is innovative because it connects the industrial SCADA, laboratory/industrial product LabVIEW and MATLAB. In addition, the algorithms responsible for process control and data exchange are presented. The paper includes a description of the capabilities, performance tests, as well as benefits and drawbacks, of the system. The outcome of the research is a prototyped system and evaluation of its usefulness. (original abstract

  6. Development of a generic wind farm SCADA system

    Energy Technology Data Exchange (ETDEWEB)

    Smith, G.

    2001-07-01

    The aim of the project is to develop a 'Generic Wind Farm Supervisory Control and Data Acquisition (SCADA) System' for the wind energy industry. A SCADA is a computer-based system that allows local and remote control of basic wind turbine functions and collects data from the wind farm that can be used to analyse and report on the operational performance. As wind farm size, complexity and remoteness of location increase an industry standard SCADA is vitally important to allow effective operation, monitoring, control and reporting. Turbine manufacturers offer a number of existing systems but these do not always fully meet the needs of wind farm operators and owners. Operators and owners who are involved with more than one turbine supplier end up with a number of incompatible systems. This causes operational difficulties and makes it hard to compared performance data from different turbines. This project aims to address these issues and develop a system that will communicate with all turbine types and calculate and store performance data in a consistent way. (Author)

  7. Analysis of a SCADA System Anomaly Detection Model Based on Information Entropy

    Science.gov (United States)

    2014-03-27

    Gerard, 2005:3) The NTSB report lists alarm management as one of the top five areas for improvement in pipeline SCADA systems (Gerard, 2005:1...Zhang, Qin, Wang, and Liang for leak detection in a SCADA -run pipeline system. A concept derived from information theory improved leak detection...System for West Products Pipeline . Journal of Loss Prevention in the Process Industries, 22(6), 981-989. Zhu, B., & Sastry, S. (2010). SCADA

  8. Upgradation in SCADA and PLC of existing LN_2 control system for SST-1

    International Nuclear Information System (INIS)

    Panchal, Pradip; Mahesuria, Gaurang; Panchal, Rohit; Patel, Rakesh; Sonara, Dashrath; Pitroda, Dipen; Nimavat, Hiren; Tanna, Vipul; Pradhan, Subrata

    2016-01-01

    Highlights: • The control system of LN_2 Management System of SST-1 is designed on PLC and SCADA. • The implementation and results of up-gradation in PLC and SCADA are reported. • The up-gradation in PLC and SCADA has improved the reliability & availability of SST-1 LN_2 system. - Abstract: Helium Refrigerator/Liquefier system of Steady State Superconducting Tokamak (SST-1) incorporates Liquid Nitrogen (LN_2) pre-cooling system. LN_2 is used for 80 K thermal shields of SST-1, current feeder system and integrated flow distribution and control system. The LN_2 management system is distributed system and requires automatic control. Initially LN_2 control system had Citect based Supervisory Control and Data Acquisition (SCADA) and Koyo make Programmable Logic Controller (PLC). With the passage of time and due to unavailability of their hardware, it is being obsoleted. So, the requirements of new PLC and SCADA systems have been envisaged to make uninterruptable operation of SST-1 cryogenic system. Therefore, Wonderware SCADA and Schneider Electric make PLC is programmed to replace Citect SCADA and Koyo PLC. New control features have been added in upgraded control system for better management of LN_2 system. This upgradation of SCADA and PLC is completed, tested successfully and in operation. Operational performance highlights of the new upgraded system are presented in this paper.

  9. Upgradation in SCADA and PLC of existing LN{sub 2} control system for SST-1

    Energy Technology Data Exchange (ETDEWEB)

    Panchal, Pradip, E-mail: pradip@ipr.res.in; Mahesuria, Gaurang; Panchal, Rohit; Patel, Rakesh; Sonara, Dashrath; Pitroda, Dipen; Nimavat, Hiren; Tanna, Vipul; Pradhan, Subrata

    2016-11-15

    Highlights: • The control system of LN{sub 2} Management System of SST-1 is designed on PLC and SCADA. • The implementation and results of up-gradation in PLC and SCADA are reported. • The up-gradation in PLC and SCADA has improved the reliability & availability of SST-1 LN{sub 2} system. - Abstract: Helium Refrigerator/Liquefier system of Steady State Superconducting Tokamak (SST-1) incorporates Liquid Nitrogen (LN{sub 2}) pre-cooling system. LN{sub 2} is used for 80 K thermal shields of SST-1, current feeder system and integrated flow distribution and control system. The LN{sub 2} management system is distributed system and requires automatic control. Initially LN{sub 2} control system had Citect based Supervisory Control and Data Acquisition (SCADA) and Koyo make Programmable Logic Controller (PLC). With the passage of time and due to unavailability of their hardware, it is being obsoleted. So, the requirements of new PLC and SCADA systems have been envisaged to make uninterruptable operation of SST-1 cryogenic system. Therefore, Wonderware SCADA and Schneider Electric make PLC is programmed to replace Citect SCADA and Koyo PLC. New control features have been added in upgraded control system for better management of LN{sub 2} system. This upgradation of SCADA and PLC is completed, tested successfully and in operation. Operational performance highlights of the new upgraded system are presented in this paper.

  10. Application of Functional Analysis on a SCADA System of a Thermal Power Plant

    Directory of Open Access Journals (Sweden)

    LAKHOUA, M. N.

    2009-06-01

    Full Text Available The aim of this paper is to present firstly the functionality of a supervisory system for complex processes, and secondly to present the concepts of SCADA (supervisory control and data acquisition systems. A functional analysis technique SADT (Structured Analysis and Design Technique has been applied on an example of a SCADA system of a thermal power plant. This technique allows a functional description of a SCADA system. The paper briefly discusses the functions of a SCADA system and some advantages of the application of functional analysis for the design of a human centered supervisory system. Then the basic principles of the SADT technique applied on the SCADA system are presented. Finally, the different results obtained from the SADT technique are discussed.

  11. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  12. Effectiveness of SCADA Systems in Control of Green Sands Properties

    Directory of Open Access Journals (Sweden)

    Ignaszak Z.

    2016-03-01

    Full Text Available The paper undertakes an important topic of evaluation of effectiveness of SCADA (Supervisory Control and Data Acquisition systems, used for monitoring and control of selected processing parameters of classic green sands used in foundry. Main focus was put on process studies of properties of so-called 1st generation molding sands in the respect of their preparation process. Possible methods of control of this processing are presented, with consideration of application of fresh raw materials, return sand (regenerate and water. The studies conducted in one of European foundries were aimed at pointing out how much application of new, automated plant of sand processing incorporating the SCADA systems allows stabilizing results of measurement of selected sand parameters after its mixing. The studies concerned two comparative periods of time, before an implementation of the automated devices for green sands processing (ASMS - Automatic Sand Measurement System and MCM – Main Control Module and after the implementation. Results of measurement of selected sand properties after implementation of the ASMS were also evaluated and compared with testing studies conducted periodically in laboratory.

  13. Information security in SCADA systems in nuclear power plants

    International Nuclear Information System (INIS)

    Satyamurty, S.A.V.

    2013-01-01

    Few decades back most of the I and C systems are Hardwired based. With the developments in digital electronics, micro processors and micro controllers, the I and C systems are becoming more and more Computer based. Though it brought convenience to the designer, comfort to the operator in the form of better GUI, it also brought many challenges in the form of information security. The talk covers the typical I and C design using SCADA systems, the challenges, typical problems faced and the need for information security. The talk illustrates various security measures to be implemented in the design, development and testing stages. These security measures have to be taken both in the development environment and deployment environment. Verification and validation of computer based system is very important. Configuration change management is very essential for smooth running of the plant. The talk illustrates the various measures need to be taken. (author)

  14. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  15. Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SIS

    CERN Document Server

    Macaulay, Tyson

    2011-01-01

    SCADA - Supervisory Control and Data Acquisition - Systems don't necessarily mesh well with standard IT security, although combined the two can create deepened levels of protection. This book demonstrates how to develop a SCADA cyber security program and how to work with internal and external IT resources in order to implement it. The technical level of this text ensures that it does not provide a detailed 'cookbook' that can be used to attack SCADA systems, but the text still provides sufficient technical detail to address areas of concern.

  16. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  17. Evaluating Information Assurance Control Effectiveness on an Air Force Supervisory Control and Data Acquisition (SCADA) System

    Science.gov (United States)

    2011-03-01

    Byres, E. J., Lowe, J. (2004). The Myths and facts behind cyber security risks for industrial control systems . Berlin, Germany: VDE 2004 Congress...ACQUISITION (SCADA) SYSTEM THESIS Jason R. Nielsen, Major, USAF AFIT/GCO/ENG/11-10 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE...DATA ACQUISITION (SCADA) SYSTEM THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of

  18. Integration of Evora-InovGrid Smartmeters in a Consumer’s SCADA System

    OpenAIRE

    Pereira, Rita; Figueiredo, Joao; Martins, Joao; Quadrado, Jose; Melicio, Rui; Mendes, Victor

    2015-01-01

    This paper develops an energy management system with smart meters integration for electricity consumers in a smart grid context. The integration of a distributor owned smart meter from the main Portuguese electricity distributor – EDP - is developed. The smart meter is connected to a common PC, that runs the Matlab Software and communicates to the SCADA system (Supervisory Control And Data Acquisition) using the OPC Protocol. The SCADA system supervises an industrial network of Programmable L...

  19. Cyber Security in Industrial Control Systems and SCADA Applications: Modbus TCP Protocol Example

    Directory of Open Access Journals (Sweden)

    Erdal IRMAK

    2017-12-01

    Full Text Available Electrical energy generation, transmission and distribution systems are evaluated in terms of national security dimension and defined as critical infrastructures. Monitoring and controlling of these systems is provided by Industrial Control Systems (ICS or Supervisory Control and Data Acquisition (SCADA systems. According to the latest advances in communication and internet technology, ICS/SCADA systems have started to become integrated with these systems. As a result of this situation, current or existing vulnerabilities in information and communication technology affect to SCADA systems directly. Therefore, this paper focuses on the cyber security of ICS/SCADA systems. It has been proved that the lack of authentication detected in Modbus TCP protocol, one of the most used in ICS/SCADA systems, can be exploited. In order to solve this security issue, a software is developed using the Python programming language for blocking or mitigating the cyber attacks. The proposed solution is subjected to several tests and results show that the attacks can be prevented successfully. Thus, it is considered that the proposed work will contribute to the security of ICS/SCADA systems and the industrial protocols using for communicating these systems.

  20. Installation of a Wastewater SCADA Monitoring System at Fort Bragg, NC

    National Research Council Canada - National Science Library

    Mullaney, Joe

    2004-01-01

    .... The Wastewater SCADA Monitoring System was installed to monitor 26 remote sites. A detailed radio study of the area verified the feasibility of using radio equipment to transfer data from these sites...

  1. An Approach to Vulnerability Assessment for Navy Supervisory Control and Data Acquisition (SCADA) Systems

    National Research Council Canada - National Science Library

    Hart, Dennis

    2004-01-01

    .... SCADA systems are relied upon in a large number of the sectors that make up the critical infrastructure, and their importance was reinforced during the massive power outage that occurred in August 2003...

  2. Anomaly Detection in SCADA Systems - A Network Based Approach

    NARCIS (Netherlands)

    Barbosa, R.R.R.

    2014-01-01

    Supervisory Control and Data Acquisition (SCADA) networks are commonly deployed to aid the operation of large industrial facilities, such as water treatment facilities. Historically, these networks were composed by special-purpose embedded devices communicating through proprietary protocols.

  3. Anomaly detection in SCADA systems: a network based approach

    NARCIS (Netherlands)

    Barbosa, R.R.R.

    2014-01-01

    Supervisory Control and Data Acquisition (SCADA) networks are commonly deployed to aid the operation of large industrial facilities, such as water treatment facilities. Historically, these networks were composed by special-purpose embedded devices communicating through proprietary protocols.

  4. A review of cyber security risk assessment methods for SCADA systems

    OpenAIRE

    Cherdantseva, Yulia; Burnap, Peter; Blyth, Andrew; Eden, Peter; Jones, Kevin; Soulsby, Hugh; Stoddart, Kristan

    2016-01-01

    This paper reviews the state of the art in cyber security risk assessment of Supervisory Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four risk assessment methods developed for or applied in the context of a SCADA system. We describe the essence of the methods and then analyse them in terms of aim; application domain; the stages of risk management addressed; key risk management concepts covered; impact measurement; sources of probabilistic data; evaluat...

  5. Summer Student Work Project Report: SCADA Bridge Tool Development Automatically Capturing Data from SCADA to the Maintenance System

    CERN Document Server

    Alhambra-Moron, Alfonso

    2015-01-01

    The main purpose of this report is to summarize the work project I have been doing at CERN during the last 3 months as a Summer Student. My name is Alfonso Alhambra Morón and the 8th of June 2015 I joined the EN-HE-LM team as a summer student supervised by Damien Lafarge in order to collaborate in the automation of the transfer of meter readings from SCADA1 to Infor EAM2, the computerized maintenance management system at CERN. The main objective of my project was to enable the automatic updates of meters in Infor EAM fetching data from SCADA so as to automatize a process which was done manually before and consumed resources in terms of having to consult the meter physically, import this information to Infor EAM by hand and detecting and correcting the errors that can occur when doing all of this manually. This problem is shared by several other teams at CERN apart from the Lift Maintenance team and for this reason the main target I had when developing my solution was flexibility and scalability so as to make...

  6. Test suite for the archiver of a SCADA system

    CERN Document Server

    Voitier, Axel

    2009-01-01

    Topic: The group responsible for providing the main control system applications for all machines at CERN has to validate that every piece of the control systems used will be reliable and fully functional when the LHC and its experiments will do collisions of particles. CERN use PVSS from ETM/Siemens for the SCADA part of its control systems. This software has a component dedicated to archive into a centralised Oracle database values and commands of tenth of thousands hardware devices. This component, named RDB, has to be tested and validated in terms of functionality and performance. The need is high for that because archiving is a critical part of the control systems. In case of an incident on one of the machine, it will be unacceptable to not benefit of archiving the machine context at this moment just because of a bug in RDB. Bugs have to be spotted and reported to ETM. Results: The proposed solution is an extensible automatic tester able to evaluate currently around 160 cases of potential bugs. Since the ...

  7. A virtual computing infrastructure for TS-CV SCADA systems

    CERN Document Server

    Poulsen, S

    2008-01-01

    In modern data centres, it is an emerging trend to operate and manage computers as software components or logical resources and not as physical machines. This technique is known as â€ワvirtualisation” and the new computers are referred to as â€ワvirtual machines” (VMs). Multiple VMs can be consolidated on a single hardware platform and managed in ways that are not possible with physical machines. However, this is not yet widely practiced for control system deployment. In TS-CV, a collection of VMs or a â€ワvirtual infrastructure” is installed since 2005 for SCADA systems, PLC program development, and alarm transmission. This makes it possible to consolidate distributed, heterogeneous operating systems and applications on a limited number of standardised high-performance servers in the Central Control Room (CCR). More generally, virtualisation assists in offering continuous computing services for controls and maintaining performance and assuring quality. Implementing our systems in a vi...

  8. From a UNIX to a PC Based SCADA System

    CERN Document Server

    Momal, F

    1999-01-01

    In order to facilitate the development of supervisory applications involved in slow process control (such as cryogenic control), the LHC/IAS Group (Equipment Controls Group) opted, a few years ago, for an industrial SCADA package which runs on UNIXÒ platforms. However, to reduce costs and following market trends, it has been decided to move over to a PC-based package. Several processes relating to the testing of the prototypes of the LHC magnets are already controlled in this way. However, it was still necessary to provide all the services previously available to the users, for example, data archiving in central databases, real-time access through the Web, automatic GSM calls, etc. This paper presents the advantages and drawbacks of a PC-based package versus a Unix-based system. It also lists the criteria used in the market survey to arrive at the final selection, as well as, the overall architecture, highlighting the developments needed to integrate the package into the global computing environment.

  9. An engineering study and concept design of the Supervisory Control and Data Acquisition (SCADA) for conventional systems

    International Nuclear Information System (INIS)

    Norman, L.S.

    1993-05-01

    The study objective was to evaluate several conventional equipment SCADA system architectural concepts and to recommend an approach for development. Each of the concepts given consideration had to satisfy the Superconducting Super Collider (SSC) conventional equipment SCADA application requirements and the evaluation process determined which approach represented the best technical and most cost effective solution to the system requirements. Based on the results of the concept evaluation process, a personal computer based approach was recommended for the SSC conventional equipment SCADA application. Block diagrams and budgetary cost estimate for this approach were developed with specific recommendations with respect to the conventional equipment SCADA system architecture and development process

  10. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    Energy Technology Data Exchange (ETDEWEB)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  11. Supervisory Control and Data Acquisition (SCADA) Systems and Cyber-Security: Best Practices to Secure Critical Infrastructure

    Science.gov (United States)

    Morsey, Christopher

    2017-01-01

    In the critical infrastructure world, many critical infrastructure sectors use a Supervisory Control and Data Acquisition (SCADA) system. The sectors that use SCADA systems are the electric power, nuclear power and water. These systems are used to control, monitor and extract data from the systems that give us all the ability to light our homes…

  12. Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research

    Science.gov (United States)

    Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne

    This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.

  13. Improved production operating efficiencies through automation: Wascana Energy`s SCADA system implementation in southeast Saskatchewan

    Energy Technology Data Exchange (ETDEWEB)

    Knudsen, R; Foord, T; Bartle, A

    1996-12-31

    Supervisory control and data acquisition (SCADA) systems covering Wascana Energy`s whole southeast Saskatchewan operating area were implemented in 1994-95. The benefits of this automation were described. Operations practices were reviewed and a brief description of the system was provided. Main features of the system described included data storage/retrieval, data display, alarm group organization, alarm call out monitoring, dynagraph display, and the Microsoft SQL server computer. Automation was found to significantly change the operator`s traditional role and altered operation practices in general. SCADA systems were found to improve operating efficiencies and production performance significantly, when properly implemented and utilized. 6 refs., 3 figs.

  14. Vulnerability assessment of critical infrastructure : activity 2 progress report : information of SCADA systems and other security monitoring systems used in oil and gas pipelines

    Energy Technology Data Exchange (ETDEWEB)

    Gu, G.P. [Natural Resources Canada, Ottawa, ON (Canada). CANMET Materials Technology Laboratory

    2007-12-15

    Many pipelines are located in remote regions and subjected to harsh environmental conditions. Damage to pipelines can have significant economic and environmental impacts. This paper discussed the use of supervisory control and data acquisition (SCADA) systems to monitor and control oil and gas pipeline infrastructure. SCADA systems are a real time, distributed computerized system with an intelligent capability for condition identification and fault diagnosis. SCADA systems can be used to capture thousands of miles of pipeline system process data and distribute it to pipeline operators, whose work stations are networked with the SCADA central host computer. SCADA architectures include monolithic, distributed, and networked systems that can be distributed across wide area networks (WANs). SCADA security strategies must be implemented to ensure corporate network security. Case studies of SCADA systems currently used by oil and gas operators in Alberta were also presented. 15 refs., 1 fig.

  15. Design and Application of SCADA Based Control System for filling process (Inter facing and Monitoring)

    International Nuclear Information System (INIS)

    Aung Naing Myint; Maung Maung Latt; Win Khaing Moe; Theingi

    2008-06-01

    In a small SCADA system, using industrial standard components and simulating real world applications, designs and constructs for thesis to interface between automation devices and software. It programs PIC microcontroller that need the information to write the sequence of process that flowchart like the PIC ladder-logic programs that control the equipment in system, software integrators to be required the information for the configuration screens and hardware installers which need the information to install and connect the equipment. It uses the initiating processor's multiplexer to verify that data or signals are being transmitted out of the parallel port and includes auto-coupler to divide different voltages between circuits and computer. Existing SCADA system are divisible into two groups - cheap and inflexible control, and another one is expensive but flexible control. This thesis attempted by means of using other network for SCADA communications and simple for control, both of which maintain flexibility while reducing cost

  16. THE ORGANIZATION OF OPERATIONAL CONTROL AND MANAGEMENT OF ROLL FORMING USING SCADA- SYSTEMS

    Directory of Open Access Journals (Sweden)

    S. A. Teslenko

    2012-01-01

    Full Text Available It is shown that the use Scada-systems for the organization of various systems of automated processes is the most promising method of automation, that gives wide opportunities of control, analysis and management of compiex dynamic, real-time systems.

  17. Process Control/SCADA system vendor security awareness and security posture.

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Lüders, S.

    2009-01-01

    A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in

  18. Industrial Control Systems/SCADA systems risk assessment in the energy sector

    Science.gov (United States)

    Falodun, Babatunde

    The energy sector is one of the most critical components of our national infrastructure. It not only provides the electrical power and petroleum required to run day-to-day operations and mechanisms in society, it's also an important element that directly impacts the economy with regard to growth and stability. Industrial Control Systems (ICS) /Supervisory Control and Data Acquisition Systems (SCADA) are computerized mechanisms, they are both software and hardware that are used to control real time processes and operations in power plants and oil production facilities. A significant attack on these control systems that leads to widespread disruption of energy could result in catastrophic consequences for any major city and even the nation. This research paper explores cyber threats and vulnerabilities faced by ICS/SCADA systems in the energy sector and also highlights possible outcomes of a successful breach. Furthermore, the research underscores mitigation strategies that could be used to prevent and respond to an attack. Keywords: Cybersecurity, SCADA, Cyber Attacks, Threats, Vulnerabilities, Risk Assessment, Dr. Albert Orbinati.

  19. SCADA System for the Modeling and Optimization of Oil Collecting Pipeline Network: A Case Study of Hassi Messaoud Oilfield

    OpenAIRE

    M. Aouadj; F. Naceri; M. Touileb; D. Sellami; M. Boukhatem

    2015-01-01

    This study aims are data acquisition, control and online modeling of an oil collection pipeline network using a SCADA «Supervisory Control and Data Acquisition» system, allowing the optimization of this network in real time by creating more exact models of onsite facilities. Indeed, fast development of computing systems makes obsolete usage of old systems for which maintenance became more and more expensive and their performances don’t comply any more with modern company operations. SCADA sys...

  20. Multiple Flow Loop SCADA System Implemented on the Production Prototype Loop

    Energy Technology Data Exchange (ETDEWEB)

    Baily, Scott A. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Dalmas, Dale Allen [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wheat, Robert Mitchell [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Woloshun, Keith Albert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Dale, Gregory E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-11-16

    The following report covers FY 15 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production prototype gas flow loop. The goal of this effort is to expand the existing system to include a second flow loop with a larger production-sized blower. Besides testing the larger blower, this system will demonstrate the scalability of our solution to multiple flow loops.

  1. JACoW Integration of the vacuum SCADA with CERN's Enterprise Asset Management system

    CERN Document Server

    Rocha, Andre; Fraga, Jorge; Gkioka, Georgia; Gomes, Paulo; Gonzalez, Luis; Krastev, Tsvetelin; Riddone, Germana; Widegren, David

    2018-01-01

    With over 128Km of vacuum chambers, reaching pressures as low as in interstellar space, CERN is home to the largest vacuum system in the world. Its underlying architecture comprises approximately 15 000 pieces of control equipment, supervised and controlled by 7 Supervisory Control And Data Acquisition (SCADA) servers, and over 300 Programmable Logic Controllers (PLCs). Their configuration files are automatically generated from a set of ORACLE databases (vacDB) using a Java application (vacDB-Editor). The maintenance management of such an amount of equipment requires the usage of an Enterprise Asset Management system (EAM), where the life cycle of every equipment is tracked from reception through decommissioning. The equipment displayed in the vacuum SCADA is automatically integrated in its user interfaces (UIs) based on data available on vacDB. On the other hand, the equipment available in Infor-EAM for maintenance management activities (creation of work-orders, stock management, location tracking) resides i...

  2. Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding

    Energy Technology Data Exchange (ETDEWEB)

    Yan, Guanhua [Los Alamos National Laboratory; Nicol, David M [UNIV OF IL; Jin, Dong [UNIV OF IL

    2010-12-16

    The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

  3. SCADA Architecture for Natural Gas plant

    Directory of Open Access Journals (Sweden)

    Turc Traian

    2009-12-01

    Full Text Available The paper describes the Natural Gas Plant SCADA architecture. The main purpose of SCADA system is remote monitoring and controlling of any industrial plant. The SCADA hardware architecture is based on multi-dropping system allowing connecting a large number of different fiels devices. The SCADA Server gathers data from gas plant and stores data to a MtSQL database. The SCADA server is connected to other SCADA client application offers a intuitive and user-friendly HMI. The main benefit of using SCADA is real time displaying of gas plant state. The main contriobution of the authors consists in designing SCADA architecture based on multi-dropping system and Human Machine Interface.

  4. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    Energy Technology Data Exchange (ETDEWEB)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  5. Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps

    Directory of Open Access Journals (Sweden)

    Javier Blesa

    2009-11-01

    Full Text Available The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps, in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals.

  6. The inherent weaknesses in industrial control systems devices; hacking and defending SCADA systems

    Science.gov (United States)

    Bianco, Louis J.

    The North American Electric Reliability Corporation (NERC) is about to enforce their NERC Critical Infrastructure Protection (CIP) Version Five and Six requirements on July 1st 2016. The NERC CIP requirements are a set of cyber security standards designed to protect cyber assets essential the reliable operation of the electric grid. The new Version Five and Six requirements are a major revision to the Version Three (currently enforced) requirements. The new requirements also bring substations into scope alongside Energy Control Centers. When the Version Five requirements were originally drafted they were vague, causing in depth discussions throughout the industry. The ramifications of these requirements has made owners look at their systems in depth, questioning how much money it will take to meet these requirements. Some owners saw backing down from routable networks to non-routable as a means to save money as they would be held to less requirements within the standards. Some owners saw removing routable connections as a proper security move. The purpose of this research was to uncover the inherent weaknesses in Industrial Control Systems (ICS) devices; to show how ICS devices can be hacked and figure out potential protections for these Critical Infrastructure devices. In addition, this research also aimed to validate the decision to move from External Routable connectivity to Non-Routable connectivity, as a security measure and not as a means of savings. The results reveal in order to ultimately protect Industrial Control Systems they must be removed from the Internet and all bi-directional external routable connections must be removed. Furthermore; non-routable serial connections should be utilized, and these non-routable serial connections should be encrypted on different layers of the OSI model. The research concluded that most weaknesses in SCADA systems are due to the inherent weaknesses in ICS devices and because of these weaknesses, human intervention is

  7. Data Mining Learning Models and Algorithms on a Scada System Data Repository

    Directory of Open Access Journals (Sweden)

    Mircea Rîşteiu

    2010-06-01

    Full Text Available This paper presents three data mining techniques applied
    on a SCADA system data repository: Naijve Bayes, k-Nearest Neighbor and Decision Trees. A conclusion that k-Nearest Neighbor is a suitable method to classify the large amount of data considered is made finally according to the mining result and its reasonable explanation. The experiments are built on the training data set and evaluated using the new test set with machine learning tool WEKA.

  8. Study on Cyber Security and Threat Evaluation in SCADA Systems

    Science.gov (United States)

    2012-03-01

    125 4.3.2 ISO 27001 , 27002 ............................................................................................ 125 4.3.3...system environments. 4.3.2 ISO 27001 , 27002 The ISO 27001 and 27002 standards ensure proper security processes and technology are implemented in...asset owner, integrators, and vendors. Now it is an independent set of 3 standards which resemble the ISO /IEC 27001 and 27002 standards. ISO /IEC

  9. SCADA SYSTEM SIMULATION USING THE TINY TIGER 2 DEVELOPMENT BOARD

    Directory of Open Access Journals (Sweden)

    AGAPE C.P.

    2015-12-01

    Full Text Available This paper presents a new design for a surveillance and control system of a medium voltage cell. The accent is on the acquisition of information of the consumer’s state, the instantaneous current consumption, power and voltage apparent to the consumer. The proposed design is based on Wilke Technology development board at its basis being a Tiny-tiger 2 Multitasking Microcontroller. This computer has 2 MByte or 4 MByte Flash for programming, and 1 MByte SRAM with backup input for data. On the software’s behalf we managed to create a Delphi Interface which communicates with the serial port on the development board. The interface takes information about the consumer and its capacity to load with voltage.

  10. Production Facility SCADA Design Report

    Energy Technology Data Exchange (ETDEWEB)

    Dale, Gregory E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Holloway, Michael Andrew [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Baily, Scott A. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Woloshun, Keith Albert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wheat, Robert Mitchell Jr. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-03-23

    The following report covers FY 14 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production facility. The goal of this effort is to provide Northstar with a baseline system design.

  11. Automatically Identifying and Predicting Unplanned Wind Turbine Stoppages Using SCADA and Alarms System Data: Case Study and Results

    Science.gov (United States)

    Leahy, Kevin; Gallagher, Colm; Bruton, Ken; O'Donovan, Peter; O'Sullivan, Dominic T. J.

    2017-11-01

    Using 10-minute wind turbine SCADA data for fault prediction offers an attractive way of gaining additional prognostic capabilities without needing to invest in extra hardware. To use these data-driven methods effectively, the historical SCADA data must be labelled with the periods when the turbine was in faulty operation as well the sub-system the fault was attributed to. Manually identifying faults using maintenance logs can be effective, but is also highly time consuming and tedious due to the disparate nature of these logs across manufacturers, operators and even individual maintenance events. Turbine alarm systems can help to identify these periods, but the sheer volume of alarms and false positives generated makes analysing them on an individual basis ineffective. In this work, we present a new method for automatically identifying historical stoppages on the turbine using SCADA and alarms data. Each stoppage is associated with either a fault in one of the turbine’s sub-systems, a routine maintenance activity, a grid-related event or a number of other categories. This is then checked against maintenance logs for accuracy and the labelled data fed into a classifier for predicting when these stoppages will occur. Results show that the automated labelling process correctly identifies each type of stoppage, and can be effectively used for SCADA-based prediction of turbine faults.

  12. SCADA based radioactive sample bottle delivery system for fuel reprocessing project

    International Nuclear Information System (INIS)

    Kaushik, Subrat; Munj, Niket; Chauhan, R.K.; Jayaram, M.N.; Haneef, K.K.M.

    2014-01-01

    Radioactive samples of process streams need to be analyzed in centralized control lab for measuring concentration of heavy elements as well as activity at various stages of re-processing plants. The sample is taken from biologically shielded process cells remotely through sampling blisters in sample bottles. These are then transferred to control lab located about 50 meters using vacuum transfer system. The bottle movement is tracked from origin to destination in rich HMI SCADA system using Infra-red non contact type proximity sensors located along sampling line and these sensors are connected to PLC in a fail-safe mode. The sample bottle travels at a speed of 10 m/s under vacuum motive force and the detection time is of the order of 1 mS. The flow meters have been used to know the air flow in sampling line. The system has been designed, developed, tested and commissioned and in use for four years. (author)

  13. SCADA based radioactive sample bottle delivery system for fuel reprocessing project

    International Nuclear Information System (INIS)

    Kaushik, Subrat; Munj, Niket; Chauhan, R.K.; Kumar, Pramod; Mishra, A.C.

    2011-01-01

    Radioactive samples of process streams need to be analyzed in centralized control lab for measuring concentration of heavy elements as well as activity at various stages of re-processing plants. The sample is taken from biologically shielded process cells remotely through sampling blisters in sample bottles. These are then transferred to control lab located about 50 meters using vacuum transfer system. The bottle movement is tracked from origin to destination in rich HMI SCADA system using Infra-red non contact type proximity sensors located along sampling line and these sensors are connected to PLC in a fail-safe mode. The sample bottle travels at a speed of 10 m/s under vacuum motive force and the detection time is of the order of 1 mS. The contact time Flow meters have been used to know the air flow in sampling line

  14. Modeling DNP3 Traffic Characteristics of Field Devices in SCADA Systems of the Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Huan [Lehigh Univ., Bethlehem, PA (United States); Cheng, Liang [Lehigh Univ., Bethlehem, PA (United States); Chuah, Mooi Choo [Lehigh Univ., Bethlehem, PA (United States)

    2017-03-08

    In the generation, transmission, and distribution sectors of the smart grid, intelligence of field devices is realized by programmable logic controllers (PLCs). Many smart-grid subsystems are essentially cyber-physical energy systems (CPES): For instance, the power system process (i.e., the physical part) within a substation is monitored and controlled by a SCADA network with hosts running miscellaneous applications (i.e., the cyber part). To study the interactions between the cyber and physical components of a CPES, several co-simulation platforms have been proposed. However, the network simulators/emulators of these platforms do not include a detailed traffic model that takes into account the impacts of the execution model of PLCs on traffic characteristics. As a result, network traces generated by co-simulation only reveal the impacts of the physical process on the contents of the traffic generated by SCADA hosts, whereas the distinction between PLCs and computing nodes (e.g., a hardened computer running a process visualization application) has been overlooked. To generate realistic network traces using co-simulation for the design and evaluation of applications relying on accurate traffic profiles, it is necessary to establish a traffic model for PLCs. In this work, we propose a parameterized model for PLCs that can be incorporated into existing co-simulation platforms. We focus on the DNP3 subsystem of slave PLCs, which automates the processing of packets from the DNP3 master. To validate our approach, we extract model parameters from both the configuration and network traces of real PLCs. Simulated network traces are generated and compared against those from PLCs. Our evaluation shows that our proposed model captures the essential traffic characteristics of DNP3 slave PLCs, which can be used to extend existing co-simulation platforms and gain further insights into the behaviors of CPES.

  15. Behavioral Profiling of Scada Network Traffic Using Machine Learning Algorithms

    Science.gov (United States)

    2014-03-27

    Acquisition ( SCADA ) System Overview SCADA systems control and monitor processes for water distribution, oil and natural gas pipelines , electrical...the desire for remote control and monitoring of industrial processes. The ability to identify SCADA devices on a mixed traffic network with zero...optimal attribute subset, while maintaining the desired TPR of .99 for SCADA network traffic. The attributes and ML algorithms chosen for

  16. Design and Implementation of SCADA Based Induction Motor Control

    OpenAIRE

    Pampashree; Dr. Md.Fakhruddin Ansari

    2014-01-01

    The introduction of Supervisory Control and Data Acquisition (SCADA) system has been discussed in details. Network components, functionality, generation and features of SCADA has been discussed in details in this paper. Application and uses of SCADA system in different fields of engineering have also been mentioned. Also the working of the software components and development in SCADA has been explained with merits and demerits of the software. Programmable Logic Controller ...

  17. Protocol converter for serial communication between digital rectifier controllers and a power plant SCADA system

    Directory of Open Access Journals (Sweden)

    Vukić Vladimir Đ.

    2016-01-01

    Full Text Available The paper describes the protocol converter INT-485-MBRTU, developed for serial communication between the thyristor rectifier (based on the proprietary protocol "INT-CPD-05", according to standard RS-485 and the SCADA system (based on protocol "Modbus RTU", of the same standard in the thermal power plant "Nikola Tesla B1". Elementary data on industrial communication protocols and communication gateways were provided. The basic technical characteristics of the "Omron" programmable logic controller CJ series were described, as well as the developed device INT-485-MBRTU. Protocol converters with two versions of communication software were tested, differing only in one control word, intended for a forced successive change of communication sequences, in opposite to automatic sequence relieve. The device iNT-485-MBRTU, with the program for forced successive change of communication sequences, demonstrated the reliability of data transfer of 100 %, in a sample of approximately 480 messages. For nearly the same sample, the same protocol converter, with a version of the program without any type of message identifiers, transferred less than 60 % of the foreseen data. During multiple sixty-hour tests, the reliability of data transfer of at least 99.9979% was recorded, in 100% of the analysed cases, and for a sample of nearly 96,000 pairs of the send and receive messages. We analysed the results and estimated the additional possibilities for application of the INT-485-MBRTU protocol converter.

  18. An Architectural Framework for Describing Supervisory Control and Data Acquisition (SCADA) Systems

    Science.gov (United States)

    2004-09-01

    The significant difference between FMS, DP and PA is at the physical layer, which allows all three versions of Profibus to be employed in one SCADA...instrumentation devices, DP devices where speed is important, and PA devices where safety and reliability is required. At the data link layer, Profibus ...12 e. Profibus

  19. A Mixed WLS Power System State Estimation Method Integrating a Wide-Area Measurement System and SCADA Technology

    Directory of Open Access Journals (Sweden)

    Tao Jin

    2018-02-01

    Full Text Available To address the issue that the phasor measurement units (PMUs of wide area measurement system (WAMS are not sufficient for static state estimation in most existing power systems, this paper proposes a mixed power system weighted least squares (WLS state estimation method integrating a wide-area measurement system and supervisory control and data acquisition (SCADA technology. The hybrid calculation model is established by incorporating phasor measurements (including the node voltage phasors and branch current phasors and the results of the traditional state estimator in a post-processing estimator. The performance assessment is discussed through setting up mathematical models of the distribution network. Based on PMU placement optimization and bias analysis, the effectiveness of the proposed method was proved to be accurate and reliable by simulations of different cases. Furthermore, emulating calculation shows this method greatly improves the accuracy and stability of the state estimation solution, compared with the traditional WLS state estimation.

  20. Scada Systems – Control, Supervision and Data Acquisition for the Power Plants Settled on a Stream (Part 2

    Directory of Open Access Journals (Sweden)

    Cosmin Ursoniu

    2015-09-01

    Full Text Available Scada (supervisory control and data acquisition is a complex system that supervises and controls an industrial process and performs several functions. A human machine interface will also be presented and how the process in a power plant is controlled and supervised through it by the operator. The main screen will be described (which is a global view of the hydro unit and what the operator can see and what he can press to control the power plants process also a few more screens will be presented for auxiliary installations and it will be described what the operator can see and what he can do to control the installation.

  1. Scada Systems – Control, Supervision and Data Acquisition for the Power Plants Settled on a Stream (Part 1

    Directory of Open Access Journals (Sweden)

    Cosmin Ursoniu

    2015-09-01

    Full Text Available Scada (supervisory control and data acquisition is a complex system that supervises and control an industrial process and performs several functions. A human machine interface will also be presented and how the process in a power plant is controlled and supervised through it by the operator. The main screen will be described (which is a global view of the hydro unit and what the operator can see and what he can press to control the power plants process also a few more screens will be presented for auxiliary installations and it will be described what the operator can see and what he can do to control the installation.

  2. Creating a European SCADA Security Testbed

    NARCIS (Netherlands)

    Christiansson, H.; Luiijf, H.A.M.

    2008-01-01

    Supervisory control and data acquisition (SCADA) systems are commonly used to monitor and control critical infrastructure assets. However, over the past two decades, they have evolved from closed, proprietary systems to open networks comprising commodity platforms running common operating systems

  3. Design and development of an IoT-based web application for an intelligent remote SCADA system

    Science.gov (United States)

    Kao, Kuang-Chi; Chieng, Wei-Hua; Jeng, Shyr-Long

    2018-03-01

    This paper presents a design of an intelligent remote electrical power supervisory control and data acquisition (SCADA) system based on the Internet of Things (IoT), with Internet Information Services (IIS) for setting up web servers, an ASP.NET model-view- controller (MVC) for establishing a remote electrical power monitoring and control system by using responsive web design (RWD), and a Microsoft SQL Server as the database. With the web browser connected to the Internet, the sensing data is sent to the client by using the TCP/IP protocol, which supports mobile devices with different screen sizes. The users can provide instructions immediately without being present to check the conditions, which considerably reduces labor and time costs. The developed system incorporates a remote measuring function by using a wireless sensor network and utilizes a visual interface to make the human-machine interface (HMI) more instinctive. Moreover, it contains an analog input/output and a basic digital input/output that can be applied to a motor driver and an inverter for integration with a remote SCADA system based on IoT, and thus achieve efficient power management.

  4. Intrusion Detection in SCADA Networks

    NARCIS (Netherlands)

    Barbosa, R.R.R.; Pras, Aiko; Stiller, Burckhard; De Turck, Filip

    Supervisory Control and Data Acquisition (SCADA) sys- tems are a critical part of large industrial facilities, such as water dis- tribution infrastructures. With the goal of reducing costs and increas- ing efficiency, these systems are becoming increasingly interconnected. However, this has also

  5. A Robust WLS Power System State Estimation Method Integrating a Wide-Area Measurement System and SCADA Technology

    Directory of Open Access Journals (Sweden)

    Tao Jin

    2015-04-01

    Full Text Available With the development of modern society, the scale of the power system is rapidly increased accordingly, and the framework and mode of running of power systems are trending towards more complexity. It is nowadays much more important for the dispatchers to know exactly the state parameters of the power network through state estimation. This paper proposes a robust power system WLS state estimation method integrating a wide-area measurement system (WAMS and SCADA technology, incorporating phasor measurements and the results of the traditional state estimator in a post-processing estimator, which greatly reduces the scale of the non-linear estimation problem as well as the number of iterations and the processing time per iteration. This paper firstly analyzes the wide-area state estimation model in detail, then according to the issue that least squares does not account for bad data and outliers, the paper proposes a robust weighted least squares (WLS method that combines a robust estimation principle with least squares by equivalent weight. The performance assessment is discussed through setting up mathematical models of the distribution network. The effectiveness of the proposed method was proved to be accurate and reliable by simulations and experiments.

  6. EMS applications integration in a SCADA; Integracion de aplicaciones EMS en un SCADA

    Energy Technology Data Exchange (ETDEWEB)

    Roses, Rodolfo; Colome, D.G.; Orduna, E.; Vega, C. de la; Camisay, G. [Universidad Nacional de San Juan (Argentina). Inst. de Energia Electrica]. E-mail: roses@iee.unsj.edu.ar

    2001-07-01

    This paper presents the methodology to integrate EMS (Energy Management System) functions in a SCADA system (System Control and Data Acquisition). The implementation methodology of the EMS applications has included the design and database implementation, EMS-SCADA communication, results presentation, logics definition of execution and processing ways. The applications portability characteristics allow integration with different SCADA system with some adaptations on the data communication interface. Thus, a open system has been obtained and implemented successfully in the control center of an Argentine 132 kV network.

  7. idRHa+ProMod - Rail Hardening Control System

    International Nuclear Information System (INIS)

    Ferro, L

    2016-01-01

    idRHa+ProMod is the process control system developed by Primetals Technologies to foresee the thermo-mechanical evolution and micro-structural composition of rail steels subjected to slack quenching into idRHa+ Rail Hardening equipments in a simulation environment. This tool can be used both off-line or in-line, giving the user the chance to test and study the best cooling strategies or letting the automatic control system free to adjust the proper cooling recipe. Optimization criteria have been tailored in order to determine the best cooling conditions according to the metallurgical requirements imposed by the main rail standards and also taking into account the elastoplastic bending phenomena occurring during all stages of the head hardening process. The computational core of idRHa+ProMod is a thermal finite element procedure coupled with special algorithms developed to work out the main thermo-physical properties of steel, to predict the non-isothermal austenite decomposition into all the relevant phases and subsequently to evaluate the amount of latent heat of transformation released, the compound thermal expansion coefficient and the amount of plastic deformation in the material. Air mist and air blades boundary conditions have been carefully investigated by means of pilot plant tests aimed to study the jet impingement on rail surfaces and the cooling efficiency at all working conditions. Heat transfer coefficients have been further checked and adjusted directly on field during commissioning. idRHa+ is a trademark of Primetals Technologies Italy Srl (paper)

  8. idRHa+ProMod - Rail Hardening Control System

    Science.gov (United States)

    Ferro, L.

    2016-03-01

    idRHa+ProMod is the process control system developed by Primetals Technologies to foresee the thermo-mechanical evolution and micro-structural composition of rail steels subjected to slack quenching into idRHa+ Rail Hardening equipments in a simulation environment. This tool can be used both off-line or in-line, giving the user the chance to test and study the best cooling strategies or letting the automatic control system free to adjust the proper cooling recipe. Optimization criteria have been tailored in order to determine the best cooling conditions according to the metallurgical requirements imposed by the main rail standards and also taking into account the elastoplastic bending phenomena occurring during all stages of the head hardening process. The computational core of idRHa+ProMod is a thermal finite element procedure coupled with special algorithms developed to work out the main thermo-physical properties of steel, to predict the non-isothermal austenite decomposition into all the relevant phases and subsequently to evaluate the amount of latent heat of transformation released, the compound thermal expansion coefficient and the amount of plastic deformation in the material. Air mist and air blades boundary conditions have been carefully investigated by means of pilot plant tests aimed to study the jet impingement on rail surfaces and the cooling efficiency at all working conditions. Heat transfer coefficients have been further checked and adjusted directly on field during commissioning. idRHa+ is a trademark of Primetals Technologies Italy Srl

  9. What's under the hood? Improving SCADA security with process awareness

    OpenAIRE

    Chromik, Justyna Joanna; Remke, Anne Katharina Ingrid; Haverkort, Boudewijn R.H.M.

    2016-01-01

    SCADA networks are an essential part of monitoring and controlling physical infrastructures, such as the power grid. Recent news item show that tampering with the data exchanged in a SCADA network occurs and has severe consequences. A possible way of improving the security of SCADA networks is to use intrusion detection systems. By monitoring and analysing the traffic, it is possible to detect whether information has a legitimate source or was tampered with. However, in many cases the knowled...

  10. Internal validation of the RapidHIT® ID system.

    Science.gov (United States)

    Wiley, Rachel; Sage, Kelly; LaRue, Bobby; Budowle, Bruce

    2017-11-01

    Traditionally, forensic DNA analysis has required highly skilled forensic geneticists in a dedicated laboratory to generate short tandem repeat (STR) profiles. STR profiles are routinely used either to associate or exclude potential donors of forensic biological evidence. The typing of forensic reference samples has become more demanding, especially with the requirement in some jurisdictions to DNA profile arrestees. The Rapid DNA (RDNA) platform, the RapidHIT ® ID (IntegenX ® , Pleasanton, CA), is a fully automated system capable of processing reference samples in approximately 90min with minimal human intervention. Thus, the RapidHIT ID instrument can be deployed to non-laboratory environments (e.g., booking stations) and run by trained atypical personnel such as law enforcement. In order to implement the RapidHIT ID platform, validation studies are needed to define the performance and limitations of the system. Internal validation studies were undertaken with four early-production RapidHIT ID units. Reliable and concordant STR profiles were obtained from reference buccal swabs. Throughout the study, no contamination was observed. The overall first-pass success rate with an "expert-like system" was 72%, which is comparable to another current RDNA platform commercially available. The system's second-pass success rate (involving manual interpretation on first-pass inconclusive results) increased to 90%. Inhibitors (i.e., coffee, smoking tobacco, and chewing tobacco) did not appear to affect typing by the instrument system; however, substrate (i.e., swab type) did impact typing success. Additionally, one desirable feature not available with other Rapid systems is that in the event of a system failed run, a swab can be recovered and subsequently re-analyzed in a new sample cartridge. Therefore, rarely should additional sampling or swab consumption be necessary. The RapidHIT ID system is a robust and reliable tool capable of generating complete STR profiles within

  11. Flow whitelisting in SCADA networks

    NARCIS (Netherlands)

    Barbosa, Rafael Ramos Regis; Sadre, Ramin; Pras, Aiko

    2013-01-01

    Supervisory control and data acquisition (SCADA) networks are commonly deployed in large industrial facilities. Modern SCADA networks are becoming more vulnerable to cyber attacks due to the common use of standard communications protocols and increased interconnections with corporate networks and

  12. Water Wells Monitoring Using SCADA System for Water Supply Network, Case Study: Water Treatment Plant Urseni, Timis County, Romania

    Science.gov (United States)

    Adrian-Lucian, Cococeanu; Ioana-Alina, Cretan; Ivona, Cojocinescu Mihaela; Teodor Eugen, Man; Narcis, Pelea George

    2017-10-01

    The water supply system in Timisoara Municipality is insured with about 25-30 % of the water demand from wells. The underground water headed to the water treatment plant in order to ensure equal distribution and pressure to consumers. The treatment plants used are Urseni and Ronaţ, near Timisoara, in Timis County. In Timisoara groundwater represents an alternative source for water supply and complementary to the surface water source. The present paper presents a case study with proposal and solutions for rehabilitation /equipment /modernization/ automation of water drilling in order to ensure that the entire system can be monitored and controlled remotely through SCADA (Supervisory control and data acquisition) system. The data collected from the field are designed for online efficiency monitoring regarding the energy consumption and water flow intake, performance indicators such as specific energy consumption KW/m3 and also in order to create a hydraulically system of the operating area to track the behavior of aquifers in time regarding the quality and quantity aspects.

  13. A Log Mining Approach for Process Monitoring in SCADA

    NARCIS (Netherlands)

    Hadziosmanovic, D.; Bolzoni, D.; Hartel, Pieter H.

    2012-01-01

    SCADA (Supervisory Control and Data Acquisition) systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when an attacker gains user access rights and

  14. A Log Mining Approach for Process Monitoring in SCADA

    NARCIS (Netherlands)

    Hadziosmanovic, D.; Bolzoni, D.; Hartel, Pieter H.

    2010-01-01

    SCADA (Supervisory Control and Data Acquisition) systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when an attacker gains user access rights and

  15. Smart Device Profiling for Smart SCADA

    NARCIS (Netherlands)

    Hadziosmanovic, D.; Bolzoni, D.; Hartel, Pieter H.

    2011-01-01

    SCADA (Supervisory Control and Data Acquisition) systems are computer systems used for monitoring and controlling industrial processes such as power plants and power grid systems, water, gas and oil distribution systems, production systems for food, cars and other products. We propose a new approach

  16. Smart Device Profiling for Smart SCADA

    NARCIS (Netherlands)

    Hadziosmanovic, D.; Bolzoni, D.; Hartel, Pieter H.

    SCADA (Supervisory Control and Data Acquisition) systems are computer systems used for monitoring and controlling industrial processes such as power plants and power grid systems, water, gas and oil distribution systems, production systems for food, cars and other products. We propose a new approach

  17. Identification of Staphylococcus species and subspecies with the MicroScan Pos ID and Rapid Pos ID panel systems.

    Science.gov (United States)

    Kloos, W E; George, C G

    1991-01-01

    The accuracies of the MicroScan Pos ID and Rapid Pos ID panel systems (Baxter Diagnostic Inc., MicroScan Division, West Sacramento, Calif.) were compared with each other and with the accuracies of conventional methods for the identification of 25 Staphylococcus species and 4 subspecies. Conventional methods included those used in the original descriptions of species and subspecies and DNA-DNA hybridization. The Pos ID panel uses a battery of 18 tests, and the Rapid Pos ID panel uses a battery of 42 tests for the identification of Staphylococcus species. The Pos ID panel has modified conventional and chromogenic tests that can be read after 15 to 48 h of incubation; the Rapid Pos ID panel has tests that use fluorogenic substrates or fluorometric indicators, and test results can be read after 2 h of incubation in the autoSCAN-W/A. Results indicated that both MicroScan systems had a high degree of congruence (greater than or equal to 90%) with conventional methods for the species S. capitis, S. aureus, S. auricularis, S. saprophyticus, S. cohnii, S. arlettae, S. carnosus, S. lentus, and S. sciuri and, in particular, the subspecies S. capitis subsp. capitis and S. cohnii subsp. cohnii. The Rapid Pos ID panel system also had greater than or equal to 90% congruence with conventional methods for S. epidermidis, S. caprae, S. warneri subsp. 2, S. xylosus, S. kloosii, and S. caseolyticus. For both MicroScan systems, congruence with conventional methods was 80 to 90% for S. haemolyticus subsp. 1, S. equorum, S. intermedius, and S. hyicus; and in addition, with the Rapid Pos ID panel system congruence was 80 to 89% for S. capitis subsp. ureolyticus, S. warneri subsp. 1, S. hominis, S. cohnii subsp. urealyticum, and S. simulans. The MicroScan systems identified a lower percentage (50 to 75%) of strains of S. lugdunensis, S. gallinarum, S. schleiferi, and S. chromogenes, although the addition of specific tests to the systems might increase the accuracy of identification

  18. Accurate Modeling of The Siemens S7 SCADA Protocol For Intrusion Detection And Digital Forensic

    Directory of Open Access Journals (Sweden)

    Amit Kleinmann

    2014-09-01

    Full Text Available The Siemens S7 protocol is commonly used in SCADA systems for communications between a Human Machine Interface (HMI and the Programmable Logic Controllers (PLCs. This paper presents a model-based Intrusion Detection Systems (IDS designed for S7 networks. The approach is based on the key observation that S7 traffic to and from a specific PLC is highly periodic; as a result, each HMI-PLC channel can be modeled using its own unique Deterministic Finite Automaton (DFA. The resulting DFA-based IDS is very sensitive and is able to flag anomalies such as a message appearing out of its position in the normal sequence or a message referring to a single unexpected bit. The intrusion detection approach was evaluated on traffic from two production systems. Despite its high sensitivity, the system had a very low false positive rate - over 99.82% of the traffic was identified as normal.

  19. Model-based fault detection for generator cooling system in wind turbines using SCADA data

    DEFF Research Database (Denmark)

    Borchersen, Anders Bech; Kinnaert, Michel

    2016-01-01

    In this work, an early fault detection system for the generator cooling of wind turbines is presented and tested. It relies on a hybrid model of the cooling system. The parameters of the generator model are estimated by an extended Kalman filter. The estimated parameters are then processed by an ...

  20. Development of an automatic subsea blowout preventer stack control system using PLC based SCADA.

    Science.gov (United States)

    Cai, Baoping; Liu, Yonghong; Liu, Zengkai; Wang, Fei; Tian, Xiaojie; Zhang, Yanzhen

    2012-01-01

    An extremely reliable remote control system for subsea blowout preventer stack is developed based on the off-the-shelf triple modular redundancy system. To meet a high reliability requirement, various redundancy techniques such as controller redundancy, bus redundancy and network redundancy are used to design the system hardware architecture. The control logic, human-machine interface graphical design and redundant databases are developed by using the off-the-shelf software. A series of experiments were performed in laboratory to test the subsea blowout preventer stack control system. The results showed that the tested subsea blowout preventer functions could be executed successfully. For the faults of programmable logic controllers, discrete input groups and analog input groups, the control system could give correct alarms in the human-machine interface. Copyright © 2011 ISA. Published by Elsevier Ltd. All rights reserved.

  1. CleverFarm - A SuperSCADA system for wind farms

    Energy Technology Data Exchange (ETDEWEB)

    Giebel, G [ed.; Juhl, A; Gram Hansen, K; Biebhardt, J [and others

    2004-08-01

    The CleverFarm project started out to build an integrated monitoring system for wind farms, where all information would be available and could be used across the wind farm for maintenance and component health assessments. This would enable wind farm operators to prioritise their efforts, since they have a good view of the farm status from home. A large emphasis was placed on the integration of condition monitoring approaches in the central system, enabling estimates of the remaining lifetime of components, especially in the nacelle. During the 3,5 years of the project, software and hardware was developed and installed in two wind farms in Denmark and Germany. The connected hardware included two different condition monitoring systems based on vibration sensors from Gram&Juhl and ISET, plus a camera system developed by Overspeed. Additionally, short-term predictions of the wind farm output were delivered by DMI and Risoes Prediktor system throughout the period of the project. All these diverse information sources are integrated through a web interface based on Java Server Pages. The software was developed in Java, and is delivered as so-called CleverBeans. The main part of the software is open-sourced. The report contains the experiences and results of a one-year experimental period. This report is a slightly edited version of the final publishable report to the EU Commission as part of the requirements of the CleverFarm project.

  2. Flow whitelisting in SCADA networks

    NARCIS (Netherlands)

    Barbosa, Rafael Ramos Regis; Pras, Aiko; Sadre, Ramin

    Supervisory Control And Data Acquisition (SCADA) networks are commonly deployed to aid the operation of large industrial facilities. Modern SCADA networks are becoming more vulnerable to network attacks, due to the now common use of standard communication protocols and increased interconnection to

  3. Flow Whitelisting in SCADA Networks

    NARCIS (Netherlands)

    Barbosa, R.R.R.; Pras, Aiko; Sadre, R.

    2013-01-01

    Supervisory Control And Data Acquisition (SCADA) networks are commonly deployed to aid the operation of large industrial facilities. Modern SCADA networks are becoming more vulnerable to network attacks, due to the now common use of standard communication protocols and increased interconnection to

  4. CleverFarm - A superSCADA system for wind farms

    DEFF Research Database (Denmark)

    Juhl, A.; Hansen, K.G.; Giebhardt, J.

    2004-01-01

    The CleverFarm project started out to build an integrated monitoring system for wind farms, where all information would be available and could be used across the wind farm for maintenance and component health assessments. This would enable wind farmoperators to prioritise their efforts, since the...

  5. SCADA AND SECURITY DISPATCHES ACCORDING TO PRESENT LEGISLATION IN ROMANIA

    Directory of Open Access Journals (Sweden)

    Cristian Silviu BANACU

    2014-11-01

    Full Text Available SCADA is an old term, older than twenty years, used for defining systems that acquires data from industrial networks and / or critical infrastructure networks and process them for operational and security purposes. Its importance is growing simultaneously with the development of technology’s interference in our lives (social life, economical life, etc.. Although they are not defined as SCADA systems, Security dispatches (and their structure have a lot of similarities with the general architecture of SCADA systems. Taking into consideration the security dispatches, as they are accepted by the actual Romanian law, we will draw a parallel between them and SCADA architecture, identifying the similarities and the differences between them, and also the points where some changes could be made.

  6. Automated Water Supply System and Water Theft Identification Using PLC and SCADA

    OpenAIRE

    Prof. Anubha Panchal,; Ketakee Dagade

    2014-01-01

    In today’s world rapid growing urban residential areas, to avoid scarcity of water problems and requirements of consumers, therefore it is supposed to supply adequate water distribution networks are managed automatically. Along with this another problem in the water supply system is that public is using suction pumps to suck the water directly from the home street pipeline. The best way to improve the automation and monitoring architectures which contain a supervision and contr...

  7. Experimental study of mini SCADA renewable energy management system on microgrid using Raspberry Pi

    Science.gov (United States)

    Tridianto, E.; Permatasari, P. D.; Ali, I. R.

    2018-03-01

    Renewable Energy Management System (REMS) is a device that can be able to monitor power through a microgrid. The purpose of this system is to optimize power usage that produced from renewable energy with the result that reduces power demand from the grid. To reach the goal this device manage the load power needs fully supplied by renewable energy when the power produced from renewable energy is higher than load demand, besides power surplus will be stored in battery in this way energy stored in battery can be used when it needed. When the power produced from renewable energy can not satisfy the power demand, power will supply by renewable energy and grid. This device uses power meters for record any power flow through microgrid. In order to manage power flow in microgrid this system use relay module. The user can find out energy consumption (consumed by the load) and production (produced by renewable energy) in a period of time so that the user can switch on the load in right time.

  8. Evaluation of Anomaly Detection Techniques for SCADA Communication Resilience

    OpenAIRE

    Shirazi, Syed Noor Ul Hassan; Gouglidis, Antonios; Syeda, Kanza Noor; Simpson, Steven; Mauthe, Andreas Ulrich; Stephanakis, Ioannis M.; Hutchison, David

    2016-01-01

    Attacks on critical infrastructures’ Supervisory Control and Data Acquisition (SCADA) systems are beginning to increase. They are often initiated by highly skilled attackers, who are capable of deploying sophisticated attacks to exfiltrate data or even to cause physical damage. In this paper, we rehearse the rationale for protecting against cyber attacks and evaluate a set of Anomaly Detection (AD) techniques in detecting attacks by analysing traffic captured in a SCADA network. For this purp...

  9. Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks

    Directory of Open Access Journals (Sweden)

    DongHo Kang

    2014-01-01

    Full Text Available Internet of Things (IoT consists of several tiny devices connected together to form a collaborative computing environment. Recently IoT technologies begin to merge with supervisory control and data acquisition (SCADA sensor networks to more efficiently gather and analyze real-time data from sensors in industrial environments. But SCADA sensor networks are becoming more and more vulnerable to cyber-attacks due to increased connectivity. To safely adopt IoT technologies in the SCADA environments, it is important to improve the security of SCADA sensor networks. In this paper we propose a multiple filtering technique based on whitelists to detect illegitimate packets. Our proposed system detects the traffic of network and application protocol attacks with a set of whitelists collected from normal traffic.

  10. Key management issue in SCADA networks: A review

    Directory of Open Access Journals (Sweden)

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  11. Automated turn pike using PLC and SCADA

    Science.gov (United States)

    Silpa Sreedhar, P.; Aiswarya, P.; Kathirvelan, J.

    2017-11-01

    We propose a smart turnpike based on Programmable Logic Controller (PLC) and Supervisory Control and Data Acquisition Systems (SCADA) in this paper. In this work, the basic idea is to measure the weight of the vehicles and classify them according to its weight to the respective lanes. It is difficult for the turnpike people to monitor the whole process all the time. So, this PLC based diversion system can be implemented in turnpikes to reduce the difficulties. This method will work based on weight sensors (piezo-resistive) whose output will be fed to a PLC, which will control the vehicle diversion. Using SCADA software, the whole process can be monitored from a remote area. The algorithm developed in this successfully installed in real time system.

  12. Development of new process network for gas chromatograph and analyzers connected with SCADA system and Digital Control Computers at Cernavoda NPP Unit 1

    International Nuclear Information System (INIS)

    Deneanu, Cornel; Popa Nemoiu, Dragos; Nica, Dana; Bucur, Cosmin

    2007-01-01

    The continuous monitoring of gas mixture concentrations (deuterium/ hydrogen/oxygen/nitrogen) accumulated in 'Moderator Cover Gas', 'Liquid Control Zone' and 'Heat Transport D 2 O Storage Tank Cover Gas', as well as the continuous monitoring of Heavy Water into Light Water concentration in 'Boilers Steam', 'Boilers Blown Down', 'Moderator heat exchangers', and 'Recirculated Water System', sensing any leaks of Cernavoda NPP U1 led to requirement of developing a new process network for gas chromatograph and analyzers connected to the SCADA system and Digital Control Computers of Cernavoda NPP Unit 1. In 2005 it was designed and implemented the process network for gas chromatograph which connected the gas chromatograph equipment to the SCADA system and Digital Control Computers of the Cernavoda NPP Unit 1. Later this process network for gas chromatograph has been extended to connect the AE13 and AE14 Fourier Transform Infrared (FTIR) analyzers with either. The Gas Chromatograph equipment measures with best accuracy the mixture gases (deuterium/ hydrogen/oxygen/nitrogen) concentration. The Fourier Transform Infrared (FTIR) AE13 and AE14 Analyzers measure the Heavy Water into Light Water concentration in Boilers Steam, Boilers BlownDown, Moderator heat exchangers, and Recirculated Water System, monitoring and signaling any leaks. The Gas Chromatograph equipment and Fourier Transform Infrared (FTIR) AE13 and AE14 Analyzers use the new OPC (Object Link Embedded for Process Control) technologies available in ABB's VistaNet network for interoperability with automation equipment. This new process network has interconnected the ABB chromatograph and Fourier Transform Infrared analyzers with plant Digital Control Computers using new technology. The result was an increased reliability and capability for inspection and improved system safety

  13. An online ID identification system for liquefied-gas cylinder plant

    Science.gov (United States)

    He, Jin; Ding, Zhenwen; Han, Lei; Zhang, Hao

    2017-11-01

    An automatic ID identification system for gas cylinders' online production was developed based on the production conditions and requirements of the Technical Committee for Standardization of Gas Cylinders. A cylinder ID image acquisition system was designed to improve the image contrast of ID regions on gas cylinders against the background. Then the ID digits region was located by the CNN template matching algorithm. Following that, an adaptive threshold method based on the analysis of local average grey value and standard deviation was proposed to overcome defects of non-uniform background in the segmentation results. To improve the single digit identification accuracy, two BP neural networks were trained respectively for the identification of all digits and the easily confusable digits. If the single digit was classified as one of confusable digits by the former BP neural network, it was further tested by the later one, and the later result was taken as the final identification result of this single digit. At last, the majority voting was adopted to decide the final identification result for the 6-digit cylinder ID. The developed system was installed on a production line of a liquefied-petroleum-gas cylinder plant and worked in parallel with the existing weighing step on the line. Through the field test, the correct identification rate for single ID digit was 94.73%, and none of the tested 2000 cylinder ID was misclassified through the majority voting.

  14. Evaluation of the Micro-ID system for the identification of Yersinia pestis.

    OpenAIRE

    Harrison, D N; Williams, J E

    1985-01-01

    One hundred isolates of Yersinia pestis identified by conventional means were tested by the Micro-ID system to assess its reliability for distinguishing Y. pestis from other members of the family Enterobacteriaceae. The Micro-ID system gave Y. pestis as a choice for the identification of 89 of these cultures, although not always as the first choice. Most nitrate-negative strains of Y. pestis keyed out with Yersinia pseudotuberculosis as first choice and Y. pestis as second or fourth choice.

  15. Is the CERN recommended SCADA useable for the ST division?

    CERN Document Server

    Sollander, P; Epting, U

    2001-01-01

    Supervisory Control and Data Acquisition (SCADA) systems are widely used at CERN and in industrial control environments. In order to limit the costs of purchase, maintenance and support, a recommendation for one SCADA system is in preparation by the SCADA working group. This SCADA system should be used for all CERN in-house developed applications as they exist today e.g. in the Technical Control Room (TCR). This presentation will show the actual environment for the control and monitoring of the technical infrastructure at CERN and the needs for the future LHC infrastructure monitoring. The presentation will cover the control activities of all ST groups represented in the ST Control System WG. A possible solution for the integration of the technical infrastructure data into a SCADA system and a solution for the data exchange with the accelerators and the experiments will be presented. This includes a short term planning for the evaluation period as well as the long-term strategy on how to implement the chosen ...

  16. Designing SCADA application software a practical approach

    CERN Document Server

    McCrady, Stuart G

    2013-01-01

    Automation systems, often referred to as SCADA systems, involve programming at several levels; these systems include computer type field controllers that monitor and control plant equipment such as conveyor systems, pumps, and user workstations that allow the user to monitor and control the equipment through color graphic displays. All of the components of these systems are integrated through a network, such as Ethernet for fast communications. This book provides a practical guide to developing the application software for all aspects of the automation system, from the field controll

  17. The benefits of SCADA integrated pipeline leak detection

    Energy Technology Data Exchange (ETDEWEB)

    Pichler, Ruprecht M.J. [Pichler Engineering GmbH, Munich (Germany)

    2003-07-01

    Software based leak detection and locating for pipelines based upon evaluation of hydraulic parameters is a widely used approach to online pipeline integrity monitoring. Typically, these software packages are installed in a stand-alone configuration with a narrow bandwidth interface to the pipeline SCADA system. However, the performance characteristics of the SCADA system and interface do have a substantial impact on the performance of the leak detection system. By a tight integration of leak detection software into the SCADA system, a source of false alarms typically experienced with leak detection systems can be eliminated, the overall performance of the leak detection system can be improved, and the project costs can be reduced. (author)

  18. ID-1 mass storage system for mainframe by using FDDI network

    International Nuclear Information System (INIS)

    Morita, Y.; Fujii, H.; Inoue, E.; Kodama, H. Manabe, A.; Miyamoto, A.; Nomachi, M.; Watase, Y.; Yasu, Y.

    1994-01-01

    The authors have developed an ID-1 mass storage system as a distributed data server for Fujitsu mainframe computers. The system consists of a SONY ID-1 recorder DIR-1000, a tape robot system DMS-24 and a SCSI-II interface DFC-1500, which are connected to Spar Station 10 with an FDDI interface. The maximum speed of 7.5 Mbytes/sec is achieved for data transfer between Sparc Station 10 memory and DIR-1000 with a buffer size of 1 Mbytes. The system has been used successfully since last October to migrate more than 1 Tbytes data

  19. Efficient coding and detection of ultra-long IDs for visible light positioning systems.

    Science.gov (United States)

    Zhang, Hualong; Yang, Chuanchuan

    2018-05-14

    Visible light positioning (VLP) is a promising technique to complement Global Navigation Satellite System (GNSS) such as Global positioning system (GPS) and BeiDou Navigation Satellite System (BDS) which features the advantage of low-cost and high accuracy. The situation becomes even more crucial for indoor environments, where satellite signals are weak or even unavailable. For large-scale application of VLP, there would be a considerable number of Light emitting diode (LED) IDs, which bring forward the demand of long LED ID detection. In particular, to provision indoor localization globally, a convenient way is to program a unique ID into each LED during manufacture. This poses a big challenge for image sensors, such as the CMOS camera in everybody's hands since the long ID covers the span of multiple frames. In this paper, we investigate the detection of ultra-long ID using rolling shutter cameras. By analyzing the pattern of data loss in each frame, we proposed a novel coding technique to improve the efficiency of LED ID detection. We studied the performance of Reed-Solomon (RS) code in this system and designed a new coding method which considered the trade-off between performance and decoding complexity. Coding technique decreases the number of frames needed in data processing, significantly reduces the detection time, and improves the accuracy of detection. Numerical and experimental results show that the detected LED ID can be much longer with the coding technique. Besides, our proposed coding method is proved to achieve a performance close to that of RS code while the decoding complexity is much lower.

  20. Flow whitelisting in SCADA networks

    DEFF Research Database (Denmark)

    Barbosa, Rafael Ramos Regis; Sadre, Ramin; Pras, Aiko

    2013-01-01

    and the Internet. This paper describes an approach for improving the security of SCADA networks using flow whitelisting. A flow whitelist describes legitimate traffic based on four properties of network packets: client address, server address, server-side port and transport protocol. The proposed approach...

  1. New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical Sessions

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2015-10-01

    Full Text Available Modern technology enhancements have been used worldwide to fulfill the requirements of the industrial sector, especially in supervisory control and data acquisition (SCADA systems as a part of industrial control systems (ICS. SCADA systems have gained popularity in industrial automations due to technology enhancements and connectivity with modern computer networks and/or protocols. The procurement of new technologies has made SCADA systems important and helpful to processing in oil lines, water treatment plants, and electricity generation and control stations. On the other hand, these systems have vulnerabilities like other traditional computer networks (or systems, especially when interconnected with open platforms. Many international organizations and researchers have proposed and deployed solutions for SCADA security enhancement, but most of these have been based on node-to-node security, without emphasizing critical sessions that are linked directly with industrial processing and automation. This study concerns SCADA security measures related to critical processing with specified sessions of automated polling, analyzing cryptography mechanisms and deploying the appropriate explicit inclusive security solution in a distributed network protocol version 3 (DNP3 stack, as part of a SCADA system. The bytes flow through the DNP3 stack with security computational bytes within specified critical intervals defined for polling. We took critical processing knowledge into account when designing a SCADA/DNP3 testbed and deploying a cryptography solution that did not affect communications.

  2. An enhanced dynamic ID-based authentication scheme for telecare medical information systems

    Directory of Open Access Journals (Sweden)

    Ankita Chaturvedi

    2017-01-01

    Full Text Available The authentication schemes for telecare medical information systems (TMIS try to ensure secure and authorized access. ID-based authentication schemes address secure communication, but privacy is not properly addressed. In recent times, dynamic ID-based remote user authentication schemes for TMIS have been presented to protect user’s privacy. The dynamic ID-based authentication schemes efficiently protect the user’s privacy. Unfortunately, most of the existing dynamic ID-based authentication schemes for TMIS ignore the input verifying condition. This makes login and password change phases inefficient. Inefficiency of the password change phase may lead to denial of service attack in the case of incorrect input in the password change phase. To overcome these weaknesses, we proposed a new dynamic ID-based authentication scheme using a smart card. The proposed scheme can quickly detect incorrect inputs which makes the login and password change phase efficient. We adopt the approach with the aim to protect privacy, and efficient login and password change phases. The proposed scheme also resists off-line password guessing attack and denial of service attack. We also demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham logic. In addition, our scheme is comparable in terms of the communication and computational overheads with relevant schemes for TMIS.

  3. OpenID connect as a security service in Cloud-based diagnostic imaging systems

    Science.gov (United States)

    Ma, Weina; Sartipi, Kamran; Sharghi, Hassan; Koff, David; Bak, Peter

    2015-03-01

    The evolution of cloud computing is driving the next generation of diagnostic imaging (DI) systems. Cloud-based DI systems are able to deliver better services to patients without constraining to their own physical facilities. However, privacy and security concerns have been consistently regarded as the major obstacle for adoption of cloud computing by healthcare domains. Furthermore, traditional computing models and interfaces employed by DI systems are not ready for accessing diagnostic images through mobile devices. RESTful is an ideal technology for provisioning both mobile services and cloud computing. OpenID Connect, combining OpenID and OAuth together, is an emerging REST-based federated identity solution. It is one of the most perspective open standards to potentially become the de-facto standard for securing cloud computing and mobile applications, which has ever been regarded as "Kerberos of Cloud". We introduce OpenID Connect as an identity and authentication service in cloud-based DI systems and propose enhancements that allow for incorporating this technology within distributed enterprise environment. The objective of this study is to offer solutions for secure radiology image sharing among DI-r (Diagnostic Imaging Repository) and heterogeneous PACS (Picture Archiving and Communication Systems) as well as mobile clients in the cloud ecosystem. Through using OpenID Connect as an open-source identity and authentication service, deploying DI-r and PACS to private or community clouds should obtain equivalent security level to traditional computing model.

  4. Communication Test for ‘MatrikonOPC Server for SCADA DNP 3’ with RTDS

    DEFF Research Database (Denmark)

    Wu, Qiuwei; Cha, Seung-Tae; Saleem, Arshad

    2010-01-01

    The purpose of the communication test for ‘MatrikonOPC server for SCADA DNP 3’ with RTDS is to verify the data exchange between the ‘MatrikonOPC server for SCADA DNP 3’ and the RTDS using the DNP 3 protocol.The communication test is part of the work for the ‘Wind in Øresund’ project. The objective...... of the ‘Wind in Øresund’ project is to build a demonstration and education system of power system operation and control with a RTDS and a SCADA system....

  5. Community energy storage and distribution SCADA improvements

    International Nuclear Information System (INIS)

    Riggins, M.

    2010-01-01

    The mission of American Electric Power (AEP) is to sustain the real time balance of energy supply and demand. Approximately 2.5 percent of energy generated in the United States (USA) is stored as pumped hydro, compressed air, or in batteries and other devices. This power point presentation discussed the use of SCADA for improving community energy storage (CES) and distribution systems. CES is a distributed fleet of small energy units connected to the transformers in order to serve houses or small commercial loads. CES is operated as a fleet offering multi-megawatt (MW) multi-hour storage. The benefits of CES include backup power, flicker mitigation, and renewable integration. Benefits to the electricity grid include power factor correct, ancillary services, and load leveling at the substation level. SCADA is being used to determine when emergency load reductions are required or when emergency inspections on fans, oil pumps or other devices are needed. An outline of AEP's monitoring system installation plan was also included. tabs., figs.

  6. OpenID Connect as a security service in cloud-based medical imaging systems.

    Science.gov (United States)

    Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter

    2016-04-01

    The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as "Kerberos of cloud." We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model.

  7. Identification of clinical yeasts by Vitek MS system compared with API ID 32 C.

    Science.gov (United States)

    Durán-Valle, M Teresa; Sanz-Rodríguez, Nuria; Muñoz-Paraíso, Carmen; Almagro-Moltó, María; Gómez-Garcés, José Luis

    2014-05-01

    We performed a clinical evaluation of the Vitek MS matrix-assisted laser desorption ionization-time-of-flight mass spectrometry (MALDI-TOF MS) system with the commercial database version 2.0 for rapid identification of medically important yeasts as compared with the conventional phenotypic method API ID 32 C. We tested 161 clinical isolates, nine isolates from culture collections and five reference strains. In case of discrepant results or no identification with one or both methods, molecular identification techniques were employed. Concordance between both methods was observed with 160/175 isolates (91.42%) and misidentifications by both systems occurred only when taxa were not included in the respective databases, i.e., one isolate of Candida etchellsii was identified as C. globosa by Vitek MS and two isolates of C. orthopsilosis were identified as C. parapsilosis by API ID 32 C. Vitek MS could not identify nine strains (5.14%) and API ID 32 C did not identify 13 (7.42%). Vitek MS was more reliable than API ID 32 C and reduced the time required for the identification of clinical isolates to only a few minutes.

  8. CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection

    Energy Technology Data Exchange (ETDEWEB)

    Marco Carvalho; Richard Ford

    2012-05-14

    Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

  9. Evaluation of the RapID-ANA system for identification of anaerobic bacteria of veterinary origin.

    Science.gov (United States)

    Adney, W S; Jones, R L

    1985-12-01

    This study evaluated the ability of the RapID-ANA system (Innovative Diagnostic Systems, Inc., Atlanta, Ga.) to accurately identify a spectrum of freshly isolated veterinary anaerobes. A total of 183 isolates were tested and included 7 Actinomyces spp., 53 Bacteroides spp., 32 Clostridium spp., 2 Eubacterium spp., 65 Fusobacterium spp., 1 Peptococcus spp., 22 Peptostreptococcus spp., and 1 Propionibacterium spp. All isolates were initially identified by conventional biochemical testing and gas-liquid chromatography of short-chain fatty acid metabolites. Additional tests were performed as required by the RapID-ANA system. Of these isolates, 81.4% were correctly identified to the genus level, including 59.6% to the species level, 14.2% were incorrectly identified at the genus level, and 4.4% were not identified. Initially, 20.2% of the strains were not identified because the microcodes were not in the code book. The majority of the incorrect identifications were caused by the misidentification of Fusobacterium spp. as Bacteroides spp. Errors also occurred when veterinary anaerobes not included in the data base were assigned an identification from the existing data base. The RapID-ANA system appears to be a promising new method for rapid identification of veterinary anaerobes; however, further evaluation with an extended data base is needed before the system can accurately identify all clinically significant anaerobes.

  10. Development of Integral Effect Test Facility P and ID and Technical Specification for SMART Fluid System

    International Nuclear Information System (INIS)

    Lee, Sang Il; Jung, Y. H.; Yang, H. J.; Song, S. Y.; Han, O. J.; Lee, B. J.; Kim, Y. A.; Lim, J. H.; Park, K. W.; Kim, N. G.

    2010-01-01

    SMART integral test loop is the thermal hydraulic test facility with a high pressure and temperature for simulating the major systems of the prototype reactor, SMART-330. The objective of this project is to conduct the basic design for constructing SMART ITL. The major results of this project include a series of design documents, technical specifications and P and ID. The results can be used as the fundamental materials for making the detailed design which is essential for manufacturing and installing SMART ITL

  11. MicroSCADA project documentation database

    OpenAIRE

    Kolam, Karolina

    2014-01-01

    Detta ingenjörsarbete var beställt av ABB Power Systems, Network Management. Syftet med detta ingenjörsarbete var att skapa en databas för dokumentering av information om MicroSCADA projekt. Ett lämpligt verktyg för att skapa rapporter och skriva ny data till databasen skulle också ingå. Före detta ingenjörsarbete sparades all information som skilda textdokument. Med en databas kunde man samla all information på ett ställe för att arkiveras under en längre tid. Det förenklad...

  12. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  13. Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08).

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Laurence R.; Richardson, Bryan T.; Stamp, Jason Edwin; LaViolette, Randall A.

    2009-02-01

    To analyze the risks due to cyber attack against control systems used in the United States electrical infrastructure, new algorithms are needed to determine the possible impacts. This research is studying the Reliability Impact of Cyber ttack (RICA) in a two-pronged approach. First, malevolent cyber actions are analyzed in terms of reduced grid reliability. Second, power system impacts are investigated using an abstraction of the grid's dynamic model. This second year of esearch extends the work done during the first year.

  14. Codifying Information Assurance Controls for Department of Defense (DoD) Supervisory Control and Data Acquisition (SCADA) Systems

    Science.gov (United States)

    2010-03-01

    this thesis would have never been possible. I would also like to thank my wife and children for their inspiration, motivation and encouragement... Telecommuting and Broadband Communications, August 2002. •SP 800-47, Security Guide for Interconnecting Information Technology Systems, September 2002

  15. [Comparison of Phoenix™ Yeast ID Panel and API® ID 32C commercial systems for the identification of Candida species isolated from clinical samples].

    Science.gov (United States)

    Gayibova, Ülkü; Dalyan Cılo, Burcu; Ağca, Harun; Ener, Beyza

    2014-07-01

    Opportunistic fungal pathogens are one of the important causes of nosocomial infections, and several different types of yeasts, especially Candida species are increasingly recovered from immunocompromised patients. Since many of the yeasts are resistant to the commonly used antifungal agents, the introduction of appropriate therapy depends on rapid and accurate identification. The aims of this study were to compare the commercial identification systems namely API® ID 32C (bioMerieux, France) and Phoenix™ Yeast ID Panel (Becton Dickinson Diagnostics, USA) for the identification of Candida species and to evaluate the effect of morphological findings in the identification process. A total of 211 yeast strains isolated from different clinical samples (111 urine, 34 blood/vascular catheter, 27 upper/lower respiratory tract, 16 abscess/pus, 13 throat/vagina swabs and 10 sterile body fluids) of 137 patients hospitalized in Uludag University Health and Research Center between October 2013 to January 2014, were included in the study. Samples were cultured on blood agar, chromogenic agar (CHROMagar Candida, BD, USA) and Saboraud's dextrose agar (SDA), and isolated yeast colonies were evaluated with germ tube test and morphological examination by microscopy on cornmeal/Tween-80 agar. The isolates were identified as well by two commercial systems according to the manufacturers' recommendations. Discrepant results between the systems were tried to be resolved by using morphological characteristics of the yeasts. Of the isolates 159 were identified identical by both of the systems, and the concordance between those systems were estimated as 75.4%. According to the concordant identification, the most frequently isolated species was C.albicans (44.1%) followed by C.tropicalis (9.9%), C.glabrata (9.5%), C.parapsilosis (8.5%) and C.kefyr (8.1%). The concordance rate was 81.7% in identification of frequently isolated species (C.albicans, C.tropicalis, C.parapsilosis, C.glabrata, C

  16. Experience of FlexCtrl SCADA usage for accelerator automation

    International Nuclear Information System (INIS)

    Nikiforov, A.S.; Alejnikov, V.V.; Sychev, K.P.; Borina, I.V.; Rukavishnikov, A.A.

    2012-01-01

    Software of particle accelerator control system is described in this paper. Software is based on licensed software (FlexCtrl SCADA, Photon Application Builder, Cogent DataHub) and additionally developed class library. This software is integrated programming environment and according to its functionality serves as visual programming. Properties number of IDE components as well as components number can be increased due to the fact that IDE is characterized by its openness

  17. A First Look into SCADA Network Traffic

    NARCIS (Netherlands)

    Barbosa, R.R.R.; Sadre, R.; Pras, Aiko

    Supervisory Control and Data Acquisition (SCADA) networks are commonly deployed to aid the operation of critical infrastructures, such as water distribution facilities. These networks provide automated processes that ensure the correct functioning of these infrastructures, in a operation much

  18. A Plan to Optimize the Management of Weld ID SSN Numbering System for Nuclear Power Plants in Korea

    International Nuclear Information System (INIS)

    Yoo, Hyun Ju; Cho, Chan Hee; Kim, Jin Hoi; Park, Dong Min

    2016-01-01

    Summary Sheet Number(SSN) in the current LTP is an ID which means a weldment in a nuclear power plant. However, the SSN ID, which is unique on in a nuclear power plant, is not unique one if the weldments of entire nuclear power plant in Korea are treated in one system. Therefore, it is hard to manage the data during life time using the existing SSN ID system. It is also hard to configure the characteristics of weldment in mind because IDs implying Alloy600 and overlay weld do not exist in the existing SSN ID System. An optimized SSN numbering system managing weldments for the life time is introduced in this paper. Moreover, it is explained how to manage the SSN numbering system in the computer program system, too. The problem, which the weld is not harmoniously managed, would be solved provided adapting the new SSN ID introduced in this paper. A weld is managed during its life time from creation to extinction. The inquiry of inspection history of a concerned weld and the reference of statistics would be performed easily and rightly because the concerned weld can be accessed from anywhere connected to KHNP network such as KHNP headquater, plants and CRI

  19. Cyber security risk assessment for SCADA and DCS networks.

    Science.gov (United States)

    Ralston, P A S; Graham, J H; Hieb, J L

    2007-10-01

    The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.

  20. Developments on the SCADA of CERN Accelerators Vacuum

    CERN Document Server

    Antoniotti, F; Boccioli, M; Gomes, P; Pereira, H; Kopylov, L; Mikheev, M; Merker, S

    2014-01-01

    During the first 3 years of LHC operation, the priority for the SCADA (Supervisory Control And Data Acquisition) of vacuum controls was to attend to user requests, and to improve its ergonomics and efficiency: access & presentation of information simplified and normalized; coherent functionalities & menus across all accelerators; automatic scripts instead of fastidious manual actions; enhanced tools for data analysis and for maintenance interventions. Several decades of cumulative developments, based on heterogeneous technologies and architectures, have been asking for a homogenization effort. The first LHC Long Shutdown (LS1) provides the opportunity to further standardize the vacuum controls systems [1], around Siemens-S7 PLCs (Programmable Logic Controllers) and PVSS SCADA. Meanwhile, exchanges with other Groups at CERN and outside Institutes have been promoted: to follow the global update policy for software libraries; to discuss philosophies and development details; and to accomplish common pro...

  1. Screening for primary aldosteronism using the newly developed IDS-iSYS® automated assay system

    Directory of Open Access Journals (Sweden)

    P.M. O’Shea

    2017-04-01

    Full Text Available Background: The recommended approach to screening for primary aldosteronism (PA in at-risk populations is to determine the ratio of aldosterone concentration (serum (SAC/plasma (PAC to renin measured in plasma as activity (PRA or concentration (DRC. However, lack of assay standardisation mandates the need for method-specific decision thresholds and clinical validation in the local population. Aim: The study objective was to establish method-specific aldosterone: renin ratio (ARR cut-offs for PA in men and women using the IDS-iSYS® assay system (IDS plc. Methods: A prospective cohort study design was used. PAC and DRC were measured immunochemically in ethylenediamine-tetraacetic acid (EDTA plasma on the IDS-iSYS® instrument. Results: A total of 437 subjects (218 men, 219 women were recruited including: healthy normotensive volunteers (n=266 and women taking the oral contraceptive pill (OCP; n=15; patients with essential hypertension (EH; n=128; confirmed PA (n=16; adrenal cortical carcinoma (ACC; n=3; Addison's disease (AD; n=4 and phaeochromocytoma/paraganglioma (PPGL; n=5. In this population, an ARR cut-off at >37.4 pmol/mIU provided 100% diagnostic sensitivity, 96% specificity and positive likelihood ratio for PA of 23:1. When the ARR decision threshold was stratified according to gender, a cut-off of >26.1 pmol/mIU in men and >113.6 pmol/mIU in women resulted in diagnostic sensitivity and specificity of 100%. Conclusion: This study demonstrates that decision thresholds for PA should not only be method-specific but also gender-specific. However, given the small number of PA patients (n=16, particularly women (n=4, further validation through a prospective study with a larger PA cohort is required before the thresholds presented here could be recommended for routine clinical use. Keywords: Primary aldosteronism, Renin, Aldosterone, Aldosterone: renin ratio (ARR, Sensitivity, Specificity

  2. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Dhanalakshmi Krishnan Sadhasivan

    2017-01-01

    Full Text Available Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS to detect the anomalies in the real-time datasets such as KDD and SCADA. Besides, the feedback loop provides the necessary update of attacks in the database that leads to the improvement in the detection accuracy. The combination of the rules and responsibilities for multiagents effectively detects the anomaly behavior, misuse of response, or relay reports of gas/water pipeline data in KDD and SCADA, respectively. The comparative analysis of the proposed ARMA-IDS with the various existing path mining methods, namely, random forest, JRip, a combination of AdaBoost/JRip, and common path mining on the SCADA dataset conveys that the effectiveness of the proposed ARMA-IDS in the real-time fault monitoring. Moreover, the proposed ARMA-IDS offers the higher detection rate in the SCADA and KDD cup 1999 datasets.

  3. Augmented Reality Applications for Substation Management by Utilizing Standards-Compliant SCADA Communication

    Directory of Open Access Journals (Sweden)

    Miro Antonijević

    2018-03-01

    Full Text Available Most electrical substations are remotely monitored and controlled by using Supervisory Control and Data Acquisition (SCADA applications. Current SCADA systems have been significantly enhanced by utilizing standardized communication protocols and the most prominent is the IEC 61850 international standard. These enhancements enable improvements in different domains of SCADA systems such as communication engineering, data management and visualization of automation process data in SCADA applications. Process data visualization is usually achieved through Human Machine Interface (HMI screens in substation control centres. However, this visualization method sometimes makes supervision, control and maintenance procedures executed by engineers slow and error-prone because it separates equipment from its automation data. Augmented reality (AR and mixed reality (MR visualization techniques have matured enough to provide new possibilities of displaying relevant data wherever needed. This paper presents a novel methodology for visualizing process related SCADA data to enhance and facilitate human-centric activities in substations such as regular equipment maintenance. The proposed solution utilizes AR visualization techniques together with standards-based communication protocols used in substations. The developed proof-of-concept AR application that enables displaying SCADA data on the corresponding substation equipment with the help of AR markers demonstrates originality and benefits of the proposed visualization method. Additionally, the application enables displaying widgets and 3D models of substation equipment to make the visualization more user-friendly and intuitive. The visualized SCADA data needs to be refreshed considering soft real-time data delivery restrictions. Therefore, the proposed solution is thoroughly tested to demonstrate the applicability of proposed methodology in real substations.

  4. Comparison between commercial and open-source SCADA packages-A case study

    International Nuclear Information System (INIS)

    Barana, O.; Barbato, P.; Breda, M.; Capobianco, R.; Luchetta, A.; Molon, F.; Moressa, M.; Simionato, P.; Taliercio, C.; Zampiva, E.

    2010-01-01

    SPIDER (Source for the Production of Ions of Deuterium Extracted from Rf plasma) is a new experimental device under development at Consorzio RFX aimed at providing a full-scale ion source prototype for MITICA (Megavolt ITer Injector and Concept Advance), the experiment devoted at supplying a full-scale prototype of the ITER Heating Neutral Beam Injector (HNB). Both experimental devices will be hosted in a new facility known as PRIMA (Padova Research on Injectors Megavolt Accelerated). The correct operation of SPIDER and MITICA will be guaranteed by process automation and plant monitoring that will be implemented using suitable controllers (cycle time greater than 10 ms) in conjunction with appropriate SCADA (Supervisory Control And Data Acquisition) software. This paper presents the tests performed at Consorzio RFX to evaluate commercial and open-source SCADA packages and prepare a technical base for the selection of the SCADA system for SPIDER. Two commercial solutions and two open-source solutions (EPICS and TANGO) were investigated. The typical test-bed was represented by a SCADA system exchanging data with a PLC (Programmable Logic Controller). The case study consisted of: (a) the development of a minimal panel provided with fields for setting parameters and of a trend window; (b) the set-up of two kinds of communication, a direct connection between the SCADA and the PLC and an indirect one by means of an OPC (Object Linking and Embedding for Process Control) server. The communication performance was evaluated measuring the network traffic with a fixed number of data variables exchanged and different polling cycle times. The conclusions show that the final choice of a SCADA package for SPIDER will be between one commercial SCADA and EPICS. This choice will not depend uniquely on the results of the tests, but will be also dictated by the early schedule of the SPIDER operations.

  5. Why SCADA security is NOT like Computer Centre Security

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    Today, the industralized world lives in symbiosis with control systems (aka SCADA systems): it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and discuss the differences (or not) between computer center cyber-security and control system cyber-security.

  6. Demonstrating idAnimate : a multi-touch system for sketching and rapidly manipulating animations

    NARCIS (Netherlands)

    Quevedo Fernandez, Javier; Martens, J.B.O.S.

    2012-01-01

    This demonstration presents idAnimate, a multi-touch application for sketching animations. Thanks to the affordances provided by multitouch interfaces, idAnimate yields a novel, intuitive and easy to use animation technique named transformation-by-example, that allows users to author animations in

  7. What's under the hood? Improving SCADA security with process awareness

    NARCIS (Netherlands)

    Chromik, Justyna Joanna; Remke, Anne Katharina Ingrid; Haverkort, Boudewijn R.H.M.

    2016-01-01

    SCADA networks are an essential part of monitoring and controlling physical infrastructures, such as the power grid. Recent news item show that tampering with the data exchanged in a SCADA network occurs and has severe consequences. A possible way of improving the security of SCADA networks is to

  8. MultiController: the PLC-SCADA object for advanced regulation

    CERN Document Server

    Ortola, J

    2007-01-01

    Nowadays, industrial solutions with PLCs (Programmable Logic Controllers) have basic control loop features. The SCADA (Supervisory Control And Data Acquisition) system is a key point of the process control system due to an efficient HMI (Human Machine Interfaces) that provides an open method of tuning and leading possibilities. As a consequence, advanced control algorithms have to be developed and implemented for those PLC-SCADA solutions in order to provide perspectives in solving complex and critical regulation problems. The MultiController is an object integrated for a large scale project at CERN (the European Organization for Nuclear Research) named LHC-GCS (Large Hadron Collider - Gas Control System). It is developed for a Framework called CERN-UNICOS based on PLC-SCADA facilities. The MultiController object offers various advanced control loop strategies. It gives to the user advanced control algorithms like PID, Smith Predictor, PFC, GPC and RST. It is implemented as a monolithic entity (in PLC and SCA...

  9. Wind turbine condition monitoring based on SCADA data using normal behavior models

    DEFF Research Database (Denmark)

    Schlechtingen, Meik; Santos, Ilmar; Achiche, Sofiane

    2013-01-01

    This paper proposes a system for wind turbine condition monitoring using Adaptive Neuro-Fuzzy Interference Systems (ANFIS). For this purpose: (1) ANFIS normal behavior models for common Supervisory Control And Data Acquisition (SCADA) data are developed in order to detect abnormal behavior...... the applicability of ANFIS models for monitoring wind turbine SCADA signals. The computational time needed for model training is compared to Neural Network (NN) models showing the strength of ANFIS in training speed. (2) For automation of fault diagnosis Fuzzy Interference Systems (FIS) are used to analyze...

  10. An Efficient Approach of Load Shifting by Using SCADA

    Directory of Open Access Journals (Sweden)

    Usman Sohail

    2016-08-01

    Full Text Available The consumption of electric power has increased significantly in the past few years, and its demand is still increasing every day. In this regard, its proper distribution is a significant challenge. This paper includes a method not only to improve the existing power distribution by using SCADA but also to reduce the human errors from the system by making the system automated. As a prototype for this paper, a geographical area was divided in to three regions named as A-Islamabad, B-Rawalpindi and C-Attock. These three regions were used as the Remote Terminal Units RTU’s and were further divided into four sectors based on different types of consumers. One main control unit was set to handle the whole power system which was referred to as the MTU (master terminal unit. MTU was designed in such a way that not only it was capable to show RTU’s readings on Graphical user interface-GUI but also to control them. By establishing such a design, distribution of electric power based on priority was achieved among these regions and thus the load requirements were managed by means of priorities among them. The entire load management task was supervised by an individual who was authorized to control the MTU’s GUI. SCADA system enabled the MTU to regulate the electric power in regions and their sectors. All the RTU’s were connected with the MTU by means of a wireless network based on an Internet Service Provider (ISP. If the system works accordingly, the MTU would be able to access the RTU’s from any part of the world. SCADA provides a platform to manage the overall system with the minimal manpower; hence, the human errors were reduced.

  11. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  12. Assessing and improving SCADA security in the Dutch drinking water sector

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Ali, M.; Zielstra, A.

    2011-01-01

    International studies have shown that information security for process control systems, in particular SCADA, is weak. Many of the critical infrastructure (CI) services critically depend on process control systems. Therefore, any vulnerability in the protection of process control systems in CI may

  13. Assessing and Improving SCADA Security in the Dutch Drinking Water Sector

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Ali, M.; Zielstra, A.

    2009-01-01

    International studies have shown that information security for process control systems, in particular SCADA, is weak. As many critical infrastructure (CI) services depend on process control systems, any vulnerability in the protection of process control systems in CI may result in serious

  14. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  15. Design and Implementation of IoT Cloud Moveable SCADA Supported by GSM for Industrial Applications

    Directory of Open Access Journals (Sweden)

    Mahmoud Shaker Nasr

    2017-05-01

    Full Text Available The world at the beginning of a new era of innovation and development with the rise of the industrial Internet or Internet of Things, IoT. It takes the space through the convergence of the global industrial system with the power of advanced computing, analytics, and low cost sensor devices and innovation of communication allowed by the Internet. One of the most important developments is IoT SCADA systems, which are considered as infrastructure of society because of their potential enormous in several industrial applications. This paper presents the design of a new generation of SCADA, named moveable SCADA , based on IoT cloud, and supported by GSM for more flexibility and reliability. The system is applied to industrial application that consists of three-control processes which are temperature, liquid level and motor processes. The three control processes data acquisition and controllers are implemented using embedded microcontroller system while a gateway is used to transfer the data proceed in field supervisor at first as well as main supervisor and monitoring engineer through IoT cloud. The system supported by GSM unit to support the system in case of internet failure. Also a camera is added to the system in order to monitor any location, any location (determined by any of the authorities in the field where the camera is mounted. The proposed SCADA is implemented practically and tested for many cases; the presented obtained results demonstrate that the system operation is very fair and meet the required targets.

  16. Assessing and Augmenting SCADA Cyber Security-A Survey of Techniques

    OpenAIRE

    Patel, S; Nazir, S; Patel, D

    2017-01-01

    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an ...

  17. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    International Nuclear Information System (INIS)

    Pollet, J.

    2006-01-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-critical networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)

  18. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    Energy Technology Data Exchange (ETDEWEB)

    Pollet, J. [PlantData Technologies, Inc., 1201 Louisiana Street, Houston, TX 77002 (United States)

    2006-07-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-critical networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)

  19. Wind Turbine Fault Detection based on Artificial Neural Network Analysis of SCADA Data

    DEFF Research Database (Denmark)

    Herp, Jürgen; S. Nadimi, Esmaeil

    2015-01-01

    Slowly developing faults in wind turbine can, when not detected and fixed on time, cause severe damage and downtime. We are proposing a fault detection method based on Artificial Neural Networks (ANN) and the recordings from Supervisory Control and Data Acquisition (SCADA) systems installed in wind...

  20. MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA

    NARCIS (Netherlands)

    Hadziosmanovic, D.; Bolzoni, D.; Hartel, Pieter H.; Jha, Somesh; Sommer, Robin; Kreibich, Christian

    2010-01-01

    Standard approaches for detecting malicious behaviors, e.g. monitoring network traffic, cannot address process-related threats in SCADA(Supervisory Control And Data Acquisition) systems. These threats take place when an attacker gains user access rights and performs actions which look legitimate,

  1. Design of SCADA water resource management control center by a bi-objective redundancy allocation problem and particle swarm optimization

    International Nuclear Information System (INIS)

    Dolatshahi-Zand, Ali; Khalili-Damghani, Kaveh

    2015-01-01

    SCADA is an essential system to control critical facilities in big cities. SCADA is utilized in several sectors such as water resource management, power plants, electricity distribution centers, traffic control centers, and gas deputy. The failure of SCADA results in crisis. Hence, the design of SCADA system in order to serve a high reliability considering limited budget and other constraints is essential. In this paper, a bi-objective redundancy allocation problem (RAP) is proposed to design Tehran's SCADA water resource management control center. Reliability maximization and cost minimization are concurrently considered. Since the proposed RAP is a non-linear multi-objective mathematical programming so the exact methods cannot efficiently handle it. A multi-objective particle swarm optimization (MOPSO) algorithm is designed to solve it. Several features such as dynamic parameter tuning, efficient constraint handling and Pareto gridding are inserted in proposed MOPSO. The results of proposed MOPSO are compared with an efficient ε-constraint method. Several non-dominated designs of SCADA system are generated using both methods. Comparison metrics based on accuracy and diversity of Pareto front are calculated for both methods. The proposed MOPSO algorithm reports better performance. Finally, in order to choose the practical design, the TOPSIS algorithm is used to prune the Pareto front. - Highlights: • Multi-objective redundancy allocation problem (MORAP) is proposed to design SCADA system. • Multi-objective particle swarm optimization (MOPSO) is proposed to solve MORAP. • Efficient epsilon-constraint method is adapted to solve MORAP. • Non-dominated solutions are generated on Pareto front of MORAP by both methods. • Several multi-objective metrics are calculated to compare the performance of methods

  2. Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment

    Directory of Open Access Journals (Sweden)

    Sang-Soo Yeo

    2014-01-01

    Full Text Available This paper presents the vulnerabilities analyses of KL scheme which is an ID-based authentication scheme for AMI network attached SCADA in smart grid and proposes a security-enhanced authentication scheme which satisfies forward secrecy as well as security requirements introduced in KL scheme and also other existing schemes. The proposed scheme uses MDMS which is the supervising system located in an electrical company as a time-synchronizing server in order to synchronize smart devices at home and conducts authentication between smart meter and smart devices using a new secret value generated by an OTP generator every session. The proposed scheme has forward secrecy, so it increases overall security, but its communication and computation overhead reduce its performance slightly, comparing the existing schemes. Nonetheless, hardware specification and communication bandwidth of smart devices will have better conditions continuously, so the proposed scheme would be a good choice for secure AMI environment.

  3. Study on Parameters Modeling of Wind Turbines Using SCADA Data

    Directory of Open Access Journals (Sweden)

    Yonglong YAN

    2014-08-01

    Full Text Available Taking the advantage of the current massive monitoring data from Supervisory Control and Data Acquisition (SCADA system of wind farm, it is of important significance for anomaly detection, early warning and fault diagnosis to build the data model of state parameters of wind turbines (WTs. The operational conditions and the relationships between the state parameters of wind turbines are complex. It is difficult to establish the model of state parameter accurately, and the modeling method of state parameters of wind turbines considering parameter selection is proposed. Firstly, by analyzing the characteristic of SCADA data, a reasonable range of data and monitoring parameters are chosen. Secondly, neural network algorithm is adapted, and the selection method of input parameters in the model is presented. Generator bearing temperature and cooling air temperature are regarded as target parameters, and the two models are built and input parameters of the models are selected, respectively. Finally, the parameter selection method in this paper and the method using genetic algorithm-partial least square (GA-PLS are analyzed comparatively, and the results show that the proposed methods are correct and effective. Furthermore, the modeling of two parameters illustrate that the method in this paper can applied to other state parameters of wind turbines.

  4. Rancang Bangun Sistem Scada (Supervisory Control And Data Acquisition pada Instalasi Pengolahan Air Sungai Cihideung Institut Pertanian Bogor

    Directory of Open Access Journals (Sweden)

    Agus Eko Handoko

    2017-08-01

    Full Text Available Abstract SCADA is a combination of telemetry and data acquisition. SCADA proceeding by means of accumulating some information and return back to center controlling, it is also implementing every analysis and necessary control through PID control system as a control parameter to SCADA input data system in this research. In designing PID control system it is needed the arrangement of P, I and D parameter in order to acquire output signal system to particular input system which has adjusted to necessity. The research was implemented on Water Treatment Plant in Bogor Agricultural University at Cihideung's area region. The NTU score as a starting operational data is necessary as a bench mark in PAC dose application which is obtained from the samples of morning and afternoon raw water and dose proportion is 75% for 14kgs PAC mixed with 200 Litre water within 30 NTU as the maximal treatment. 75% dose application can be imposed for 7 hours PAC usage. The result of research indicated that the variety of percentages value in PAC dose application delivered the advantage in operating of clean water processing installation particularly for PAC needed. Design Of SCADA System SCADA indicated the outcome of unit data acquirement on certain period to determine the PAC necessity in operating Water Treatment Plant.

  5. Integration of Sensor and Actuator Networks and the SCADA System to Promote the Migration of the Legacy Flexible Manufacturing System towards the Industry 4.0 Concept

    Directory of Open Access Journals (Sweden)

    Antonio José Calderón Godoy

    2018-05-01

    Full Text Available Networks of sensors and actuators in automated manufacturing processes are implemented using industrial fieldbuses, where automation units and supervisory systems are also connected to exchange operational information. In the context of the incoming fourth industrial revolution, called Industry 4.0, the management of legacy facilities is a paramount issue to deal with. This paper presents a solution to enhance the connectivity of a legacy Flexible Manufacturing System, which constitutes the first step in the adoption of the Industry 4.0 concept. Such a system includes the fieldbus PROcess FIeld BUS (PROFIBUS around which sensors, actuators, and controllers are interconnected. In order to establish effective communication between the sensors and actuators network and a supervisory system, a hardware and software approach including Ethernet connectivity is implemented. This work is envisioned to contribute to the migration of legacy systems towards the challenging Industry 4.0 framework. The experimental results prove the proper operation of the FMS and the feasibility of the proposal.

  6. Yucca Mountain Project Integrated Data System (IDS). Final report, October 1, 1989--December 31, 1990

    International Nuclear Information System (INIS)

    1991-01-01

    This final report for LANL Subcontract 9-XS8-2604-1 includes copies of all formal letters, memorandums, and reports provided by CAG to support the IDS effort in the LANL Test Managers Office, Las Vegas, Nevada from October 1, 1989 through the end of the contract on December 31, 1990. The material is divided into two sections; the Functional Requirements Document (FRD) and other reports, letters, and memorandums. All documents are arranged in chronological order with most recent last. Numerous draft copies of the FRD were prepared and cover sheets for all drafts are included. The complete text of only the last version supplied (July 27, 1990) is included in this document

  7. A new cyber security risk evaluation method for oil and gas SCADA based on factor state space

    International Nuclear Information System (INIS)

    Yang, Li; Cao, Xiedong; Li, Jie

    2016-01-01

    Based on comprehensive analysis of the structure and the potential safety problem of oil and gas SCADA(Supervisor control and data acquisition) network, aiming at the shortcomings of traditional evaluation methods, combining factor state space and fuzzy comprehensive evaluation method, a new network security risk evaluation method of oil and gas SCADA is proposed. First of all, formal description of factor state space and its complete mathematical definition were presented; secondly, factor fuzzy evaluation steps were discussed; then, using analytic hierarchy method, evaluation index system for oil and gas SCADA system was established, the index weights of all factors were determined by two-two comparisons; structure design of three layers in reasoning machine was completed. Experiments and tests show that the proposed method is accurate, reliable and practical. Research results provide the template and the new method for the other industries.

  8. A Survey of Research in Supervisory Control and Data Acquisition (SCADA)

    Science.gov (United States)

    2014-09-01

    RISC ) platforms running some version of UNIX.4 Around the turn of the millennium work began on applying Web technologies to SCADA systems.5–8 Lately...the 2 trend has been to move from the UNIX/ RISC system to commodity hardware and Microsoft solutions although there is some Linux,1 to move from...Control Center MTU Master Terminal Unit OS operating system PKI Public Key Infrastructure PLC Programmable Logic Controller RISC Reduced Instruction

  9. MALDI-TOF MS is more accurate than VITEK II ANC card and API Rapid ID 32 A system for the identification of Clostridium species.

    Science.gov (United States)

    Kim, Young Jin; Kim, Si Hyun; Park, Hyun-Jung; Park, Hae-Geun; Park, Dongchul; Song, Sae Am; Lee, Hee Joo; Yong, Dongeun; Choi, Jun Yong; Kook, Joong-Ki; Kim, Hye Ran; Shin, Jeong Hwan

    2016-08-01

    All 50 Clostridium difficile strains were definitely identified by Vitek2 system, Rapid ID 32A system, and MALDI-TOF. For 18 non-difficile Clostridium strains, the identification results were correct in 0, 2, and 17 strains by Vitek2, Rapid ID 32A, and MALDI-TOF, respectively. MALDI-TOF could be used as the primary tool for identification of Clostridium species. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. One ID Card for the Entire Campus.

    Science.gov (United States)

    Ridenour, David P.; Ferguson, Linda M.

    1986-01-01

    The implementation by Indiana State University of a machine-readable photo ID system for their food services prompted an investigation into the available alternatives and requirements for a more efficient all-University ID card system. The new ID system is described. (AUTHOR/MLW)

  11. An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications

    Energy Technology Data Exchange (ETDEWEB)

    Beaver, Justin M [ORNL; Borges, Raymond Charles [ORNL; Buckner, Mark A [ORNL

    2013-01-01

    Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in a critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.

  12. Perancangan Sistem Pemantauan Pengendali Suhu pada Stirred Tank Heater menggunakan Supervisory Control and Data Acquisition (SCADA

    Directory of Open Access Journals (Sweden)

    Ike Bayusari

    2013-04-01

    Full Text Available This paper discusses design of a suhue control monitoring system in stirred tank heater system that has an important function in industrial processes. Monitoring of suhue control system in stirred tank heater is designed using Supervisory Control and Data Acquisition (SCADA that control function of industrial processes. While the actuator to be controlled is the position of burner openings, so that the heat can be adjusted to meet a predetermined set-point. The suhue controller that is also used as a Remote Terminal Unit (RTU is Programmable Logic Controller (PLC. The testing result showed on SCADA system was quite good, where the average percentage of deviation for testing of set-point data was 0.76687%, and the percentage of deviation for testing of suhue data was 0.082%.

  13. FlowIDS

    OpenAIRE

    Sabolčák, Peter

    2006-01-01

    FlowIDS is system which can detect some of the undesirable traffi c in computer networks (undesirable traffic could be also ie. virus activity or overloading of network) and mostly doing counteraction which are set by administrator. Information about data ows are provided by hardware of network infrastructure, eliminitaion of undesirable activity is done through changes in network hardware settings. Regarding the quantity of solution which are provided on market, I decided to focus on Cisco n...

  14. MULTILINGUAL RECODING METHOD DESIGNED FOR SCADA-SYSTEM’S SOFTWARE UPGRADE

    Directory of Open Access Journals (Sweden)

    S. Velykodniy

    2017-06-01

    Full Text Available The article discusses a new approach to upgrade the software for SCADA-systems. A distinctive feature of this method is the ability to support more than ten most popular programming languages. By applying this method it’s possible to automate the process of recoding software components and, by doing so, it saves time programmers have to spend to rewrite the code and reduce the likelihood of structural errors inherited from the previous system.

  15. Design and implementation of HMI and SCADA applied to a didactic emulation of a packing process

    Directory of Open Access Journals (Sweden)

    Manuel Alejandro Bohórquez-Dallos

    2013-07-01

    The supervision and control of the signals are performed with the CANopen protocol. The developed system allows the user to interact directly with the emulation of the process, triggering elements of it in the computer remotely and locally using the touch screen. The SCADA and HMI are embedded in a CoDeSys® function that the user can use as a learning tool for automating the process emulation.

  16. Supervisory Control and Data Acquisition (SCADA) Security Awareness In a Resource Constrained Learning Environment

    Science.gov (United States)

    2014-06-16

    SCADA systems are connected in some manner to the Global Information Grid ( GIG ), the requirement to educate future computer scientists, software...improves retention and understanding of the learning outcomes [6]. Due to the impact these vulnerabilities can have on the economy , military, and...implications such as what impact a persistent blackout would have on local and national economies . Once a firm understanding of the strategic impacts

  17. Difficulties in Modeling SCADA Traffic: A Comparative Analysis

    NARCIS (Netherlands)

    Barbosa, R.R.R.; Sadre, R.; Pras, Aiko

    Modern critical infrastructures, such as water distribution and power generation, are large facilities that are distributed over large geographical areas. Supervisory Control and Data Acquisition (SCADA) networks are deployed to guarantee the correct operation and safety of these infrastructures. In

  18. The Research and Improvement of SDT Algorithm for Historical Data in SCADA

    Directory of Open Access Journals (Sweden)

    Xu Xu-Dong

    2017-01-01

    Full Text Available With the rapid development of Internet of things and big data technology, the amount of data collected by SCADA(Supervisory Control And Data Acquisitionsystem is growing exponentially, which the traditional SDT algorithm can not meet the requirements of SCADA system for historical data compression. In this paper, ASDT(Advanced SDT algorithm based on SDT algorithm is proposed and implemented in the Java language, which is based on the deep research of the data compression method, especially the Swing Door Trending. ASDT algorithm through the sine curve fitting data to achieve data compression, compared with the performance of the traditional SDT algorithm, which it can achieve better compression results. The experimental results show that compared with the traditional SDT algorithm, the ASDT algorithm can improve the compression ratio in the case of no significant increase in the compression error, and the compression radio is increased by nearly 50%.

  19. Condition monitoring with wind turbine SCADA data using Neuro-Fuzzy normal behavior models

    DEFF Research Database (Denmark)

    Schlechtingen, Meik; Santos, Ilmar

    2012-01-01

    System (ANFIS) models are employed to learn the normal behavior in a training phase, where the component condition can be considered healthy. In the application phase the trained models are applied to predict the target signals, e.g. temperatures, pressures, currents, power output, etc. The behavior......This paper presents the latest research results of a project that focuses on normal behavior models for condition monitoring of wind turbines and their components, via ordinary Supervisory Control And Data Acquisition (SCADA) data. In this machine learning approach Adaptive Neuro-Fuzzy Interference...... of the prediction error is used as an indicator for normal and abnormal behavior, with respect to the learned behavior. The advantage of this approach is that the prediction error is widely decoupled from the typical fluctuations of the SCADA data caused by the different turbine operational modes. To classify...

  20. Vulnerability assessment of critical infrastructure : activity 2 final report : information on SCADA systems and other security monitoring techniques used in oil and gas pipelines

    Energy Technology Data Exchange (ETDEWEB)

    Gu, G.P.; Revie, R.W. [Natural Resources Canada, Ottawa, ON (Canada). CANMET Materials Technology Laboratory

    2008-03-15

    This study evaluated various technologies for monitoring the security of remote pipeline infrastructure. The technologies included flow, pressure and mass variations; negative pressure waves; dynamic and statistical modelling; hydrocarbon-sensitive cables; fiber optic systems; infrared thermography; spectral imaging; and synthetic aperture radar and radio frequency identification methods. A brief outline of the technologies was provided, along with suggestions for integrating the technology with other commercially available tools designed to manage security and reduce risk. The study demonstrated that many monitoring technologies are suitable for detecting pipeline leaks and identifying third party intrusions. A combination of different methods may provide optimal security and accuracy in leak detection and location. Automatic range and plausibility checks can be used to enhance system security and to recognize invalid changes in measuring devices and poorly parameterized media. Detailed reviews of the technologies were included in 2 appendices. 28 refs., 2 appendices.

  1. Optimization of Phasor Measurement Unit (PMU Placement in Supervisory Control and Data Acquisition (SCADA-Based Power System for Better State-Estimation Performance

    Directory of Open Access Journals (Sweden)

    Mohammad Shoaib Shahriar

    2018-03-01

    Full Text Available Present-day power systems are mostly equipped with conventional meters and intended for the installation of highly accurate phasor measurement units (PMUs to ensure better protection, monitoring and control of the network. PMU is a deliberate choice due to its unique capacity in providing accurate phasor readings of bus voltages and currents. However, due to the high expense and a requirement for communication facilities, the installation of a limited number of PMUs in a network is common practice. This paper presents an optimal approach to selecting the locations of PMUs to be installed with the objective of ensuring maximum accuracy of the state estimation (SE. The optimization technique ensures that the critical locations of the system will be covered by PMU meters which lower the negative impact of bad data on state-estimation performance. One of the well-known intelligent optimization techniques, the genetic algorithm (GA, is used to search for the optimal set of PMUs. The proposed technique is compared with a heuristic approach of PMU placement. The weighted least square (WLS, with a modified Jacobian to deal with the phasor quantities, is used to compute the estimation accuracy. IEEE 30-bus and 118-bus systems are used to demonstrate the suggested technique.

  2. Unavailability of critical SCADA communication links interconnecting a power grid and a Telco network

    International Nuclear Information System (INIS)

    Bobbio, A.; Bonanni, G.; Ciancamerla, E.; Clemente, R.; Iacomini, A.; Minichino, M.; Scarlatti, A.; Terruggia, R.; Zendri, E.

    2010-01-01

    The availability of power supply to power grid customers depends upon the availability of services of supervision, control and data acquisition (SCADA) system, which constitutes the nervous system of a power grid. In turn, SCADA services depend on the availability of the interconnected networks supporting such services. We propose a service oriented stochastic modelling methodology to investigate the availability of large interconnected networks, based on the hierarchical application of different modelling formalisms to different parts of the networks. Interconnected networks are decomposed according to the specific services delivered until the failure and repair mechanisms of the decomposed elementary blocks can be identified. We represent each network by a convenient stochastic modelling formalism, able to capture the main technological issues and to cope with realistic assumptions about failure and recovery mechanisms. This procedure confines the application of the more intensive computational techniques to those subsystems that actually require it. The paper concentrates on an actual failure scenario, occurred in Rome in January 2004 that involved the outage of critical SCADA communication links, interconnecting a power grid and a Telco network.

  3. Unavailability of critical SCADA communication links interconnecting a power grid and a Telco network

    Energy Technology Data Exchange (ETDEWEB)

    Bobbio, A. [Dipartimento di Informatica, Universita del Piemonte Orientale, Viale Michel 11, 15121 Alessandria (Italy); Bonanni, G.; Ciancamerla, E. [ENEA - CRE Casaccia, Via Anguillarese 301, 00060 Roma (Italy); Clemente, R. [Telecom Italia Mobile, Via Isonzo112, 10141 Torino (Italy); Iacomini, A. [ACEA, Pl. Ostiense 2, 00154 Roma (Italy); Minichino, M., E-mail: minichino@casaccia.enea.i [ENEA - CRE Casaccia, Via Anguillarese 301, 00060 Roma (Italy); Scarlatti, A. [ACEA, Pl. Ostiense 2, 00154 Roma (Italy); Terruggia, R. [Dipartimento di Informatica, Universita del Piemonte Orientale, Viale Michel 11, 15121 Alessandria (Italy); Zendri, E. [ACEA, Pl. Ostiense 2, 00154 Roma (Italy)

    2010-12-15

    The availability of power supply to power grid customers depends upon the availability of services of supervision, control and data acquisition (SCADA) system, which constitutes the nervous system of a power grid. In turn, SCADA services depend on the availability of the interconnected networks supporting such services. We propose a service oriented stochastic modelling methodology to investigate the availability of large interconnected networks, based on the hierarchical application of different modelling formalisms to different parts of the networks. Interconnected networks are decomposed according to the specific services delivered until the failure and repair mechanisms of the decomposed elementary blocks can be identified. We represent each network by a convenient stochastic modelling formalism, able to capture the main technological issues and to cope with realistic assumptions about failure and recovery mechanisms. This procedure confines the application of the more intensive computational techniques to those subsystems that actually require it. The paper concentrates on an actual failure scenario, occurred in Rome in January 2004 that involved the outage of critical SCADA communication links, interconnecting a power grid and a Telco network.

  4. Solar Energy System Description Document: Scattergood School, Site ID 009, PON 2249.

    Science.gov (United States)

    International Business Machines Corp., Huntsville, AL.

    Described are the components, functions, and monitoring instrumentation of a solar heating system at Scattergood School, a Quaker school located in Iowa. The system provides the school gymnasium's space heating and preheating for domestic hot water. This project was constructed and is being evaluated under the United States Department of Energy's…

  5. Smart Home System Based on Mobile Phone and SCADA%基于手机及组态软件的智能家居监控系统

    Institute of Scientific and Technical Information of China (English)

    周磊磊; 周瑜; 张伟

    2015-01-01

    This paper introduces how to convey orders to PLC by logining website using mobile phones,which can reach the goal of controlling and monitoring the smart home system.The main technologies are configuration software,datebase,webpage making and so on.The operations of doors,lamp,windows ect in the home merely can be monitored by landing phone page.%介绍了如何通过手机登录网页来向PLC传达命令,从而实现对智能家居系统的控制与监视.主要利用组态软件、数据库、网页制作等技术.实际运行效果:手机登录网页可以看到家中门窗灯等的运行情况,同时可以通过手机按下按钮打开或者关闭家用电器.

  6. A Parameter Selection Method for Wind Turbine Health Management through SCADA Data

    Directory of Open Access Journals (Sweden)

    Mian Du

    2017-02-01

    Full Text Available Wind turbine anomaly or failure detection using machine learning techniques through supervisory control and data acquisition (SCADA system is drawing wide attention from academic and industry While parameter selection is important for modelling a wind turbine’s condition, only a few papers have been published focusing on this issue and in those papers interconnections among sub-components in a wind turbine are used to address this problem. However, merely the interconnections for decision making sometimes is too general to provide a parameter list considering the differences of each SCADA dataset. In this paper, a method is proposed to provide more detailed suggestions on parameter selection based on mutual information. First, the copula is proven to be capable of simplifying the estimation of mutual information. Then an empirical copulabased mutual information estimation method (ECMI is introduced for application. After that, a real SCADA dataset is adopted to test the method, and the results show the effectiveness of the ECMI in providing parameter selection suggestions when physical knowledge is not accurate enough.

  7. Technoeconomic analysis of a biomass based district heating system. Paper no. IGEC-1-ID01

    International Nuclear Information System (INIS)

    Zhang, H.; Ugursal, V.I.; Fung, A.

    2005-01-01

    District energy systems (DES) that produce steam, hot water or chilled water at a central plant and then distribute that energy to buildings in the district for space heating, domestic hot water heating and air conditioning provide opportunities for increasing energy efficiency and reducing greenhouse gas (GHG) emissions. Use of biomass, such as wood, wood byproducts and wastes, fast-growing trees, agricultural crops and waste, in place of conventional fossil fuels to produce the thermal energy needed by a DES, presents further opportunities for reducing green house gas emissions as well as providing rural employment, and local solutions to rural and remote energy needs. In this paper, a technoeconomic analysis of a biomass based DES for a community center in Nova Scotia, Canada is presented. The methodology used to size and design the heating and ventilating system, as well as the biomass based DES is discussed. Annual energy requirement and biomass fuel consumption predictions are presented along with cost estimates. A comparative assessment of the economic feasibility of the system vis-a-vis a conventional oil fired system is conducted. While the results are specific to the particular application, the design and analysis methodology that is presented in the paper can be used for any similar application. (author)

  8. Automatic diagnosis method for scada operability

    OpenAIRE

    Syrotkina, O. I.

    2015-01-01

    Пропонується до розгляду методика автоматичної діагностики працездатності SCADA системи в режимі реального часу за зміною інформаційно-діагностичних ознак контрольованих параметрів у процесі проходження потоків даних за структурними одиницями і рівнями ієрархії SCADA. В рамках методики були сформульовані необхідні і достатні критерії виявлення відмови в системі, необхідні і достатні критерії розмежування незалежних і вторинних відмов на підставі логіки функціонування SCADA з ур...

  9. Proposal for a Visualization System of Purchase Relationship Using ID-POS Data

    Directory of Open Access Journals (Sweden)

    Ko Hashimoto

    2017-08-01

    Full Text Available In recent years, big data analysis is gaining immense credence in the fields of academics and business. Businesses such as management and marketing have demonstrated a strong inclination and interest in data analytics. However, many businesses are unable to utilize data even if they have access to it. The main reason for that is the lack of familiarity with data analytics procedures. Hence, a system needs to be developed that can perform data analytics and demonstrate its benefits. In this study, we use point of sales data obtained from a supermarket chain to analyze and show the relationship between purchase goods at the same time. A supermarket is one of the ideal places to demonstrate data analysis because retail stores have many purchase records and are always conducting various marketing activities. We propose an easy-to-handle visualization system to show the goods that are inter-related. By using our system, a store manager can obtain information about the item sales easily and interactively.

  10. Desarrollo de un sistema SCADA para el abastecimineto de agua en la estación de bombeo Yuyucocha de la empresa municipal de agua potable y alcantarillado de Ibarra

    OpenAIRE

    Murillo Moreno, Darío Hernán

    2018-01-01

    The present technical project was developed in the Municipal Drinking Water and Sewerage Company of Ibarra with the purpose of developing a SCADA system for the water supply system in the Yuyucocha pumping station, using fiber optic for the connection between three wells and the control room. The SCADA system of the Yuyucocha pumping station allows the continuous monitoring and control of the equipment that is used for the administration of drinking water in the city of Ibarra. Furthermore, t...

  11. Computer-Based Monitoring and Remote Controlling for Oil Well Pumps Using Scada

    Directory of Open Access Journals (Sweden)

    Rudi Tjiptadi

    2011-12-01

    Full Text Available The research aims to change manually the monitoring and controlling of oil well pumps into a computer-based system using SCADA (Supervisory and Data Acquisition system. To design the protection system which consists of controller unit and display system, RTU (Remote Terminal Unit and MTU (Master Terminal Unit are used. The research results in a controller unit which is able to communicate to personal computer using RS-232 C and an alarm system to protect oil pump motors by detecting sensors installed at the pumps. 

  12. Wind turbine condition monitoring based on SCADA data using normal behavior models

    DEFF Research Database (Denmark)

    Schlechtingen, Meik; Santos, Ilmar

    2014-01-01

    system (ANFIS) models in this context and the application of a proposed procedure to a wide range of different SCADA signals. The applicability of the set up ANFIS models for anomaly detection was proven by the achieved performance of the models. In combination with the fuzzy interference system (FIS......) a hydraulic oil leakage; (2) cooling system filter obstructions; (3) converter fan malfunctions; (4) anemometer offsets and (5) turbine controller malfunctions. Moreover, the graphical user interface (GUI) developed to access, analyze and visualize the data and results is presented....

  13. SCADA for microtron and beam transport line radio therapy machine subsystem

    International Nuclear Information System (INIS)

    Deshpande, Praveen; Palod, Shradha; Bhujle, Ashok

    2003-01-01

    Centre for Advanced Technology is developing a Radio Therapy Machine (RTM) to be used for cancer treatment. The radiotherapy machine has a Microtron consisting of a RF system, main and auxiliary magnets. It has a Beam transport line (BTL) consisting of fourteen magnets. This paper describes a PC based supervisory control and data acquisition system (SCADA) developed for controlling mainly the power supplies for the above sub systems from a remote location. It offers a graphic user interface (GUI) at the control room PC for RTM operation in engineering mode

  14. SISTEMA SCADA PARA EL PROCESO DE PASTEURIZACION DE JUGOS

    Directory of Open Access Journals (Sweden)

    Juan de Dios Contreras Cáceres

    2014-06-01

    Full Text Available La finalidad de este artículo es dar a conocer el proyecto desarrollado para diseñar e implementar un sistema SCADA (Supervisory Control And Data Adquisition aplicado al proceso de pasteurización de jugos. Se siguieron las etapas de diseño, partiendo de la elaboración del esquemático Layout, la programación del PLC, los drivers de comunicación y el diseño del software SCADA para una planta de jugos.

  15. Proposta de arquitetura orientada a recursos para SCADA na Web

    OpenAIRE

    Polônia, Pablo Valério

    2011-01-01

    Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico, Programa de Pós-Graduação em Engenharia de Automação e Sistemas, Florianópolis, 2011 Esta dissertação descreve uma proposta de arquitetura de software para aplicações típicas de Sistemas de Supervisão e Aquisição de Dados (SCADA), utilizando a World Wide Web como plataforma. O objetivo é mostrar como os requisitos característicos de aplicações SCADA podem ser incorporados em uma arquitetura condizente com ...

  16. Analysis of Anholt offshore wind farm SCADA measurements

    DEFF Research Database (Denmark)

    Hansen, Kurt Schaldemose; Volker, Patrick; Pena Diaz, Alfredo

    SCADA measurements from the Danish Anholt offshore wind farm (ANH) for a period of 2½ years have been qualified. ANH covers 12 km × 22 km and is located between Djursland and the island Anholt in Kattegat, Denmark. This qualification encompasses identification of curtailment and idling periods......, start/stop events and a power curve control for each wind turbine in the wind farm. Data also include wind speed measurements from a nearby WindCube lidar and simulations from the WRF model for the same period as the SCADA. An equivalent wind speed (wsi) is derived from the combined power and pitch...

  17. PV-Diesel Hybrid SCADA Experiment Network Design

    Science.gov (United States)

    Kalu, Alex; Durand, S.; Emrich, Carol; Ventre, G.; Wilson, W.; Acosta, R.

    1999-01-01

    The essential features of an experimental network for renewable power system satellite based supervisory, control and data acquisition (SCADA) are communication links, controllers, diagnostic equipment and a hybrid power system. Required components for implementing the network consist of two satellite ground stations, to satellite modems, two 486 PCs, two telephone receivers, two telephone modems, two analog telephone lines, one digital telephone line, a hybrid-power system equipped with controller and a satellite spacecraft. In the technology verification experiment (TVE) conducted by Savannah State University and Florida Solar Energy Center, the renewable energy hybrid system is the Apex-1000 Mini-Hybrid which is equipped with NGC3188 for user interface and remote control and the NGC2010 for monitoring and basic control tasks. This power system is connected to a satellite modem via a smart interface, RS232. Commands are sent to the power system control unit through a control PC designed as PC1. PC1 is thus connected to a satellite model through RS232. A second PC, designated PC2, the diagnostic PC is connected to both satellite modems via separate analog telephone lines for checking modems'health. PC2 is also connected to PC1 via a telephone line. Due to the unavailability of a second ground station for the ACTS, one ground station is used to serve both the sending and receiving functions in this experiment. Signal is sent from the control PC to the Hybrid system at a frequency f(sub 1), different from f(sub 2), the signal from the hybrid system to the control PC. f(sub l) and f(sub 2) are sufficiently separated to avoid interference.

  18. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  19. Beat-ID: Towards a computationally low-cost single heartbeat biometric identity check system based on electrocardiogram wave morphology

    Science.gov (United States)

    Paiva, Joana S.; Dias, Duarte

    2017-01-01

    In recent years, safer and more reliable biometric methods have been developed. Apart from the need for enhanced security, the media and entertainment sectors have also been applying biometrics in the emerging market of user-adaptable objects/systems to make these systems more user-friendly. However, the complexity of some state-of-the-art biometric systems (e.g., iris recognition) or their high false rejection rate (e.g., fingerprint recognition) is neither compatible with the simple hardware architecture required by reduced-size devices nor the new trend of implementing smart objects within the dynamic market of the Internet of Things (IoT). It was recently shown that an individual can be recognized by extracting features from their electrocardiogram (ECG). However, most current ECG-based biometric algorithms are computationally demanding and/or rely on relatively large (several seconds) ECG samples, which are incompatible with the aforementioned application fields. Here, we present a computationally low-cost method (patent pending), including simple mathematical operations, for identifying a person using only three ECG morphology-based characteristics from a single heartbeat. The algorithm was trained/tested using ECG signals of different duration from the Physionet database on more than 60 different training/test datasets. The proposed method achieved maximal averaged accuracy of 97.450% in distinguishing each subject from a ten-subject set and false acceptance and rejection rates (FAR and FRR) of 5.710±1.900% and 3.440±1.980%, respectively, placing Beat-ID in a very competitive position in terms of the FRR/FAR among state-of-the-art methods. Furthermore, the proposed method can identify a person using an average of 1.020 heartbeats. It therefore has FRR/FAR behavior similar to obtaining a fingerprint, yet it is simpler and requires less expensive hardware. This method targets low-computational/energy-cost scenarios, such as tiny wearable devices (e.g., a

  20. Towards Periodicity Based Anomaly Detection in SCADA Networks

    NARCIS (Netherlands)

    Barbosa, R.R.R.; Sadre, R.; Pras, Aiko

    Supervisory Control and Data Acquisition (SCADA) networks are commonly deployed to aid the operation of large industrial facilities. The polling mechanism used to retrieve data from field devices causes the data transmission to be highly periodic. In this paper, we propose an approach that exploits

  1. Evaluation of the iPLEX(®) Sample ID Plus Panel designed for the Sequenom MassARRAY(®) system. A SNP typing assay developed for human identification and sample tracking based on the SNPforID panel

    DEFF Research Database (Denmark)

    Johansen, P; Andersen, J D; Børsting, Claus

    2013-01-01

    on the peak height and the signal to noise data exported from the TYPER 4.0 software. With the forensic analysis parameters, all inconsistencies were eliminated in reactions with ≥10ng DNA. However, the average call rate decreased to 69.9%. The iPLEX(®) Sample ID Plus Panel was tested on 10 degraded samples......Sequenom launched the first commercial SNP typing kit for human identification, named the iPLEX(®) Sample ID Plus Panel. The kit amplifies 47 of the 52 SNPs in the SNPforID panel, amelogenin and two Y-chromosome SNPs in one multiplex PCR. The SNPs were analyzed by single base extension (SBE......) and Matrix Assisted Laser Desorption/Ionization-Time of Flight Mass Spectrometry (MALDI-TOF MS). In this study, we evaluated the accuracy and sensitivity of the iPLEX(®) Sample ID Plus Panel by comparing the typing results of the iPLEX(®) Sample ID Plus Panel with those obtained with our ISO 17025 accredited...

  2. Disain Sistem SCADA jarak Jauh Menggunakan Layanan VPN 3G Untuk Penggerak Pompa pada Sistem Pengolahan Air

    Directory of Open Access Journals (Sweden)

    Asep Insani

    2013-03-01

    Full Text Available Dalam pengolahan air gambut menjadi air bersih yang menggunakan metode AOP dan RO ini, pengaturan tekanan pompa merupakan sesuatu yang sangat vital pada saat dilakukan suplay air yang akan diolah ke sistem. Sistem pengolahan air yang menggunakan pompa tersebut harus selalu dipastikan beroperasi dengan normal disesuaikan dengan peruntukannya. Manajemen terbaru sistem pengolahan air memerlukan teknologi yang terbaru pada peralatan remote control system, dan yang paling fundamental untuk hal ini adalah penggunaan layanan public untuk akusisi dan pengawasan dari data yang diambil dari peralatan kontrol. Untuk mewujudkan remote control untuk pompa dengan tekanan tertentu dengan PLC, didisain dengan kombinasi antara internet, arsitektur dan implementasi dari sistem SCADA, yang menggabungkan jaringan komputer, PLC, WinCC, dan teknologi VPN. Dalam melakukan disain, perlu diperhatikan poin-poin penting baik dari sisi server maupun sisi controller. Disain sistem SCADA remote dapat mengefisienkan waktu bagi operator dan pemantauan lebih lanjut untuk suplay air.

  3. Organizative structure of the System for Integral Management of Archive Documents (SiGeID 1.0)

    OpenAIRE

    Irima Campillo Torres; Raudel J. Rosquete Martínez; Magalys Palomino Palomino; Dominica Legañoa Ferrá; Anysley Cano Inclán; Idalmis Cabrera Morales

    2012-01-01

    El nuevo contexto impone a las organizaciones la necesidad vital de disponer de adecuadas infraestructuras de comunicación, que les permitan conseguir un conocimiento real y suficiente del entorno. El presente artículo pretende mostrar la estructura organizativa del Sistema de Gestión Integral de Documentos de archivo SiGeID (1.0), como una herramienta informática que ayuda a las organizaciones empresariales al perfeccionamiento de la gestión de documentos. Dividido en tres módulos: Gestión y...

  4. Enlace de reconectadores a un sistema SCADA mediante una red de comunicaciones

    Directory of Open Access Journals (Sweden)

    Juan Ortega Castro

    2016-12-01

    Abstract The following paper details the link methodology from a communications network for the SCADA system at Azogues Power Company (EEA, starting from the need to implement electric reconnectors in the short and medium term; using automatic reconnectors OSM for their versatility and endurance when used outdoors, IEC 870 DNP3 communications protocols and ModBus for SCADA systems and remote terminal units. This way there is an improvement in the quality of the power supply service that is distributed in Azogues and its parishes. For this task, an implementation design of a communications network was done, in order to link the new reconnectors that were acquired by the company; setting a priority of the infrastructure and resources that it already had, achieving the placement of eight of these devices that were distributed in different areas of the city, using optic fiber in some cases and radio links in other situations when the network infrastructure didn’t allow the physical access to the facility; everything backed up with the correspondent technical and financial studies

  5. Software design practice using two SCADA software packages

    DEFF Research Database (Denmark)

    Basse, K.P.; Christensen, Georg Kronborg; Frederiksen, P. K.

    1996-01-01

    Typical software development for manufacturing control is done either by specialists with consideral real-time programming experience or done by the adaptation of standard software packages for manufacturing control. After investigation and test of two commercial software packages: "InTouch" and ......Touch" and "Fix", it is argued, that a more efficient software solution can be achieved by utilising an integrated specification for SCADA and PLC-programming. Experiences gained from process control is planned investigated for descrete parts manufacturing....

  6. Analyzing wind turbine directional behavior: SCADA data mining techniques for efficiency and power assessment

    International Nuclear Information System (INIS)

    Castellani, Francesco; Astolfi, Davide; Sdringola, Paolo; Proietti, Stefania; Terzi, Ludovico

    2017-01-01

    Highlights: • The directional behavior of four turbines of an onshore wind farm is investigated. • The positions of the nacelles are discretized to highlight clusterization effects. • The recurrent alignment patterns of the cluster are individuated and analyzed. • The patterns are studied by the point of view of efficiency and power output. • Significative performance deviations arise among the most frequent configurations. - Abstract: SCADA control systems are the keystone for reliable performance optimization of wind farms. Processing into knowledge the amount of information they spread is a challenging task, involving engineering, physics, statistics and computer science skills. This work deals with SCADA data analysis methods for assessing the importance of how wind turbines align in patterns to the wind direction. In particular it deals with the most common collective phenomenon causing clusters of turbines behaving as a whole, rather than as a collection of individuality: wake effects. The approach is based on the discretization of nacelle position measurements and subsequent post-processing through simple statistical methods. A cluster, severely affected by wakes, from an onshore wind farm, is selected as test case. The dominant alignment patterns of the cluster are identified and analyzed by the point of view of power output and efficiency. It is shown that non-trivial alignments with respect to the wind direction arise and important performance deviations occur among the most frequent configurations.

  7. Organizative structure of the System for Integral Management of Archive Documents (SiGeID 1.0

    Directory of Open Access Journals (Sweden)

    Irima Campillo Torres

    2012-04-01

    Full Text Available El nuevo contexto impone a las organizaciones la necesidad vital de disponer de adecuadas infraestructuras de comunicación, que les permitan conseguir un conocimiento real y suficiente del entorno. El presente artículo pretende mostrar la estructura organizativa del Sistema de Gestión Integral de Documentos de archivo SiGeID (1.0, como una herramienta informática que ayuda a las organizaciones empresariales al perfeccionamiento de la gestión de documentos. Dividido en tres módulos: Gestión y Seguridad Documental, Gestión de Archivo y Administración y Configuración, se tienen en cuenta además sus requerimientos funcionales y no funcionales

  8. Chiral Spin-Density Wave, Spin-Charge-Chern Liquid, and d+id Superconductivity in 1/4-Doped Correlated Electronic Systems on the Honeycomb Lattice

    Directory of Open Access Journals (Sweden)

    Shenghan Jiang

    2014-09-01

    Full Text Available Recently, two interesting candidate quantum phases—the chiral spin-density wave state featuring anomalous quantum Hall effect and the d+id superconductor—were proposed for the Hubbard model on the honeycomb lattice at 1/4 doping. Using a combination of exact diagonalization, density matrix renormalization group, the variational Monte Carlo method, and quantum field theories, we study the quantum phase diagrams of both the Hubbard model and the t-J model on the honeycomb lattice at 1/4 doping. The main advantage of our approach is the use of symmetry quantum numbers of ground-state wave functions on finite-size systems (up to 32 sites to sharply distinguish different quantum phases. Our results show that for 1≲U/t<40 in the Hubbard model and for 0.1id superconductor. However, in the t-J model, upon increasing J, the system goes through a first-order phase transition at J/t=0.80(2 into the d+id superconductor. Here, the spin-charge-Chern liquid state is a new type of topologically ordered quantum phase with Abelian anyons and fractionalized excitations. Experimental signatures of these quantum phases, such as tunneling conductance, are calculated. These results are discussed in the context of 1/4-doped graphene systems and other correlated electronic materials on the honeycomb lattice.

  9. A proposed HTTP service based IDS

    Directory of Open Access Journals (Sweden)

    Mohamed M. Abd-Eldayem

    2014-03-01

    Full Text Available The tremendous growth of the web-based applications has increased information security vulnerabilities over the Internet. Security administrators use Intrusion-Detection System (IDS to monitor network traffic and host activities to detect attacks against hosts and network resources. In this paper IDS based on Naïve Bayes classifier is analyzed. The main objective is to enhance IDS performance through preparing the training data set allowing to detect malicious connections that exploit the http service. Results of application are demonstrated and discussed. In the training phase of the proposed IDS, at first a feature selection technique based on Naïve Bayes classifier is used, this technique identifies the most important HTTP traffic features that can be used to detect HTTP attacks. In the testing and running phases proposed IDS classifies the network traffic based on the requested service, then based on the selected features Naïve Bayes classifier is used to analyze the HTTP service based traffic and identifies the HTTP normal connections and attacks. The performance of the IDS is measured through experiments using NSL-KDD data set. The results show that the detection rate of the IDS is about 99%, the false-positive rate is about 1%, and the false-negative rate is about 0.25%; therefore, proposed IDS holds the highest detection rate and the lowest false alarm compared with other leading IDS. In addition, the proposed IDS based on Naïve Bayes is used to classify network connections as a normal or attack. And it holds a high detection rate and a low false alarm.

  10. LHC-GCS a model-driven approach for automatic PLC and SCADA code generation

    CERN Document Server

    Thomas, Geraldine; Barillère, Renaud; Cabaret, Sebastien; Kulman, Nikolay; Pons, Xavier; Rochez, Jacques

    2005-01-01

    The LHC experiments’ Gas Control System (LHC GCS) project [1] aims to provide the four LHC experiments (ALICE, ATLAS, CMS and LHCb) with control for their 23 gas systems. To ease the production and maintenance of 23 control systems, a model-driven approach has been adopted to generate automatically the code for the Programmable Logic Controllers (PLCs) and for the Supervision Control And Data Acquisition (SCADA) systems. The first milestones of the project have been achieved. The LHC GCS framework [4] and the generation tools have been produced. A first control application has actually been generated and is in production, and a second is in preparation. This paper describes the principle and the architecture of the model-driven solution. It will in particular detail how the model-driven solution fits with the LHC GCS framework and with the UNICOS [5] data-driven tools.

  11. Interoperability for electronic ID

    OpenAIRE

    Zygadlo, Zuzanna

    2009-01-01

    Electronic Business, including eBanking, eCommerce and eGovernmental services, is today based on a large variety of security solutions, comprising electronic IDs provided by a broad community of Public Key Infrastructure (PKI) vendors. Significant differences in implementations of those solutions introduce a problem of lack of interoperability in electronic business, which have not yet been resolved by standardization and interoperability initiatives based on existing PKI trust models. It i...

  12. Predicting Faults in Wind Turbines Using SCADA Data

    DEFF Research Database (Denmark)

    Borchersen, Anders Bech; Larsen, Jesper Abildgaard; Stoustrup, Jakob

    2013-01-01

    The cost of operation and maintenance of wind turbines is a significant part of the overall cost of wind turbines. To reduce this cost a method for enabling early fault detection is proposed and tested in this paper. The method is taking advantage of the fact that wind turbines in wind farms...... and tested on historical Supervisory Control And Data Acquisition (SCADA) data from nine operational turbines over a testing period of nine months. The performance of the fault detection is found to be acceptable based on the testing period. During the testing period several gear related services were...

  13. Development of Supervisory Control and Data Acquisition (SCADA) Electrical Supply in Malaysian Nuclear Agency

    International Nuclear Information System (INIS)

    Zainudin Jaafar; Mohd Ashhar Khalid; Mohd Hanafiah Chik

    2015-01-01

    Nuclear Power supplies in Malaysia supplied from the power utility company Tenaga Nasional Berhad through several substations before reaching the building and equipment. The power supply is received and passed down through the 11000 V high voltage switch gears to 415 V 3-phase or 1-phase 240 V. The equipment used in this process is dangerous and monitoring hardware operating remotely (remote) is the best as only guard machinery may engage in business operations. Similarly, the supply of electrical parameters should be monitored to ensure safe and continuous supply of and according to the appropriate voltage for record and analysis when needed. This paper discusses the monitoring and data acquisition is performed using the system 'Supervisory Control And Data Acquisition (SCADA) was developed. (author)

  14. VLM Tool for IDS Integration

    Directory of Open Access Journals (Sweden)

    Cǎtǎlin NAE

    2010-03-01

    Full Text Available This paper is dedicated to a very specific type of analysis tool (VLM - Vortex Lattice Method to be integrated in a IDS - Integrated Design System, tailored for the usage of small aircraft industry. The major interest is to have the possibility to simulate at very low computational costs a preliminary set of aerodynamic characteristics for basic aerodynamic global characteristics (Lift, Drag, Pitching Moment and aerodynamic derivatives for longitudinal and lateral-directional stability analysis. This work enables fast investigations of the influence of configuration changes in a very efficient computational environment. Using experimental data and/or CFD information for a specific calibration of VLM method, reliability of the analysis may me increased so that a first type (iteration zero aerodynamic evaluation of the preliminary 3D configuration is possible. The output of this tool is basic state aerodynamic and associated stability and control derivatives, as well as a complete set of information on specific loads on major airframe components.The major interest in using and validating this type of methods is coming from the possibility to integrate it as a tool in an IDS system for conceptual design phase, as considered for development for CESAR project (IP, UE FP6.

  15. Does postprandial itopride intake affect the rate of gastric emptying? A crossover study using the continuous real time 13C breath test (BreathID system).

    Science.gov (United States)

    Nonaka, Takashi; Kessoku, Takaomi; Ogawa, Yuji; Yanagisawa, Shogo; Shiba, Tadahiko; Sahaguchi, Takashi; Atsukawa, Kazuhiro; Takahashi, Hisao; Sekino, Yusuke; Iida, Hiroshi; Hosono, Kunihiro; Endo, Hiroki; Sakamoto, Yasunari; Koide, Tomoko; Takahashi, Hirokazu; Tokoro, Chikako; Abe, Yasunobu; Maeda, Shin; Nakajima, Atsushi; Inamori, Masahiko

    2011-01-01

    The aim of this study was to determine whether oral Itopride hydrochloride (itopride) intake might have any effect on the rate of gastric emptying, using a novel non-invasive technique for measuring the rate of gastric emptying, namely, the continuous real time 13C breath test (BreathID system: Exalenz Bioscience Ltd., Israel). Eight healthy male volunteers participated in this randomized, two-way crossover study. The subjects fasted overnight and were randomly assigned to receive 50mg itopride following a test meal (200 kcal per 200mL, containing 100mg 13C acetate), or the test meal alone. Under both conditions, gastric emptying was monitored for 4 hours after administration of the test meal by the 13C-acetic acid breath test performed continually using the BreathID system. Using Oridion Research Software (beta version), the time required for emptying of 50% of the labeled meal (T 1/2), the analog to the scintigraphy lag time for 10% emptying of the labeled meal (T lag), the gastric emptying coefficient (GEC), and the regression-estimated constants (beta and kappa) were calculated. The parameters measured under the two conditions were compared using the Wilcoxon's signed-rank test. No significant differences in the calculated parameters, namely, the T 1/2, T lag, GEC, beta or kappa, were observed between the two test conditions, namely, administration of a test meal+itopride and administration of the test meal alone. The present study revealed that postprandial itopride intake had no significant influence on the rate of gastric emptying. Recently, several studies have shown that itopride may be effective in the treatment of patients with functional dyspepsia. Our results suggest that the efficacy of itopride in patients with functional dyspepsia may be based on its effect of improving functions other than the rate of gastric emptying, such as the activities at neuronal sites, brain-gut correlation, visceral hypersensitivity, gastric accommodation and distension

  16. Introduction to SCADA Protection and Vulnerabilities

    Energy Technology Data Exchange (ETDEWEB)

    Ken Barnes; Briam Johnson; Reva Nickelson

    2004-03-01

    Even though deregulation has changed the landscape of the electric utility industry to some extent, a typical large electric utility still owns power generation facilities, power transmission and distribution lines, and substations. Transmission and distribution lines form the segments or spokes of a utility’s grid. Power flow may change through these lines, but control of the system occurs at the nodes of the grid, the generation facilities, and substations. This section discusses each of these node types in more detail as well as how each is controlled.

  17. Optimal planning of gas turbine cogeneration system based on linear programming. Paper no. IGEC-1-ID09

    International Nuclear Information System (INIS)

    Oh, S.-D.; Kwak, H.-Y.

    2005-01-01

    An optimal planning for gas turbine cogeneration system has been studied. The planning problem considered in this study is to determine the optimal configuration of the system equipments and optimal operational policy of the system when the annual energy demands of electric power, heat and cooling are given a priori. The main benefit of the optimal planning is to minimize operational costs and to save energy by efficient energy utilization. A mixed-integer linear programming and the branch and bound algorithm have been adopted to obtain the optimal solution. Both the optimal configuration of the system equipments and the optimal operation policy has been obtained based on annual cost method. The planning method employed here may be applied to the planning problem of the cogeneration plant to any specific building or hotel. (author)

  18. Facts about Infectious Diseases (ID)

    Science.gov (United States)

    ... an ID Specialist? Facts about ID Pocketcard Infectious diseases are caused by microscopic organisms that penetrate the body’s natural ... from diseases such as AIDS or treatment of diseases such as cancer, may allow ... of contaminated food or water, bites from vectors such as ticks or mosquitoes ...

  19. PENINGKATAN KEAMANAN SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA PADA SMART GRID SEBAGAI INFRASTRUKTUR KRITIS

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2016-10-01

    Full Text Available SCADA (Supervisory Control and Data Acquisition systems as the control unit of the smart grid has been used in almost various industries around the world in terms of automation systems. Smart grid technology combines the energy infrastructure and telecommunications and Internet networks. The system provides the operational ease and efficiency in the industry. However, the system has a lot of vulnerabilities in information security aspects that can have a major impact for the industry and even the economy. This study tried to design in building a smart grid cyber security, it includes the strategies that must be done and the information security system architecture to be built. The study was conducted qualitative in-depth interviews, focus group discussions and direct observation. Results of this research is the design strategy recommendations ddalam development of smart grid cyber security. Recommendation results of this study also intended as a suggestion-making framework for smart grid cyber security as a reference implementation of the smart grid in Indonesia.

  20. IT security analysis of the scada-system in the Nossener Bruecke power plant GT-HKW; IT-Sicherheitsbetrachtung fuer die leittechnische Anlage des GT-HKW Nossener Bruecke in Dresden

    Energy Technology Data Exchange (ETDEWEB)

    Mallon, Martin [Drewag Stadtwerke Dresden GmbH, Dresden (Germany). Abt. Kraftwerkstechnik; Schaeffer, Philippe A.R. [Jester Secure iT GmbH, Bergisch Gladbach (Germany)

    2012-11-01

    Drewag Stadtwerke Dresden GmbH operates the Nossener Bruecke gas turbine combined cycle power plant. The I and C systems were subjected to an IT safety check in order to guarantee the high availability. Measures increasing security were derived. These were implemented after having assessed the risks and feasibility. A PDCA cycle is integrated to guarantee and improve long-term IT security. (orig.)

  1. Population data and mutation rates of 19 STR loci in seven provinces from China based on Goldeneye™ DNA ID System 20A.

    Science.gov (United States)

    Liu, Qiu-Ling; Chen, Ye-Fei; Huang, Xiao-Ling; Liu, Kai-Yan; Zhao, Hu; Lu, De-Jian

    2017-05-01

    Short tandem repeat (STR) analysis is a primary tool in forensic casework. Population data and mutation rates of STRs are very important for paternity testing and forensic genetics. However, the population data and mutation rates of STRs in Han nationality based on large samples have still not been fully described in China. In this study, the allelic frequencies, forensic parameters, and mutation rate of 19 STR loci (D19S433, D5S818, D21S11, D18S51, D6S1043, D3S1358, D13S317, D7S820, D16S539, CSFIPO, PentaD, vWA, D8S1179, TPOX, Penta E, TH01, D12S391, D2S1338, and FGA) based on the Goldeneye™ DNA ID System 20A in Southern China Han nationality among seven provinces were investigated. Furthermore, population stratification of Southern China Han nationality among seven provinces was established. The multidimensional scaling (MDS) plot based on genetic distances (Fst) showed that the studied populations can be clustered into two major groups. However, relationships among populations were weak (Fst < 0.0043). A total of 376 cases of mutation were detected from the 19 selected loci in 15,396 meioses. The average mutation rate for the 19 loci was estimated to be 1.3 × 10 -3 per meiosis. The mutation was mainly single step; the paternal mutation rate was higher than the maternal; and paternal mutation rate increases with paternal age.

  2. A Contextual Model for Identity Management (IdM) Interfaces

    Science.gov (United States)

    Fuller, Nathaniel J.

    2014-01-01

    The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…

  3. 78 FR 25406 - Proposed Modification of Class E Airspace; Twin Falls, ID

    Science.gov (United States)

    2013-05-01

    ...) Global Positioning System (GPS) and the Instrument Landing System (ILS) or Localizer (LOC) standard... the earth. * * * * * ANM ID E5 Twin Falls, ID [Modified] Twin Falls Joslin Field-Magic Valley Regional...

  4. 78 FR 40382 - Modification of Class D and E Airspace; Twin Falls, ID

    Science.gov (United States)

    2013-07-05

    ... using the Navigation (RNAV) Global Positioning System (GPS) and the Instrument Landing System (ILS) or... or more above the surface of the earth. * * * * * ANM ID E5 Twin Falls, ID [Modified] Twin Falls...

  5. ID THEFT IN CYBERSPACE

    Directory of Open Access Journals (Sweden)

    Maxim DOBRINOIU

    2014-05-01

    Full Text Available Obtaining personal data, identification data, including data which allow the use of a electronic payment instrument, or any other data generated in the context of one person’s activities in the social, economic or financial life, without its consent or by deceit, if this occurs in computer systems or through electronic means of communications, should be considered as a crime and punished accordingly.

  6. Particle ID in LHCb

    International Nuclear Information System (INIS)

    Powell, Andrew

    2010-01-01

    Particle identification (PID) is a fundamental requirement for LHCb and is provided by CALO, MUON and RICH sub-detectors. The Calorimeters provide identification of electrons, photons and hadrons in addition to the measurement of their energies and positions. As well as being part of the LHCb trigger, the MUON system provides identification of muons to a very high level of purity, essential for many CP-sensitive measurements that have J/ψ's in their final states. Hadron identification, in particular the ability to distinguish kaons and pions, is crucial to many LHCB analyses, particularly where the final states of interest are purely hadronic. The LHCb RICH system provides this, covering a momentum range between 1 and 100 GeV/c. To maintain the integrity of the LHCb physics performance, it is essential to measure and monitor the particle identification efficiency and mis-identification fraction over time. This can be done by using specific decays, such as K-shorts, φ's, Λ's, J/ψ's and D*'s, for which pure samples can be isolated using only kinematic quantities, due to their unique decay topologies. This allows for clean samples of known particle types to be selected, which can then be used to calibrate and monitor the PID performance from data. The procedures for performing this will be presented, together with preliminary results from the 2009 and 2010 LHC runs. (author)

  7. Controlling the Filling and Capping Operation of a Bottling Plant using PLC and SCADA

    Directory of Open Access Journals (Sweden)

    Kunal Chakraborty

    2015-03-01

    Full Text Available This paper presents basic stages of operation of a bottling plant, i.e. the filling and capping process. The main aim of our paper is to control the filling and capping section of a bottling plant simultaneously. At first a set of empty bottle is run by using a conveyer towards filling section, after the operation, the filled bottles are sent towards the capping section. After successful capping operation, the sealed bottles terminate towards exit and a new set of empty bottle arrive, in this way the process continues. This paper includes the method using which, a bunch of bottles can be filled and capped at one instant of time. This method has made the operation more flexible and time saving. The filling and capping operations are controlled using Programmable Logic Controllers (PLC, as the PLC’s are very much user-efficient, cost-effective and easy to control. By using PLC automation the whole process is kept under control. SCADA (Supervisory Control and Data Acquisition is used to monitor the process by means of a display system.

  8. SCADA Sistemi ile Bir İşletmenin Dış Saha Otomasyonu

    OpenAIRE

    Kılıç, Murat; Özdemir, Şule

    2010-01-01

    Bu çalışmada, PLC (Programmable Logic Controller: Programlanabilir Mantık Denetleyici) ve SCADA (Supervising Control and Data Acquisition: Veri Tabanlı Kontrol ve Gözetleme) sistemleriyle bir MDF (Medium Density Fiberboard) presi dış saha besleme hattının otomasyonu gerçekleştirilmiştir. Tüm sistem SCADA sayesinde bilgisayar ekranından izlenebilmekte ve kontrol edilebilmektedir. MDF presi dış saha besleme hattı tam otomasyon ile çalışmaktadır. Otomasyon sisteminde PLC yazılımı olarak Siemens ...

  9. 77 FR 68065 - Amendment of Class D and Class E Airspace; Lewiston, ID

    Science.gov (United States)

    2012-11-15

    ... Measuring Equipment (VOR/ DME), and the Lewiston-Nez Perce Instrument Landing System (ILS) Localizer... feet or more above the surface of the earth. * * * * * ANM ID E5 Lewiston, ID [Modified] Lewiston-Nez...

  10. A Good IDS Response Protocol of MANET Containment Strategies

    Science.gov (United States)

    Cheng, Bo-Chao; Chen, Huan; Tseng, Ryh-Yuh

    Much recent research concentrates on designing an Intrusion Detection System (IDS) to detect the misbehaviors of the malicious node in MANET with ad-hoc and mobility natures. However, without rapid and appropriate IDS response mechanisms performing follow-up management services, even the best IDS cannot achieve the desired primary goal of the incident response. A competent containment strategy is needed to limit the extent of an attack in the Incident Response Life Cycle. Inspired by the T-cell mechanisms in the human immune system, we propose an efficient MANET IDS response protocol (T-SecAODV) that can rapidly and accurately disseminate alerts of the malicious node attacks to other nodes so as to modify their AODV routing tables to isolate the malicious nodes. Simulations are conducted by the network simulator (Qualnet), and the experiment results indicate that T-SecAODV is able to spread alerts steadily while greatly reduce faulty rumors under simultaneous multiple malicious node attacks.

  11. Automatic spent fuel ID number reader (I)

    International Nuclear Information System (INIS)

    Tanabe, S.; Kawamoto, H.; Fujimaki, K.; Kobe, A.

    1991-01-01

    An effective and efficient technique has been developed for facilitating identification works of LWR spent fuel stored in large scale spent fuel storage pools of such as processing plants. Experience shows that there are often difficulties in the implementation of operator's nuclear material accountancy and control works as well as safeguards inspections conducted on spent fuel assemblies stored in deep water pool. This paper reports that the technique is realized as an automatic spent fuel ID number reader system installed on fuel handling machine. The ID number reader system consists of an optical sub-system and an image processing sub-system. Thousands of spent fuel assemblies stored in under water open racks in each storage pool could be identified within relatively short time (e.g. within several hours) by using this combination. Various performance tests were carried out on image processing sub-system in 1990 using TV images obtained from different types of spent fuel assemblies stored in various storage pools of PWR and BWR power stations

  12. Diseño e implementación de un sistema SCADA en un biorreactor para la incubación de plaguicidas en la empresa palmar del rio, NEGCORPBIS S.A.

    OpenAIRE

    Barragán Delgado, Santiago Xavier; Torres Andrade, José Luis

    2016-01-01

    This project is a SCADA system whose aim is the control and monitoring from a master station that allows viewing through a man - machine interface (HMI) created using the LabVIEW software, the status of the variables of temperature, level, oxygen and pH by using sensors placed in the bioreactor. The HMI interface is made in LabVIEW software includes the same symbols and mimic diagrams tank bioreactor, alarm generation, database and historical generation. The proposed methodo...

  13. Willowglen Systems Inc. : 8 case studies

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The various supervisory control and data acquisition (SCADA) systems designed by Willowglen Systems Inc. were described. The company provides custom SCADA technology products, automation systems, and technical services for various applications. Their remote terminal units (RTUs) were designed to have a very low power consumption rate, and can be operated from any power source. The company has also designed integrated metering and communications solutions for remote locations. The following 8 case studies of Willowglen System solutions were highlighted: (1) a SCADA system designed for the Northwest Territories Power Corporation, (2) a system of RTUs installed at the Shell Canada Ltd. Caroline Gas Complex, (3) a SCADA system designed to monitor a natural gas pipeline, (4) a SCADA system designed to monitor a transmission pipeline and distribution system in Singapore, (5) RTUs designed to monitor gas dehydration units in Bahrain, (6) a SCADA system designed for a refined petroleum products pipeline, (7) a SCADA system installed at an electric power utility in New Brunswick, and (8) a tank gauging system designed for a large oil refinery in Alberta. 7 figs.

  14. Perancangan SCADA Software dengan Wonderware InTouch Recipe Manager dan SQL Access Manager pada Simulator Proses Pencampuran Bahan

    OpenAIRE

    Wicaksono, Handy; Lim, Resmana; Sutanto, William

    2008-01-01

    In Bahasa Indonesia: Banyak industri yang sudah menggunakan sistem automasi dengan menggunakan PLC (Programmable Logic Controller) dan SCADA (Supervisory Control And Data Acquisition). Salah satu software untuk membuat program SCADA adalah Wonderware InTouch. Untuk mengelola data dalam bentuk recipe dan database, Wonderware InTouch mempunyai program-program tambahan yaitu Recipe Manager dan SQL Access Manager. Pada penelitian ini, akan digunakan proses pembuatan kertas sebagai contoh kas...

  15. ID card number detection algorithm based on convolutional neural network

    Science.gov (United States)

    Zhu, Jian; Ma, Hanjie; Feng, Jie; Dai, Leiyan

    2018-04-01

    In this paper, a new detection algorithm based on Convolutional Neural Network is presented in order to realize the fast and convenient ID information extraction in multiple scenarios. The algorithm uses the mobile device equipped with Android operating system to locate and extract the ID number; Use the special color distribution of the ID card, select the appropriate channel component; Use the image threshold segmentation, noise processing and morphological processing to take the binary processing for image; At the same time, the image rotation and projection method are used for horizontal correction when image was tilting; Finally, the single character is extracted by the projection method, and recognized by using Convolutional Neural Network. Through test shows that, A single ID number image from the extraction to the identification time is about 80ms, the accuracy rate is about 99%, It can be applied to the actual production and living environment.

  16. ID Barrel installed in cryostat

    CERN Multimedia

    Apsimon, R.; Romaniouk, A.

    Wednesday 23rd August was a memorable day for the Inner Detector community as they witnessed the transport and installation of the central part of the inner detector (ID-barrel) into the ATLAS detector. Many members of the collaboration gathered to witness this moment at Point 1. After years of design, construction and commissioning, the outer two detectors (TRT and SCT) of the ID barrel were moved from the SR1 cleanroom to the ATLAS cavern. The barrel was moved across the car park from building 2175 to SX1. Although only a journey of about 100 metres, this required weeks of planning and some degree of luck as far as the weather was concerned. Accelerometers were fitted to the barrel to provide real-time monitoring and no values greater than 0.1 g were recorded, fully satisfying the transport specification for this extremely precise and fragile detector. Muriel, despite her fear of heights, bravely volunteered to keep a close eye on the detector. Swapping cranes to cross the entire parking lot, while Mur...

  17. Electron ID in ATLAS Run 2

    CERN Document Server

    Thais, Savannah Jennifer; The ATLAS collaboration

    2018-01-01

    Efficient and accurate electron identification is of critical importance to measuring many physics processes with leptons in the final state, including H->4l, dark vector boson searches, and various SUSY searches. This poster will describe the current status of the Likelihood driven Electron ID, highlighting the recent move from a MC driven ID to a data-driven ID. It will include the most recent identification efficiency and scale-factor measurements. Additionally, it will describe continued improvements for Run 2 electron ID, highlighting improvements in the low pt region and potential Machine Learning improvements.

  18. Tinjauan Desain Website Kemlu.Go.Id

    Directory of Open Access Journals (Sweden)

    Danu Widhyatmoko

    2013-04-01

    Full Text Available Review of kemlu.go.id website design is a research report on Kemlu.go.id website design. Kemlu.go.id website aims to be the information gateway of Ministry of Foreign Affairs, and also as guidelines of foreign politic policies of Republic of Indonesia. The review had been accomplished by using analytical method based on the "Nine Essential Principles for Good Web Design" developed by Collis Ta'eed (2007. At the end of the article, several recommendations in developing kemlu.go.id website are presented to create better appearance.  

  19. Tinjauan Desain Website Kemlu.Go.Id

    OpenAIRE

    Danu Widhyatmoko

    2013-01-01

    Review of kemlu.go.id website design is a research report on Kemlu.go.id website design. Kemlu.go.id website aims to be the information gateway of Ministry of Foreign Affairs, and also as guidelines of foreign politic policies of Republic of Indonesia. The review had been accomplished by using analytical method based on the "Nine Essential Principles for Good Web Design" developed by Collis Ta'eed (2007). At the end of the article, several recommendations in developing kemlu.go.id website are...

  20. Standardization of detector control systems

    International Nuclear Information System (INIS)

    Fukunaga, Chikara

    2000-01-01

    Current and future detectors for high-energy and/or nuclear physics experiments require highly intelligent detector control systems. In order to reduce resources, the construction of a standardized template for the control systems based on the commercially available superviser control and data acquisition (SCADA) system has been proposed. The possibility of constructing this template is discussed and several key issues for evaluation of SCADA as the basis for such a template are presented. (author)

  1. Id1 and Id3 expression is associated with increasing grade of prostate cancer: Id3 preferentially regulates CDKN1B

    International Nuclear Information System (INIS)

    Sharma, Pankaj; Patel, Divya; Chaudhary, Jaideep

    2012-01-01

    As transcriptional regulators of basic helix–oop–helix (bHLH) transcription and non-bHLH factors, the inhibitor of differentiation (Id1, Id2, Id3, and Id4) proteins play a critical role in coordinated regulation of cell growth, differentiation, tumorigenesis, and angiogenesis. Id1 regulates prostate cancer (PCa) cell proliferation, apoptosis, and androgen independence, but its clinical significance in PCa remains controversial. Moreover, there is lack of evidence on the expression of Id2 and Id3 in PCa progression. In this study we investigated the expression of Id2 and Id3 and reevaluated the expression of Id1 in PCa. We show that increased Id1 and Id3 protein expression is strongly associated with increasing grade of PCa. At the molecular level, we report that silencing either Id1 or Id3 attenuates cell cycle. Although structurally and mechanistically similar, our results show that both these proteins are noncompensatory at least in PCa progression. Moreover, through gene silencing approaches we show that Id1 and Id3 primarily attenuates CDKN1A (p21) and CDKN1B (p27), respectively. We also demonstrate that silencing Id3 alone significantly attenuates proliferation of PCa cells as compared with Id1. We propose that increased Id1 and Id3 expression attenuates all three cyclin-dependent kinase inhibitors (CDKN2B, -1A, and -1B) resulting in a more aggressive PCa phenotype

  2. Integrating a work-flow engine within a commercial SCADA to build end users applications in a scientific environment

    International Nuclear Information System (INIS)

    Ounsy, M.; Pierre-Joseph Zephir, S.; Saintin, K.; Abeille, G.; Ley, E. de

    2012-01-01

    To build integrated high-level applications, SOLEIL is using an original component-oriented approach based on GlobalSCREEN, an industrial Java SCADA. The aim of this integrated development environment is to give SOLEIL's scientific and technical staff a way to develop GUI (Graphical User Interface) applications for external users of beamlines. These GUI applications must address the two following needs: monitoring and supervision of a control system and development and execution of automated processes (as beamline alignment, data collection and on-line data analysis). The first need is now completely answered through a rich set of Java graphical components based on the COMETE library and providing a high level of service for data logging, scanning and so on. To reach the same quality of service for process automation, a big effort has been made for more seamless integration of PASSERELLE, a work-flow engine with dedicated user-friendly interfaces for end users, packaged as JavaBeans in GlobalSCREEN components library. Starting with brief descriptions of software architecture of the PASSERELLE and GlobalSCREEN environments, we will then present the overall system integration design as well as the current status of deployment on SOLEIL beamlines. (authors)

  3. AN APPLICATION EXAMPLE ; FAULT DIAGNOSIS IN POWER SYSTEM

    Directory of Open Access Journals (Sweden)

    Özgür COŞAR

    2003-02-01

    Full Text Available There are a lot of protective devices in electrical transmission and distribution systems which are monitored and data are collected from these devices via Supervisory Control and Data Acquisition System (SCADA. distribution systems are more complicated when compared with transmission systems. However, SCADA is not available in most distribution systems where phones from the customers are used as alarms. In the cases where SCADA is not available experiences of the dispatchers and the information from customers becomes important. In this work a user friendly software is developed for even unexperienced dispatchers.

  4. The influence of the ACE (I/D) polymorphism on systemic and renal vascular responses to angiotensins in normotensive, normoalbuminuric Type 1 diabetes mellitus

    NARCIS (Netherlands)

    Luik, PT; Hoogenberg, K; Kerstens, MN; Beusekamp, BJ; de Jong, PE; Dullaart, RPF; Navis, GJ

    Aim/hypothesis. The renin-angiotensin-aldosterone system is important in diabetic nephropathy, with the angiotensin-converting-enzyme DD-genotype being a renal risk factor. The D-allele is associated with higher ACE concentrations, but functional consequences in diabetes mellitus are not known. To

  5. Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs

    OpenAIRE

    Dominic Savio, Lourdes Gino

    2016-01-01

    Covert Channels are communication channels used for information transfer, and created by violating the security policies of a system (Latham, 1986, p. 80). Research in the field has shown that, like many communication channels, IPv4 and the TCP/IP protocol suite has features, functionality and options which could be exploited by cyber criminals to leak data or for anonymous communications, through covert channels. With the advent of IPv6, researchers are on the lookout for covert channels in ...

  6. Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS to Zero-Day and Stealth Attacks

    Directory of Open Access Journals (Sweden)

    Waqas Haider

    2016-07-01

    Full Text Available The Windows Operating System (OS is the most popular desktop OS in the world, as it has the majority market share of both servers and personal computing necessities. However, as its default signature-based security measures are ineffectual for detecting zero-day and stealth attacks, it needs an intelligent Host-based Intrusion Detection System (HIDS. Unfortunately, a comprehensive data set that reflects the modern Windows OS’s normal and attack surfaces is not publicly available. To fill this gap, in this paper two open data sets generated by the cyber security department of the Australian Defence Force Academy (ADFA are introduced, namely: Australian Defence Force Academy Windows Data Set (ADFA-WD; and Australian Defence Force Academy Windows Data Set with a Stealth Attacks Addendum (ADFA-WD: SAA. Statistical analysis results based on these data sets show that, due to the low foot prints of modern attacks and high similarity of normal and attacked data, both these data sets are complex, and highly intelligent Host based Anomaly Detection Systems (HADS design will be required.

  7. Using Physical Models for Anomaly Detection in Control Systems

    Science.gov (United States)

    Svendsen, Nils; Wolthusen, Stephen

    Supervisory control and data acquisition (SCADA) systems are increasingly used to operate critical infrastructure assets. However, the inclusion of advanced information technology and communications components and elaborate control strategies in SCADA systems increase the threat surface for external and subversion-type attacks. The problems are exacerbated by site-specific properties of SCADA environments that make subversion detection impractical; and by sensor noise and feedback characteristics that degrade conventional anomaly detection systems. Moreover, potential attack mechanisms are ill-defined and may include both physical and logical aspects.

  8. Characterization of Enterococcus species isolated from marine recreational waters by MALDI-TOF MS and Rapid ID API® 20 Strep system.

    Science.gov (United States)

    Christ, Ana Paula Guarnieri; Ramos, Solange Rodrigues; Cayô, Rodrigo; Gales, Ana Cristina; Hachich, Elayse Maria; Sato, Maria Inês Zanoli

    2017-05-15

    MALDI-TOF Mass Spectrometry Biotyping has proven to be a reliable method for identifying bacteria at the species level based on the analysis of the ribosomal proteins mass fingerprint. We evaluate the usefulness of this method to identify Enterococcus species isolated from marine recreational water at Brazilian beaches. A total of 127 Enterococcus spp. isolates were identified to species level by bioMérieux's API® 20 Strep and MALDI-TOF systems. The biochemical test identified 117/127 isolates (92%), whereas MALDI identified 100% of the isolates, with an agreement of 63% between the methods. The 16S rRNA gene sequencing of isolates with discrepant results showed that MALDI-TOF and API® correctly identified 74% and 11% of these isolates, respectively. This discrepancy probably relies on the bias of the API® has to identify clinical isolates. MALDI-TOF proved to be a feasible approach for identifying Enterococcus from environmental matrices increasing the rapidness and accuracy of results. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Propuesta de gestión de riesgos para Scada en sistemas eléctricos

    Directory of Open Access Journals (Sweden)

    María J. Bernal Zuluaga

    2012-12-01

    Full Text Available En la actualidad los ataques cibernéticos son uno de los principales aspectos a considerar por parte de los entes gubernamentales y por las empresas prestadoras de servicios públicos, dado que dichas entidades son el blanco preferido para desestabilizar el normal desempeño de las actividades de un sector determinado. En particular, la prestación del servicio eléctrico es fundamental para la operación de la mayor parte de las actividades diarias a nivel comercial, industrial y social de nuestro país. Los centros de control eléctricos cuentan con el Sistema SCADA para tener información en tiempo real que facilite la supervisión, control y toma de decisiones necesarias para garantizar la seguridad y calidad en la prestación del servicio eléctrico. Este artículo trata de la gestión de riesgos del sistema SCADA y la definición de un plan de tratamiento en el cual se exponen las medidas de control que deben ser implementadas para la mitigación de los riesgos a los cuales está expuesto dicho sistema.

  10. Extending and implementing the Persistent ID pillars

    Science.gov (United States)

    Car, Nicholas; Golodoniuc, Pavel; Klump, Jens

    2017-04-01

    The recent double decade anniversary of scholarly persistent identifier use has triggered journal special editions such as "20 Years of Persistent Identifiers". For such a publication, it is apt to consider the longevity of some persistent identifier (PID) mechanisms (Digital Object Identifiers) and the partial disappearance of others (Life Sciences IDs). We have previously postulated a set of "PID Pillars" [1] which are design principles aimed at ensuring PIDs can survive technology and social change and thus persist for the long term that we have drawn from our observations of PIDs at work over many years. The principles: describe how to ensure identifiers' system and organisation independence; codify the delivery of essential PID system functions; mandate a separation of PID functions from data delivery mechanisms; and require generation of policies detailing how change is handled. In this presentation, first we extend on our previous work of introducing the pillars by refining their descriptions, giving specific suggestions for each and presenting some work that addresses them. Second, we propose a baseline data model for persistent identifiers that, if used, would assist the separation of PID metadata and PID system functioning. This would allow PID system function specifics to change over time (e.g. resolver services or even resolution protocols) and yet preserve the PIDs themselves. Third, we detail our existing PID system — the PID Service [2] — that partially implements the pillars and describe both its successes and shortcomings. Finally, we describe our planned next-generation system that will aim to use the baseline data model and fully implement the pillars.

  11. Sardana, the software for building SCADAS in scientific environments

    International Nuclear Information System (INIS)

    Coutinho, T.; Cuni, G.; Fernandez-Carreiras, D.; Klora, J.; Pascual-Izarra, C.; Reszela, Z.; Sune, R.; Homs, A.; Taurel, E.; Rey, V.

    2012-01-01

    Sardana is a software package for Supervision, Control and Data Acquisition in scientific installations. It delivers important cost and time reductions associated with the design, development and support of the control and data acquisition systems. It enhances TANGO with the capabilities for building graphical interfaces without writing code, a powerful python-based macro environment for building sequences and complex macros, and a comprehensive access to the hardware. Just as Tango, Sardana is Open Source and its development model is open to collaboration, which provides a free platform that scales well to small laboratories as well as to large scientific institutions. The first beta version has been commissioned for the control system of Accelerators and Beamlines at the Alba Synchrotron. Furthermore, there is a collaboration in place, comprising Desy, MaxIV and Solaris, and several other potential users are evaluating it. (authors)

  12. Regulation of Id2 expression in EL4 T lymphoma cells overexpressing growth hormone.

    Science.gov (United States)

    Weigent, Douglas A

    2009-01-01

    In previous studies, we have shown that overexpression of growth hormone (GH) in cells of the immune system upregulates proteins involved in cell growth and protects from apoptosis. Here, we report that overexpression of GH in EL4 T lymphoma cells (GHo) also significantly increased levels of the inhibitor of differentiation-2 (Id2). The increase in Id2 was suggested in both Id2 promoter luciferase assays and by Western analysis for Id2 protein. To identify the regulatory elements that mediate transcriptional activation by GH in the Id2 promoter, promoter deletion analysis was performed. Deletion analysis revealed that transactivation involved a 301-132bp region upstream to the Id2 transcriptional start site. The pattern in the human GHo Jurkat T lymphoma cell line paralleled that found in the mouse GHo EL4 T lymphoma cell line. Significantly less Id2 was detected in the nucleus of GHo EL4 T lymphoma cells compared to vector alone controls. Although serum increased the levels of Id2 in control vector alone cells, no difference was found in the total levels of Id2 in GHo EL4 T lymphoma cells treated with or without serum. The increase in Id2 expression in GHo EL4 T lymphoma cells measured by Id2 promoter luciferase expression and Western blot analysis was blocked by the overexpression of a dominant-negative mutant of STAT5. The results suggest that in EL4 T lymphoma cells overexpressing GH, there is an upregulation of Id2 protein that appears to involve STAT protein activity.

  13. PLC SCADA systém pro řízení větrného tunelu

    OpenAIRE

    Trenčan, Tomáš

    2017-01-01

    Předložená bakalářská práce se věnuje programovatelnému automatu (PLC) firmy WAGO a SCADA systémům. Skládá se ze dvou části, z teoretické části a z praktické části. V teoretické části jsou na zakladě poznatků z odborné literatury vymezeny pojmy ohledně SCADA systémů, PLC od firmy WAGO a vývojového prostředí e!COCKPIT firmy WAGO a rešerše volně dostupných SCADA systémů podporujících Modbus TCP. Na základě této rešerše byl vybrán SCADA systém pro vizualizaci dvou demonstračníc úloh v praktické ...

  14. The management, control and implementation of SCADA projects

    OpenAIRE

    2012-01-01

    M.Ing. The dissertation covers the establishment of a project from the point of view of a project manager. The document refers to examples where possible to illustrate the actual process through which a project goes during the life-cycle of the project. The first chapter provides an introduction to the context of the project and informs the reader of the type of project which the dissertation discusses. An overview of SCAD A (Supervisory Control and Data Acquisition) systems is discussed f...

  15. Multi-platform SCADA GUI Regression Testing at CERN

    CERN Document Server

    Burkimsher, P C; Klikovits, S

    2011-01-01

    The JCOP Framework is a toolkit used widely at CERN for the development of industrial control systems in several domains (i.e. experiments, accelerators and technical infrastructure). The software development started 10 years ago and there is now a large base of production systems running it. For the success of the project, it was essential to formalize and automate the quality assurance process. This paper will present the overall testing strategy and will describe in detail mechanisms used for GUI testing. The choice of a commercial tool (Squish) and the architectural features making it appropriate for our multi-platform environment will be described. Practical difficulties encountered when using the tool in the CERN context are discussed as well as how these were addressed. In the light of initial experience, the test code itself has been recently reworked in object-oriented style to facilitate future maintenance and extension. The current reporting process is described, as well as future plans for easy re...

  16. Pengalaman Komunikasi Pelanggan Zalora.co.id (Studi Fenomenologi Pelanggan Zalora.co.id)

    OpenAIRE

    Aji, Widya Andhika; Pradekso, Tandiyo; Ulfa, Nurist Surayya

    2013-01-01

    1PENGALAMAN KOMUNIKASI PELANGGAN ZALORA.CO.ID(Studi Fenomenologi Pelanggan Zalora.co.id)Oleh:Widya Andhika AjiFakultas Ilmu Sosial dan Ilmu PolitikUniversitas Diponegoro SemarangABSTRAKPenelitian ini bertujuan untuk menganalisis pengalaman komunikasi danpemahaman penerimaan konsumen terkait pesan komunikasi pemasaran dalamberbelanja di Zalora.co.id. Dengan menggunakan sampel pada lima informandan metode wawancara, dapat ditarik kesimpulan: Pelanggan Zalora.co.idmemiliki pengalaman komunikasi ...

  17. Biscayne Bay Dolphin Photo ID System

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — It has been shown through a variety of photo-identification studies that populations of bottlenose dolphin inhabit the various embayments along the coast of Florida....

  18. Id-1 and Id-2 genes and products as markers of epithelial cancer

    Science.gov (United States)

    Desprez, Pierre-Yves [El Cerrito, CA; Campisi, Judith [Berkeley, CA

    2008-09-30

    A method for detection and prognosis of breast cancer and other types of cancer. The method comprises detecting expression, if any, for both an Id-1 and an Id-2 genes, or the ratio thereof, of gene products in samples of breast tissue obtained from a patient. When expressed, Id-1 gene is a prognostic indicator that breast cancer cells are invasive and metastatic, whereas Id-2 gene is a prognostic indicator that breast cancer cells are localized and noninvasive in the breast tissue.

  19. REFORMASI PEMAHAMAN TEORI MAQᾹṢID SYARIAH Analisis Pendekatan Sistem Jasser Auda

    Directory of Open Access Journals (Sweden)

    Muhammad Iqbal Fasa

    2016-12-01

    Full Text Available This paper attempts to offer reform ideas Jasser Auda thought related reforms theoretical understanding of maqᾱṣid sharia. The systems approach is done by Auda critize the theory of classical maqᾱṣid more likely to hierarchical and narrow mindset. The classical maqᾱṣid pressure a point more on protection and preservation. Whereas the new maqᾱṣid theory emphasizes development (construction, development and rights (rights. Thus, Auda developed the concept of human development as the main target of maslahah (public interest. Auda offers the systems approach, namely: cognitive nature; interrelated; wholeness; openness; multi dimentionality and purposefulness. At the end of the discussion in this paper, the authors develop the idea of Jasser Auda by offering Sharia Maqᾱṣid concept in the context of Islamic Economics

  20. Impact of the Shodan Computer Search Engine on Internet-facing Industrial Control System Devices

    Science.gov (United States)

    2014-03-27

    SSL 995 POP3+SSL 1023 Telnet 1434 MS-SQL Port Service 1900 UPnP 2323 Telnet 3306 MySQL 3389 RDP 5000 Synology 5001 Synology 5432 PostgreSQL 5560 Oracle...capture mode, Digital Bond SCADA IDS signatures, Sebek, Argus, Walleye, and MySQL [13]. Honeywall report generation includes top ten scanned ports, the top...Sleuth: A Course in Methods of Data Analysis: A Course in Methods of Data Analysis. Cengage Learning, Boston MA, 2012. [41] Rrushi, J. SCADA protocol

  1. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  2. Operations and maintenance manual for the LDUA supervisory control and data acquisition system (LDUA System 4200) and control network (LDUA System 4400)

    International Nuclear Information System (INIS)

    Barnes, G.A.

    1998-01-01

    This document defines the requirements applicable to the operation, maintenance and storage of the Supervisory Control and Data Acquisition System (SCADAS) and Control Network in support of the Light Duty Utility Arm (LDUA) operations

  3. Id3 induces an Elk-1–caspase-8-dependent apoptotic pathway in squamous carcinoma cells

    International Nuclear Information System (INIS)

    Chen, You-Shin; Aubee, Joseph; DiVito, Kyle A; Zhou, Hengbo; Zhang, Weiyi; Chou, Fen-Pi; Simbulan-Rosenthal, Cynthia M; Rosenthal, Dean S

    2015-01-01

    Inhibitor of differentiation/DNA-binding (Id) proteins are helix–loop–helix (HLH) transcription factors. The Id protein family (Id1–Id4) mediates tissue homeostasis by regulating cellular processes including differentiation, proliferation, and apoptosis. Ids typically function as dominant negative HLH proteins, which bind other HLH proteins and sequester them away from DNA promoter regions. Previously, we have found that Id3 induced apoptosis in immortalized human keratinocytes upon UVB exposure, consistent with its role as a tumor suppressor. To investigate the role of Id3 in malignant squamous cell carcinoma (SCC) cells (A431), a tetracycline-regulated inducible system was used to induce Id3 in cell culture and mouse xenograft models. We found that upon Id3 induction, there was a decrease in cell number under low serum conditions, as well as in soft agar. Microarray, RT-PCR, immunoblot, siRNA, and inhibitor studies revealed that Id3 induced expression of Elk-1, an E-twenty-six (ETS)-domain transcription factor, inducing procaspase-8 expression and activation. Id3 deletion mutants revealed that 80 C-terminal amino acids, including the HLH, are important for Id3-induced apoptosis. In a mouse xenograft model, Id3 induction decreased tumor size by 30%. Using immunofluorescent analysis, we determined that the tumor size decrease was also mediated through apoptosis. Furthermore, we show that Id3 synergizes with 5-FU and cisplatin therapies for nonmelanoma skin cancer cells. Our studies have shown a molecular mechanism by which Id3 induces apoptosis in SCC, and this information can potentially be used to develop new treatments for SCC patients

  4. Separate individual control systems come together at EP2

    International Nuclear Information System (INIS)

    Podmore, A.

    1991-01-01

    At BNFL's EP2 radioactive waste encapsulation plant in the UK, eight area supervisory control and data acquisition systems (SCADAs) and one central SCADA are being installed to provide computer-controlled processing of waste drums. The individual systems are all autonomous, minimizing the effect they have on other areas of the process. At the same time, they are part of an integrated system which provides effective communication between the various areas. (author)

  5. Vibrational measurements in 3-ID-B

    International Nuclear Information System (INIS)

    Sutter, J.; Alp, E.; Barraza, J.; Shu, D.

    1998-04-01

    The authors have undertaken a series of vibrational measurements in hutch 3-ID-B. Their motivation was to compare two different methods of mounting an interferometer for effectiveness in vibrational isolation and stability. In addition they were able to compare the stability of the optical table with and without its eight large bolts inserted

  6. Independence Day 2004 (ID04) / Raul Hindov

    Index Scriptorium Estoniae

    Hindov, Raul

    2004-01-01

    Ülevaade 20.-22. veebruarini 2004 toimunud kaugluurepatrullide rännaku ja sõdurioskuste kompleksõppusest ID04 (Independence Day 2004 - Iseseisvuspäev 2004), millel osales 25 patrullvõistlusteks valmistuvat meest ja naist

  7. ID'ing innate and innate-like lymphoid cells.

    Science.gov (United States)

    Verykokakis, Mihalis; Zook, Erin C; Kee, Barbara L

    2014-09-01

    The immune system can be divided into innate and adaptive components that differ in their rate and mode of cellular activation, with innate immune cells being the first responders to invading pathogens. Recent advances in the identification and characterization of innate lymphoid cells have revealed reiterative developmental programs that result in cells with effector fates that parallel those of adaptive lymphoid cells and are tailored to effectively eliminate a broad spectrum of pathogenic challenges. However, activation of these cells can also be associated with pathologies such as autoimmune disease. One major distinction between innate and adaptive immune system cells is the constitutive expression of ID proteins in the former and inducible expression in the latter. ID proteins function as antagonists of the E protein transcription factors that play critical roles in lymphoid specification as well as B- and T-lymphocyte development. In this review, we examine the transcriptional mechanisms controlling the development of innate lymphocytes, including natural killer cells and the recently identified innate lymphoid cells (ILC1, ILC2, and ILC3), and innate-like lymphocytes, including natural killer T cells, with an emphasis on the known requirements for the ID proteins. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  8. Instrumentation for NBI SST-1 cooling water system

    International Nuclear Information System (INIS)

    Qureshi, Karishma; Patel, Paresh; Jana, M.R.

    2015-01-01

    Neutral Beam Injector (NBI) System is one of the heating systems for Steady state Superconducting Tokamak (SST-1). It is capable of generating a neutral hydrogen beam of power 0.5 MW at 30 kV. NBI system consists of following sub-systems: Ion source, Neutralizer, Deflection Magnet and Magnet Liner (ML), Ion Dump (ID), V-Target (VT), Pre Duct Scraper (PDS), Beam Transmission Duct (BTD) and Shine Through (ST). For better heat removal management purpose all the above sub-systems shall be equipped with Heat Transfer Elements (THE). During beam operation these sub-systems gets heated due to the received heat load which requires to be removed by efficient supplying water. The cooling water system along with the other systems (External Vacuum System, Gas Feed System, Cryogenics System, etc.) will be controlled by NBI Programmable Logic Control (PLC). In this paper instrumentation and its related design for cooling water system is discussed. The work involves flow control valves, transmitters (pressure, temperature and water flow), pH and conductivity meter signals and its interface with the NBI PLC. All the analog input, analog output, digital input and digital output signals from the cooling water system will be isolated and then fed to the NBI PLC. Graphical Users Interface (GUI) needed in the Wonderware SCADA for the cooling water system shall also be discussed. (author)

  9. Beam transport radiation shielding for branch lines 2-ID-B and 2-ID-C

    International Nuclear Information System (INIS)

    Feng, Y.P.; Lai, B.; McNulty, I.; Dejus, R.J.; Randall, K.J.; Yun, W.

    1995-01-01

    The x-ray radiation shielding requirements beyond the first optics enclosure have been considered for the beam transport of the 2-ID-B and 2-ID-C branch lines of Sector 2 (SRI-CAT) of the APS. The first three optical components (mirrors) of the 2-ID-B branch are contained within the shielded first optics enclosure. Calculations indicate that scattering of the primary synchrotron beam by beamline components outside the enclosure, such as apertures and monochromators, or by gas particles in case of vacuum failure is within safe limits for this branch. A standard 2.5-inch-diameter stainless steel pipe with 1/16-inch-thick walls provides adequate shielding to reduce the radiation dose equivalent rate to human tissue to below the maximum permissible limit of 0.25 mrem/hr. The 2-ID-C branch requires, between the first optics enclosure where only two mirrors are used and the housing for the third mirror, additional lead shielding (0.75 mm) and a minimum approach distance of 2.6 cm. A direct beam stop consisting of at least 4.5 mm of lead is also required immediately downstream of the third mirror for 2-ID-C. Finally, to stop the direct beam from escaping the experimental station, a beam stop consisting of at least 4-mm or 2.5-mm steel is required for the 2-ID-B or 2-ID-C branches, respectively. This final requirement can be met by the vacuum chambers used to house the experiments for both branch lines

  10. Biogas plant control system

    International Nuclear Information System (INIS)

    Balasevicius, L.; Dervinis, G.; Macerauskas, V.

    2002-01-01

    This paper presents intelligent control system for the pig farm biogas production process. The system uses a fuzzy logic models based on knowledge of experts and operators. Four fuzzy models are introduced. The adequacy of fuzzy models is verified using real data and MATLAB simulation. Proposed expert system is implemented into traditional SCADA system for biogas process prediction and failure analyzing. (authors)

  11. Idékatalog Appetit på maden

    DEFF Research Database (Denmark)

    Jensen, Tenna; Jespersen, Astrid Pernille; Grønnow, Liv Cæcilie

    2015-01-01

    Idékataloget er en selvstændig publikation hørende til projekt Appetit på maden. Idékataloget er udviklet til brug i Københavns Kommune.......Idékataloget er en selvstændig publikation hørende til projekt Appetit på maden. Idékataloget er udviklet til brug i Københavns Kommune....

  12. Applying risk management strategies to strengthen an IDS's investment policy.

    Science.gov (United States)

    Fine, R P

    1998-11-01

    The increased financial risk that not-for-profit integrated delivery systems have assumed to function under managed care has required them to become increasingly reliant on income and gains from their investment portfolios. This reliance underscores the need for these organizations to take steps to effectively manage their investment risk. Not-for-profit IDSs should establish a systematic approach to investment risk management that is based on maintaining a sound fiduciary infrastructure and having a clear understanding of risk exposures, the most important of which are policy and market risk. Applying reasonable and common-sense risk management strategies to investment policy will enhance an IDS's overall financial and competitive strength.

  13. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  14. RFID and Auto-ID in planning and logistics

    CERN Document Server

    Jones, Erick C

    2011-01-01

    As RFID technology is becoming increasingly popular, the need has arisen to address the challenges and approaches to successful implementation. RFID and Auto-ID in Planning and Logistics: A Practical Guide for Military UID Applications presents the concepts for students, military personnel and contractors, and corporate managers to learn about RFID and other automatic information capture technologies, and their integration into planning and logistics functions. The text includes comparisons of RFID with technologies such as bar codes, satellite tags, and global positioning systems and provides

  15. Labelling IDS clusters by means of the silhouette index

    OpenAIRE

    Petrovic, Slovodan; Álvarez, Gonzalo; Orfila, Agustín; Carbó, Javier

    2006-01-01

    Proceeding of: IX Reunión Española sobre Criptología y Seguridad de la Información. Barcelona, 2006 One of the most difficult problems in the design of an anomaly based intrusion detection system (IDS) that uses clustering is that of labelling the ob- tained clusters, i.e. determining which of them correspond to ”good” behaviour on the network/host and which to ”bad” behaviour. In this paper, a new clusters’ labelling strategy, which makes use of the Silhouette clustering quality index is ...

  16. Predicting Students’ Performance using Modified ID3 Algorithm

    OpenAIRE

    Ramanathan L; Saksham Dhanda; Suresh Kumar D

    2013-01-01

    The ability to predict performance of students is very crucial in our present education system. We can use data mining concepts for this purpose. ID3 algorithm is one of the famous algorithms present today to generate decision trees. But this algorithm has a shortcoming that it is inclined to attributes with many values. So , this research aims to overcome this shortcoming of the algorithm by using gain ratio(instead of information gain) as well as by giving weights to each attribute at every...

  17. Group-ID based RFID Mutual Authentication

    Directory of Open Access Journals (Sweden)

    LEE, Y.

    2013-11-01

    Full Text Available For passive type RFID tags, EPCglobal Class 1 Generation-2 Revision is used widely as a de facto standard. As it was designed for low cost, it is quite vulnerable to security issues, such as privacy concerns. This paper presents a new RFID mutual authentication protocol, which is designed to be configured on EPC Gen2 platform and to meet various security requirements while providing efficiency using PRNG (Pseudo Random Number Generator. Group-ID is used to minimize the authentication time. Security analysis of the proposed protocol is discussed.

  18. Le sort des répudiations musulmanes dans l’ordre juridique français. Droit et idéologie(s Muslim Repudiations in the French Legal System: Law and Ideologies

    Directory of Open Access Journals (Sweden)

    Marie-Claude Najm

    2010-07-01

    Full Text Available Mode de dissolution du mariage exclusivement tributaire de la volonté unilatérale du mari, la répudiation islamique heurte le principe d’égalité des époux qui fait partie des valeurs fondamentales du droit français. Quel est alors le sort réservé, dans l’ordre juridique français, aux répudiations prononcées à l’étranger en application du droit musulman ? À cet égard, l’évolution de la jurisprudence française au cours des trente dernières années révèle un durcissement des exigences de l’ordre public, au terme d’un parcours erratique oscillant entre la reconnaissance et le rejet. Cette évolution en dents de scie qui semble aujourd’hui stabilisée n’est pas réellement surprenante, tant les impératifs en jeu sont délicats à mettre en œuvre. En effet, l’accueil réservé à la répudiation de droit musulman en France dévoile, au-delà de la technique juridique, un double conflit de valeurs. Sur le terrain du droit international privé, il met en lumière le tiraillement entre deux impératifs : celui de préserver la cohésion et les valeurs de l’ordre juridique français d’une part, celui de favoriser l’harmonie internationale des solutions d’autre part. Ensuite et surtout, sur un terrain proprement idéologique, la question touche à la conception même que l’on se fait des droits de l’homme dans les relations entre systèmes juridiques de traditions culturelles différentes ; elle oppose alors les tenants du relativisme culturel à ceux qui prônent la vocation des droits de l’homme à l’universalité.A form of marriage dissolution initiated exclusively and unilaterally by the husband, Islamic repudiation tests the principle of equality between spouses that figures among the fundamental values of French law. What status does French law accord repudiations pronounced abroad under Islamic law? The development of French jurisprudence on this question over the past thirty years shows a

  19. CÁLCULO Y DISEÑO DE UN SISTEMA DE CONTROL MEDIANTE LA IMPLEMENTACION DE UN SOFTWARE SCADA EN EL CURSO DE PROYECTO INTEGRADOR II

    Directory of Open Access Journals (Sweden)

    Karla Puerto-López

    2014-12-01

    Full Text Available El objetivo de este documento es ilustrar cada una de etapas que intervienen en el diseño de un sistema SCADA (Supervisory Control And Data Adquisition partiendo de la elaboración de layout estructural mecánico, potencia eléctrica orientado a procesos industriales El objetivo de este trabajo es analizar y especificar los requerimientos para software SCADA (Supervisory Control And Data Adquisition orientados a todo tipo de empresas del sector industrial. Se presentan los análisis efectuados a software SCADA comerciales relevando los usuarios existentes en el mercado. Además se presenta un análisis basado en un desarrollo propio realizado con un lenguaje de propósito general.

  20. To ID or Not to ID? Changes in Classification Rates of Intellectual Disability Using "DSM-5"

    Science.gov (United States)

    Papazoglou, Aimilia; Jacobson, Lisa A.; McCabe, Marie; Kaufmann, Walter; Zabel, T. Andrew

    2014-01-01

    The "Diagnostic and Statistical Manual of Mental Disorders-Fifth Edition" ("DSM-5") diagnostic criteria for intellectual disability (ID) include a change to the definition of adaptive impairment. New criteria require impairment in one adaptive domain rather than two or more skill areas. The authors examined the diagnostic…

  1. Diseño e implantación de un sistema SCADA para una planta de producción y envasado de líquidos

    OpenAIRE

    Redondo Sol, Manuel

    2008-01-01

    Este proyecto consiste en la implantación de un sistema SCADA en una planta piloto de fabricación y envasado de líquidos. En este documento se muestra toda la información que ha sido necesaria para realizar el sistema de automatización en los tres niveles propios de un SCADA: nivel de campo, nivel de control y nivel de supervisión. El trabajo de campo ha sido, típicamente de revisión, puesto que el Departament de Telecomunicació i d'Enginyeria de Sistemes ya poseía la planta totalmente equipa...

  2. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Jaerventausta, P; Verho, P; Kaerenlampi, M; Pitkaenen, M [Tampere Univ. of Technology (Finland); Partanen, J [Lappeenranta Univ. of Technology (Finland)

    1998-08-01

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion to the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. Nowadays the SCADA is the main computer system (and often the only) in the control center. However, the information displayed by the SCADA is often inadequate, and several tasks cannot be solved by a conventional SCADA system. A need for new computer applications in control center arises from the insufficiency of the SCADA and some other trends. The latter means that the overall importance of the distribution networks is increasing. The slowing down of load-growth has often made network reinforcements unprofitable. Thus the existing network must be operated more efficiently. At the same time larger distribution areas are for economical reasons being monitored at one control center and the size of the operation staff is decreasing. The quality of supply requirements are also becoming stricter. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the

  3. Definition of metabolism-dependent xenobiotic toxicity with co-cultures of human hepatocytes and mouse 3T3 fibroblasts in the novel integrated discrete multiple organ co-culture (IdMOC) experimental system: results with model toxicants aflatoxin B1, cyclophosphamide and tamoxifen.

    Science.gov (United States)

    Li, Albert P; Uzgare, Aarti; LaForge, Yumiko S

    2012-07-30

    The integrated discrete multiple organ co-culture system (IdMOC) allows the co-culturing of multiple cell types as physically separated cells interconnected by a common overlying medium. We report here the application of IdMOC with two cell types: the metabolically competent primary human hepatocytes, and a metabolically incompetent cell line, mouse 3T3 fibroblasts, in the definition of the role of hepatic metabolism on the cytotoxicity of three model toxicants: cyclophosphamide (CPA), aflatoxin B1 (AFB) and tamoxifen (TMX). The presence of hepatic metabolism in IdMOC with human hepatocytes was demonstrated by the metabolism of the P450 isoform 3A4 substrate, luciferin-IPA. The three model toxicants showed three distinct patterns of cytotoxic profile: TMX was cytotoxic to 3T3 cells in the absence of hepatocytes, with slightly lower cytotoxicity towards both 3T3 cells and hepatocytes in the IdMOC. AFB was selective toxic towards the human hepatocytes and relatively noncytotoxic towards 3T3 cells both in the presence and absence of the hepatocytes. CPA cytotoxicity to the 3T3 cells was found to be significantly enhanced by the presence of the hepatocytes, with the cytotoxicity dependent of the number of hepatocytes, and with the cytotoxicity attenuated by the presence of a non-specific P450 inhibitor, 1-aminobenzotriazole. We propose here the following classification of toxicants based on the role of hepatic metabolism as defined by the human hepatocyte-3T3 cell IdMOC assay: type I: direct-acting cytotoxicants represented by TMX as indicated by cytotoxicity in 3T3 cells in the absence of hepatocytes; type II: metabolism-dependent cytotoxicity represented by AFB1 with effects localized within the site of metabolic activation (i. e. hepatocytes); and type III: metabolism-dependent cytotoxicity with metabolites that can diffuse out of the hepatocytes to cause toxicity in cells distal from the site of metabolism, as exemplified by CPA. Copyright © 2012 Elsevier Ireland

  4. Applying Open Researchers and Contributors ID in scholarly journals

    Directory of Open Access Journals (Sweden)

    Jeonghee Im

    2015-02-01

    Full Text Available Open Researchers and Contributors ID (ORCID launched its registry services in October 2012. Consequently, adding personal information to the ORCID registry became routine work for researchers. To add ORCID to an online article, the tag needs to be included in the Journal Article Tag Suite extensible markup language file, if such a file has been produced by the publisher. Subsequently, all co-authors’ ORCID can be easily and conveniently collected and then integrated into the manuscript management system. In the current age of information and the Internet, journals need to keep pace with the surge of new standards and technologies. Editors should be able to accept and apply these new systems rapidly.

  5. Modeling of quasi-static thrust load of wind turbines based on 1 s SCADA data

    Directory of Open Access Journals (Sweden)

    N. Noppe

    2018-03-01

    Full Text Available A reliable load history is crucial for a fatigue assessment of wind turbines. However, installing strain sensors on every wind turbine is not economically feasible. In this paper, a technique is proposed to reconstruct the thrust load history of a wind turbine based on high-frequency Supervisory Control and Data Acquisition (SCADA data. Strain measurements recorded during a short period of time are used to train a neural network. The selection of appropriate input parameters is performed based on Pearson correlation and mutual information. Once the training is done, the model can be used to predict the thrust load based on SCADA data only. The technique is validated on two different datasets, one consisting of simulation data (using the software FAST v8, created by Jonkman and Jonkman, 2016 obtained in a controllable environment and one consisting of measurements taken at an offshore wind turbine. In general, the relative error between simulated or measured and predicted thrust load barely exceeds 15 % during normal operation.

  6. miR-342 regulates BRCA1 expression through modulation of ID4 in breast cancer.

    Directory of Open Access Journals (Sweden)

    Elisabetta Crippa

    Full Text Available A miRNAs profiling on a group of familial and sporadic breast cancers showed that miRNA-342 was significantly associated with estrogen receptor (ER levels. To investigate at functional level the role of miR-342 in the pathogenesis of breast cancer, we focused our attention on its "in silico" predicted putative target gene ID4, a transcription factor of the helix-loop-helix protein family whose expression is inversely correlated with that of ER. ID4 is expressed in breast cancer and can negatively regulate BRCA1 expression. Our results showed an inverse correlation between ID4 and miR-342 as well as between ID4 and BRCA1 expression. We functionally validated the interaction between ID4 and miR-342 in a reporter Luciferase system. Based on these findings, we hypothesized that regulation of ID4 mediated by miR-342 could be involved in the pathogenesis of breast cancer by downregulating BRCA1 expression. We functionally demonstrated the interactions between miR-342, ID4 and BRCA1 in a model provided by ER-negative MDA-MB-231 breast cancer cell line that presented high levels of ID4. Overexpression of miR-342 in these cells reduced ID4 and increased BRCA1 expression, supporting a possible role of this mechanism in breast cancer. In the ER-positive MCF7 and in the BRCA1-mutant HCC1937 cell lines miR-342 over-expression only reduced ID4. In the cohort of patients we studied, a correlation between miR-342 and BRCA1 expression was found in the ER-negative cases. As ER-negative cases were mainly BRCA1-mutant, we speculate that the mechanism we demonstrated could be involved in the decreased expression of BRCA1 frequently observed in non BRCA1-mutant breast cancers and could be implicated as a causal factor in part of the familial cases grouped in the heterogeneous class of non BRCA1 or BRCA2-mutant cases (BRCAx. To validate this hypothesis, the study should be extended to a larger cohort of ER-negative cases, including those belonging to the BRCAx class.

  7. Commissioning of the IDS Neutron Detector and $\\beta$-decay fast-timing studies at IDS

    CERN Document Server

    Piersa, Monika

    2016-01-01

    The following report describes my scientific activities performed during the Summer Student Programme at ISOLDE. The main part of my project was focused on commissioning the neutron detector dedicated to nuclear decay studies at ISOLDE Decay Station (IDS). I have participated in all the steps needed to make it operational for the IS609 experiment. In the testing phase, we obtained expected detector response and calibrations confirmed its successful commissioning. The detector was mounted in the desired geometry at IDS and used in measurements of the beta-delayed neutron emission of $^8$He. After completing aforementioned part of my project, I became familiar with the fast-timing method. This technique was applied at IDS in the IS610 experiment performed in June 2016 to explore the structure of neutron-rich $^{130-134}$Sn nuclei. Since the main part of my PhD studies will be the analysis of data collected in this experiment, the second part of my project was dedicated to acquiring knowledge about technical de...

  8. Integrated natural gas pipeline control and customer service system of Gasum; Le systeme integre de controle des canalisations de gaz et de service au consommateur chez Gasum

    Energy Technology Data Exchange (ETDEWEB)

    Aho, J.; Manty, O.; Ahlnas, B. [Gasul Oy (Finland)

    2000-07-01

    Due to the rapid development of the information technology, ageing is not the only driving force for replacing old computer systems with more sophisticated ones. The Finnish natural Gas company, Gasum Oy, has recently taken into use a new control and monitoring system for natural gas pipeline. A special customer service system, developed by Gasum Oy, is closely connected to monitoring system. It provides up-to-date information to all customers of Gasum Oy. The information is layered in three confidential levels: general information, operational data and invoicing information. The system is operating interactively in confidential Extranet. Inside Gasum Oy to meet the needs of departments outside the control room, a new GID system is developed. GID is a way to present pipeline process data and its further modifications with a very user-friendly interface based on geographical map. The system is based on data warehouse architecture and it is working on company's Intranet. This makes it possible to present various secrecy level information based on user ID. Gasum's new SCADA is not only the base for operating the pipeline, but it also provides lot of vital information to other systems serving different user groups within natural gas business in Finland. (authors)

  9. Identifying Supervisory Control and Data Acquisition (SCADA) Systems on a Network via Remote Reconnaissance

    Science.gov (United States)

    2006-09-01

    Medium 000768 Danfoss A/S - Medium 0007A6 Home Automation - Medium 0007BE DataLogic SpA - Medium 000808 PPT Vision - Medium 00089B ICP Electronics...Medium 1 00:06:77 Sick AG Medium 1 00:07:46 Interlink BT Medium 1 00:07:68 Danfoss A/S Medium 1 00:07:A6 Home Automation Medium 4 00:07:BE DataLogic

  10. Context-aware local Intrusion Detection in SCADA systems : a testbed and two showcases

    NARCIS (Netherlands)

    Chromik, Justyna Joanna; Haverkort, Boudewijn R.H.M.; Remke, Anne Katharina Ingrid; Pilch, Carina; Brackmann, Pascal; Duhme, Christof; Everinghoff, Franziska; Giberlein, Artur; Teodorowicz, Thomas; Wieland, Julian

    2017-01-01

    This paper illustrates the use of a testbed that we have developed for context-aware local intrusion detection. This testbed is based on the co-simulation framework Mosaik and allows for the validation of local intrusion detection mechanisms at field stations in power distribution networks. For two

  11. Relationship between major depressive disorder and ACE gene I/D polymorphism in a Turkish population

    Directory of Open Access Journals (Sweden)

    Sema Inanir

    2016-04-01

    Full Text Available Abstract Background Major depressive disorder (MDD is a complex disease and a significant health problem that is prevalent across the world. Angiotensin-converting enzyme (ACE has an important role in renin-angiotensin system (RAS and converts inactive angiotensin I to a potent vasopressor and aldosterone-stimulating peptide angiotensin II. Levels of ACE in plasma vary according to the insertion/deletion (I/D polymorphism of ACE gene. Objective The aim of the current study was to examine the influence ACE gene I/D variations on the risk of MDD. Methods In the present case-control study, we analyzed ACE I/D polymorphism in 346 MDD patients and 210 healthy subjects using polymerase chain reaction technique. Results Comparing the two groups, no significant difference was observed with regard to either genotype distributions or allele frequencies of the I/D polymorphism of ACE gene. Discussion Our findings suggest that the ACE I/D polymorphism is not associated with MDD in Turkish case-control study. Further studies are still needed.

  12. Best practices for the implementation of the REAL ID Act.

    Science.gov (United States)

    2015-10-01

    The REAL ID Act specifies the minimum standards that must be used to produce and issue drivers license and : identification cards that are REAL ID compliant. Beginning in 2020, if a person does not possess a form of : identification that meets REA...

  13. IMI's CANCER-ID: Status of liquid biopsy standardization

    NARCIS (Netherlands)

    Pantel, Klaus; Terstappen, Leon W. M. M.; Baggiani, Barbara; Krahn, Thomas; Schlange, Thomas

    The CANCER-ID (www.cancer-id.eu) consortium was established in early 2015 with more than 30 partners as part of the Innovative Medicines Initiative (IMI), Europe's largest public-private partnership funded in equal parts by the European Union and the European Federation of Pharmaceutical Industries

  14. Evaluation of ID-PaGIA syphilis antibody test.

    Science.gov (United States)

    Naaber, Paul; Makoid, Ene; Aus, Anneli; Loivukene, Krista; Poder, Airi

    2009-01-01

    Laboratory diagnosis of syphilis is usually accomplished by serology. There are currently a large number of different commercial treponemal tests available that vary in format, sensitivity and specificity. To evaluate the ID-PaGIA Syphilis Antibody Test as an alternative to other specific treponemal tests for primary screening or confirmation of diagnosis. Serum samples from healthy adults (n = 100) were used for detection of specificity of ID-PaGIA. To evaluate sensitivity of ID-PaGIA serum samples (n = 101) from patients with confirmed or suspected syphilis were tested for syphilis antibodies with FTA-Abs IgM, ID-PaGIA, ELISA IgM and TPHA tests. No false-positive results were found with ID-PaGIA. Sensitivity of various treponemal tests was the following: FTA-Abs IgM: 95.5%, ID-PaGIA and ELISA IgM: 94%, and TPHA 75%. The positive and negative predictive values of ID-PaGIA were 100 and 89.5%, respectively. Compared with other treponemal tests ID-PaGIA has excellent sensitivity and specificity.

  15. Security analysis for biometric data in ID documents

    NARCIS (Netherlands)

    Schimke, S.; Kiltz, S.; Vielhauer, C.; Kalker, A.A.C.M.

    2005-01-01

    In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents

  16. 78 FR 65555 - Establishment of Class E Airspace; Salmon, ID

    Science.gov (United States)

    2013-11-01

    ...-0531; Airspace Docket No. 13-ANM-20] Establishment of Class E Airspace; Salmon, ID AGENCY: Federal... at the Salmon VHF Omni-Directional Radio Range/Distance Measuring Equipment (VOR/DME) navigation aid, Salmon, ID, to facilitate vectoring of Instrument Flight Rules (IFR) aircraft under control of Salt Lake...

  17. Cyclin D1, Id1 and EMT in breast cancer

    International Nuclear Information System (INIS)

    Tobin, Nicholas P; Sims, Andrew H; Lundgren, Katja L; Lehn, Sophie; Landberg, Göran

    2011-01-01

    Cyclin D1 is a well-characterised cell cycle regulator with established oncogenic capabilities. Despite these properties, studies report contrasting links to tumour aggressiveness. It has previously been shown that silencing cyclin D1 increases the migratory capacity of MDA-MB-231 breast cancer cells with concomitant increase in 'inhibitor of differentiation 1' (ID1) gene expression. Id1 is known to be associated with more invasive features of cancer and with the epithelial-mesenchymal transition (EMT). Here, we sought to determine if the increase in cell motility following cyclin D1 silencing was mediated by Id1 and enhanced EMT-features. To further substantiate these findings we aimed to delineate the link between CCND1, ID1 and EMT, as well as clinical properties in primary breast cancer. Protein and gene expression of ID1, CCND1 and EMT markers were determined in MDA-MB-231 and ZR75 cells by western blot and qPCR. Cell migration and promoter occupancy were monitored by transwell and ChIP assays, respectively. Gene expression was analysed from publicly available datasets. The increase in cell migration following cyclin D1 silencing in MDA-MB-231 cells was abolished by Id1 siRNA treatment and we observed cyclin D1 occupancy of the Id1 promoter region. Moreover, ID1 and SNAI2 gene expression was increased following cyclin D1 knock-down, an effect reversed with Id1 siRNA treatment. Similar migratory and SNAI2 increases were noted for the ER-positive ZR75-1 cell line, but in an Id1-independent manner. In a meta-analysis of 1107 breast cancer samples, CCND1 low /ID1 high tumours displayed increased expression of EMT markers and were associated with reduced recurrence free survival. Finally, a greater percentage of CCND1 low /ID1 high tumours were found in the EMT-like 'claudin-low' subtype of breast cancer than in other subtypes. These results indicate that increased migration of MDA-MB-231 cells following cyclin D1 silencing can be mediated by Id

  18. Projectc conception for city logistics with utilization of IDS element applicated to the Nitra city

    Directory of Open Access Journals (Sweden)

    Michal Balog

    2010-02-01

    Full Text Available Nowadays traffic situation in the town-residential area is characterized by growing requirement for quality and quantityof transfer performance and services that result in congestion increasing in the some towns. Currently the similar problem has Nitracity, where it is necessary to solve this situation immediately. One of the possibilities of increasing traffic fluency is to extend roads, butin case of Nitra that possibility is irrelevant because of non-available space. Other possibility is an utilization of IDS elements(Intelligent Transport System. The contribution presents the conception of transportation in the town, founded on creation of trafficcircles with subsequent IDS elements application.

  19. Underground Storage Tank Integrated Demonstration (UST-ID)

    International Nuclear Information System (INIS)

    1994-02-01

    The DOE complex currently has 332 underground storage tanks (USTs) that have been used to process and store radioactive and chemical mixed waste generated from weapon materials production. Very little of the over 100 million gallons of high-level and low-level radioactive liquid waste has been treated and disposed of in final form. Two waste storage tank design types are prevalent across the DOE complex: single-shell wall and double-shell wall designs. They are made of stainless steel, concrete, and concrete with carbon steel liners, and their capacities vary from 5000 gallons (19 m 3 ) to 10 6 gallons (3785 m 3 ). The tanks have an overburden layer of soil ranging from a few feet to tens of feet. Responding to the need for remediation of tank waste, driven by Federal Facility Compliance Agreements (FFCAs) at all participating sites, the Underground Storage Tank Integrated Demonstration (UST-ID) Program was created by the US DOE Office of Technology Development in February 1991. Its mission is to focus the development, testing, and evaluation of remediation technologies within a system architecture to characterize, retrieve, treat to concentrate, and dispose of radioactive waste stored in USTs at DOE facilities. The ultimate goal is to provide safe and cost-effective solutions that are acceptable to the public and the regulators. The UST-ID has focused on five DOE locations: the Hanford Site, which is the host site, in Richland, Washington; the Fernald Site in Fernald, Ohio; the Idaho National Engineering Laboratory near Idaho Falls, Idaho; the Oak Ridge Reservation in Oak Ridge, Tennessee, and the Savannah River Site in Savannah River, South Carolina

  20. Expression of Id2 in the Second Heart Field and Cardiac Defects in Id2 Knock-Out Mice

    NARCIS (Netherlands)

    Jongbloed, M. R. M.; Vicente-Steijn, R.; Douglas, Y. L.; Wisse, L. J.; Mori, K.; Yokota, Y.; Bartelings, M. M.; Schalij, M. J.; Mahtab, E. A.; Poelmann, R. E.; Gittenberger-De Groot, A. C.

    2011-01-01

    The inhibitor of differentiation Id2 is expressed in mesoderm of the second heart field, which contributes myocardial and mesenchymal cells to the primary heart tube. The role of Id2 in cardiac development is insufficiently known. Heart development was studied in sequential developmental stages in

  1. Angiotensin-converting enzyme gene I/D polymorphism in Pakistani ...

    African Journals Online (AJOL)

    hope&shola

    two were the cases of antiphospholipid syndrome. Parsa et al. (2002) conducted an association of 3 polymor- phisms in angiotensin-converting enzyme including I/D polymorphism and 2 polymorphisms were associated with systemic lupus erythematosus and Lupus Nephritis among non-Caucasians that includes Hispanic, ...

  2. Proactive monitoring of a wind turbine array with lidar measurements, SCADA data and a data-driven RANS solver

    Science.gov (United States)

    Iungo, G.; Said, E. A.; Santhanagopalan, V.; Zhan, L.

    2016-12-01

    Power production of a wind farm and durability of wind turbines are strongly dependent on non-linear wake interactions occurring within a turbine array. Wake dynamics are highly affected by the specific site conditions, such as topography and local atmospheric conditions. Furthermore, contingencies through the life of a wind farm, such as turbine ageing and off-design operations, make prediction of wake interactions and power performance a great challenge in wind energy. In this work, operations of an onshore wind turbine array were monitored through lidar measurements, SCADA and met-tower data. The atmospheric wind field investing the wind farm was estimated by using synergistically the available data through five different methods, which are characterized by different confidence levels. By combining SCADA data and the lidar measurements, it was possible to estimate power losses connected with wake interactions. For this specific array, power losses were estimated to be 4% and 2% of the total power production for stable and convective atmospheric regimes, respectively. The entire dataset was then leveraged for the calibration of a data-driven RANS (DDRANS) solver for prediction of wind turbine wakes and power production. The DDRANS is based on a parabolic formulation of the Navier-Stokes equations with axisymmetry and boundary layer approximations, which allow achieving very low computational costs. Accuracy in prediction of wind turbine wakes and power production is achieved through an optimal tuning of the turbulence closure model. The latter is based on a mixing length model, which was developed based on previous wind turbine wake studies carried out through large eddy simulations and wind tunnel experiments. Several operative conditions of the wind farm under examination were reproduced through DDRANS for different stability regimes, wind directions and wind velocity. The results show that DDRANS is capable of achieving a good level of accuracy in prediction

  3. Automatic Generation of Supervisory Control System Software Using Graph Composition

    Science.gov (United States)

    Nakata, Hideo; Sano, Tatsuro; Kojima, Taizo; Seo, Kazuo; Uchida, Tomoyuki; Nakamura, Yasuaki

    This paper describes the automatic generation of system descriptions for SCADA (Supervisory Control And Data Acquisition) systems. The proposed method produces various types of data and programs for SCADA systems from equipment definitions using conversion rules. At first, this method makes directed graphs, which represent connections between the equipment, from equipment definitions. System descriptions are generated using the conversion rules, by analyzing these directed graphs, and finding the groups of equipment that involve similar operations. This method can make the conversion rules multi levels by using the composition of graphs, and can reduce the number of rules. The developer can define and manage these rules efficiently.

  4. Id-1 and Id-2 genes and products as therapeutic targets for treatment of breast cancer and other types of carcinoma

    Science.gov (United States)

    Desprez, Pierre-Yves; Campisi, Judith

    2014-09-30

    A method for treatment and amelioration of breast, cervical, ovarian, endometrial, squamous cells, prostate cancer and melanoma in a patient comprising targeting Id-1 or Id-2 gene expression with a delivery vehicle comprising a product which modulates Id-1 or Id-2 expression.

  5. FDIC Institution Directory (ID) -- Insured Insitution Download File

    Data.gov (United States)

    Federal Deposit Insurance Corporation — The FDIC's Institution Directory (ID) download file provides a list of all FDIC-insured institutions. The file includes demographic information related to the...

  6. Identity Management ToolKit (IdM TK)

    Data.gov (United States)

    Department of Veterans Affairs — With the IdM TK, authorized users can search and view identity and exception information from the Administrative Data Repository (ADR). Specifically, users can view...

  7. The Antibody Response of Pregnant Cameroonian Women to VAR2CSA ID1-ID2a, a Small Recombinant Protein Containing the CSA-Binding Site

    Science.gov (United States)

    Babakhanyan, Anna; Leke, Rose G. F.; Salanti, Ali; Bobbili, Naveen; Gwanmesia, Philomina; Leke, Robert J. I.; Quakyi, Isabella A.; Chen, John J.; Taylor, Diane Wallace

    2014-01-01

    In pregnant women, Plasmodium falciparum-infected erythrocytes expressing the VAR2CSA antigen bind to chondroitin sulfate A in the placenta causing placental malaria. The binding site of VAR2CSA is present in the ID1-ID2a region. This study sought to determine if pregnant Cameroonian women naturally acquire antibodies to ID1-ID2a and if antibodies to ID1-ID2a correlate with absence of placental malaria at delivery. Antibody levels to full-length VAR2CSA and ID1-ID2a were measured in plasma samples from 745 pregnant Cameroonian women, 144 Cameroonian men, and 66 US subjects. IgM levels and IgG avidity to ID1-ID2a were also determined. As expected, antibodies to ID1-ID2a were absent in US controls. Although pregnant Cameroonian women developed increasing levels of antibodies to full-length VAR2CSA during pregnancy, no increase in either IgM or IgG to ID1-ID2a was observed. Surprisingly, no differences in antibody levels to ID1-ID2a were detected between Cameroonian men and pregnant women. For example, in rural settings only 8–9% of males had antibodies to full-length VAR2CSA, but 90–96% had antibodies to ID1-ID2a. In addition, no significant difference in the avidity of IgG to ID1-ID2a was found between pregnant women and Cameroonian men, and no correlation between antibody levels at delivery and absence of placental malaria was found. Thus, the response to ID1-ID2a was not pregnancy specific, but predominantly against cross-reactivity epitopes, which may have been induced by other PfEMP1 antigens, malarial antigens, or microbes. Currently, ID1-ID2a is a leading vaccine candidate, since it binds to the CSA with the same affinity as the full-length molecule and elicits binding-inhibitory antibodies in animals. Further studies are needed to determine if the presence of naturally acquired cross-reactive antibodies in women living in malaria endemic countries will alter the response to ID1-ID2a following vaccination with ID1-ID2a. PMID:24505415

  8. The antibody response of pregnant Cameroonian women to VAR2CSA ID1-ID2a, a small recombinant protein containing the CSA-binding site.

    Directory of Open Access Journals (Sweden)

    Anna Babakhanyan

    Full Text Available In pregnant women, Plasmodium falciparum-infected erythrocytes expressing the VAR2CSA antigen bind to chondroitin sulfate A in the placenta causing placental malaria. The binding site of VAR2CSA is present in the ID1-ID2a region. This study sought to determine if pregnant Cameroonian women naturally acquire antibodies to ID1-ID2a and if antibodies to ID1-ID2a correlate with absence of placental malaria at delivery. Antibody levels to full-length VAR2CSA and ID1-ID2a were measured in plasma samples from 745 pregnant Cameroonian women, 144 Cameroonian men, and 66 US subjects. IgM levels and IgG avidity to ID1-ID2a were also determined. As expected, antibodies to ID1-ID2a were absent in US controls. Although pregnant Cameroonian women developed increasing levels of antibodies to full-length VAR2CSA during pregnancy, no increase in either IgM or IgG to ID1-ID2a was observed. Surprisingly, no differences in antibody levels to ID1-ID2a were detected between Cameroonian men and pregnant women. For example, in rural settings only 8-9% of males had antibodies to full-length VAR2CSA, but 90-96% had antibodies to ID1-ID2a. In addition, no significant difference in the avidity of IgG to ID1-ID2a was found between pregnant women and Cameroonian men, and no correlation between antibody levels at delivery and absence of placental malaria was found. Thus, the response to ID1-ID2a was not pregnancy specific, but predominantly against cross-reactivity epitopes, which may have been induced by other PfEMP1 antigens, malarial antigens, or microbes. Currently, ID1-ID2a is a leading vaccine candidate, since it binds to the CSA with the same affinity as the full-length molecule and elicits binding-inhibitory antibodies in animals. Further studies are needed to determine if the presence of naturally acquired cross-reactive antibodies in women living in malaria endemic countries will alter the response to ID1-ID2a following vaccination with ID1-ID2a.

  9. La certificazione professionale I&D in Europa

    OpenAIRE

    Franco, Augusta

    2003-01-01

    The statement points out the activity of I&D European associations in the field of competences' certification, in ECIA federation's area as well as in the national one. In the statement there are references on history and outcomes of DECIDoc project; objectives and operative stages of CERTIDoc project, promoted by ECIA; and enterprises of I&D associations in France, Spain, Germany and Italy. Secondly, it is illustrated the activity of Italian librarians and archivists associatio...

  10. Generating unique IDs from patient identification data using security models

    Directory of Open Access Journals (Sweden)

    Emad A Mohammed

    2016-01-01

    Full Text Available Background: The use of electronic health records (EHRs has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. Method: We describe the usage of the message digest-5 (MD5 and secure hashing algorithm (SHA as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. Results: The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. Conclusion: The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data.

  11. An IDS Alerts Aggregation Algorithm Based on Rough Set Theory

    Science.gov (United States)

    Zhang, Ru; Guo, Tao; Liu, Jianyi

    2018-03-01

    Within a system in which has been deployed several IDS, a great number of alerts can be triggered by a single security event, making real alerts harder to be found. To deal with redundant alerts, we propose a scheme based on rough set theory. In combination with basic concepts in rough set theory, the importance of attributes in alerts was calculated firstly. With the result of attributes importance, we could compute the similarity of two alerts, which will be compared with a pre-defined threshold to determine whether these two alerts can be aggregated or not. Also, time interval should be taken into consideration. Allowed time interval for different types of alerts is computed individually, since different types of alerts may have different time gap between two alerts. In the end of this paper, we apply proposed scheme on DAPRA98 dataset and the results of experiment show that our scheme can efficiently reduce the redundancy of alerts so that administrators of security system could avoid wasting time on useless alerts.

  12. Generating unique IDs from patient identification data using security models.

    Science.gov (United States)

    Mohammed, Emad A; Slack, Jonathan C; Naugler, Christopher T

    2016-01-01

    The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. We describe the usage of the message digest-5 (MD5) and secure hashing algorithm (SHA) as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data.

  13. Actualización del sistema SCADA y de control para los reactores MQ5 y MQ6 de la planta de Pinturas Condor, Sherwin Williams Ecuador

    Directory of Open Access Journals (Sweden)

    Jonathan Reinoso

    2013-12-01

    Full Text Available El presente documento describe la actualización del sistema SCADA para los reactores MQ5 y MQ6 de la planta de Pinturas Condor mediante el software Intouch y la actualización del sistema de control del reactor MQ5 implementado en un controlador lógico programable (PLC de marca SCHNEIDER, además de la arquitectura de control realizada en el proyecto. El sistema SCADA y de control de los reactores permiten la visualización y control de los datos y variables más relevantes durante las diferentes fases de producción de resinas en los reactores MQ5 y MQ6.

  14. Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.

    Science.gov (United States)

    Wang, Hao; Lau, Nathan; Gerdes, Ryan M

    2018-04-01

    The aim of this study was to apply work domain analysis for cybersecurity assessment and design of supervisory control and data acquisition (SCADA) systems. Adoption of information and communication technology in cyberphysical systems (CPSs) for critical infrastructures enables automated and distributed control but introduces cybersecurity risk. Many CPSs employ SCADA industrial control systems that have become the target of cyberattacks, which inflict physical damage without use of force. Given that absolute security is not feasible for complex systems, cyberintrusions that introduce unanticipated events will occur; a proper response will in turn require human adaptive ability. Therefore, analysis techniques that can support security assessment and human factors engineering are invaluable for defending CPSs. We conducted work domain analysis using the abstraction hierarchy (AH) to model a generic SCADA implementation to identify the functional structures and means-ends relations. We then adopted a case study approach examining the Stuxnet cyberattack by developing and integrating AHs for the uranium enrichment process, SCADA implementation, and malware to investigate the interactions between the three aspects of cybersecurity in CPSs. The AHs for modeling a generic SCADA implementation and studying the Stuxnet cyberattack are useful for mapping attack vectors, identifying deficiencies in security processes and features, and evaluating proposed security solutions with respect to system objectives. Work domain analysis is an effective analytical method for studying cybersecurity of CPSs for critical infrastructures in a psychologically relevant manner. Work domain analysis should be applied to assess cybersecurity risk and inform engineering and user interface design.

  15. Design of Distortion-Invariant Optical ID Tags for Remote Identification and Verification of Objects

    Science.gov (United States)

    Pérez-Cabré, Elisabet; Millán, María Sagrario; Javidi, Bahram

    Optical identification (ID) tags [1] have a promising future in a number of applications such as the surveillance of vehicles in transportation, control of restricted areas for homeland security, item tracking on conveyor belts or other industrial environment, etc. More specifically, passive optical ID tag [1] was introduced as an optical code containing a signature (that is, a characteristic image or other relevant information of the object), which permits its real-time remote detection and identification. Since their introduction in the literature [1], some contributions have been proposed to increase their usefulness and robustness. To increase security and avoid counterfeiting, the signature was introduced in the optical code as an encrypted function [2-5] following the double-phase encryption technique [6]. Moreover, the design of the optical ID tag was done in such a way that tolerance to variations in scale and rotation was achieved [2-5]. To do that, the encrypted information was multiplexed and distributed in the optical code following an appropriate topology. Further studies were carried out to analyze the influence of different sources of noise. In some proposals [5, 7], the designed ID tag consists of two optical codes where the complex-valued encrypted signature was separately introduced in two real-valued functions according to its magnitude and phase distributions. This solution was introduced to overcome some difficulties in the readout of complex values in outdoors environments. Recently, the fully phase encryption technique [8] has been proposed to increase noise robustness of the authentication system.

  16. Id1 suppresses anti-tumour immune responses and promotes tumour progression by impairing myeloid cell maturation.

    Science.gov (United States)

    Papaspyridonos, Marianna; Matei, Irina; Huang, Yujie; do Rosario Andre, Maria; Brazier-Mitouart, Helene; Waite, Janelle C; Chan, April S; Kalter, Julie; Ramos, Ilyssa; Wu, Qi; Williams, Caitlin; Wolchok, Jedd D; Chapman, Paul B; Peinado, Hector; Anandasabapathy, Niroshana; Ocean, Allyson J; Kaplan, Rosandra N; Greenfield, Jeffrey P; Bromberg, Jacqueline; Skokos, Dimitris; Lyden, David

    2015-04-29

    A central mechanism of tumour progression and metastasis involves the generation of an immunosuppressive 'macroenvironment' mediated in part through tumour-secreted factors. Here we demonstrate that upregulation of the Inhibitor of Differentiation 1 (Id1), in response to tumour-derived factors, such as TGFβ, is responsible for the switch from dendritic cell (DC) differentiation to myeloid-derived suppressor cell expansion during tumour progression. Genetic inactivation of Id1 largely corrects the myeloid imbalance, whereas Id1 overexpression in the absence of tumour-derived factors re-creates it. Id1 overexpression leads to systemic immunosuppression by downregulation of key molecules involved in DC differentiation and suppression of CD8 T-cell proliferation, thus promoting primary tumour growth and metastatic progression. Furthermore, advanced melanoma patients have increased plasma TGFβ levels and express higher levels of ID1 in myeloid peripheral blood cells. This study reveals a critical role for Id1 in suppressing the anti-tumour immune response during tumour progression and metastasis.

  17. RFID vs.Wi-Fi ID

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Wireless networks and Radio Frequency Identification(RFID) have always been closely linked.One of Wi-Fi’s first applications was transferring data from portable RFID readers.But the popularity of RFID has led some to envision whole networks of readers embed- ded throughout a building’s infrastructure.Reva Systems had an- nounced what it calls a Tag Acquisition Network(TAN),an array of RFID readers that work with passive,batteryless tags.Meanwhile,

  18. ID brief news May/June

    CERN Multimedia

    Stapnes, S

    The SCT group passed an important milestone at the end of May when the barrel system was reviewed. Test-results of irradiated barrel hybrids and modules, and of a system of modules were presented. The noise levels in the system remain at a level similar to those measured for single modules. The efficiencies measured on single modules remain high even after irradiation to 3 x 1014 protons/cm2 corresponding to ten years of operation at the LHC. The SCT barrel community is now moving towards production with the SCT Frond End ASIC Production Readiness Review early July as the remaining step before all barrel module components are into full production. The modules consist of 4 silicon p,n detectors with 80um pitch, a thermal baseplate and a wrap-around hybrid bridged across the front and back of the module. The upper set of detectors on each module is rotated by 40mrad to provide stereo information. The picture shows 15 modules in the systemtest at CERN, mounted on a barrel structure. The four barrel productio...

  19. A proposed data base system for detection, classification and ...

    African Journals Online (AJOL)

    A proposed data base system for detection, classification and location of fault on electricity company of Ghana electrical distribution system. Isaac Owusu-Nyarko, Mensah-Ananoo Eugine. Abstract. No Abstract. Keywords: database, classification of fault, power, distribution system, SCADA, ECG. Full Text: EMAIL FULL TEXT ...

  20. Automated pose estimation of objects using multiple ID devices for handling and maintenance task in nuclear fusion reactor

    International Nuclear Information System (INIS)

    Umetani, Tomohiro; Morioka, Jun-ichi; Tamura, Yuichi; Inoue, Kenji; Arai, Tatsuo; Mae, Yasusi

    2011-01-01

    This paper describes a method for the automated estimation of three-dimensional pose (position and orientation) of objects by autonomous robots, using multiple identification (ID) devices. Our goal is to estimate the object pose for assembly or maintenance tasks in a real nuclear fusion reactor system, with autonomous robots cooperating in a virtual assembly system. The method estimates the three-dimensional pose for autonomous robots. This paper discusses a method of motion generation for ID acquisition using the sensory data acquired by the measurement system attached to the robots and from the environment. Experimental results show the feasibility of the proposed method. (author)

  1. Inspection of cup-shaped steel parts from the I.D. side using eddy current

    Science.gov (United States)

    Griffiths, Erick W.; Pearson, Lee H.

    2018-04-01

    An eddy current method was developed to inspect cup-shaped steel parts from the I.D. side. During the manufacturing process of these parts, a thin Al tape foil is applied to the I.D. side of the part. One of the critical process parameters is that only one foil layer can be applied. An eddy current inspection system was developed to reject parts with more than one foil layer. The Al tape foil is cut to length to fit the inner diameter, however, after application of the foil there is a gap created between the beginning and end of the foil. It was found that this gap interfered with the eddy current inspection causing a false positive indication. To solve this problem a sensor design and data analysis process were developed to overcome the effects of these gaps. The developed system incorporates simultaneous measurements from multiple eddy current sensors and signal processing to achieve a reliable inspection.

  2. Aliénation et idéologie

    OpenAIRE

    Kanabus, Benoît; Popa, Délia

    2017-01-01

    Dès lors, on entend mieux la question sur laquelle se referment les mille pages du Marx : « La pensée de Marx nous place devant la question abyssale : qu’est-ce que la vie » ? Cette question peut être reposée à nouveaux frais à l’âge du capitalisme avancé, où, comme le notait Adorno, la vie est devenue « l’idéologie de sa propre absence ». La recherche d’un autre rapport à l’idéologie vient alors prendre le relais de la lutte anti-idéologique de la théorie critique. Cette recherche part du po...

  3. Final Report: DOE/ID/14215

    Energy Technology Data Exchange (ETDEWEB)

    Kenneth Bryden; J. Richard Hess; Thomas Ulrich; Robert Zemetra

    2008-08-18

    The proposed straw separation system developed in the research project harvests the large internode sections of the straw which has the greater potential as a feedstock for lignocellulosic ethanol production while leaving the chaff and nodes in the field. This strategy ensures sustainable agriculture by preventing the depletion of soil minerals, and it restores organic matter to the soil in amounts and particle sizes that accommodate farmers’ needs to keep tillage and fertilizer costs low. A ton of these nutrient-rich plant tissues contains as much as $10.55 worth of fertilizer (economic and energy benefits), in terms of nitrogen, phosphorus, potassium, and other nutrients provided to the soil when incorporated by tillage instead of being burned. Biomass conversion to fermentable sugars for the purpose of producing fuels, chemicals, and other industrial products is well understood. Most bioenergy strategies rely on low-cost fermentable sugars for sustainability and economic viability in the marketplace. Exploitation of the “whole crop”—specifically, wheat straw or other plant material currently regarded as residue or waste—is a practical approach for obtaining a reliable and low-cost source of sugars. However, industrial-scale production of sugars from wheat straw, while technically feasible, is plagued by obstacles related to capital costs, energy consumption, waste streams, production logistics, and the quality of the biomass feedstock. Currently available separation options with combine harvesters are not able to achieve sufficient separation of the straw/stover and chaff streams to realize the full potential of selective harvest. Since ethanol yield is a function of feedstock structural carbohydrate content, biomass anatomical fractions of higher product yield can have a significant beneficial impact on minimum ethanol selling price. To address this advanced biomass separation computation engineering models were developed to more effectively and

  4. Implementing New-age Authentication Techniques using OpenID for Security Automation

    OpenAIRE

    Dharmendra Choukse; Umesh Kumar Singh; Deepak Sukheja; Rekha Shahapurkar

    2010-01-01

    Security of any software can be enhanced manifolds if multiple factors for authorization and authentication are used .The main aim of this work was to design and implement an Academy Automation Software for IPS Academy which uses OpenID and Windows CardSpace as Authentication Techniques in addition to Role Based Authentication (RBA) System to ensure that only authentic users can access the predefined roles as per their Authorization level. The Automation covers different computing hardware an...

  5. Narrowband infrared emitters for combat ID

    Science.gov (United States)

    Pralle, Martin U.; Puscasu, Irina; Daly, James; Fallon, Keith; Loges, Peter; Greenwald, Anton; Johnson, Edward

    2007-04-01

    There is a strong desire to create narrowband infrared light sources as personnel beacons for application in infrared Identify Friend or Foe (IFF) systems. This demand has augmented dramatically in recent years with the reports of friendly fire casualties in Afghanistan and Iraq. ICx Photonics' photonic crystal enhanced TM (PCE TM) infrared emitter technology affords the possibility of creating narrowband IR light sources tuned to specific IR wavebands (near 1-2 microns, mid 3-5 microns, and long 8-12 microns) making it the ideal solution for infrared IFF. This technology is based on a metal coated 2D photonic crystal of air holes in a silicon substrate. Upon thermal excitation the photonic crystal modifies the emitted yielding narrowband IR light with center wavelength commensurate with the periodicity of the lattice. We have integrated this technology with microhotplate MEMS devices to yield 15mW IR light sources in the 3-5 micron waveband with wall plug efficiencies in excess of 10%, 2 orders of magnitude more efficient that conventional IR LEDs. We have further extended this technology into the LWIR with a light source that produces 9 mW of 8-12 micron light at an efficiency of 8%. Viewing distances >500 meters were observed with fielded camera technologies, ideal for ground to ground troop identification. When grouped into an emitter panel, the viewing distances were extended to 5 miles, ideal for ground to air identification.

  6. Summary of the electron ID group

    International Nuclear Information System (INIS)

    Dukes, E.C.

    1993-01-01

    Lepton identification is extremely important for any B physics experiment attempting to measure CP violation. The reasons are obvious: (1) single lepton triggers operate on 44% of all b bar b pairs; (2) lepton triggers are the only triggers (outside of secondary vertex triggers) that are feasible for a variety of important B decay modes; for example, B 0 →D + D - , B 0 →J/ψK s , and B s →K s γ; and (3) events triggered with leptons are already tagged. The electron identification group focused its efforts on learning what state-of-the-art collider detectors are doing in electron identification. To this end they entertained several talks each from the CDF and D0 collaborations at Fermilab, as well as several talks from proposed SSC and LHC experiments. Each talk was followed by lively discussion. They also attempted to understand what the backgrounds to electron identifications will be at the new higher energy hadron colliders - the SSC and LHC - their prejudice being that only these machines will have the energy and luminosity needed to see CP violation in the B system. None of the approved experiments at the SSC or LHC is optimized for B physics. Hence they focused on dedicated forward collider and fixed target detectors

  7. A new module in neural differentiation control: two microRNAs upregulated by retinoic acid, miR-9 and -103, target the differentiation inhibitor ID2.

    Directory of Open Access Journals (Sweden)

    Daniela Annibali

    Full Text Available The transcription factor ID2 is an important repressor of neural differentiation strongly implicated in nervous system cancers. MicroRNAs (miRNAs are increasingly involved in differentiation control and cancer development. Here we show that two miRNAs upregulated on differentiation of neuroblastoma cells--miR-9 and miR-103--restrain ID2 expression by directly targeting the coding sequence and 3' untranslated region of the ID2 encoding messenger RNA, respectively. Notably, the two miRNAs show an inverse correlation with ID2 during neuroblastoma cell differentiation induced by retinoic acid. Overexpression of miR-9 and miR-103 in neuroblastoma cells reduces proliferation and promotes differentiation, as it was shown to occur upon ID2 inhibition. Conversely, an ID2 mutant that cannot be targeted by either miRNA prevents retinoic acid-induced differentiation more efficient than wild-type ID2. These findings reveal a new regulatory module involving two microRNAs upregulated during neural differentiation that directly target expression of the key differentiation inhibitor ID2, suggesting that its alteration may be involved in neural cancer development.

  8. Day-Ahead Wind Power Forecasting Using a Two-Stage Hybrid Modeling Approach Based on SCADA and Meteorological Information, and Evaluating the Impact of Input-Data Dependency on Forecasting Accuracy

    Directory of Open Access Journals (Sweden)

    Dehua Zheng

    2017-12-01

    Full Text Available The power generated by wind generators is usually associated with uncertainties, due to the intermittency of wind speed and other weather variables. This creates a big challenge for transmission system operators (TSOs and distribution system operators (DSOs in terms of connecting, controlling and managing power networks with high-penetration wind energy. Hence, in these power networks, accurate wind power forecasts are essential for their reliable and efficient operation. They support TSOs and DSOs in enhancing the control and management of the power network. In this paper, a novel two-stage hybrid approach based on the combination of the Hilbert-Huang transform (HHT, genetic algorithm (GA and artificial neural network (ANN is proposed for day-ahead wind power forecasting. The approach is composed of two stages. The first stage utilizes numerical weather prediction (NWP meteorological information to predict wind speed at the exact site of the wind farm. The second stage maps actual wind speed vs. power characteristics recorded by SCADA. Then, the wind speed forecast in the first stage for the future day is fed to the second stage to predict the future day’s wind power. Comparative selection of input-data parameter sets for the forecasting model and impact analysis of input-data dependency on forecasting accuracy have also been studied. The proposed approach achieves significant forecasting accuracy improvement compared with three other artificial intelligence-based forecasting approaches and a benchmark model using the smart persistence method.

  9. Comparison of the optimized conditions for genotyping of ACE ID ...

    African Journals Online (AJOL)

    STORAGESEVER

    2009-10-19

    Oct 19, 2009 ... variants (Koyama et al., 2008). This method removed the chances of mistyping and gave 100% accuracy in the confirmation of ID heterozygotes but expenses of chromatography did not prove it to be cost effective. Normally, genomic DNA is used as template DNA for. PCR based studies. It is very difficult to ...

  10. Screening of Lactobacillus plantarum isolated from fermented idli ...

    African Journals Online (AJOL)

    Probiotics are defined as live microorganisms which when administered in adequate amounts confer a health benefit on the host. The objective of this study was to screen eight potential probiotic Lactobacillus plantarum strains from fermented idli batter using in vitro assays such as bile tolerance, acid tolerance, transit ...

  11. Enhancing privacy of users in eID schemes

    NARCIS (Netherlands)

    Shrishak, Kris; Erkin, Z.; Schaar, Remco

    2016-01-01

    In todays world transactions are increasingly being performed over the internetbut require identication of users as in face-to-face transactions. In order to facilitate eGovernance as well as other eCommerce services Electronic Identiation(eID) schemes, which intend to provide unique and reliable

  12. Comparison of the optimized conditions for genotyping of ACE ID ...

    African Journals Online (AJOL)

    ACE ID polymorphism is inevitable for genetic epidemiology of several cardiovascular and non cardiovascular diseases due to its direct influence on ACE activity level. In the present work, conditions were optimized for its analysis using conventional and direct blood PCR (DB PCR). Blood samples from nine normotensive ...

  13. Anmeldung in ILIAS ohne Uni-Login-ID

    OpenAIRE

    Schanz, Nadja

    2016-01-01

    Gewusst wie...! Online-Tutorial der Universitätsbibliothek Tübingen. Erklärt die Anmeldung in Ilias zu Führungen ohne Uni-Login-ID Online Tutorial from university library tuebingen. teaches how to register in Ilias for courses and guided tours without university login

  14. The Danish eID Case: Twenty years of Delay

    DEFF Research Database (Denmark)

    Hoff, Jens Villiam; Hoff, Frederik Villiam

    2010-01-01

    the technological, organizational and legal dimensions of eID in Denmark, and comparing these with a number of other European countries made it possible to explain this paradox. Thus, the three main reasons for the special route development has taken in Denmark seems to be concerns over privacy, lack...

  15. Student ID Cards: What You Should Know About Them

    Science.gov (United States)

    Hoffman, Jonathan; McGuire, Agnes C.

    1973-01-01

    Discusses the usefulness of photo ID cards for school security purposes, library control, student activities, and bus transportation control. Examines ways in which card costs can be reduced and the pros and cons of producing the cards at the school or of letting the work out. Problems involving card abuse and student rights are also considered.…

  16. ACE insertion/deletion (I/D) polymorphism and diabetic nephropathy.

    Science.gov (United States)

    Rahimi, Zohreh

    2012-10-01

    Angiotensin converting enzyme (ACE) gene encodes ACE, a key component of renin angiotensin system (RAS), plays an important role in blood pressure homeostasis by generating the vasoconstrictor peptide angiotensin II. Directory of Open Access Journals (DOAJ), Google Scholar, Pubmed (NLM), LISTA (EBSCO) and Web of Science have been searched. The presence of ACE insertion/deletion (I/D) polymorphism affects the plasma level of ACE. ACE DD genotype is associated with the highest systemic and renal ACE levels compared with the lowest ACE activity in carriers of II genotype. In this review focus has been performed on the study of ACE I/D polymorphism in various populations and its influence on the risk of onset and progression of diabetic nephropathy. Also, association between ACE I/D polymorphism and response to ACE inhibitor and angiotensin II receptor antagonists will be reviewed. Further, synergistic effect of this polymorphism and variants of some genes on the risk of development of diabetic nephropathy will be discussed.

  17. RNA-ID, a Powerful Tool for Identifying and Characterizing Regulatory Sequences.

    Science.gov (United States)

    Brule, C E; Dean, K M; Grayhack, E J

    2016-01-01

    The identification and analysis of sequences that regulate gene expression is critical because regulated gene expression underlies biology. RNA-ID is an efficient and sensitive method to discover and investigate regulatory sequences in the yeast Saccharomyces cerevisiae, using fluorescence-based assays to detect green fluorescent protein (GFP) relative to a red fluorescent protein (RFP) control in individual cells. Putative regulatory sequences can be inserted either in-frame or upstream of a superfolder GFP fusion protein whose expression, like that of RFP, is driven by the bidirectional GAL1,10 promoter. In this chapter, we describe the methodology to identify and study cis-regulatory sequences in the RNA-ID system, explaining features and variations of the RNA-ID reporter, as well as some applications of this system. We describe in detail the methods to analyze a single regulatory sequence, from construction of a single GFP variant to assay of variants by flow cytometry, as well as modifications required to screen libraries of different strains simultaneously. We also describe subsequent analyses of regulatory sequences. © 2016 Elsevier Inc. All rights reserved.

  18. Visible and NIR spectral band combination to produce high security ID tags for automatic identification

    Science.gov (United States)

    Pérez-Cabré, Elisabet; Millán, María S.; Javidi, Bahram

    2006-09-01

    Verification of a piece of information and/or authentication of a given object or person are common operations carried out by automatic security systems that can be applied, for instance, to control the entrance to restricted areas, access to public buildings, identification of cardholders, etc. Vulnerability of such security systems may depend on the ease of counterfeiting the information used as a piece of identification for verification and authentication. To protect data against tampering, the signature that identifies an object is usually encrypted to avoid an easy recognition at human sight and an easy reproduction using conventional devices for imaging or scanning. To make counterfeiting even more difficult, we propose to combine data from visible and near infrared (NIR) spectral bands. By doing this, neither the visible content nor the NIR data by theirselves are sufficient to allow the signature recognition and thus, the identification of a given object. Only the appropriate combination of both signals permits a satisfactory authentication. In addition, the resulting signature is encrypted following a fully-phase encryption technique and the obtained complex-amplitude distribution is encoded on an ID tag. Spatial multiplexing of the encrypted signature allows us to build a distortion-invariant ID tag, so that remote authentication can be achieved even if the tag is captured under rotation or at different distances. We also explore the possibility of using partial information of the encrypted signature to simplify the ID tag design.

  19. Papers of the PTAC wireless, telecommunications and e-business forum : using wireless, SCADA, and well data life cycle management technology to boost productivity and reduce costs in the upstream oil and gas industry

    International Nuclear Information System (INIS)

    2004-01-01

    The main focus of this forum was the use of wireless, telecommunications and e-business as a means of improving efficiency and productivity in the upstream oil and gas industry. The use of new communications technologies in asset monitoring and business performance was discussed, as well as industrial automation and wireless connectivity in conjunction with Supervisory Control and Data Acquisition (SCADA) systems. New technologies in the areas of maintenance and decision support and synergy integration were introduced. New health, safety and environmental performance tools were presented. Issues concerning secure communications and document exchange expenses were also introduced, as well as different methods of closing data gaps between joint interest partners. Specific tools and software concerning compliance management with web-based and remote field data capture technology were discussed, as well as the collection and display of well-site data using newly developed BlueGauge technology. Eleven papers were presented in this forum, of which three were catalogued separately for inclusion in this database. tabs., figs

  20. Papers of the PTAC wireless, telecommunications and e-business forum : using wireless, SCADA, and well data life cycle management technology to boost productivity and reduce costs in the upstream oil and gas industry

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    The main focus of this forum was the use of wireless, telecommunications and e-business as a means of improving efficiency and productivity in the upstream oil and gas industry. The use of new communications technologies in asset monitoring and business performance was discussed, as well as industrial automation and wireless connectivity in conjunction with Supervisory Control and Data Acquisition (SCADA) systems. New technologies in the areas of maintenance and decision support and synergy integration were introduced. New health, safety and environmental performance tools were presented. Issues concerning secure communications and document exchange expenses were also introduced, as well as different methods of closing data gaps between joint interest partners. Specific tools and software concerning compliance management with web-based and remote field data capture technology were discussed, as well as the collection and display of well-site data using newly developed BlueGauge technology. Eleven papers were presented in this forum, of which three were catalogued separately for inclusion in this database. tabs., figs.

  1. The Control System of CERN Accelerators Vacuum (Current Status and Recent Improvements)

    CERN Document Server

    Gomes, P; Blanchard, S; Boccioli, M; Girardot, G; Vestergard, H; Kopylov, L; Mikheev, M

    2011-01-01

    The vacuum control system of most of the CERN accelerators is based on Siemens PLCs and on PVSS SCADA. After the transition from the LHC commissioning phase to its regular operation, there has been a number of additions and improvements to the vacuum control system. They were driven by new technical requirements and by feedback from the accelerator operators and vacuum specialists. New control functions have been implemented in the PLCs; new tools have been developed for the SCADA, while its ergonomics and navigation have been enhanced.

  2. The control system of CERN accelerators vacuum (current status and recent improvements)

    International Nuclear Information System (INIS)

    Gomes, P.; Antoniotti, F.; Blanchard, S.; Boccioli, M.; Girardot, G.; Vestergard, H.; Kopylov, L.; Mikheev, M.

    2012-01-01

    The vacuum control system of most of the CERN accelerators is based on Siemens PLCs and on PVSS SCADA. After the transition from the LHC commissioning phase to its regular operation, there has been a number of additions and improvements to the vacuum control system. They were driven by new technical requirements and by feedback from the accelerator operators and vacuum specialists. New control functions have been implemented in the PLCs; new tools have been developed for the SCADA, while its ergonomic and navigation have been enhanced. (authors)

  3. Id4 functions downstream of Bmp signaling to restrict TCF function in endocardial cells during atrioventricular valve development.

    Science.gov (United States)

    Ahuja, Suchit; Dogra, Deepika; Stainier, Didier Y R; Reischauer, Sven

    2016-04-01

    The atrioventricular canal (AVC) connects the atrial and ventricular chambers of the heart and its formation is critical for the development of the cardiac valves, chamber septation and formation of the cardiac conduction system. Consequently, problems in AVC formation can lead to congenital defects ranging from cardiac arrhythmia to incomplete cardiac septation. While our knowledge about early heart tube formation is relatively comprehensive, much remains to be investigated about the genes that regulate AVC formation. Here we identify a new role for the basic helix-loop-helix factor Id4 in zebrafish AVC valve development and function. id4 is first expressed in the AVC endocardium and later becomes more highly expressed in the atrial chamber. TALEN induced inactivation of id4 causes retrograde blood flow at the AV canal under heat induced stress conditions, indicating defects in AV valve function. At the molecular level, we found that id4 inactivation causes misexpression of several genes important for AVC and AV valve formation including bmp4 and spp1. We further show that id4 appears to control the number of endocardial cells that contribute to the AV valves by regulating Wnt signaling in the developing AVC endocardium. Copyright © 2016 Elsevier Inc. All rights reserved.

  4. A case control association study of ACE gene polymorphism (I/D) with hypertension in Punjabi population from Faisalabad, Pakistan.

    Science.gov (United States)

    Hussain, Misbah; Awan, Fazli Rabbi; Gujjar, Amna; Hafeez, Shakir; Islam, Mehboob

    2018-01-01

    Angiotensin converting enzyme (ACE) is a key component of renin angiotensin aldosterone system. It converts angiotensin I to angiotensin II. Insertion/deletion (I/D) polymorphism of ACE gene is found associated with several complications. However, its association with hypertension and related metabolic diseases is still controversial. So, the aim of the present study was to check this association for Punjabi population from Faisalabad, Pakistan. For this purpose, blood samples (patients = 100, controls = 48) were collected and several biochemical parameters were measured. Genotyping for ACE (I/D) polymorphism was performed by polymerase chain reaction (PCR) assay. ID genotype is found prevalent in the studied population as 41% in control subjects and 61% in patients. Furthermore, chi-square analysis showed significant (p = 0.005) difference for genotypic frequencies between both groups. One-way ANOVA for association of II, ID, and DD genotypes with anthropometric, clinical, and biochemical parameters showed that in patient group, DD genotype is significantly (p = 0.041) associated with systolic blood pressure (SBP). Moreover, ID genotype is found associated with the presence of cardiovascular diseases. This study concludes that DD genotype is strongly associated with higher SBP in hypertensive patients.

  5. BMP-6 inhibits growth of mature human B cells; induction of Smad phosphorylation and upregulation of Id1

    Directory of Open Access Journals (Sweden)

    Kersten Christian

    2005-05-01

    Full Text Available Abstract Background Bone morphogenetic proteins (BMPs belong to the TGF-β superfamily and are secreted proteins with pleiotropic roles in many different cell types. A potential role of BMP-6 in the immune system has been implied by various studies of malignant and rheumatoid diseases. In the present study, we explored the role of BMP-6 in normal human peripheral blood B cells. Results The B cells were found to express BMP type I and type II receptors and BMP-6 rapidly induced phosphorylation of Smad1/5/8. Furthermore, Smad-phosphorylation was followed by upregulation of Id1 mRNA and Id1 protein, whereas Id2 and Id3 expression was not affected. Furthermore, we found that BMP-6 had an antiproliferative effect both in naïve (CD19+CD27- and memory B cells (CD19+CD27+ stimulated with anti-IgM alone or the combined action of anti-IgM and CD40L. Additionally, BMP-6 induced cell death in activated memory B cells. Importantly, the antiproliferative effect of BMP-6 in B-cells was completely neutralized by the natural antagonist, noggin. Furthermore, B cells were demonstrated to upregulate BMP-6 mRNA upon stimulation with anti-IgM. Conclusion In mature human B cells, BMP-6 inhibited cell growth, and rapidly induced phosphorylation of Smad1/5/8 followed by an upregulation of Id1.

  6. Epigenetic inactivation of inhibitor of differentiation 4 (Id4) correlates with prostate cancer

    International Nuclear Information System (INIS)

    Sharma, Pankaj; Chinaranagari, Swathi; Patel, Divya; Carey, Jason; Chaudhary, Jaideep

    2012-01-01

    The inhibitor of DNA-binding (Id) proteins, Id1–4 are negative regulators of basic helix-loop-helix (bHLH) transcription factors. As key regulators of cell cycle and differentiation, expression of Id proteins are increasingly observed in many cancers and associated with aggressiveness of the disease. Of all the four Id proteins, the expression of Id1, Id2, and to a lesser extent, Id3 in prostate cancer and the underlying molecular mechanism is relatively well known. On the contrary, our previous results demonstrated that Id4 acts as a potential tumor suppressor in prostate cancer. In the present study, we extend these observations and demonstrate that Id4 is down-regulated in prostate cancer due to promoter hypermethylation. We used prostate cancer tissue microarrays to investigate Id4 expression. Methylation specific PCR on bisulfite treated DNA was used to determine methylation status of Id4 promoter in laser capture micro-dissected normal, stroma and prostate cancer regions. High Id4 expression was observed in the normal prostate epithelial cells. In prostate cancer, a stage-dependent decrease in Id4 expression was observed with majority of high grade cancers showing no Id4 expression. Furthermore, Id4 expression progressively decreased in prostate cancer cell line LNCaP and with no expression in androgen-insensitive LNCaP-C81 cell line. Conversely, Id4 promoter hypermethylation increased in LNCaP-C81 cells suggesting epigenetic silencing. In prostate cancer samples, loss of Id4 expression was also associated with promoter hypermethylation. Our results demonstrate loss of Id4 expression in prostate cancer due to promoter hypermethylation. The data strongly support the role of Id4 as a tumor suppressor

  7. Fraudulent ID using face morphs: Experiments on human and automatic recognition.

    Science.gov (United States)

    Robertson, David J; Kramer, Robin S S; Burton, A Mike

    2017-01-01

    Matching unfamiliar faces is known to be difficult, and this can give an opportunity to those engaged in identity fraud. Here we examine a relatively new form of fraud, the use of photo-ID containing a graphical morph between two faces. Such a document may look sufficiently like two people to serve as ID for both. We present two experiments with human viewers, and a third with a smartphone face recognition system. In Experiment 1, viewers were asked to match pairs of faces, without being warned that one of the pair could be a morph. They very commonly accepted a morphed face as a match. However, in Experiment 2, following very short training on morph detection, their acceptance rate fell considerably. Nevertheless, there remained large individual differences in people's ability to detect a morph. In Experiment 3 we show that a smartphone makes errors at a similar rate to 'trained' human viewers-i.e. accepting a small number of morphs as genuine ID. We discuss these results in reference to the use of face photos for security.

  8. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R., E-mail: rodrigo.castro@visite.es [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Barbato, P. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Taliercio, C. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy)

    2011-10-15

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  9. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    International Nuclear Information System (INIS)

    Castro, R.; Barbato, P.; Vega, J.; Taliercio, C.

    2011-01-01

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  10. Rapid, autonomous analysis of He spectra I: Overview of the RadID program, user experience, and structure

    Energy Technology Data Exchange (ETDEWEB)

    Gosnell, Thomas B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Chavez, Joseph R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rowland, Mark S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wong, James L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-02-26

    RadID is a new gamma-ray spectrum analysis program for rapid screening of HPGe gamma-ray data to reveal the presence of radionuclide signatures. It is an autonomous, rule-based heuristic system that can identify well over 200 radioactive sources with particular interest in uranium and plutonium characteristics. It executes in about one second. RadID does not require knowledge of the detector efficiency, the source-to-detector distance, or the geometry of the inspected radiation source—including any shielding. In this first of a three-document series we sketch the RadID program’s origin, its minimal requirements, the user experience, and the program operation.

  11. Energy efficiency analysis considering the use of an intelligent systems management in a smart home

    OpenAIRE

    Morais, H.; Fernandes, Filipe; Faria, Pedro; Vale, Zita

    2012-01-01

    In this abstract is presented an energy management system included in a SCADA system existent in a intelligent home. The system control the home energy resources according to the players definitions (electricity consumption and comfort levels), the electricity prices variation in real time mode and the DR events proposed by the aggregators.

  12. Determination of local chromatin composition by CasID.

    Science.gov (United States)

    Schmidtmann, Elisabeth; Anton, Tobias; Rombaut, Pascaline; Herzog, Franz; Leonhardt, Heinrich

    2016-09-02

    Chromatin structure and function are determined by a plethora of proteins whose genome-wide distribution is typically assessed by immunoprecipitation (ChIP). Here, we developed a novel tool to investigate the local chromatin environment at specific DNA sequences. We combined the programmable DNA binding of dCas9 with the promiscuous biotin ligase BirA* (CasID) to biotinylate proteins in the direct vicinity of specific loci. Subsequent streptavidin-mediated precipitation and mass spectrometry identified both known and previously unknown chromatin factors associated with repetitive telomeric, major satellite and minor satellite DNA. With super-resolution microscopy, we confirmed the localization of the putative transcription factor ZNF512 at chromocenters. The versatility of CasID facilitates the systematic elucidation of functional protein complexes and locus-specific chromatin composition.

  13. Zircaloy cladding ID/OD oxidation studies. Final report

    International Nuclear Information System (INIS)

    Westerman, R.E.; Hesson, G.M.

    1977-11-01

    The ID/OD oxide ratio that forms on Zircaloy tubing at temperatures relevant to postulated LOCA conditions was measured as a function of time, temperature, and distance from the rupture. The average ratio at the rupture position was less than unity, and decreased with decreasing test time and increasing distance from the point of rupture. The maximum observed ID/OD oxide ratio was 1.4. Ratios in excess of unity were typically found to be a consequence of the OD oxide being thinner than would have been anticipated from the nominal test conditions. Confirmatory data were also obtained on the isothermal oxidation kinetics of Zircaloy. These data are in good agreement with those obtained by other investigators and confirm the conservative nature of the Baker-Just equation that is required for use in licensing calculations

  14. ID-kaart on mugav ja praktiline dokument / Heiki Raudla

    Index Scriptorium Estoniae

    Raudla, Heiki, 1949-

    2001-01-01

    Ilmunud ka: Severnoje Poberezhje 12. okt., lk. 2; Lääne Elu 13. okt., lk. 2; Hiiumaa 13. okt., lk. 2; Koit 16. okt., lk. 6; Nädaline 16. okt., lk. 4; Sakala 18. okt., lk. 2; Valgamaalane 18. okt., lk. 2; Pjarnuskii Ekspress 12. okt., lk. 2; Meie Maa 19. okt., lk. 2; Hiiu Leht 23. okt., lk. 2; Järva Teataja 30. okt., lk. 2. Siseministri nõunik Heiki Raudla ID-kaardist

  15. Time-and-ID-Based Proxy Reencryption Scheme

    OpenAIRE

    Mtonga, Kambombo; Paul, Anand; Rho, Seungmin

    2014-01-01

    Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled wi...

  16. ID based cryptography for secure cloud data storage

    OpenAIRE

    Kaaniche , Nesrine; Boudguiga , Aymen; Laurent , Maryline

    2013-01-01

    International audience; This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the commercial cloud providers. It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-Based Cryptography. Our solution has several advantages. First, it provides secrecy for encrypted data which are stored in public servers. Second, it offers controlled data access and sharing among users, so that unauthorized us...

  17. Guinea pig ID-like families of SINEs.

    Science.gov (United States)

    Kass, David H; Schaetz, Brian A; Beitler, Lindsey; Bonney, Kevin M; Jamison, Nicole; Wiesner, Cathy

    2009-05-01

    Previous studies have indicated a paucity of SINEs within the genomes of the guinea pig and nutria, representatives of the Hystricognathi suborder of rodents. More recent work has shown that the guinea pig genome contains a large number of B1 elements, expanding to various levels among different rodents. In this work we utilized A-B PCR and screened GenBank with sequences from isolated clones to identify potentially uncharacterized SINEs within the guinea pig genome, and identified numerous sequences with a high degree of similarity (>92%) specific to the guinea pig. The presence of A-tails and flanking direct repeats associated with these sequences supported the identification of a full-length SINE, with a consensus sequence notably distinct from other rodent SINEs. Although most similar to the ID SINE, it clearly was not derived from the known ID master gene (BC1), hence we refer to this element as guinea pig ID-like (GPIDL). Using the consensus to screen the guinea pig genomic database (Assembly CavPor2) with Ensembl BlastView, we estimated at least 100,000 copies, which contrasts markedly to just over 100 copies of ID elements. Additionally we provided evidence of recent integrations of GPIDL as two of seven analyzed conserved GPIDL-containing loci demonstrated presence/absence variants in Cavia porcellus and C. aperea. Using intra-IDL PCR and sequence analyses we also provide evidence that GPIDL is derived from a hystricognath-specific SINE family. These results demonstrate that this SINE family continues to contribute to the dynamics of genomes of hystricognath rodents.

  18. A new concept in glasshouse computer automation with SCADA and CASE Tools

    NARCIS (Netherlands)

    Meurs, van W.Th.M.; Gieling, Th.H.; Janssen, H.J.J.

    1996-01-01

    Climate control computers in greenhouses control heating and ventilation, supply water, dilute and dispense nutrients and integrate models into an optimally controlled system. This paper describes how information technology, as in use in other sectors of industry, applies to greenhouse control. In

  19. ID3 contributes to cerebrospinal fluid seeding and poor prognosis in medulloblastoma

    International Nuclear Information System (INIS)

    Phi, Ji Hoon; Choi, Seung Ah; Lim, Sang-Hee; Lee, Joongyub; Wang, Kyu-Chang; Park, Sung-Hye; Kim, Seung-Ki

    2013-01-01

    The inhibitor of differentiation (ID) genes have been implicated as promoters of tumor progression and metastasis in many human cancers. The current study investigated the expression and functional roles of ID genes in seeding and prognosis of medulloblastoma. ID gene expression was screened in human medulloblastoma tissues. Knockdown of ID3 gene was performed in medulloblastoma cells in vitro. The expression of metastasis-related genes after ID3 knockdown was assessed. The effect of ID3 knockdown on tumor seeding was observed in an animal model in vivo. The survival of medulloblastoma patients was plotted according to the ID3 expression levels. Significantly higher ID3 expression was observed in medulloblastoma with cerebrospinal fluid seeding than tumors without seeding. Knockdown of ID3 decreased proliferation, increased apoptosis, and suppressed the migration of D283 medulloblastoma cells in vitro. In a seeding model of medulloblastoma, ID3 knockdown in vivo with shRNA inhibited the growth of primary tumors, prevented the development of leptomeningeal seeding, and prolonged animal survival. High ID3 expression was associated with shorter survival of medulloblastoma patients, especially in Group 4 medulloblastomas. High ID3 expression is associated with medullolbastoma seeding and is a poor prognostic factor, especially in patients with Group 4 tumors. ID3 may represent the metastatic/ aggressive phenotype of a subgroup of medulloblastoma

  20. Análisis de la colaboración entre las empresas biotecnológicas españolas con actividades de I+D y el sistema público de I+D

    Directory of Open Access Journals (Sweden)

    García-Carpintero, Esther

    2014-06-01

    Full Text Available The development and improvement of cooperation between the industrial sector and the public R&D system can produce competitive advantages for the companies. The present work describes experiences and perceptions of Spanish biotechnology companies in their collaboration with the public R&D system. Results show that almost all the biotechnological companies with R&D activities (93.6% have cooperated with the public R&D system. The main barriers found by the companies are the excess of bureaucracy and the slow response of public researchers. Results obtained also suggest the need to establish public policies and programmes to promote knowledge and technology transfer from public research centres to companies, with a special focus on encouraging researchers from the public R&D system and on improving how Technology Transfer Offices work.El desarrollo y la mejora de la cooperación entre el sector productivo y el sistema público de I+D puede generar un conjunto de ventajas competitivas para estas empresas. El presente trabajo describe las experiencias y percepciones de las empresas biotecnológicas españolas en su colaboración con el sistema público de I+D. Los resultados muestran que prácticamente la totalidad de empresas biotecnológicas españolas con actividades de I+D (un 93,6% han mantenido algún tipo de colaboración con el sistema público de I+D. Los principales obstáculos percibidos por estas empresas en su colaboración con el sistema público de I+D son el exceso de burocracia y la respuesta lenta de los investigadores. Los resultados obtenidos sugieren la conveniencia de establecer políticas y programas públicos para fomentar la transferencia de conocimiento y tecnología desde el sistema público de I+D a las empresas, fundamentalmente centrados en la necesidad de incentivar a los investigadores del sistema público de I+D y mejorar el funcionamiento de las Oficinas de Transferencia de Tecnología.

  1. ID.alistic: identificatie met een touch voor de patiënt

    NARCIS (Netherlands)

    M. Wilschut; M. Zijlmans; Dr. L.S.G.L Wauben

    2017-01-01

    ID.alistic is een conceptuele patiëntidentificatie methode (middels een vingerafdrukscanner), ter vervanging van het polsbandjessysteem van het Albert Schweitzer ziekenhuis (ASz) dialysecentrum. Dit onderzoek bepaalt de implementeerbaarheid van ID.alistic binnen het dialysecentrum door

  2. Ekspert : mobiil-ID kasutamine valimistel turvariske ei tekita / Holger Roonemaa

    Index Scriptorium Estoniae

    Roonemaa, Holger

    2008-01-01

    E-valimiste projektijuhi Taavi Martensi väitel pole põhjust kahelda mobiil-ID turvalisuses. Valimiskomisjoni esimehe Heiki Sibula meelest peaks m-ID kaarte välja andma kodakondsus- ja migratsiooniamet

  3. 78 FR 773 - Hartford Financial Services Group, Inc., Commercial/Actuarial/Information Delivery Services (IDS...

    Science.gov (United States)

    2013-01-04

    ... Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS)/Corporate & Financial... Assistance (TAA) applicable to workers and former workers of Hartford Financial Services Group, Inc., Commercial/ Actuarial/Information Delivery Services (IDS)/Corporate & Financial Reporting group, Hartford...

  4. Rancang Sistem Absensi Siswa Menggunakan Id Card Dengan Pemberitahuan SMS Berbasis Mikrokontroller At Mega 16

    OpenAIRE

    Rangkuti, Nur Hafiz Ahmad

    2017-01-01

    150821053 The system of Radio frequency identification (RFID) is a technology that uses communication via electromagnetic waves to change data between terminals with an object such as product goods, animals, or humans with the aim to Here the author uses identification identification is a STUDENT ID CARD and searches the trail through the use of a device called the RFID tag. RFID tags can be active or passive. Passive RFID tags do not have their own power supply, so the price is cheaper th...

  5. RETRACTED: Association of the ACE I/D gene polymorphism with sepsis susceptibility and sepsis progression.

    Science.gov (United States)

    Yang, Chun-Hua; Zhou, Tian-Biao

    2015-12-01

    This article has been included in a multiple retraction: Chun-Hua Yang and Tian-Biao Zhou Association of the ACE I/D gene polymorphism with sepsis susceptibility and sepsis progression Journal of Renin-Angiotensin-Aldosterone System 1470320314568521, first published on February 3, 2015 doi: 10.1177/1470320314568521 This article has been retracted at the request of the Editors and the Publisher. After conducting a thorough investigation, SAGE found that the submitting authors of a number of papers published in the Journal of the Renin-Angiotensin Aldosterone System ( JRAAS) (listed below) had supplied fabricated contact details for their nominated reviewers. The Editors accepted these papers based on the reports supplied by the individuals using these fake reviewer email accounts. After concluding that the peer review process was therefore seriously compromised, SAGE and the journal Editors have decided to retract all affected articles. Online First articles (these articles will not be published in an issue) Wenzhuang Tang, Tian-Biao Zhou, and Zongpei Jiang Association of the angiotensinogen M235T gene polymorphism with risk of diabetes mellitus developing into diabetic nephropathy Journal of Renin-Angiotensin-Aldosterone System 1470320314563426, first published on December 18, 2014 doi: 10.1177/1470320314563426 Tian-Biao Zhou, Hong-Yan Li, Zong-Pei Jiang, Jia-Fan Zhou, Miao-Fang Huang, and Zhi-Yang Zhou Role of renin-angiotensin-aldosterone system inhibitors in radiation nephropathy Journal of Renin-Angiotensin-Aldosterone System 1470320314563424, first published on December 18, 2014 doi: 10.1177/1470320314563424 Weiqiang Zhong, Zongpei Jiang, and Tian-Biao Zhou Association between the ACE I/D gene polymorphism and T2DN susceptibility: The risk of T2DM developing into T2DN in the Asian population Journal of Renin-Angiotensin-Aldosterone System 1470320314566019, first published on January 26, 2015 doi: 10.1177/1470320314566019 Tian-Biao Zhou, Xue-Feng Guo, Zongpei

  6. People with ID as interviewers and co-researchers: experiences and reflection.

    NARCIS (Netherlands)

    Lieshout, H. van

    2012-01-01

    Aim: To share the experience of working with people with intellectual disabilities (ID) as interviewers in a qualitative study about community participation of people with ID. We reflect on two perspectives: the interviewers and the researchers. Method: Eighteen people with ID were interviewed by

  7. 78 FR 8596 - Hartford Financial Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS...

    Science.gov (United States)

    2013-02-06

    ... Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS)/Corporate & Financial... workers and former workers of Hartford Financial Services Group, Inc., Commercial/Actuarial/Information Delivery Services (IDS)/Corporate & Financial Reporting group, Hartford, Connecticut (The Hartford-IDS...

  8. Picture This: How to Establish an Effective School ID Card Program

    Science.gov (United States)

    Finkelstein, David

    2013-01-01

    Most school districts do not have an ID card policy that everyone knows and follows, yet. many school districts are implementing ID card programs to address concerns about safety, efficiency, and convenience. A well-thought-out ID card program leads to greater security and smoother operations throughout the school and should thus be a priority.…

  9. Exploring the Link between ACE Insertion/Deletion (I/D Polymorphism and Uterine Leiomyomas

    Directory of Open Access Journals (Sweden)

    Shirin Shahbazi

    2017-03-01

    Full Text Available Introduction: Uterine leiomyomas arise from the proliferation of smooth muscle cells. ACE gene encodes a convertase enzyme mainly secreted in vascular endothelial cells which is involved in the renin–angiotensin system and blood pressure controlling. This gene has an insertion/deletion (I/D polymorphism correlates to serum and tissue ACE levels. The aim of this study is to elucidate the relationship between ACE gene variation and the development of myom. Methods: The samples of 55 uterine leiomyoma patients and 78 healthy women were studied. After obtaining informed consent, blood samples were collected and DNA extraction was performed by Salting-out method. Genotyping was performed using PCR reaction. The amplified products were two bands of 190 and 490 bp, which represents D allele and I allele, respectively. Statistical analysis was done using Chi-square test. Results: The D allele frequency was 0.55 in the patient group and 0.51 in the control group. The I allele frequencies in the two groups were 0.45 and 0.49, respectively. The results showed that taking the II genotype into account as reference genotype; homozygous DD individuals were at increased risk of uterine myoma (Odds ratio: 1.37. However, heterozygous ID showed a similar risk with the II genotype as the reference group. Conclusion: High blood pressure is significantly associated with uterine fibroids. It has been shown that atherosclerotic damage of uterine blood vessels and the inflammatory process caused by it may play an important role in the development of uterine myoma. This study indicates a positive relationship between the ACE (I/D polymorphism and the risk of uterine myoma. This finding is evidence of the important role of the renin–angiotensin system in the pathogenesis of myoma

  10. A Cross-Layer, Anomaly-Based IDS for WSN and MANET.

    Science.gov (United States)

    Amouri, Amar; Morgera, Salvatore D; Bencherif, Mohamed A; Manthena, Raju

    2018-02-22

    Intrusion detection system (IDS) design for mobile adhoc networks (MANET) is a crucial component for maintaining the integrity of the network. The need for rapid deployment of IDS capability with minimal data availability for training and testing is an important requirement of such systems, especially for MANETs deployed in highly dynamic scenarios, such as battlefields. This work proposes a two-level detection scheme for detecting malicious nodes in MANETs. The first level deploys dedicated sniffers working in promiscuous mode. Each sniffer utilizes a decision-tree-based classifier that generates quantities which we refer to as correctly classified instances (CCIs) every reporting time. In the second level, the CCIs are sent to an algorithmically run supernode that calculates quantities, which we refer to as the accumulated measure of fluctuation (AMoF) of the received CCIs for each node under test (NUT). A key concept that is used in this work is that the variability of the smaller size population which represents the number of malicious nodes in the network is greater than the variance of the larger size population which represents the number of normal nodes in the network. A linear regression process is then performed in parallel with the calculation of the AMoF for fitting purposes and to set a proper threshold based on the slope of the fitted lines. As a result, the malicious nodes are efficiently and effectively separated from the normal nodes. The proposed scheme is tested for various node velocities and power levels and shows promising detection performance even at low-power levels. The results presented also apply to wireless sensor networks (WSN) and represent a novel IDS scheme for such networks.

  11. Monetizing a Meme: YouTube, Content ID, and the Harlem Shake

    Directory of Open Access Journals (Sweden)

    Michael Soha

    2016-01-01

    Full Text Available This article analyzes the creation, evolution, and monetization of the Harlem Shake meme on YouTube to explore contemporary implementation of copyright and understanding of authorship in regard to monetization of works with distributed authorship. This article has three main findings: first, we highlight the collection of digital labor that comprises the “Harlem Shake” meme, its rise in popularity, and the subsequent rise in popularity of Baauer, the composer of the song which forms the backbone of the meme; second, we examine how YouTube’s “new bargain” of Content ID, as a departure from the site’s origins creates coercive control mechanisms, shedding new light on the concept of and debate over “digital sharecropping.” Finally, we argue for a “Fair(er use” system by exploring how memes might be understood outside of the contemporary copyright system, rethinking the rights of users engaged in collective production. The article is significant in that it challenges the current distribution of Content ID payments solely to copyright holders in an attempt to rethink a system that acknowledges the creative labor of memetic phenomena and collective authorship.

  12. Revocable ID-Based Signature with Short Size over Lattices

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-01-01

    Full Text Available In the past, many ID-based signature (IBS schemes based on the integer factorization or discrete logarithm problems were proposed. With the progress on the development of quantum technology, IBS schemes mentioned above would become vulnerable. Recently, several IBS schemes over lattices were proposed to be secure against attacks in the quantum era. As conventional public-key settings, ID-based public-key settings have to offer a revocation mechanism to revoke misbehaving or malicious users. However, in the past, little work focuses on the revocation problem in the IBS schemes over lattices. In this article, we propose a new revocable IBS (RIBS scheme with short size over lattices. Based on the short integer solution (SIS assumption, we prove that the proposed RIBS scheme provides existential unforgeability against adaptive chosen-message attacks. As compared to the existing IBS schemes over lattices, our RIBS scheme has better performance in terms of signature size, signing key size, and the revocation mechanism with public channels.

  13. Secure OpenID Authentication Model by Using Trusted Computing

    Directory of Open Access Journals (Sweden)

    E. Ghazizadeh

    2014-01-01

    Full Text Available The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. This paper proposes a model in which One Time Password (OTP, TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment.

  14. Experience in developing control integrated multilevel systems for gas transport; Developpement de systemes integres de gestion multi-niveaux pour le transport du gaz

    Energy Technology Data Exchange (ETDEWEB)

    Kostyukov, V.Y. [NIIIS, (Russian Federation); Bityukov, V.S. [Gasprom, (Russian Federation)

    2000-07-01

    This report describes the experience of the integrated control multilevel system (IACS) development and implementation for gas transport at the regional enterprises of JSC 'Gasprom', specificity of IACS creation by the Russian enterprises on the basis of the technical and licensed basic software SCADA Geamatics purchased from AEG company under the contract. (authors)

  15. Overview of the ID, EPI and REL tasks of BioNLP Shared Task 2011

    Directory of Open Access Journals (Sweden)

    Pyysalo Sampo

    2012-06-01

    Full Text Available Abstract We present the preparation, resources, results and analysis of three tasks of the BioNLP Shared Task 2011: the main tasks on Infectious Diseases (ID and Epigenetics and Post-translational Modifications (EPI, and the supporting task on Entity Relations (REL. The two main tasks represent extensions of the event extraction model introduced in the BioNLP Shared Task 2009 (ST'09 to two new areas of biomedical scientific literature, each motivated by the needs of specific biocuration tasks. The ID task concerns the molecular mechanisms of infection, virulence and resistance, focusing in particular on the functions of a class of signaling systems that are ubiquitous in bacteria. The EPI task is dedicated to the extraction of statements regarding chemical modifications of DNA and proteins, with particular emphasis on changes relating to the epigenetic control of gene expression. By contrast to these two application-oriented main tasks, the REL task seeks to support extraction in general by separating challenges relating to part-of relations into a subproblem that can be addressed by independent systems. Seven groups participated in each of the two main tasks and four groups in the supporting task. The participating systems indicated advances in the capability of event extraction methods and demonstrated generalization in many aspects: from abstracts to full texts, from previously considered subdomains to new ones, and from the ST'09 extraction targets to other entities and events. The highest performance achieved in the supporting task REL, 58% F-score, is broadly comparable with levels reported for other relation extraction tasks. For the ID task, the highest-performing system achieved 56% F-score, comparable to the state-of-the-art performance at the established ST'09 task. In the EPI task, the best result was 53% F-score for the full set of extraction targets and 69% F-score for a reduced set of core extraction targets, approaching a level

  16. Id1 represses osteoclast-dependent transcription and affects bone formation and hematopoiesis.

    Directory of Open Access Journals (Sweden)

    April S Chan

    2009-11-01

    Full Text Available The bone-bone marrow interface is an area of the bone marrow microenvironment in which both bone remodeling cells, osteoblasts and osteoclasts, and hematopoietic cells are anatomically juxtaposed. The close proximity of these cells naturally suggests that they interact with one another, but these interactions are just beginning to be characterized.An Id1(-/- mouse model was used to assess the role of Id1 in the bone marrow microenvironment. Micro-computed tomography and fracture tests showed that Id1(-/- mice have reduced bone mass and increased bone fragility, consistent with an osteoporotic phenotype. Osteoclastogenesis and pit formation assays revealed that loss of Id1 increased osteoclast differentiation and resorption activity, both in vivo and in vitro, suggesting a cell autonomous role for Id1 as a negative regulator of osteoclast differentiation. Examination by flow cytometry of the hematopoietic compartment of Id1(-/- mice showed an increase in myeloid differentiation. Additionally, we found increased expression of osteoclast genes, TRAP, Oscar, and CTSK in the Id1(-/- bone marrow microenvironment. Lastly, transplantation of wild-type bone marrow into Id1(-/- mice repressed TRAP, Oscar, and CTSK expression and activity and rescued the hematopoietic and bone phenotype in these mice.In conclusion, we demonstrate an osteoporotic phenotype in Id1(-/- mice and a mechanism for Id1 transcriptional control of osteoclast-associated genes. Our results identify Id1 as a principal player responsible for the dynamic cross-talk between bone and bone marrow hematopoietic cells.

  17. The antibody response of pregnant Cameroonian women to VAR2CSA ID1-ID2a, a small recombinant protein containing the CSA-binding site

    DEFF Research Database (Denmark)

    Babakhanyan, Anna; Leke, Rose G F; Salanti, Ali

    2014-01-01

    In pregnant women, Plasmodium falciparum-infected erythrocytes expressing the VAR2CSA antigen bind to chondroitin sulfate A in the placenta causing placental malaria. The binding site of VAR2CSA is present in the ID1-ID2a region. This study sought to determine if pregnant Cameroonian women natura...

  18. Comparison of Perinatal Risk Factors Associated with Autism Spectrum Disorder (ASD), Intellectual Disability (ID), and Co-Occurring ASD and ID

    Science.gov (United States)

    Schieve, Laura A.; Clayton, Heather B.; Durkin, Maureen S.; Wingate, Martha S.; Drews-Botsch, Carolyn

    2015-01-01

    While studies report associations between perinatal outcomes and both autism spectrum disorder (ASD) and intellectual disability (ID), there has been little study of ASD with versus without co-occurring ID. We compared perinatal risk factors among 7547 children in the 2006-2010 Autism and Developmental Disability Monitoring Network classified as…

  19. ID4 promotes AR expression and blocks tumorigenicity of PC3 prostate cancer cells

    International Nuclear Information System (INIS)

    Komaragiri, Shravan Kumar; Bostanthirige, Dhanushka H.; Morton, Derrick J.; Patel, Divya; Joshi, Jugal; Upadhyay, Sunil; Chaudhary, Jaideep

    2016-01-01

    Deregulation of tumor suppressor genes is associated with tumorigenesis and the development of cancer. In prostate cancer, ID4 is epigenetically silenced and acts as a tumor suppressor. In normal prostate epithelial cells, ID4 collaborates with androgen receptor (AR) and p53 to exert its tumor suppressor activity. Previous studies have shown that ID4 promotes tumor suppressive function of AR whereas loss of ID4 results in tumor promoter activity of AR. Previous study from our lab showed that ectopic ID4 expression in DU145 attenuates proliferation and promotes AR expression suggesting that ID4 dependent AR activity is tumor suppressive. In this study, we examined the effect of ectopic expression of ID4 on highly malignant prostate cancer cell, PC3. Here we show that stable overexpression of ID4 in PC3 cells leads to increased apoptosis and decreased cell proliferation and migration. In addition, in vivo studies showed a decrease in tumor size and volume of ID4 overexpressing PC3 cells, in nude mice. At the molecular level, these changes were associated with increased androgen receptor (AR), p21, and AR dependent FKBP51 expression. At the mechanistic level, ID4 may regulate the expression or function of AR through specific but yet unknown AR co-regulators that may determine the final outcome of AR function. - Highlights: • ID4 expression induces AR expression in PC3 cells, which generally lack AR. • ID4 expression increased apoptosis and decreased cell proliferation and invasion. • Overexpression of ID4 reduces tumor growth of subcutaneous xenografts in vivo. • ID4 induces p21 and FKBP51 expression- co-factors of AR tumor suppressor activity.

  20. ID4 promotes AR expression and blocks tumorigenicity of PC3 prostate cancer cells

    Energy Technology Data Exchange (ETDEWEB)

    Komaragiri, Shravan Kumar; Bostanthirige, Dhanushka H.; Morton, Derrick J.; Patel, Divya; Joshi, Jugal; Upadhyay, Sunil; Chaudhary, Jaideep, E-mail: jchaudhary@cau.edu

    2016-09-09

    Deregulation of tumor suppressor genes is associated with tumorigenesis and the development of cancer. In prostate cancer, ID4 is epigenetically silenced and acts as a tumor suppressor. In normal prostate epithelial cells, ID4 collaborates with androgen receptor (AR) and p53 to exert its tumor suppressor activity. Previous studies have shown that ID4 promotes tumor suppressive function of AR whereas loss of ID4 results in tumor promoter activity of AR. Previous study from our lab showed that ectopic ID4 expression in DU145 attenuates proliferation and promotes AR expression suggesting that ID4 dependent AR activity is tumor suppressive. In this study, we examined the effect of ectopic expression of ID4 on highly malignant prostate cancer cell, PC3. Here we show that stable overexpression of ID4 in PC3 cells leads to increased apoptosis and decreased cell proliferation and migration. In addition, in vivo studies showed a decrease in tumor size and volume of ID4 overexpressing PC3 cells, in nude mice. At the molecular level, these changes were associated with increased androgen receptor (AR), p21, and AR dependent FKBP51 expression. At the mechanistic level, ID4 may regulate the expression or function of AR through specific but yet unknown AR co-regulators that may determine the final outcome of AR function. - Highlights: • ID4 expression induces AR expression in PC3 cells, which generally lack AR. • ID4 expression increased apoptosis and decreased cell proliferation and invasion. • Overexpression of ID4 reduces tumor growth of subcutaneous xenografts in vivo. • ID4 induces p21 and FKBP51 expression- co-factors of AR tumor suppressor activity.

  1. Radikal konservativ idédebat og højreautoritær fascination i Danmark, ca. 1928-1940

    DEFF Research Database (Denmark)

    Holm, Adam

    1999-01-01

    Historie, Højreradikalisme, Konservatisme, Fascisme, Mellemkrigstid, Idéhistorie, Intellektuelle......Historie, Højreradikalisme, Konservatisme, Fascisme, Mellemkrigstid, Idéhistorie, Intellektuelle...

  2. Forensic validation of the SNPforID 52-plex assay

    DEFF Research Database (Denmark)

    Musgrave-Brown, Esther; Ballard, David; Balogh, Kinga

    2007-01-01

    The advantages of single nucleotide polymorphism (SNP) typing in forensic genetics are well known and include a wider choice of high-throughput typing platforms, lower mutation rates, and improved analysis of degraded samples. However, if SNPs are to become a realistic supplement to current short...... tandem repeat (STR) typing methods, they must be shown to successfully and reliably analyse the challenging samples commonly encountered in casework situations. The European SNPforID consortium, supported by the EU GROWTH programme, has developed a multiplex of 52 SNPs for forensic analysis...... in forensic casework. A total of 40 extracts were used in the study, each of which was sent to two of the five participating laboratories for typing in duplicate or triplicate. Laboratories were instructed to carry out their analyses as if they were dealing with normal casework samples. Results were reported...

  3. International Decommissioning Symposium 2000 (IDS 2000). Final Report

    International Nuclear Information System (INIS)

    Ebadian, M.A.

    2001-01-01

    The purpose of IDS 2000 was to deliver a world-class conference on applicable global environmental issues. The objective of this conference was to publicize environmental progress of individual countries, to provide a forum for technology developer and problem-holder interaction, to facilitate environmental and technology discussions between the commercial and financial communities, and to accommodate information and education exchange between governments, industries, universities, and scientists. The scope of this project included the planning and execution of an international conference on the decommissioning of nuclear facilities, and the providing of a business forum for vendors and participants sufficient to attract service providers, technology developers, and the business and financial communities. These groups, when working together with attendees from regulatory organizations and government decision-maker groups, provide an opportunity to more effectively and efficiently expedite the decommissioning projects

  4. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications. © 2015 American Academy of Forensic Sciences.

  5. Automatic ID heat load generation in ANSYS code

    International Nuclear Information System (INIS)

    Wang, Zhibi.

    1992-01-01

    Detailed power density profiles are critical in the execution of a thermal analysis using a finite element (FE) code such as ANSYS. Unfortunately, as yet there is no easy way to directly input the precise power profiles into ANSYS. A straight-forward way to do this is to hand-calculate the power of each node or element and then type the data into the code. Every time a change is made to the FE model, the data must be recalculated and reentered. One way to solve this problem is to generate a set of discrete data, using another code such as PHOTON2, and curve-fit the data. Using curve-fitted formulae has several disadvantages. It is time consuming because of the need to run a second code for generation of the data, curve-fitting, and doing the data check, etc. Additionally, because there is no generality for different beamlines or different parameters, the above work must be repeated for each case. And, errors in the power profiles due to curve-fitting result in errors in the analysis. To solve the problem once and for all and with the capability to apply to any insertion device (ID), a program for ED power profile was written in ANSYS Parametric Design Language (APDL). This program is implemented as an ANSYS command with input parameters of peak magnetic field, deflection parameter, length of ID, and distance from the source. Once the command is issued, all the heat load will be automatically generated by the code

  6. Methods and Tools for Profiling and Control of Distributed Systems

    Directory of Open Access Journals (Sweden)

    Sukharev Roman

    2017-01-01

    Full Text Available The article analyzes and standardizes methods for profiling distributed systems that focus on simulation to conduct experiments and build a graph model of the system. The theory of queueing networks is used for simulation modeling of distributed systems, receiving and processing user requests. To automate the above method of profiling distributed systems the software application was developed with a modular structure and similar to a SCADA-system.

  7. Practical In-Depth Analysis of IDS Alerts for Tracing and Identifying Potential Attackers on Darknet

    Directory of Open Access Journals (Sweden)

    Jungsuk Song

    2017-02-01

    Full Text Available The darknet (i.e., a set of unused IP addresses is a very useful solution for observing the global trends of cyber threats and analyzing attack activities on the Internet. Since the darknet is not connected with real systems, in most cases, the incoming packets on the darknet (‘the darknet traffic’ do not contain a payload. This means that we are unable to get real malware from the darknet traffic. This situation makes it difficult for security experts (e.g., academic researchers, engineers, operators, etc. to identify whether the source hosts of the darknet traffic are infected by real malware or not. In this paper, we present the overall procedure of the in-depth analysis between the darknet traffic and IDS alerts using real data collected at the Science and Technology Cyber Security Center (S&T CSC in Korea and provide the detailed in-depth analysis results. The ultimate goal of this paper is to provide practical experience, insight and know-how to security experts so that they are able to identify and trace the root cause of the darknet traffic. The experimental results show that correlation analysis between the darknet traffic and IDS alerts is very useful to discover potential attack hosts, especially internal hosts, and to find out what kinds of malware infected them.

  8. Remote system of data acquisition and equipment maintenance with communication door Series; Sistema remoto de aquisicao de dados e manutencao de equipamentos com portas de comunicacao Serie

    Energy Technology Data Exchange (ETDEWEB)

    Marques, Ailton; Cabrera, Fernando [TRANSIERRA S.A., Santa Cruz (Bolivia)

    2005-07-01

    The present work has for objective to present the Remote System of Data Acquisition and Equipment Maintenance with Communication door Series - GASYRG. The solution is based on a converter of protocol (Serial -Ethernet) and a panel that the function of commutator (switch) managed by control system assumes (SCADA). (author)

  9. Inhibitor of differentiation 4 (Id4) is a potential tumor suppressor in prostate cancer

    International Nuclear Information System (INIS)

    Carey, Jason PW; Asirvatham, Ananthi J; Galm, Oliver; Ghogomu, Tandeih A; Chaudhary, Jaideep

    2009-01-01

    Inhibitor of differentiation 4 (Id4), a member of the Id gene family is also a dominant negative regulator of basic helix loop helix (bHLH) transcription factors. Some of the functions of Id4 appear to be unique as compared to its other family members Id1, Id2 and Id3. Loss of Id4 gene expression in many cancers in association with promoter hypermethylation has led to the proposal that Id4 may act as a tumor suppressor. In this study we provide functional evidence that Id4 indeed acts as a tumor suppressor and is part of a cancer associated epigenetic re-programming. Data mining was used to demonstrate Id4 expression in prostate cancer. Methylation specific polymerase chain reaction (MSP) analysis was performed to understand molecular mechanisms associated with Id4 expression in prostate cancer cell lines. The effect of ectopic Id4 expression in DU145 cells was determined by cell cycle analysis (3H thymidine incorporation and FACS), expression of androgen receptor, p53 and cyclin dependent kinase inhibitors p27 and p21 by a combination of RT-PCR, real time-PCR, western blot and immuno-cytochemical analysis. Id4 expression was down-regulated in prostate cancer. Id4 expression was also down-regulated in prostate cancer line DU145 due to promoter hyper-methylation. Ectopic Id4 expression in DU145 prostate cancer cell line led to increased apoptosis and decreased cell proliferation due in part by an S-phase arrest. In addition to S-phase arrest, ectopic Id4 expression in PC3 cells also resulted in prolonged G2/M phase. At the molecular level these changes were associated with increased androgen receptor (AR), p21, p27 and p53 expression in DU145 cells. The results suggest that Id4 acts directly as a tumor suppressor by influencing a hierarchy of cellular processes at multiple levels that leads to a decreased cell proliferation and change in morphology that is possibly mediated through induction of previously silenced tumor suppressors

  10. Inhibitor of differentiation 4 (Id4 is a potential tumor suppressor in prostate cancer

    Directory of Open Access Journals (Sweden)

    Carey Jason PW

    2009-06-01

    Full Text Available Abstract Background Inhibitor of differentiation 4 (Id4, a member of the Id gene family is also a dominant negative regulator of basic helix loop helix (bHLH transcription factors. Some of the functions of Id4 appear to be unique as compared to its other family members Id1, Id2 and Id3. Loss of Id4 gene expression in many cancers in association with promoter hypermethylation has led to the proposal that Id4 may act as a tumor suppressor. In this study we provide functional evidence that Id4 indeed acts as a tumor suppressor and is part of a cancer associated epigenetic re-programming. Methods Data mining was used to demonstrate Id4 expression in prostate cancer. Methylation specific polymerase chain reaction (MSP analysis was performed to understand molecular mechanisms associated with Id4 expression in prostate cancer cell lines. The effect of ectopic Id4 expression in DU145 cells was determined by cell cycle analysis (3H thymidine incorporation and FACS, expression of androgen receptor, p53 and cyclin dependent kinase inhibitors p27 and p21 by a combination of RT-PCR, real time-PCR, western blot and immuno-cytochemical analysis. Results Id4 expression was down-regulated in prostate cancer. Id4 expression was also down-regulated in prostate cancer line DU145 due to promoter hyper-methylation. Ectopic Id4 expression in DU145 prostate cancer cell line led to increased apoptosis and decreased cell proliferation due in part by an S-phase arrest. In addition to S-phase arrest, ectopic Id4 expression in PC3 cells also resulted in prolonged G2/M phase. At the molecular level these changes were associated with increased androgen receptor (AR, p21, p27 and p53 expression in DU145 cells. Conclusion The results suggest that Id4 acts directly as a tumor suppressor by influencing a hierarchy of cellular processes at multiple levels that leads to a decreased cell proliferation and change in morphology that is possibly mediated through induction of previously

  11. Psychometrics and latent structure of the IDS and QIDS with young adult students.

    Science.gov (United States)

    González, David Andrés; Boals, Adriel; Jenkins, Sharon Rae; Schuler, Eric R; Taylor, Daniel

    2013-07-01

    Students and young adults have high rates of suicide and depression, thus are a population of interest. To date, there is no normative psychometric information on the IDS and QIDS in these populations. Furthermore, there is equivocal evidence on the factor structure and subscales of the IDS. Two samples of young adult students (ns=475 and 1681) were given multiple measures to test the psychometrics and dimensionality of the IDS and QIDS. The IDS, its subscales, and QIDS had acceptable internal consistencies (αs=.79-90) and favorable convergent and divergent validity correlations. A three-factor structure and two Rasch-derived subscales best fit the IDS. The samples were collected from one university, which may influence generalizability. The IDS and QIDS are desirable measures of depressive symptoms when studying young adult students. Copyright © 2013 Elsevier B.V. All rights reserved.

  12. Id2 reinforces TH1 differentiation and inhibits E2A to repress TFH differentiation.

    Science.gov (United States)

    Shaw, Laura A; Bélanger, Simon; Omilusik, Kyla D; Cho, Sunglim; Scott-Browne, James P; Nance, J Philip; Goulding, John; Lasorella, Anna; Lu, Li-Fan; Crotty, Shane; Goldrath, Ananda W

    2016-07-01

    The differentiation of helper T cells into effector subsets is critical to host protection. Transcription factors of the E-protein and Id families are important arbiters of T cell development, but their role in the differentiation of the TH1 and TFH subsets of helper T cells is not well understood. Here, TH1 cells showed more robust Id2 expression than that of TFH cells, and depletion of Id2 via RNA-mediated interference increased the frequency of TFH cells. Furthermore, TH1 differentiation was blocked by Id2 deficiency, which led to E-protein-dependent accumulation of effector cells with mixed characteristics during viral infection and severely impaired the generation of TH1 cells following infection with Toxoplasma gondii. The TFH cell-defining transcriptional repressor Bcl6 bound the Id2 locus, which provides a mechanism for the bimodal Id2 expression and reciprocal development of TH1 cells and TFH cells.

  13. ALFA Detector Control System

    CERN Document Server

    Oleiro Seabra, Luis Filipe; The ATLAS collaboration

    2015-01-01

    ALFA (Absolute Luminosity For ATLAS) is one of the sub-detectors of ATLAS (A Toroidal LHC Apparatus). The ALFA system is composed by four stations installed in the LHC tunnel 240 m away from the ATLAS interaction point. Each station has a vacuum and ventilation system, movement control and all the required electronics for signal processing. The Detector Control System (DCS) provides control and monitoring of several components and ensures the safe operation of the detector contributing to good Data Quality. This paper describes the ALFA DCS system including a detector overview, operation aspects and hardware control through a SCADA system, WinCC OA.

  14. ALFA Detector Control System

    CERN Document Server

    Oleiro Seabra, Luis Filipe; The ATLAS collaboration

    2015-01-01

    ALFA (Absolute Luminosity For ATLAS) is one of the sub-detectors of ATLAS/LHC. The ALFA system is composed by two stations installed in the LHC tunnel 240 m away from each side of the ATLAS interaction point. Each station has a vacuum and ventilation system, movement control and all the required electronic for signal processing. The Detector Control System (DCS) provides control and monitoring of several components and ensures the safe operation of the detector contributing to good Data Quality. This paper describes the ALFA DCS system including a detector overview, operation aspects and hardware control through a SCADA system, WinCC OA.

  15. Differential expression of ID4 and its association with TP53 mutation, SOX2, SOX4 and OCT-4 expression levels.

    Directory of Open Access Journals (Sweden)

    Thais Fernanda de Almeida Galatro

    Full Text Available Inhibitor of DNA Binding 4 (ID4 is a member of the helix-loop-helix ID family of transcription factors, mostly present in the central nervous system during embryonic development, that has been associated with TP53 mutation and activation of SOX2. Along with other transcription factors, ID4 has been implicated in the tumorigenic process of astrocytomas, contributing to cell dedifferentiation, proliferation and chemoresistance. In this study, we aimed to characterize the ID4 expression pattern in human diffusely infiltrative astrocytomas of World Health Organization (WHO grades II to IV of malignancy (AGII-AGIV; to correlate its expression level to that of SOX2, SOX4, OCT-4 and NANOG, along with TP53 mutational status; and to correlate the results with the clinical end-point of overall survival among glioblastoma patients. Quantitative real time PCR (qRT-PCR was performed in 130 samples of astrocytomas for relative expression, showing up-regulation of all transcription factors in tumor cases. Positive correlation was found when comparing ID4 relative expression of infiltrative astrocytomas with SOX2 (r = 0.50; p<0.005, SOX4 (r = 0.43; p<0.005 and OCT-4 (r = 0.39; p<0.05. The results from TP53 coding exon analysis allowed comparisons between wild-type and mutated status only in AGII cases, demonstrating significantly higher levels of ID4, SOX2 and SOX4 in mutated cases (p<0.05. This pattern was maintained in secondary GBM and further confirmed by immunohistochemistry, suggesting a role for ID4, SOX2 and SOX4 in early astrocytoma tumorigenesis. Combined hyperexpression of ID4, SOX4 and OCT-4 conferred a much lower (6 months median survival than did hypoexpression (18 months. Because both ID4 alone and a complex of SOX4 and OCT-4 activate SOX2 transcription, it is possible that multiple activation of SOX2 impair the prognosis of GBM patients. These observational results of associated expression of ID4 with SOX4 and OCT-4 may be used as a

  16. The Implementation of C-ID, R2D2 Model on Learning Reading Comprehension

    Science.gov (United States)

    Rayanto, Yudi Hari; Rusmawan, Putu Ngurah

    2016-01-01

    The purposes of this research are to find out, (1) whether C-ID, R2D2 model is effective to be implemented on learning Reading comprehension, (2) college students' activity during the implementation of C-ID, R2D2 model on learning Reading comprehension, and 3) college students' learning achievement during the implementation of C-ID, R2D2 model on…

  17. ID-pilet teeb Tallinnas võidukäiku / Anneli Lepp

    Index Scriptorium Estoniae

    Lepp, Anneli

    2006-01-01

    Vt. ka Postimees : na russkom jazõke 12. jaan. lk 3. Tallinna transpordiameti peaökonomisti Mart Moosuse sõnul moodustas ID-pilet 60,7% ühistranspordi piletituludest, Tartus oli vastav näitaja aga alla 1%. Tartut teenindava bussifirma AS Connex Eesti finantsjuht Tiina Telling peab suure erinevuse põhjuseks asjaolu, et Tallinnas on ID-pilet paberpiletist 40-88% soodsam, Tartus hinnavahe aga puudub või on lausa negatiivne ID-pileti kahjuks. Lisa: ID-pilet

  18. A brief review of revocable ID-based public key cryptosystem

    Directory of Open Access Journals (Sweden)

    Tsu-Yang Wu

    2016-03-01

    Full Text Available The design of ID-based cryptography has received much attention from researchers. However, how to revoke the misbehaviour/compromised user in ID-based public key cryptosystem becomes an important research issue. Recently, Tseng and Tsai proposed a novel public key cryptosystem called revocable ID-based public key cryptosystem (RIBE to solve the revocation problem. Later on, numerous research papers based on the Tseng-Tsai key RIBE were proposed. In this paper, we brief review Tseng and Tsai's RIBE. We hope this review can help the readers to understand the Tseng and Tsai's revocable ID-based public key cryptosystem.

  19. Achieving Payoffs from an Industry Cloud Ecosystem at BankID

    DEFF Research Database (Denmark)

    Eaton, Ben; Hallingby, Hanne Kristine; Nesse, Per-Jonny

    2014-01-01

    BankID is an industry cloud owned by Norwegian banks. It provides electronic identity, authentication and electronic signing capabilities for banking, merchant and government services. More than 60% of the population uses BankID services. As the broader ecosystem around BankID evolved, challenges......—arising from tensions between different parts of the ecosystem—had to be resolved. The four lessons learned from the BankID case will help others to build an industry cloud and establish a healthy ecosystem to service a broad user base....

  20. Id-1 is not expressed in the luminal epithelial cells of mammary glands

    International Nuclear Information System (INIS)

    Uehara, Norihisa; Chou, Yu-Chien; Galvez, Jose J; Candia, Paola de; Cardiff, Robert D; Benezra, Robert; Shyamala, Gopalan

    2003-01-01

    The family of inhibitor of differentiation/DNA binding (Id) proteins is known to regulate development in several tissues. One member of this gene family, Id-1, has been implicated in mammary development and carcinogenesis. Mammary glands contain various cell types, among which the luminal epithelial cells are primarily targeted for proliferation, differentiation and carcinogenesis. Therefore, to assess the precise significance of Id-1 in mammary biology and carcinogenesis, we examined its cellular localization in vivo using immunohistochemistry. Extracts of whole mammary glands from wild type and Id-1 null mutant mice, and tissue sections from paraffin-embedded mouse mammary glands from various developmental stages and normal human breast were subjected to immunoblot and immunohistochemical analyses, respectively. In both these procedures, an anti-Id-1 rabbit polyclonal antibody was used for detection of Id-1. In immunoblot analyses, using whole mammary gland extracts, Id-1 was detected. In immunohistochemical analyses, however, Id-1 was not detected in the luminal epithelial cells of mammary glands during any stage of development, but it was detected in vascular endothelial cells. Id-1 is not expressed in the luminal epithelial cells of mammary glands

  1. EPICS based control system for cryogenic plant at VECC

    International Nuclear Information System (INIS)

    Panda, Umashankar; Pal, Sandip; Mandal, Anupam; Dey, Ranadhir

    2012-01-01

    Cryogenic Plant of Variable Energy Cyclotron Centre consists of two Helium refrigerators (250W and 415W at the rate 4.5K), valve box with sub-cooler and associated sub systems like pure gas storage, helium purifier and impure gas recovery etc. The system also consists of 3.1K liters of liquid Nitrogen (LN 2 ) storage and delivery system. Many of the systems are procured from different suppliers and some are also developed in house. Due to the variety of systems and suppliers the control philosophy, communication protocols and component is also different. So the Supervisory control and data acquisition (SCADA) module has to be such that it can take care of the variance and bring everything into a common control platform. To solve this purpose EPICS (Experimental Physics and Industrial Control System) architecture has been adopted. EPICS is having the advantage of being open source, flexible and unlimited as compared to the commercial SCADA packages. (author)

  2. Vitek 2 ANC card versus BBL Crystal Anaerobe and RapID ANA II for identification of clinical anaerobic bacteria.

    Science.gov (United States)

    Blairon, Laurent; Maza, Mengi L; Wybo, Ingrid; Piérard, Denis; Dediste, Anne; Vandenberg, Olivier

    2010-08-01

    The Vitek 2 Anaerobe and Corynebacterium Identification Card (ANC) was recently evaluated in a multicentre study. In the present work, this system was compared with the BBL Crystal Anaerobe and RapID ANA II panels. These kits were tested using 196 strains of anaerobes that had been previously identified by gas-liquid chromatography. Identification to the species or to the genus level was 75.0%, 81.1% and 70.9% for Crystal, RapID and Vitek, respectively. Vitek ANC failed to provide any identification in 20.4% of the strains, but it had fewer misidentifications than RapID. The confidence factors provided on the results report of each kit were not always correlated with a lower risk of major errors, with the exception of Vitek 2 in which a confidence factor higher than 0.86 excluded the risk of misidentification in more than 87% of isolates. The lower rate of identification by the Vitek and Crystal panels is mostly due the lower ability of these systems to identify the Clostridia. Overall, the three panels are comparable but need improvement to a better accuracy. Copyright (c) 2010 Elsevier Ltd. All rights reserved.

  3. Inductive learning of thyroid functional states using the ID3 algorithm. The effect of poor examples on the learning result.

    Science.gov (United States)

    Forsström, J

    1992-01-01

    The ID3 algorithm for inductive learning was tested using preclassified material for patients suspected to have a thyroid illness. Classification followed a rule-based expert system for the diagnosis of thyroid function. Thus, the knowledge to be learned was limited to the rules existing in the knowledge base of that expert system. The learning capability of the ID3 algorithm was tested with an unselected learning material (with some inherent missing data) and with a selected learning material (no missing data). The selected learning material was a subgroup which formed a part of the unselected learning material. When the number of learning cases was increased, the accuracy of the program improved. When the learning material was large enough, an increase in the learning material did not improve the results further. A better learning result was achieved with the selected learning material not including missing data as compared to unselected learning material. With this material we demonstrate a weakness in the ID3 algorithm: it can not find available information from good example cases if we add poor examples to the data.

  4. Molecular characterization of lactobacilli isolated from fermented idli batter

    Directory of Open Access Journals (Sweden)

    Perumal Jayaprabha Agaliya

    2013-12-01

    Full Text Available Lactic acid bacteria are non pathogenic organism widely distributed in nature typically involved in a large number of spontaneous food fermentation. The purpose of this study was to characterize the bacteriocinogenic lactobacilli from fermented idli batter which can find application in biopreservation and biomedicine. Eight most promising lactobacilli were chosen from twenty two isolates based on their spectrum of activity against other lactic acid bacteria and pathogens. The eight lactobacilli were characterized based on the various classical phenotypic tests, physiological tests and biochemical tests including various carbohydrate utilization profiles. All isolates were homo fermentative, catalase, and gelatin negative. Molecular characterization was performed by RAPD, 16S rRNA analysis, 16S ARDRA, and Multiplex PCR for species identification. RAPD was carried out using the primer R2 and M13. Five different clusters were obtained based on RAPD indicating strain level variation. 16S rRNA analysis showed 99 to 100% homology towards Lactobacillus plantarum. The restriction digestion pattern was similar for all the isolates with the restriction enzyme AluI. The subspecies were identified by performing Multiplex PCR using species specific primer. Among the five clusters, three clusters were clearly identified as Lactobacillus plantarum subsp. plantarum, Lactobacillus pentosus, and Lactobacillus plantarum subsp. argentoratensis.

  5. Time-and-ID-Based Proxy Reencryption Scheme

    Directory of Open Access Journals (Sweden)

    Kambombo Mtonga

    2014-01-01

    Full Text Available Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE. We prove that our scheme is semantically secure in the standard model.

  6. Protocol for VOC-Arid ID remediation performance characterization

    International Nuclear Information System (INIS)

    Tegner, B.J.; Hassig, N.L.; Last, G.V.

    1994-09-01

    The Volatile Organic Compound-Arid Integrated Demonstration (VOC-Arid ID) is a technology development program sponsored by the US Department of Energy's Office of Technology Development that is targeted to acquire, develop, demonstrate, and deploy new technologies for the remediation of VOC contaminants in the soils and groundwaters of arid DOE sites. Technologies cannot be adequately evaluated unless sufficient site characterization and technology performance data have been collection and analyzed. The responsibility for identifying these data needs has been placed largely on the Principal Investigators (PIs) developing the remediation technology, who usually are not experts in site characterization or in identification of appropriate sampling, analysis, and monitoring techniques to support the field testing. This document provides a protocol for planning the collection of data before, during, and after a test of a new technology. This generic protocol provides the PIs and project managers with a set of steps to follow. The protocol is based on a data collection planning process called the Data Quality Objectives (DQO) process, which was originally developed by the US Environmental Protection Agency and has been expanded by DOE to support site cleanup decisions. The DQO process focuses on the quality and quantity of data required to make decision. Stakeholders to the decisions must negotiate such key inputs to the process as the decision rules that will be used and the acceptable probabilities of making decision errors

  7. Improvement of the ID model for quantitative network data

    DEFF Research Database (Denmark)

    Sørensen, Peter Borgen; Damgaard, Christian Frølund; Dupont, Yoko Luise

    2015-01-01

    Many interactions are often poorly registered or even unobserved in empirical quantitative networks. Hence, the output of the statistical analyses may fail to differentiate between patterns that are statistical artefacts and those which are real characteristics of ecological networks. Such artefa......Many interactions are often poorly registered or even unobserved in empirical quantitative networks. Hence, the output of the statistical analyses may fail to differentiate between patterns that are statistical artefacts and those which are real characteristics of ecological networks......)1. This presentation will illustrate the application of the ID method based on a data set which consists of counts of visits by 152 pollinator species to 16 plant species. The method is based on two definitions of the underlying probabilities for each combination of pollinator and plant species: (1), pi...... reproduce the high number of zero valued cells in the data set and mimic the sampling distribution. 1 Sørensen et al, Journal of Pollination Ecology, 6(18), 2011, pp129-139...

  8. Comparative evaluation of the drug interaction screening programs MediQ and ID PHARMA CHECK in neurological inpatients.

    Science.gov (United States)

    Zorina, Olesya I; Haueis, Patrick; Semmler, Alexander; Marti, Isabelle; Gonzenbach, Roman R; Guzek, Markus; Kullak-Ublick, Gerd A; Weller, Michael; Russmann, Stefan

    2012-08-01

    The comparative evaluation of clinical decision support software (CDSS) programs regarding their sensitivity and positive predictive value for the identification of clinically relevant drug interactions. In this research, we used a cross-sectional study that identified potential drug interactions using the CDSS MediQ and the ID PHARMA CHECK in 484 neurological inpatients. Interactions were reclassified according to the Zurich Interaction System, a multidimensional classification that incorporates the Operational Classification of Drug Interactions. In 484 patients with 2812 prescriptions, MediQ and ID PHARMA CHECK generated a total of 1759 and 1082 alerts, respectively. MediQ identified 658 unique potentially interacting combinations, 8 classified as "high danger," 164 as "average danger," and 486 as "low danger." ID PHARMA CHECK detected 336 combinations assigned to one or several of 12 risk and management categories. Altogether, both CDSS issued alerts relating to 808 unique potentially interacting combinations. According to the Zurich Interaction System, 6 of these were contraindicated, 25 were provisionally contraindicated, 190 carried a conditional risk, and 587 had a minimal risk of adverse events. The positive predictive value for alerts having at least a conditional risk was 0.24 for MediQ and 0.48 for ID PHARMA CHECK. CDSS showed major differences in the identification and grading of interactions, and many interactions were only identified by one of the two CDSS. For both programs, only a small proportion of all identified interactions appeared clinically relevant, and the selected display of alerts that imply management changes is a key issue in the further development and local setup of such programs. Copyright © 2012 John Wiley & Sons, Ltd.

  9. Final PHP bench-scale report for the DOE-ID/SAIC sole source contract

    International Nuclear Information System (INIS)

    1997-04-01

    The Plasma Hearth Process (PHP) Technology Development Project was established to develop, test, and evaluate a new concept for treating mixed waste. The new concept uses direct current (dc) transferred-arc plasma torch technology to process mixed waste into a glass-like end-product. Under the cognizance of the US Department of Energy (DOE) Office of Technology Development (OTD) Mixed Waste Focus Area (MWFA), the technology is being explored for its potential to treat mixed waste. Because it is a mature technology, well-understood and commercially available, it is expected to develop rapidly in this new application. This report summarizes the radioactive bench-scale system activities funded under PHP Sole Source Contract DE-AC07-94ID13266 through the end of the contract

  10. Evaluation of the Precision ID Ancestry Panel for crime case work

    DEFF Research Database (Denmark)

    Pereira, Vania; Mogensen, Helle S; Børsting, Claus

    2017-01-01

    The application of massive parallel sequencing (MPS) methodologies in forensic genetics is promising and it is gradually being implemented in forensic genetic case work. One of the major advantages of these technologies is that several traditional electrophoresis assays can be combined into one...... single MPS assay. This reduces both the amount of sample used and the time of the investigations. This study assessed the utility of the Precision ID Ancestry Panel (Thermo Fisher Scientific, Waltham, USA) in forensic genetics. This assay was developed for the Ion Torrent PGM™ System and genotypes 165...... ancestry informative SNPs. The performance of the assay and the accompanying software solution for ancestry inference was assessed by typing 142 Danes and 98 Somalis. Locus balance, heterozygote balance, and noise levels were calculated and future analysis criteria for crime case work were estimated...

  11. Cytological Evaluation and REBA HPV-ID HPV Testing of Newly Developed Liquid-Based Cytology, EASYPREP: Comparison with SurePath.

    Science.gov (United States)

    Lee, Youn Soo; Gong, Gyungyub; Sohn, Jin Hee; Ryu, Ki Sung; Lee, Jung Hun; Khang, Shin Kwang; Cho, Kyung-Ja; Kim, Yong-Man; Kang, Chang Suk

    2013-06-01

    The objective of this study was to evaluate a newly-developed EASYPREP liquid-based cytology method in cervicovaginal specimens and compare it with SurePath. Cervicovaginal specimens were prospectively collected from 1,000 patients with EASYPREP and SurePath. The specimens were first collected by brushing for SurePath and second for EASYPREP. The specimens of both methods were diagnosed according to the Bethesda System. Additionally, we performed to REBA HPV-ID genotyping and sequencing analysis for human papillomavirus (HPV) on 249 specimens. EASYPREP and SurePath showed even distribution of cells and were equal in cellularity and staining quality. The diagnostic agreement between the two methods was 96.5%. Based on the standard of SurePath, the sensitivity, specificity, positive predictive value, and negative predictive value of EASYPREP were 90.7%, 99.2%, 94.8%, and 98.5%, respectively. The positivity of REBA HPV-ID was 49.4% and 95.1% in normal and abnormal cytological samples, respectively. The result of REBA HPV-ID had high concordance with sequencing analysis. EASYPREP provided comparable results to SurePath in the diagnosis and staining quality of cytology examinations and in HPV testing with REBA HPV-ID. EASYPREP could be another LBC method choice for the cervicovaginal specimens. Additionally, REBA HPV-ID may be a useful method for HPV genotyping.

  12. The Development of Gamma Irradiator Control System

    International Nuclear Information System (INIS)

    Mohd Zaid Hassan; Anwar Abdul Rahman; Azraf Azman; Mohd Rizal Mamat

    2015-01-01

    This paper presents the preliminary software development for the Gamma irradiator control system using commercial supervisory control and data acquisition (SCADA) software. The radiation dose analysis is the study of the relationship between the initial loading source activity (Curie) and concurrent activity in order to perform the irradiation process. The concurrent source activity calculation model is presented. The Human machine interface (HMI) has been developed by using Indusoft Web Studio to solve the mathematical calculation, task and process overview. (author)

  13. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Verho, P.; Jaerventausta, P.; Kaerenlampi, M.; Paulasaari, H. [Tampere Univ. of Technology (Finland); Partanen, J. [Lappeenranta Univ. of Technology (Finland)

    1996-12-31

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion of the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the vendors of the other systems. In the research project this alternative is preferred and used in developing an independent distribution management system

  14. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Verho, P; Jaerventausta, P; Kaerenlampi, M; Paulasaari, H [Tampere Univ. of Technology (Finland); Partanen, J [Lappeenranta Univ. of Technology (Finland)

    1997-12-31

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion of the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the vendors of the other systems. In the research project this alternative is preferred and used in developing an independent distribution management system

  15. Security and Privacy Improvements for the Belgian eID Technology

    Science.gov (United States)

    Verhaeghe, Pieter; Lapon, Jorn; de Decker, Bart; Naessens, Vincent; Verslype, Kristof

    The Belgian Electronic Identity Card enables Belgian citizens to prove their identity digitally and to sign electronic documents. At the end of 2009, every Belgian citizen older than 12 years will have such an eID card. In the future, usage of the eID card may be mandatory. However, irresponsible use of the card may cause harm to individuals.

  16. Causes of Mortality in Older People with Intellectual Disability: Results from the HA-ID Study

    Science.gov (United States)

    Oppewal, Alyt; Schoufour, Josje D.; van der Maarl, Hanne J. K.; Evenhuis, Heleen M.; Hilgenkamp, Thessa I. M.; Festen, Dederieke A.

    2018-01-01

    We aim to provide insight into the cause-specific mortality of older adults with intellectual disability (ID), with and without Down syndrome (DS), and compare this to the general population. Immediate and primary cause of death were collected through medical files of 1,050 older adults with ID, 5 years after the start of the Healthy Ageing and…

  17. Extending the Intermediate Data Structure (IDS for longitudinal historical databases to include geographic data

    Directory of Open Access Journals (Sweden)

    Finn Hedefalk

    2014-09-01

    Full Text Available The Intermediate Data Structure (IDS is a standardised database structure for longitudinal historical databases. Such a common structure facilitates data sharing and comparative research. In this study, we propose an extended version of IDS, named IDS-Geo, that also includes geographic data. The geographic data that will be stored in IDS-Geo are primarily buildings and/or property units, and the purpose of these geographic data is mainly to link individuals to places in space. When we want to assign such detailed spatial locations to individuals (in times before there were any detailed house addresses available, we often have to create tailored geographic datasets. In those cases, there are benefits of storing geographic data in the same structure as the demographic data. Moreover, we propose the export of data from IDS-Geo using an eXtensible Markup Language (XML Schema. IDS-Geo is implemented in a case study using historical property units, for the period 1804 to 1913, stored in a geographically extended version of the Scanian Economic Demographic Database (SEDD. To fit into the IDS-Geo data structure, we included an object lifeline representation of all of the property units (based on the snapshot time representation of single historical maps and poll-tax registers. The case study verifies that the IDS-Geo model is capable of handling geographic data that can be linked to demographic data.

  18. Cloning and shake flask expression of hrIDS- Like in Pichia pastoris ...

    African Journals Online (AJOL)

    The human Iduronate-2-sulfate sulfatase (hIDS-Like) was cloned into the methylotrophic yeast Pichia pastoris under the control of alcohol oxidase promoter (AOX1) and the -mating factor signal peptide (a-factor). Six clones were identified by PCR. Using clone IDS28, the enzyme was secreted into the culture medium, ...

  19. The Mathematica package TopoID and its application to the Higgs boson production cross section

    Energy Technology Data Exchange (ETDEWEB)

    Hoff, Jens

    2016-07-15

    We present the Mathematica package TopoID which aims at the automation of several steps in multiloop calculations. The algorithm which lies at the very core of the package is described and illustrated with an example. The main features of TopoID are stated and some of them are briefly demonstrated for NLO or NNLO Higgs boson production.

  20. Rethinking Social Network Assessment for Students with Intellectual Disabilities (ID) in Postsecondary Education

    Science.gov (United States)

    Eisenman, Laura T.; Farley-Ripple, Elizabeth; Culnane, Mary; Freedman, Brian

    2013-01-01

    Social networks of persons with intellectual disabilities (ID) have been characterized as smaller and less diverse than those of typical peers. Advocates have focused on strengthening those social networks by expanding circles of social support, protection, and friendship. As young adults with ID experience increasing levels of community…

  1. Supporting co-creation with software, the idSpace platform

    NARCIS (Netherlands)

    Van Rosmalen, Peter; Boon, Jo; Bitter-Rijpkema, Marlies; Sie, Rory; Sloep, Peter

    2014-01-01

    Innovation, in general, requires teamwork among specialist of different disciplines. The idSpace project developed ideas on how teams of collaborating innovators could best be supported. These ideas were embodied in a platform that the project developed. This idSpace platform allows its users to

  2. 76 FR 46721 - Salmon-Challis National Forest, ID; Upper North Fork HFRA Ecosystem Restoration Project...

    Science.gov (United States)

    2011-08-03

    ...-Challis National Forest, ID; Upper North Fork HFRA Ecosystem Restoration Project Environmental Impact... improve the health of the ecosystem and reach the desired future condition. DATES: Comments concerning the... Ecosystem Restoration Project EIS, P.O. Box 180, 11 Casey Rd., North Fork, ID 83466. Comments may also be...

  3. 78 FR 45478 - Proposed Establishment of Class E Airspace; Salmon, ID

    Science.gov (United States)

    2013-07-29

    ...-0531; Airspace Docket No. 13-ANM-20] Proposed Establishment of Class E Airspace; Salmon, ID AGENCY... action proposes to establish Class E airspace at the Salmon VHF Omni-Directional Radio Range/Distance Measuring Equipment (VOR/DME) navigation aid, Salmon, ID, to facilitate vectoring of Instrument Flight Rules...

  4. Clarté des idées innées ?

    DEFF Research Database (Denmark)

    Schøsler, Jørn

    2013-01-01

    Der gives en analyse af begreberne 'evidens' og 'medfødte idéer' hos Descartes og Locke samt hos de franske oplysningsfilosoffer.......Der gives en analyse af begreberne 'evidens' og 'medfødte idéer' hos Descartes og Locke samt hos de franske oplysningsfilosoffer....

  5. Ubiquitin-SUMO Circuitry Controls Activated Fanconi Anemia ID Complex Dosage in Response to DNA Damage

    DEFF Research Database (Denmark)

    Gibbs-Seymour, Ian; Oka, Yasuyoshi; Rajendra, Eeson

    2015-01-01

    We show that central components of the Fanconi anemia (FA) DNA repair pathway, the tumor suppressor proteins FANCI and FANCD2 (the ID complex), are SUMOylated in response to replication fork stalling. The ID complex is SUMOylated in a manner that depends on the ATR kinase, the FA ubiquitin ligase...

  6. Muon Identification performance: hadron mis-Id measurements and RPC Muon selections

    CERN Document Server

    CMS Collaboration

    2014-01-01

    Pion, kaon, proton mis-identification probabilities as muons have been measured for different Muon ID algorithms. Results from two independent analyses are presented. The performance of a new muon ID algorithm based on matching of inner tracks with hits in muon RPC chambers is also presented.

  7. Bmps and id2a act upstream of Twist1 to restrict ectomesenchyme potential of the cranial neural crest.

    Directory of Open Access Journals (Sweden)

    Ankita Das

    Full Text Available Cranial neural crest cells (CNCCs have the remarkable capacity to generate both the non-ectomesenchyme derivatives of the peripheral nervous system and the ectomesenchyme precursors of the vertebrate head skeleton, yet how these divergent lineages are specified is not well understood. Whereas studies in mouse have indicated that the Twist1 transcription factor is important for ectomesenchyme development, its role and regulation during CNCC lineage decisions have remained unclear. Here we show that two Twist1 genes play an essential role in promoting ectomesenchyme at the expense of non-ectomesenchyme gene expression in zebrafish. Twist1 does so by promoting Fgf signaling, as well as potentially directly activating fli1a expression through a conserved ectomesenchyme-specific enhancer. We also show that Id2a restricts Twist1 activity to the ectomesenchyme lineage, with Bmp activity preferentially inducing id2a expression in non-ectomesenchyme precursors. We therefore propose that the ventral migration of CNCCs away from a source of Bmps in the dorsal ectoderm promotes ectomesenchyme development by relieving Id2a-dependent repression of Twist1 function. Together our model shows how the integration of Bmp inhibition at its origin and Fgf activation along its migratory route would confer temporal and spatial specificity to the generation of ectomesenchyme from the neural crest.

  8. Overestimation of the 25(OH)D serum concentration with the automated IDS EIA kit.

    Science.gov (United States)

    Cavalier, Etienne; Huberty, Véronique; Cormier, Catherine; Souberbielle, Jean-Claude

    2011-02-01

    We have recently observed an increasing number of patients presenting very high serum levels of 25-hydroxyvitamin D [25(OH)D] (> 150 ng/mL), which, in all cases, had been measured with the IDS EIA kit adapted on different "open" automated platforms. We performed a comparison between the IDS EIA kit adapted on two different "open"automated platforms and the DiaSorin RIA. We found a systematic bias (higher levels with the IDS EIA kit) for concentrations more than 50-60 ng/mL that was less obvious when the IDS EIA was used in its manual procedure. We thus suggest to use the IDS EIA kit in its manual procedure rather than to adapt it on an automated platform, and to interpret cautiously a 25(OH)D greater than 100 ng/mL with this kit. Copyright © 2011 American Society for Bone and Mineral Research.

  9. PERSONAL BRANDING PRABOWO SUBIANTO (ANALISIS ISI KUANTITATIF PERSONAL BRANDING PRABOWO SUBIANTO DI SITUS BERITA ONLINE REPUBLIKA.CO.ID DAN TEMPO.CO.ID TANGGAL 9 JUNI - 9 JULI 2014

    Directory of Open Access Journals (Sweden)

    Hendro Agus Prakoso

    2016-09-01

    berita kedua media tersebut. Frekuensi berita berjumlah 107 di Republika.co.id dan 51 berita di Tempo.co.id Ragam berita Republika.co.id didominasi konsep Spesialisasi sebesar 22,4% dari 107 berita, sedangkan pada Tempo.co.id didominasi konsep Nama baik sebesar 23,5% dari 51 berita. Sumber berita pada Republika.co.id mayoritas berasal dari Liputan langsung sebesar 42,9% dari 107 berita sedangkan pada Tempo.co.id mayoritas berasal dari Intelektual sebesar 54,9% dari 51 berita.

  10. DeID – A Data Sharing Tool for Neuroimaging Studies

    Directory of Open Access Journals (Sweden)

    Xuebo eSong

    2015-09-01

    Full Text Available Funding institutions and researchers increasingly expect that data will be shared to increase scientific integrity and provide other scientists with the opportunity to use the data with novel methods that may advance understanding in a particular field of study. In practice, sharing human subject data can be complicated because data must be de-identified prior to sharing. Moreover, integrating varied data types collected in a study can be challenging and time consuming. For example, sharing data from structural imaging studies of a complex disorder requires the integration of imaging, demographic and/or behavioral data in a way that no subject identifiers are included in the de-identified dataset and with new subject labels or identification values that cannot be tracked back to the original ones. We have developed a Java program that users can use to remove identifying information in neuroimaging datasets, while still maintaining the association among different data types from the same subject for further studies. This software provides a series of user interaction wizards to allow users to select data variables to be de-identified, implements functions for auditing and validation of de-identified data, and enables the user to share the de-identified data in a single compressed package through various communication protocols, such as FTPS and SFTP. DeID runs with Windows, Linux, and Mac operating systems and its open architecture allows it to be easily adapted to support a broader array of data types, with the goal of facilitating data sharing. DeID can be obtained at http://www.nitrc.org/projects/deid.

  11. Supervisory control and data acquisition system development for superconducting current feeder system of SST-1

    International Nuclear Information System (INIS)

    Patel, R.; Mahesuria, G.; Gupta, N.C.; Sonara, D.; Panchal, R.; Panchal, P.; Tanna, V.L.; Pradhan, S.

    2014-01-01

    The Current Feeders System (CFS) is essentially an optimized bridge between the power supply at room temperature and Super Conducting Magnet System (SCMS) of the SST-1 machine at 4.5 K.CFS is a complex electrical and cryogenic network which consists of ten pairs of 10 KA rating helium Vapor cooled Conventional Current Leads (VCCLs), superconducting (SC) current feeder and associated components. For the safe and reliable operation of CFS, it is equipped with different physical process parameters measuring instruments like flow, pressure, temperature, level, vacuum, voltage taps and final control element like control valves, heaters, vacuum pumps etc. PLC program is developed in ladder language for acquiring and controlling the process parameters. Independent SCADA applications developed in WonderwareIntouch software for data communication from PLC, front-end Graphical User Interface (GUI), auto-manual interface, real time trends, history trends, events and alarm pages. Time synchronized communication established between CFS control system and Industrial SQL server (InSQL) Historian for centralized storage of CFS process parameters which intern provides the CFS process data to SST-1 central control room. SCADA based data acquisition and data retrieval system is found to be satisfactory during the recent SST-1 cool down experiment. This paper describes the SCADA and PLC application development and their communication to InSQL server. (author)

  12. Promoter methylation-associated loss of ID4 expression is a marker of tumour recurrence in human breast cancer

    International Nuclear Information System (INIS)

    Noetzel, Erik; Veeck, Jürgen; Niederacher, Dieter; Galm, Oliver; Horn, Felicitas; Hartmann, Arndt; Knüchel, Ruth; Dahl, Edgar

    2008-01-01

    Inhibitor of DNA binding/Inhibitor of differentiation 4 (ID4) is a critical factor for cell proliferation and differentiation in normal vertebrate development. ID4 has regulative functions for differentiation and growth of the developing brain. The role of ID1, ID2 and ID3 are expected to be oncogenic due to their overexpression in pancreatic cancer and colorectal adenocarcinomas, respectively. Aside from these findings, loss of ID3 expression was demonstrated in ovarian cancer. The aim of the present study was to reveal the factual role of ID4 in carcinogenesis in more detail, since its role for the pathogenesis of human breast cancer has been discussed controversially, assigning both oncogenic and tumour suppressive functions. ID4 promoter methylation, ID4 mRNA expression and ID4 protein expression were analysed in primary human breast cancer specimens using methylation-specific PCR (MSP) (n=170), semiquantitative realtime RT-PCR (n=46) and immunhistochemistry (n=3), respectively. In order to demonstrate a functional association of ID4 promoter methylation with its gene silencing, we performed DNA demethylation analysis with four human breast cell lines using MSP and semiquantitative realtime RT-PCR. In addition, we performed correlations of ID4 promoter methylation with ID4 mRNA and ID4 protein expression in matched samples of breast tumour and corresponding normal tissue. We carried out statistical analyses in order to find correlations between ID4 promoter methylation and clinicopathological parameters. Frequent ID4 promoter methylation was observed in primary breast cancer samples (69%, 117/170). We found a tight correlation (P<0.0001) between ID4 promoter methylation and loss of ID4 expression in primary breast cancer 3 specimens. Demethylating treatment with breast cancer cell lines was associated with clear ID4 mRNA re-expression. Tumours with ID4 promoter methylation showed distinct loss of ID4 expression on both transcription and protein level

  13. Smart Building Management Systems and Internet of Things

    Directory of Open Access Journals (Sweden)

    Jean Yves Astier

    2017-07-01

    Full Text Available After a brief historical reminder on SCADA systems, we will present the new challenges regarding modern building technical management (BTM systems. We identify the technological evolutions, which allow us to address these new issues, and describe the software and hardware architectures of our Building Management Internet of Things (BMIoT solution. We end by comparing with other older solutions and by a short description of the new business models, our solution allows.

  14. ID stat: innovative technology for assessing wildlife collisions with wind turbines

    Energy Technology Data Exchange (ETDEWEB)

    Delprat, Bertrand; Alcuri, Gustavo

    2011-07-01

    Full text: Assessing wildlife mortality resulting from collision with wind turbines is a recurring concern for conservationists and governmental agencies around the world. Monitoring wildlife fatality is often based on carcass searches below the turbines. However, the efficiency of this technique is known to have many biases, or even be unfeasible in some areas (e.g. offshore wind farms and heavily vegetated environments). To solve this problem, we have developed a system that uses specifically-designed microphones placed within turbine blades to record individual collisions of birds or bats with the blades. The accompanying data loggers contain software that uses acoustical signatures to filter noises produced by the shock on the blade by birds and bats (down to 2.5 grams), from those produced by other objects (rain drops, insects, mechanical noises, etc.). Every time a collision occurs, the system automatically sends the information (sensor ID and turbine, time, etc.) to a remotely located server. Collision can be signalled instantaneously on a cell phone so a ground search can be done soon after the collision under the turbine where the event occurred. After field validation, the system will ultimately allow for quantification of mortality in areas that were previously inaccessible (e.g. offshore wind farms) and the standardization of mortality data collection across wide geographic areas. The remote monitoring capabilities of the system will also allow for low-cost, accurate, long-term mortality monitoring. (Author)

  15. Bio-fortification and shelf-life extension of idli batter using curry leaves (Murraya koenigii).

    Science.gov (United States)

    Chelliah, R; Ramakrishnan, S R; Premkumar, D; Antony, U

    2016-06-01

    Among several traditional foods of India, idli is one of the most popular and commonly consumed steamed products. A new method of adding Murraya koenigii (curry leaves) to idli batter as a vehicle for fortification and extension of shelf-life has been developed. Dried curry leaves powder was incorporated with other ingredients like rice and dehusked black gram in different proportions to optimize the most palatable formulation. Rate of fermentation and microbial changes in the batter; nutritional qualities, texture and sensory properties of the prepared product were assessed. Incorporation of curry leaves powder (5 %) in idli batter increased the shelf-life and also increased the flavour, texture and appearance of the idli. The calcium content of the prepared idli was 10 times more than that of the control idli, while dietary fiber content increased by 18.6 %. Anti-microbial activity of the curry leaves in idli batter extended the shelf-life from 2 to 5 days when stored at 30 °C.

  16. Application of Synchrophasor Measurements for Improving Situational Awareness of the Power System

    Science.gov (United States)

    Obushevs, A.; Mutule, A.

    2018-04-01

    The paper focuses on the application of synchrophasor measurements that present unprecedented benefits compared to SCADA systems in order to facilitate the successful transformation of the Nordic-Baltic-and-European electric power system to operate with large amounts of renewable energy sources and improve situational awareness of the power system. The article describes new functionalities of visualisation tools to estimate a grid inertia level in real time with monitoring results between Nordic and Baltic power systems.

  17. Role of ID Proteins in BMP4 Inhibition of Profibrotic Effects of TGF-β2 in Human TM Cells.

    Science.gov (United States)

    Mody, Avani A; Wordinger, Robert J; Clark, Abbot F

    2017-02-01

    Increased expression of TGF-β2 in primary open-angle glaucoma (POAG) aqueous humor (AH) and trabecular meshwork (TM) causes deposition of extracellular matrix (ECM) in the TM and elevated IOP. Bone morphogenetic proteins (BMPs) regulate TGF-β2-induced ECM production. The underlying mechanism for BMP4 inhibition of TGF-β2-induced fibrosis remains undetermined. Bone morphogenic protein 4 induces inhibitor of DNA binding proteins (ID1, ID3), which suppress transcription factor activities to regulate gene expression. Our study will determine whether ID1and ID3 proteins are downstream targets of BMP4, which attenuates TGF-β2 induction of ECM proteins in TM cells. Primary human TM cells were treated with BMP4, and ID1 and ID3 mRNA, and protein expression was determined by quantitative PCR (Q-PCR) and Western immunoblotting. Intracellular ID1 and ID3 protein localization was studied by immunocytochemistry. Transformed human TM cells (GTM3 cells) were transfected with ID1 or ID3 expression vectors to determine their potential inhibitory effects on TGF-β2-induced fibronectin and plasminogen activator inhibitor-I (PAI-1) protein expression. Basal expression of ID1-3 was detected in primary human TM cells. Bone morphogenic protein 4 significantly induced early expression of ID1 and ID3 mRNA (P protein in primary TM cells, and a BMP receptor inhibitor blocked this induction. Overexpression of ID1 and ID3 significantly inhibited TGF-β2-induced expression of fibronectin and PAI-1 in TM cells (P protein 4 induced ID1 and ID3 expression suppresses TGF-β2 profibrotic activity in human TM cells. In the future, targeting specific regulators may control the TGF-β2 profibrotic effects on the TM, leading to disease modifying IOP lowering therapies.

  18. The Self-Identity Protein IdsD Is Communicated between Cells in Swarming Proteus mirabilis Colonies.

    Science.gov (United States)

    Saak, Christina C; Gibbs, Karine A

    2016-12-15

    Proteus mirabilis is a social bacterium that is capable of self (kin) versus nonself recognition. Swarming colonies of this bacterium expand outward on surfaces to centimeter-scale distances due to the collective motility of individual cells. Colonies of genetically distinct populations remain separate, while those of identical populations merge. Ids proteins are essential for this recognition behavior. Two of these proteins, IdsD and IdsE, encode identity information for each strain. These two proteins bind in vitro in an allele-restrictive manner. IdsD-IdsE binding is correlated with the merging of populations, whereas a lack of binding is correlated with the separation of populations. Key questions remained about the in vivo interactions of IdsD and IdsE, specifically, whether IdsD and IdsE bind within single cells or whether IdsD-IdsE interactions occur across neighboring cells and, if so, which of the two proteins is exchanged. Here we demonstrate that IdsD must originate from another cell to communicate identity and that this nonresident IdsD interacts with IdsE resident in the recipient cell. Furthermore, we show that unbound IdsD in recipient cells does not cause cell death and instead appears to contribute to a restriction in the expansion radius of the swarming colony. We conclude that P. mirabilis communicates IdsD between neighboring cells for nonlethal kin recognition, which suggests that the Ids proteins constitute a type of cell-cell communication. We demonstrate that self (kin) versus nonself recognition in P. mirabilis entails the cell-cell communication of an identity-encoding protein that is exported from one cell and received by another. We further show that this intercellular exchange affects swarm colony expansion in a nonlethal manner, which adds social communication to the list of potential swarm-related regulatory factors. Copyright © 2016, American Society for Microbiology. All Rights Reserved.

  19. Overexpression of inhibitor of DNA-binding (ID)-1 protein related to angiogenesis in tumor advancement of ovarian cancers

    International Nuclear Information System (INIS)

    Maw, Min Khine; Fujimoto, Jiro; Tamaya, Teruhiko

    2009-01-01

    The inhibitor of DNA-binding (ID) has been involved in cell cycle regulation, apoptosis and angiogenesis. This prompted us to study ID functions in tumor advancement of ovarian cancers. Sixty patients underwent surgery for ovarian cancers. In ovarian cancers, the levels of ID-1, ID-2 and ID-3 mRNAs were determined by real-time reverse transcription-polymerase chain reaction. The histoscore with the localization of ID-1 was determined by immunohistochemistry. Patient prognosis was analyzed with a 36-month survival rate. Microvessel counts were determined by immunohistochemistry for CD34 and factor VIII-related antigen. ID-1 histoscores and mRNA levels both significantly (p < 0.001) increased in ovarian cancers according to clinical stage, regardless of histopathological type. Furthermore, 30 patients with high ID-1 expression had a lower survival rate (53%) compared to patients with low ID-1 expression (80%). ID-1 histoscores and mRNA levels significantly (p < 0.0001) correlated with microvessel counts in ovarian cancers. ID-1 increased in ovarian cancer cells during tumor progression. Moreover, ID-1 expression levels correlated with microvessel counts. Therefore, ID-1 might work on tumor advancement via angiogenesis and is considered to be a candidate for a prognostic indicator in ovarian cancers

  20. Increased Inhibitor of Differentiation 4 (Id4 Expression in Glioblastoma: A Tissue Microarray Study

    Directory of Open Access Journals (Sweden)

    Weifin Zeng, Elisabeth J. Rushing, Daniel P. Hartmann, Norio Azumi

    2010-01-01

    Full Text Available Background: The inhibitor of differentiation/DNA binding protein family (Id1-4 is involved in cell cycle control, tumorigenesis and angiogenesis through the negative regulation of helix-loop-helix transcription factors. Of these proteins, Id4 is known to play an important role in neural stem cell differentiation, and deregulation has been implicated in glial neoplasia. However, the expression and significance of Id4 in astrocytomas has not been fully addressed. Herein we report the differential expression of Id4 in astrocytomas of various grades using tissue microarrays (TMA and immunohistochemistry (IHC. Design: The GBM TMA was constructed from 53 archival cases at Georgetown University Hospital and a TMA with normal brain controls and grades II-III astrocytoma was obtained from Cybrdi (Rockville, MD. TMA sections were stained with Id4 antibody and the slides were scored according to the percentage of staining astrocytic nuclei (<9% -, 10-50% +, >51% ++. The Fisher Exact test was used to test for statistical significance. Results: Nuclear staining for Id4 was seen in 73.58% GBMs, 25% grade III, and 12.5% grade II astrocytomas; staining was absent in normal brain tissue. There was a statistically significant difference between GBM and grades II, III astrocytoma (p <0.01. Significant Id4 expression was not detected in normal brain. Conclusions: Our study confirms the frequent upregulation of Id4 expression in GBM, which lends support to its role in tumorigenesis, possibly in the transformation of low to high-grade astrocytoma (i.e. GBM. Further studies are warranted to determine the precise role of Id4 in glial neoplasia and its potential use in targeted therapy for GBM.

  1. TLR4 and TLR7/8 Adjuvant Combinations Generate Different Vaccine Antigen-Specific Immune Outcomes in Minipigs when Administered via the ID or IN Routes.

    Directory of Open Access Journals (Sweden)

    Paul F McKay

    Full Text Available The induction of high levels of systemic and mucosal humoral immunity is a key goal for many prophylactic vaccines. However, adjuvant strategies developed in mice have often performed poorly in the clinic. Due to their closer similarity to humans, minipigs may provide a more accurate picture of adjuvant performance. Based on their complementary signalling pathways, we assessed humoral immune responses to model antigens after co-administration with the toll-like receptor 4 (TLR4 stimulator glucopyranosyl lipid adjuvant (GLA-AF or the TLR7/8 agonist resiquimod (R848 (alone and in combination via the intradermal (ID, intranasal (IN or combined routes in the Gottingen minipig animal model. Surprisingly, we discovered that while GLA-AF additively enhanced the adjuvant effect of R848 when injected ID, it abrogated the adjuvant activity of R848 after IN inoculation. We then performed a route comparison study using a CN54 gp140 HIV Envelope model antigen adjuvanted with R848 + GLA-AF (ID or R848 alone (IN. Animals receiving priming inoculations via one route were then boosted by the alternate route. Although differences were observed in the priming phase (IN or ID, responses converged upon boosting by the alternative route with no observable impact resultant from the order of administration (ID/IN vs IN/ID. Specific IgG responses were measured at a distal mucosal site (vaginal, although there was no evidence of mucosal linkage as these closely reflected serum antibody levels. These data indicate that the complex in vivo cross-talk between innate pathways are likely tissue specific and cannot be predicted by simple in vitro models.

  2. The paradox of IDs: an account of an ethnographic experience in the US

    Directory of Open Access Journals (Sweden)

    Mariza Peirano

    2008-01-01

    Full Text Available In the modern world, IDs are indispensable objects, without which we cannot prove that we are who we say we are. We need material substantiation that attests to the authenticity of our self-identification. This paper is an account of an ethnographic experience about IDs and identification processes in the US, based on the examination of two events in which Eliot Spitzer, the New York State governor from January 2007 to March 2008, was a central figure. A comparison with the Brazilian scenario is present throughout the paper, and it ends by focusing on the ID theft phenomenon.

  3. Bake-Out Mobile Controls for Large Vacuum Systems

    CERN Document Server

    Blanchard, S; Gomes, P; Pereira, H; Kopylov, L; Merker, S; Mikheev, M

    2014-01-01

    Large vacuum systems at CERN (Large Hadron Collider - LHC, Low Energy Ion Rings - LEIR...) require bake-out to achieve ultra-high vacuum specifications. The bake-out cycle is used to decrease the outgassing rate of the vacuum vessel and to activate the Non-Evaporable Getter (NEG) thin film. Bake-out control is a Proportional-Integral-Derivative (PID) regulation with complex recipes, interlocks and troubleshooting management and remote control. It is based on mobile Programmable Logic Controller (PLC) cabinets, fieldbus network and Supervisory Control and Data Acquisition (SCADA) application. The CERN vacuum installations include more than 7 km of baked vessels; using mobile cabinets reduces considerably the cost of the control system. The cabinets are installed close to the vacuum vessels during the time of the bake-out cycle. Mobile cabinets can be used in any of the CERN vacuum facilities. Remote control is provided through a fieldbus network and a SCADA application

  4. Id-1 gene and gene products as therapeutic targets for treatment of breast cancer and other types of carcinoma

    Science.gov (United States)

    Desprez, Pierre-Yves; Campisi, Judith

    2014-08-19

    A method for treatment of breast cancer and other types of cancer. The method comprises targeting and modulating Id-1 gene expression, if any, for the Id-1 gene, or gene products in breast or other epithelial cancers in a patient by delivering products that modulate Id-1 gene expression. When expressed, Id-1 gene is a prognostic indicator that cancer cells are invasive and metastatic.

  5. The metalloid arsenite induces nuclear export of Id3 possibly via binding to the N-terminal cysteine residues

    International Nuclear Information System (INIS)

    Kurooka, Hisanori; Sugai, Manabu; Mori, Kentaro; Yokota, Yoshifumi

    2013-01-01

    Highlights: •Sodium arsenite induces cytoplasmic accumulation of Id3. •Arsenite binds to closely spaced N-terminal cysteine residues of Id3. •N-terminal cysteines are essential for arsenite-induced nuclear export of Id3. •Nuclear export of Id3 counteracts its transcriptional repression activity. -- Abstract: Ids are versatile transcriptional repressors that regulate cell proliferation and differentiation, and appropriate subcellular localization of the Id proteins is important for their functions. We previously identified distinct functional nuclear export signals (NESs) in Id1 and Id2, but no active NES has been reported in Id3. In this study, we found that treatment with the stress-inducing metalloid arsenite led to the accumulation of GFP-tagged Id3 in the cytoplasm. Cytoplasmic accumulation was impaired by a mutation in the Id3 NES-like sequence resembling the Id1 NES, located at the end of the HLH domain. It was also blocked by co-treatment with the CRM1-specific nuclear export inhibitor leptomycin B (LMB), but not with the inhibitors for mitogen-activated protein kinases (MAPKs). Importantly, we showed that the closely spaced N-terminal cysteine residues of Id3 interacted with the arsenic derivative phenylarsine oxide (PAO) and were essential for the arsenite-induced cytoplasmic accumulation, suggesting that arsenite induces the CRM1-dependent nuclear export of Id3 via binding to the N-terminal cysteines. Finally, we demonstrated that Id3 significantly repressed arsenite-stimulated transcription of the immediate-early gene Egr-1 and that this repression activity was inversely correlated with the arsenite-induced nuclear export. Our results imply that Id3 may be involved in the biological action of arsenite

  6. Estructura del Sistema de Gestión Integral de Documentos de archivo [SiGeID 1.0

    Directory of Open Access Journals (Sweden)

    Dominica Legañoa Ferrá

    2012-08-01

    Full Text Available The new context imposes on organizations the vital necessity of having appropriate communication infrastructures that allow them to get actual and enough knowledge about their environment. This article seeks to show the organizational structure of the Integral Management System for Archive Documents SiGeID (1.0, as a computer tool helping the managerial organizations in Camagüey, Cuba, to improve their documents management processes. This tool in divided into three modules: Documental Management and Security, Archive Management and Management and Settings. Its functional and non- functional requirements are also kept in mind.

  7. Remote Supervision and Control of Air Conditioning Systems in Different Modes

    Science.gov (United States)

    Rafeeq, Mohammed; Afzal, Asif; Rajendra, Sree

    2018-01-01

    In the era of automation, most of the application of engineering and science are interrelated with system for optimal operation. To get the efficient result of an operation and desired response, interconnected systems should be controlled by directing, regulating and commanding. Here, air conditioning (AC) system is considered for experimentation, to supervise and control its functioning in both, automated and manual mode. This paper reports the work intended to design and develop an automated and manual AC system working in remote and local mode, to increase the level of comfort, easy operation, reducing human intervention and faults occurring in the system. The Programmable Logical Controller (PLC) and Supervisory Control and Data Acquisition (SCADA) system were used for remote supervision and monitoring of AC systems using series ninety protocol and remote terminal unit modbus protocol as communication module to operate in remote mode. PLC was used as remote terminal for continuous supervision and control of AC system. SCADA software was used as a tool for designing user friendly graphical user interface. The proposed SCADA AC system successfully monitors and controls in accordance within the parameter limits like temperature, pressure, humidity and voltage. With all the features, this designed system is capable of efficient handling of the resources like the compressor, humidifier etc., with all the levels of safety and durability. This system also maintains the temperature and controls the humidity of the remote location and also looks after the health of the compressor.

  8. How to save distressed IDS-physician marriages: a case study.

    Science.gov (United States)

    Collins, H; Johnson, B A

    1998-04-01

    A hospital-driven IDS that encounters serious problems resulting from ownership of a physician practice should address those problems by focusing on three core areas: vision and leadership, effectiveness of operations, and physician compensation arrangements. If changes in these areas do not lead to improvements, the IDS may need to consider organizational restructuring. In one case study, a hospital-driven IDS faced the problem of owning a poorly performing MSO with a captive physician group. The IDS's governing board determined that the organization lacked effective communication with the physicians and that realization of the organization's vision would require greater physician involvement in organizational decision making. The organization is expected to undergo some corporate reorganization in which physicians will acquire an equity interest in the enterprise.

  9. Toward operation of series IDs at BL43LXU of SPring-8

    Energy Technology Data Exchange (ETDEWEB)

    Baron, A. Q. R.; Tanaka, T.; Soutome, K.; Takao, M.; Nakamura, T.; Kobayashi, K.; Fujita, T.; Takahashi, S.; Aoyagi, H.; Shimosaki, Y.; Seike, T.; Uchiyama, H.; Ishikawa, D.; Chuang, T.-H.; Kimura, H.; Tanaka, H.; Kitamura, H.; Ishikawa, T. [SPring-8, 1-1-1 Kouto, Sayo, Hyogo, 679 (Japan)

    2016-07-27

    This paper discusses two issues relating to using 3 small gap insertion devices in series at BL43LXU of SPring-8 to make a uniquely powerful source in the 15-26 keV region of the x-ray spectrum. The issues discussed are (1) damage to the covers of the downstream IDs by radiation from the upstream IDs and (2) proper steering of the electron beam to get the best photon beam properties. After tests in several configurations, including one where an ID was run without an impedance-reducing cover, the damage issue was solved by installing a distributed absorber in the most downstream ID. The steering issues were mostly resolved by the introduction of appropriate corrector magnets and feedback. The paper is written from the viewpoint of an interested beamline scientist impressed with the cooperation of different groups to make a source for new science possible.

  10. Pätid võtsid varastatud ID-kaardiga kiirlaene / Põim Kama

    Index Scriptorium Estoniae

    Kama, Põim, 1985-

    2008-01-01

    ID-kaardi vargusega seotud pettusjuhtumist ning jaanuaris jõustunud rahapesu ja terrorismi rahastamise tõkestamise seaduse sättest, mis kohustab laenufirmasid esimese tehingu sooritamisel kliendiga silmast silma kohtuma. Lisatud: kiirlaenufirmad vilistavad seadusele

  11. idSpace Tooling and Training for collaborative distributed product innovation

    NARCIS (Netherlands)

    Rutjens, Marjo; Bitter-Rijpkema, Marlies; Grube, Pascal; Heider, Thomas

    2009-01-01

    Rutjens, M., Bitter-Rijpkema, M., Grube, P. P., & Heider, T. (2009). idSpace Tooling and Training for collaborative distributed product innovation. Workshop during the e-Learning Baltic conference. June, 17-19, 2009, Rostock, Germany.

  12. Wnt/β-catenin signaling changes C2C12 myoblast proliferation and differentiation by inducing Id3 expression

    International Nuclear Information System (INIS)

    Zhang, Long; Shi, Songting; Zhang, Juan; Zhou, Fangfang; Dijke, Peter ten

    2012-01-01

    Highlights: ► Expression of Id3 but not Id1 is induced by Wnt3a stimulation in C2C12 cells. ► Wnt3a induces Id3 expression via canonical Wnt/β-catenin pathway. ► Wnt3a-induced Id3 expression does not depend on BMP signaling activation. ► Induction of Id3 expression is critical determinant in Wnt3a-induced cell proliferation and differentiation. -- Abstract: Canonical Wnt signaling plays important roles in regulating cell proliferation and differentiation. In this study, we report that inhibitor of differentiation (Id)3 is a Wnt-inducible gene in mouse C2C12 myoblasts. Wnt3a induced Id3 expression in a β-catenin-dependent manner. Bone morphogenetic protein (BMP) also potently induced Id3 expression. However, Wnt-induced Id3 expression occurred independent of the BMP/Smad pathway. Functional studies showed that Id3 depletion in C2C12 cells impaired Wnt3a-induced cell proliferation and alkaline phosphatase activity, an early marker of osteoblast cells. Id3 depletion elevated myogenin induction during myogenic differentiation and partially impaired Wnt3a suppressed myogenin expression in C2C12 cells. These results suggest that Id3 is an important Wnt/β-catenin induced gene in myoblast cell fate determination.

  13. ACE I/D polymorphism in Indian patients with hypertrophic cardiomyopathy and dilated cardiomyopathy

    DEFF Research Database (Denmark)

    Rai, Taranjit Singh; Dhandapany, Perundurai Subramaniam; Ahluwalia, Tarun Veer Singh

    2008-01-01

    The study was carried to determine the association of angiotensin converting enzyme (ACE) insertion/deletion (I/D) polymorphism with the risk of hypertrophic cardiomyopathy (HCM), dilated cardiomyopathy (DCM), and restrictive cardiomyopathy (RCM).......The study was carried to determine the association of angiotensin converting enzyme (ACE) insertion/deletion (I/D) polymorphism with the risk of hypertrophic cardiomyopathy (HCM), dilated cardiomyopathy (DCM), and restrictive cardiomyopathy (RCM)....

  14. Modern Solutions for Automation of Electrical Traction Power Supply Systems

    Directory of Open Access Journals (Sweden)

    Ana Mihaela Andreica

    2011-09-01

    Full Text Available This paper presents modern solutions for the automation of the electrical traction power supply system used in urban public transport (trams, trolleybuses and subway trains. The monitoring and control of this process uses SCADA distributed architectures, grouped around a central point (dispatcher who controls all field sensors, transmitters and actuators using programmable logical controllers. The presented applications refer to the Bucharest electrical transport infrastructure.

  15. Supervisory control system implemented in programmable logical controller web server

    OpenAIRE

    Milavec, Simon

    2012-01-01

    In this thesis, we study the feasibility of supervisory control and data acquisition (SCADA) system realisation in a web server of a programmable logic controller. With the introduction of Ethernet protocol to the area of process control, the more powerful programmable logic controllers obtained integrated web servers. The web server of a programmable logic controller, produced by Siemens, will also be described in this thesis. Firstly, the software and the hardware equipment used for real...

  16. AANtID: an alternative approach to network intrusion detection ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Security has become not just a feature of an information system, but the core and a necessity especially the systems that communicate and transmit data over the Internet for they are more ... Keywords: Intrusion, Genetic Algorithm, detection, Security, DARPA dataset ...

  17. KONSEP MᾹQᾹṢID AL-SYᾹRĪAH MENURUT ṬᾹHᾹ JᾹBIR AL-‘ALWᾹNĪ

    Directory of Open Access Journals (Sweden)

    Chasnak Najidah

    2017-03-01

    Full Text Available One discourse which is receiving considerable attention from scholars of Islam is about the objectives of Islamic law (maqasid al-shari'ah. Taha Jabir al-'Alwānī as one reviewer of Maqasid al-shari'ah contemporary formulate the concept of maqasid al-shari'ah different from previous scholars. This article describes the concept of maqasid al-shari'ah by Taha Jabir al-'Alwānī. According to him, there are three levels of hierarchical of Maqasid al-Sharia. The highest value of maqasid al-shari'ah says is what he describes as al-Maqasid al-'ulyā al-Hakimah (intentions of the highest shari'ah and a legal basis, which consists of three main elements, namely al-Tawhid ( Onesess of God, al-Tazkiyah (purification and al-'umrān (prosperity. The position of the second al-shari'ah Maqasid are universal values such as justice, freedom, and equality. While the third position is the formulation of the previous scholars regarding maqasid al-shari'ah consisting of ḍarūriyyat, ḥājiyyāt, and taḥsīniyyāt. In terms of methodological, Taha Jabir al-'Alwānī basing the new system for Maqasid al-syarī'ahnya on the methods of al-jam'u Baina al-qirā'atain, a reading of the two entities: the revelation of God and the universe. With this basis, he argues that the maqasid al-shari'ah formulations are qaṭ'ī, so it can be a reference to the scholars in solving the problems of contemporary law.   [Salah satu diskursus yang mendapat perhatian cukup besar dari para akademisi Islam adalah seputar tujuan-tujuan hukum islam  (maqāṣid al-syarī'ah. Ṭāhā Jābir al-‘Alwānī sebagai salah satu ulama pengkaji maqāṣid asy-syarī’ahkontemporer merumuskan konsep maqāṣid asy-syarī’ahyang berbeda dari ulama sebelumnya. Artikel ini mendeskripsikan konsep maqāṣid asy-syarī’ahmenurut Ṭāhā Jābir al-‘Alwānī. Menurutnya, ada tiga tingkatan hierarkis maqāṣid al-syarī'ah. Nilai tertinggi maqāṣid asy-syarī’ahmenurutnya adalah apa

  18. Computer-based supervisory control and data acquisition system for the radioactive waste evaporator

    International Nuclear Information System (INIS)

    Pope, N.G.; Schreiber, S.B.; Yarbro, S.L.; Gomez, B.G.; Nekimken, H.L.; Sanchez, D.E.; Bibeau, R.A.; Macdonald, J.M.

    1994-12-01

    The evaporator process at TA-55 reduces the amount of transuranic liquid radioactive waste by separating radioactive salts from relatively low-level radioactive nitric acid solution. A computer-based supervisory control and data acquisition (SCADA) system has been installed on the process that allows the operators to easily interface with process equipment. Individual single-loop controllers in the SCADA system allow more precise process operation with less human intervention. With this system, process data can be archieved in computer files for later analysis. Data are distributed throughout the TA-55 site through a local area network so that real-time process conditions can be monitored at multiple locations. The entire system has been built using commercially available hardware and software components

  19. Distributed Monitoring System Based on ICINGA

    CERN Multimedia

    Haen, C; Neufeld, N

    2011-01-01

    The LHCb online system relies on a large and heterogeneous I.T. infrastructure : it comprises more than 2000 servers and embedded systems and more than 200 network devices. While for the control and monitoring of detectors, PLCs, and readout boards an industry standard SCADA system PVSSII has been put in production, we use a low level monitoring system to monitor the control infrastructure itself. While our previous system was based on a single central NAGIOS server, our current system uses a distributed ICINGA infrastructure.

  20. Using Efficient TRNGs for PSEUDO Profile in National eID Card

    Directory of Open Access Journals (Sweden)

    Blerim Rexha

    2018-03-01

    Full Text Available Applications that requires true random number generator (TRNG, which uses raw analog data generated from any noise source in nature, must convert the source normal distribution to uniform distribution. Many up to date implementations convert the raw analog data into digital data by employing a comparator or a Schmitt trigger. This method wastes a large amount of random input data, lowering the throughput of the TRNG. In new national electronic identity card (eID beyond the true identity of his bearer and to address the increasing concern of user privacy while doing business in Internet an additional pseudo profile is set. This pseudo profile uses 20-byte random value generated by database server, using a script during personalization process. In this paper, we present a novel algorithm that enables efficient distribution conversion in low power devices. The low memory requirements and efficient processing make it suitable for implementation low power cryptographic devices but also in complex personalization systems. Furthermore, we compare the random data generated by our efficient TRNG vs. those generated by database server.

  1. The Inventory of Depressive Symptomatology Self Report (IDS-SR: Psychometric properties of the Indonesian version.

    Directory of Open Access Journals (Sweden)

    Retha Arjadi

    Full Text Available Depression screening and examination in Indonesia are highly challenging due to the disproportionately low number of mental health professionals in comparison to the Indonesian population. Self-report questionnaires on depression are cost-effective and time-efficient. The current study investigates the psychometric properties of the Indonesian Inventory of Depressive Symptomatology Self Report (IDS-SR.The participants were 904 Indonesians (aged 16-61; 50.2% female, recruited via an online survey using Qualtrics. Confirmatory factor analysis of the one-factor, three-factor, and four-factor model were explored. Convergent and divergent validity of the total score of the Indonesian IDS-SR and each factor were examined, as well as the Cronbach's Alpha reliability. In addition, an optimal cut-off score for the Indonesian IDS-SR was established using ROC curve analysis.The three-factor model of "cognitive/mood", "anxiety/arousal", and "sleep disturbance" was the best fit with the Indonesian IDS-SR data. Convergent and divergent validity were good. Cronbach's Alpha reliability was excellent for the total score, good for the factors "cognitive/mood" and "anxiety/arousal", but insufficient for the factor "sleep disturbance". The optimal cut-off score of the Indonesian IDS-SR was 14, with 87% sensitivity and 86% specificity.As a multifactorial instrument to measure depression that has good validity and reliability, the Indonesian IDS-SR can be used to assess depressive symptoms for the purpose of research and clinical practice. The optimal cut-off score of the Indonesian IDS-SR is in accordance with the internationally used cut-off score.

  2. Association between ACE gene I/D polymorphism and clinical presentation and prognosis of sarcoidosis.

    Science.gov (United States)

    Alía, P; Mañá, J; Capdevila, O; Alvarez, A; Navarro, M A

    2005-01-01

    Serum angiotensin converting enzyme (SACE) concentration is considered a marker of sarcoidosis activity. This concentration is influenced by an insertion/deletion (I/D) polymorphism of the ACE gene, such that SACE levels follow the pattern DD>ID>II. The aim of our work was to study the relationship between I/D polymorphism and susceptibility to sarcoidosis, as well as the relation between this polymorphism and the clinical presentation and evolution of the disease in 177 sarcoidosis patients. A group of 104 individuals without sarcoidosis was included as control. Genotyping was done by a polymerase chain reaction (PCR) method, and SACE concentration at diagnosis was determined by a kinetic method. No differences were observed in genotype or allele distributions between patients and controls, nor between patients considering the type of presentation (Löfgren versus non-Löfgren) and evolution of the disease (acute versus chronic). As reported for healthy populations, SACE concentrations followed the pattern DD>ID>II in sarcoidosis patients, but significant differences between genotypes existed only in the Löfgren group (p = 0.003) and in acute patients (p = 0.02). SACE concentrations at diagnosis were lower in acute patients (p = 0.05) and in Löfgren's syndrome (p = 0.04), but this seemed to occur only in ID individuals (p = 0.02 and p = 0.01, respectively). No relation was thus found between I/D polymorphism and susceptibility to sarcoidosis, but ACE I/D genotyping may improve the assessment of disease activity, both at diagnosis and during the follow-up of treated and untreated patients.

  3. Adaptive Kalman Filter Based on Adjustable Sampling Interval in Burst Detection for Water Distribution System

    OpenAIRE

    Doo Yong Choi; Seong-Won Kim; Min-Ah Choi; Zong Woo Geem

    2016-01-01

    Rapid detection of bursts and leaks in water distribution systems (WDSs) can reduce the social and economic costs incurred through direct loss of water into the ground, additional energy demand for water supply, and service interruptions. Many real-time burst detection models have been developed in accordance with the use of supervisory control and data acquisition (SCADA) systems and the establishment of district meter areas (DMAs). Nonetheless, no consideration has been given to how frequen...

  4. Industrial Control System Process-Oriented Intrusion Detection (iPoid) Algorithm

    Science.gov (United States)

    2016-08-01

    SUBJECT TERMS supervisory control and data acquisition (SCADA), Modbus, industrial control system, intrusion detection system 16. SECURITY...List of Tables iv Acknowledgments v 1. Background 1 2. iPoid Modbus Packet-Inspection Capability 2 2.1 Software Requirements 2 2.2 Startup ...Mr Curtis Arnold’s support of Industrial Control Systems–Supervisory Control and Data Acquisition research at the US Army Research Laboratory

  5. Development project of an automatic sampling system for part time unmanned pipeline terminals

    Energy Technology Data Exchange (ETDEWEB)

    Moreira, Gullherme O.; De Almelda, Marcio M. G.; Ramos, Ricardo R. [Petrobas, (Brazil); Potten, Gary [Cameron Measurement Systems, (United States)

    2010-07-01

    The Sao Paulo - Brasilia Pipeline (OSBRA) is a highly automated pipeline using a SCADA system which operates from a control room. A new quality management system standard was established for transportation and storage operations. The products had to be sampled on an automatic basis. This paper reports the development of an automatic sampling system (ASS) in accordance with the new quality control standard. The prototype was developed to be implemented through a human-machine interface (HMI) from the control room SCADA screens. A technical cooperation agreement(TCA) was drawn up for development of this new ASS product. The TCA was a joint cooperation between the Holding, the Operator and the cooperators. The prototype will be on-field tested at Senador Canedo tank farm to SPEC requirements. The current performance of the ASS establishes reasonable expectations for further successful development.

  6. Identification and genetic analysis of Panama-genotype Venezuelan equine encephalitis virus subtype ID in Peru.

    Science.gov (United States)

    Oberste, M S; Weaver, S C; Watts, D M; Smith, J F

    1998-01-01

    Venezuelan equine encephalitis (VEE) virus was isolated in 1993, 1994, and 1995 from human cases of acute, undifferentiated, febrile illness in the Peruvian Amazon Basin. Two virus isolates were recovered in 1994 from Peruvian soldiers at a jungle outpost near Pantoja in northern Peru, and 10 isolates were obtained from military personnel and civilians in 1993-1995 in Iquitos, an urban center in northeastern Peru. The genetic relationship of these isolates to other VEE virus strains was determined by sequencing 856-867 nucleotide reverse transcription-polymerase chain reaction fragments derived from the PE2 glycoprotein gene. The sequences were compared with those of other VEE virus strains, including representatives of the IAB, IC, ID, IE, II, and IIIC subtypes. The two Pantoja isolates were most closely related to subtype IC and ID viruses previously isolated in Colombia and Venezuela, and to the ID viruses isolated during the 1970s in Iquitos. All of the recent Iquitos isolates were similar to one another, but they were more closely related to Panamanian ID strains than to isolates previously obtained in Iquitos, Peru, or in Colombia and Venezuela. The recent Iquitos VEE viral isolates were the first Panama-genotype VEE ID virus strains identified outside of the Republic of Panama.

  7. CASK inhibits ECV304 cell growth and interacts with Id1

    International Nuclear Information System (INIS)

    Qi Jie; Su Yongyue; Sun Rongju; Zhang Fang; Luo Xiaofeng; Yang Zongcheng; Luo Xiangdong

    2005-01-01

    Calcium/calmodulin-dependent serine protein kinase (CASK) is generally known as a scaffold protein. Here we show that overexpression of CASK resulted in a reduced rate of cell growth, while inhibition of expression of endogenous CASK via RNA-mediated interference resulted in an increased rate of cell growth in ECV304 cells. To explore the molecular mechanism, we identified a novel CASK-interacting protein, inhibitor of differentiation 1 (Id1) with a yeast two-hybrid screening. Furthermore, endogenous CASK and Id1 proteins were co-precipitated from the lysates of ECV304 cells by immunoprecipitation. Mammalian two-hybrid protein-protein interaction assays indicated that CASK possessed a different binding activity for Id1 and its alternative splicing variant. It is known that Id proteins play important roles in regulation of cell proliferation and differentiation. Thus, we speculate that the regulation of cell growth mediated by CASK may be involved in Id1. Our findings indicate a novel function of CASK, the mechanism that remains to be further investigated

  8. Inhibitor of DNA binding 1 (Id1) induces differentiation and proliferation of mouse embryonic carcinoma P19CL6 cells

    International Nuclear Information System (INIS)

    Meng, Qingzhen; Jia, Zhuqing; Wang, Weiping; Li, Binhong; Ma, Kangtao; Zhou, Chunyan

    2011-01-01

    Highlights: → Id1 was upregulated during the cardiac differentiation process of P19CL6 cells. → Id1 upregulated expression of cardiac specific genes Gata4, α-MHC and ISL1. → Id1 promoted proliferation of P19CL6 cells. → Overexpression of Id1 increased activity of TOP flash. → Wnt3a or LiCl treatment promoted Id1 expression in P19CL6 cells. -- Abstract: The inhibitor of DNA binding (Id) family of genes encodes negative regulators of basic helix-loop-helix transcription factors and has been implicated in such diverse cellular processes as differentiation, proliferation, apoptosis and migration. Id knockout mouse embryos display multiple cardiac defects but the specific role of Id1 in cardiac differentiation is unclear. In the present study, we investigated the function of Id1 in DMSO-induced P19CL6 cells, a widely-accepted cell model of cardiac differentiation. We found that Id1 was upregulated during the cardiac differentiation of P19CL6 cells. The expression of cardiac specific marker genes, Gata4, α-MHC and ISL1, was upregulated in P19CL6 cells stably transfected with Id1 (P19CL6-Id1) during cardiac differentiation. The overexpression of Id1 reduced the number of cells in G1 phase and increased the cell population in G2, M and S phases, while knockdown of Id1 increased the number of cells in G1 phase from 48.6 ± 2.51% to 62.2 ± 1.52% at day 0 of cardiac induction, and from 52.5 ± 3.41% to 63.7 ± 1.02% at day 3 after cardiac induction, indicating that Id1 promoted proliferation of P19CL6 cells. Luciferase assays showed that the activity of TOP flash was higher in P19CL6-Id1 cells than wildtype P19CL6 cells, while Id1 expression was also upregulated in P19CL6 cells treated with Wnt3a or LiCl. This indicates that there may be positive feedback between Id1 and Wnt signaling which plays an important role in cardiac differentiation.

  9. Le traitement de l’idéologie dans la sociologie de Luc Boltanski

    Directory of Open Access Journals (Sweden)

    David Vrydaghs

    2006-10-01

    Full Text Available IntroductionLe concept d’idéologie apparaît dans la sociologie de Luc Boltanski à partir du Nouvel Esprit du capitalisme, publié en 1999. L’auteur y revient dans La Condition fœtale, paru en 2004. On aurait donc pu se contenter de ces ouvrages pour examiner le traitement réservé à l’idéologie dans la sociologie de Luc Boltanski. On préférera pourtant revenir aux travaux antérieurs du sociologue, et ce pour deux raisons.D’abord parce que le concept d’idéologie tel qu’il est employé dans Le Nou...

  10. Implementasi Cell ID dan GPS dalam Pencarian Lokasi Fasilitas Kesehatan Terdekat

    Directory of Open Access Journals (Sweden)

    Fahmi Candra Permana

    2017-07-01

    Full Text Available Cell ID dan GPS merupakan layanan berbasis lokasi dan teknologi yang banyak membantu manusia dalam hal navigasi dan penemuan tempat-tempat yang bermanfaat di sekitarnya. Salah satu komponen utama dari teknologi ini dapat diterapkan pada telepon seluler. Dalam penelitian ini, dirancang sebuah aplikasi dengan memanfaatkan teknologi berdasar implementasi dari Cell ID dan GPS untuk mengetahui posisi user dan lokasi fasilitas kesehatan terdekat di sekitar user dan penggunaan JSON sebagai sarana untuk menyimpan database pada web. Aplikasi ini diimplementasikan pada telepon seluler dengan sistem operasi Android. Hasil dari penelitian ini menunjukkan bahwa Cell ID dan GPS dapat diimplementasikan dengan baik dengan memanfaatkan akses Internet dan Google Maps untuk mencari fasilitas kesehatan terdekat dan menggambarkan daerah sekitar user.

  11. Building of fuzzy decision trees using ID3 algorithm

    Science.gov (United States)

    Begenova, S. B.; Avdeenko, T. V.

    2018-05-01

    Decision trees are widely used in the field of machine learning and artificial intelligence. Such popularity is due to the fact that with the help of decision trees graphic models, text rules can be built and they are easily understood by the final user. Because of the inaccuracy of observations, uncertainties, the data, collected in the environment, often take an unclear form. Therefore, fuzzy decision trees becoming popular in the field of machine learning. This article presents a method that includes the features of the two above-mentioned approaches: a graphical representation of the rules system in the form of a tree and a fuzzy representation of the data. The approach uses such advantages as high comprehensibility of decision trees and the ability to cope with inaccurate and uncertain information in fuzzy representation. The received learning method is suitable for classifying problems with both numerical and symbolic features. In the article, solution illustrations and numerical results are given.

  12. High-visibility infrared beacons for IFF and combat ID

    Science.gov (United States)

    Pralle, Martin; Puscasu, Irina; Johnson, Edward; Loges, Peter; Melnyk, James

    2005-05-01

    A new kind of Identification Friend or Foe (IFF) infrared beacon has been demonstrated. The omni-directional beacon consists of a pyramidal array of 1W pulsIR thermal light sources. Operating at a total power of 84W, the beacon can be used to track and identify surface vehicles and personnel with a recognition range of up to 6 miles on the battlefield and in urban environments or the marine boundary layer. Advanced photonic technology enables the beacon to be seen only while using a 3-5 μm or 8-12 μm thermal imaging system. There is no visible or near-IR emission to betray the location of the beacon. The beacon is rugged and will operate from -40 to 50°C ambient temperature, 0-100% relative humidity, 0 - 10,000 ft altitude, and meets MIL-STD 810F and MIL-STD 461E.

  13. Magmatic Longevity Constrained by ID-TIMS U-Pb Dating of Zircon and Titanite

    Science.gov (United States)

    Szymanowski, D.; Wotzlaw, J. F.; Ellis, B. S.; Bachmann, O.; Von Quadt, A.

    2016-12-01

    Clues about the timescales and thermal conditions associated with the growth and evacuation of large silicic magma reservoirs are frequently drawn from radiometric dating, diffusion modelling, or thermomechanical modelling. A growing amount of petrological and geochronological evidence, supported by thermal modelling, suggests that many silicic magma reservoirs may exist for some 104-106 years in the form of high-crystallinity mushes at relatively low temperatures ( 700-750°C; [1-3]). Geochronological studies addressing this issue typically utilise the U-Pb system in zircon capable of recording extended periods of crystallisation, particularly in evolved calc-alkaline systems that spend most of their lifetime zircon-saturated. In this study, we integrate U-Pb dating of zircon and titanite to investigate the longevity of the magma reservoir that produced the Kneeling Nun Tuff, a 35 Ma, >900 km3 crystal-rich rhyolitic super-eruption from the Mogollon-Datil volcanic field in New Mexico (USA). High-precision ID-TIMS U-Pb dates of single crystals of both zircon and titanite independently record a continuous crystallisation history over >400,000 years. We combine the dating of both accessory phases with textural, major, trace element and isotopic studies of single crystals, placing tight constraints on the thermal conditions of magma accumulation and storage while recording differentiation and rejuvenation processes within the magma reservoir. The results suggest a protracted `cool' upper-crustal storage of magma prior to the Kneeling Nun Tuff eruption followed by a melting event which reduced the magma crystallinity and conditioned it for eruption. [1] Bachmann & Bergantz (2004), J. Petrol. 45, 1565-1582. [2] Gelman et al. (2013), Geology 41, 759-762. [3] Cooper & Kent (2014), Nature 506, 480-483.

  14. Hacker tracking Security system for HMI

    Science.gov (United States)

    Chauhan, Rajeev Kumar

    2011-12-01

    Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.

  15. ACE I/D genotype, adiposity, and blood pressure in children

    Directory of Open Access Journals (Sweden)

    Rothschild Max

    2009-03-01

    Full Text Available Abstract Background Angiotensin converting enzyme (ACE is a possible candidate gene that may influence both body fatness and blood pressure. Although several genetic studies have been conducted in adults, relatively few studies have examined the contribution of potential candidate genes, and specifically ACE I/D, on adiposity and BP phenotypes in childhood. Such studies may prove insightful for the development of the obesity-hypertension phenotype early in life. The purpose of this study was to examine differences in body fatness and resting blood pressure (BP by ACE I/D genotype, and determine if the association between adiposity and BP varies by ACE I/D genotype in children. Methods 152 children (75 girls, 77 boys were assessed for body composition (% body fat using dual energy x-ray absorbtiometry and resting BP according to American Heart Association recommendations. Buccal cell samples were genotyped using newly developed PCR-RFLP tests for two SNPs (rs4341 and rs4343 in complete linkage disequilibrium with the ACE I/D polymorphism. Partial correlations were computed to assess the ociations between % body fat and BP in the total sample and by genotype. ANCOVA was used to examine differences in resting BP by ACE I/D genotype and fatness groups. Results Approximately 39% of youth were overfat based on % body fat (>30% fat in girls, 25% fat in boys. Body mass, body mass index, and fat-free mass were significantly higher in the ACE D-carriers compared to the II group (p Conclusion ACE D-carriers are heavier than ACE II children; however, BP did not differ by ACE I/D genotype but was adversely influenced in the overfat D-carriers. Further studies are warranted to investigate the genetics of fatness and BP phenotypes in children.

  16. The ubiquitin ligase ASB4 promotes trophoblast differentiation through the degradation of ID2.

    Directory of Open Access Journals (Sweden)

    W H Davin Townley-Tilson

    Full Text Available Vascularization of the placenta is a critical developmental process that ensures fetal viability. Although the vascular health of the placenta affects both maternal and fetal well being, relatively little is known about the early stages of placental vascular development. The ubiquitin ligase Ankyrin repeat, SOCS box-containing 4 (ASB4 promotes embryonic stem cell differentiation to vascular lineages and is highly expressed early in placental development. The transcriptional regulator Inhibitor of DNA binding 2 (ID2 negatively regulates vascular differentiation during development and is a target of many ubiquitin ligases. Due to their overlapping spatiotemporal expression pattern in the placenta and contrasting effects on vascular differentiation, we investigated whether ASB4 regulates ID2 through its ligase activity in the placenta and whether this activity mediates vascular differentiation. In mouse placentas, ASB4 expression is restricted to a subset of cells that express both stem cell and endothelial markers. Placentas that lack Asb4 display immature vascular patterning and retain expression of placental progenitor markers, including ID2 expression. Using JAR placental cells, we determined that ASB4 ubiquitinates and represses ID2 expression in a proteasome-dependent fashion. Expression of ASB4 in JAR cells and primary isolated trophoblast stem cells promotes the expression of differentiation markers. In functional endothelial co-culture assays, JAR cells ectopically expressing ASB4 increased endothelial cell turnover and stabilized endothelial tube formation, both of which are hallmarks of vascular differentiation within the placenta. Co-transfection of a degradation-resistant Id2 mutant with Asb4 inhibits both differentiation and functional responses. Lastly, deletion of Asb4 in mice induces a pathology that phenocopies human pre-eclampsia, including hypertension and proteinuria in late-stage pregnant females. These results indicate that

  17. 'System-of-systems' approach for interdependent critical infrastructures

    International Nuclear Information System (INIS)

    Eusgeld, Irene; Nan, Cen; Dietz, Sven

    2011-01-01

    The study of the interdependencies within critical infrastructures (CI) is a growing field of research as the importance of potential failure propagation among infrastructures may lead to cascades affecting all supply networks. New powerful methods are required to model and describe such 'systems-of-systems' (SoS) as a whole. An overall model is required to provide security and reliability assessment taking into account various kinds of threats and failures. A significant challenge associated with this model may be to create 'what-if' scenarios for the analysis of interdependencies. In this paper the interdependencies between industrial control systems (ICS), in particular SCADA (Supervisory Control and Data Acquisition), and the underlying critical infrastructures to address the vulnerabilities related to the coupling of these systems are analyzed. The modeling alternatives for system-of-systems, integrated versus coupled models, are discussed. An integrated model contains detailed low level models of (sub)systems as well as a high level model, covering all hierarchical levels. On the other hand, a coupled model aggregates different simulated outputs of the low level models as inputs at a higher level. Strengths and weaknesses of both approaches are analyzed and a model architecture for SCADA and the 'system under control' are proposed. Furthermore, the HLA simulation standard is introduced and discussed in this paper as a promising approach to represent interdependencies between infrastructures. To demonstrate the capabilities of the HLA standard for the interdependencies study, an exemplary application and some first results are also briefly presented in this paper.

  18. Suurnimed jäid müümata / Maria-Kristiina Soomre

    Index Scriptorium Estoniae

    Soomre, Maria-Kristiina, 1978-

    2001-01-01

    9. mai Christie' oksjonist, müümata jäänud Picasso, Degas', Cezanne'i tööd. 8. mai Sotheby oksjonist, kus edukalt müüdi töid S. J. Seegeri kogust, 3,85 miljoni dollari eest M. Beckmanni "Perseuse viimane katsumus". Sotheby kaasaegse kunsti oksjonil New Yorgis müüdi 5,6 miljoni dollari eest J. Koonsi skulptuur M. Jacksonist. Müümata jäid A. Warholi "Viis supipurki", A. Calderi 3 skulptuuri

  19. Charged Particle ID with DIRCs in PANDA at FAIR

    Energy Technology Data Exchange (ETDEWEB)

    Schepers, Georg [GSI Helmholtzzentrum fuer Schwerionenforschung GmbH, Darmstadt (Germany); Collaboration: PANDA Cherenkov Group of the PANDA-Collaboration

    2015-07-01

    The PANDA detector at FAIR, the new international accelerator facility for antiprotons and ions in Darmstadt, will address open questions of hadronic physics. Experiments concerning charmonium spectroscopy are performed with antiproton beams colliding with hydrogen or nuclear targets. The beam momentum range between 1.5 GeV/c and 15 GeV/c allows tests of the predictions by perturbation theory, but will also reveal deviations originating from strong QCD. Excellent charged particle identification over a large momentum range is necessary for all these experiments. In the target spectrometer this will be accomplished by two Cherenkov counters using the DIRC principle, reducing the size of the solenoid and calorimeter. Both counters have to work in a strong magnetic field and withstand high event rates. The concept of the Barrel DIRC, covering the polar angles between 22 and 140 degrees, is based on the successful BaBar DIRC. It uses focusing optics with lenses and fast photon timing. The Endcap Disc DIRC works with a novel radiator geometry and covers the angular range from 5 to 22 degrees. In addition to a fast electronic readout it employs a compact photon detection system. Prototypes were tested with particle beams at GSI, CERN, DESY, and MAMI to validate the design choices. The results achieved and the status of the PANDA DIRC detectors are presented.

  20. The Methods of Implementation of the Three-dimensional Pseudorandom Number Generator DOZEN for Heterogeneous CPU/GPU /FPGA High-performance Systems

    Directory of Open Access Journals (Sweden)

    Nikolay Petrovich Vasilyev

    2015-03-01

    Full Text Available The paper describes the scope of information security protocols based on PRN G in industrial systems. A method for implementing three-dimensional pseudorandom number generator D O Z E N in hybrid systems is provided. The description and results of studies parallel CUDA-version of the algorithm for use in hybrid data centers and high-performance FPGA-version for use in hardware solutions in controlled facilities of SCADA-systems are given.

  1. Id2 reinforces TH1 cell differentiation and inhibits E2A to repress TFH cell differentiation

    Science.gov (United States)

    Shaw, Laura A.; Bélanger, Simon; Omilusik, Kyla D.; Cho, Sunglim; Scott-Browne, James P.; Nance, J. Philip; Goulding, John; Lasorella, Anna; Lu, Li-Fan; Crotty, Shane; Goldrath, Ananda W.

    2016-01-01

    Differentiation of T helper (TH) effector subsets is critical for host protection. E protein transcription factors and Id proteins are important arbiters of T cell development, but their role in differentiation of TH1 and TFH cells is not well understood. TH1 cells showed robust Id2 expression compared to TFH cells, and RNAi depletion of Id2 increased TFH cell frequencies. Further, TH1 cell differentiation was blocked by Id2 deficiency, leading to E protein-dependent accumulation of effector cells with mixed characteristics during viral infection and severely impaired generation of TH1 cells following Toxoplasma gondii infection. The TFH-defining transcriptional repressor Bcl6 bound the Id2 locus, providing a mechanism for the bimodal Id2 expression and reciprocal development of TH1 and TFH cell fates. PMID:27213691

  2. The helix-loop-helix protein id1 controls stem cell proliferation during regenerative neurogenesis in the adult zebrafish telencephalon.

    Science.gov (United States)

    Rodriguez Viales, Rebecca; Diotel, Nicolas; Ferg, Marco; Armant, Olivier; Eich, Julia; Alunni, Alessandro; März, Martin; Bally-Cuif, Laure; Rastegar, Sepand; Strähle, Uwe

    2015-03-01

    The teleost brain has the remarkable ability to generate new neurons and to repair injuries during adult life stages. Maintaining life-long neurogenesis requires careful management of neural stem cell pools. In a genome-wide expression screen for transcription regulators, the id1 gene, encoding a negative regulator of E-proteins, was found to be upregulated in response to injury. id1 expression was mapped to quiescent type I neural stem cells in the adult telencephalic stem cell niche. Gain and loss of id1 function in vivo demonstrated that Id1 promotes stem cell quiescence. The increased id1 expression observed in neural stem cells in response to injury appeared independent of inflammatory signals, suggesting multiple antagonistic pathways in the regulation of reactive neurogenesis. Together, we propose that Id1 acts to maintain the neural stem cell pool by counteracting neurogenesis-promoting signals. © 2014 AlphaMed Press.

  3. Experimental validation of control strategies for a microgrid test facility including a storage system and renewable generation sets

    DEFF Research Database (Denmark)

    Baccino, Francesco; Marinelli, Mattia; Silvestro, Federico

    2012-01-01

    The paper is aimed at describing and validating some control strategies in the SYSLAB experimental test facility characterized by the presence of a low voltage network with a 15 kW-190 kWh Vanadium Redox Flow battery system and a 11 kW wind turbine. The generation set is connected to the local...... network and is fully controllable by the SCADA system. The control strategies, implemented on a local pc interfaced to the SCADA, are realized in Matlab-Simulink. The main purpose is to control the charge/discharge action of the storage system in order to present at the point of common coupling...... the desired power or energy profiles....

  4. Combination of electron beam irradiation and thermal treatment to enhance the shelf-life of traditional Indian fermented food (Idli)

    Science.gov (United States)

    Mulmule, Manoj D.; Shimmy, Shankar M.; Bambole, Vaishali; Jamdar, Sahayog N.; Rawat, K. P.; Sarma, K. S. S.

    2017-02-01

    Idli, a steam-cooked breakfast food item consumed in India, is famous as a staple food for its spongy texture and unique fermented taste. Idli preparation is a time consuming process; although instant Idli pre-mixes as powder or batter are available in the market, they do not have the distinctive taste and aroma similar to the Idli prepared at home. Hence ready-to-eat (RTE) form of this food is in demand. Therefore, an attempt was made to prepare RTE Idli bearing similar taste as home-cooked Idli with an extended shelf-life of up to two months at an ambient temperature using Electron Beam Irradiation (EBI) at dosages 2.5 kGy, 5 kGy and 7.5 kGy and combination processing comprised of EBI dosage at 2.5 kGy and thermal treatment (80 °C for 20 min). The treated Idli's were microbiologically and sensorially evaluated at storage periods of zero day, 14 days, 30 days and 60 days. Idli's irradiated at 7.5 kGy and subjected to combination processing at 2.5 kGy and thermal treatment were shelf-stable for 60 days. 2.5 kGy and 5 kGy radiation dosages alone were not sufficient to preserve Idli samples for more than 14 days. Undesirable change in sensory properties of Idli was observed at an EBI dosage of 7.5 kGy. Sensory properties of combination processed Idli's were found to undergo minor change over the storage period. The present work suggests that lowest radiation dosage in combination with thermal treatment could be useful to achieve the extended shelf-life without considerably impairing the organoleptic quality of Ready-to-Eat Idli.

  5. Experiments on a forced convection heat transfer at supercritical pressures - 6.32 mm ID tube

    Energy Technology Data Exchange (ETDEWEB)

    Bae, Yoon Yeong; Kim, Hwan Yeol

    2009-08-15

    The size of a sub-channel of the conceptual SCWR core design studied at KAERI is 6.5 mm. In order to provide heat transfer information in such a narrow sub-channel at supercritical pressure, an experiment was performed with a test section made of Inconel 625 tube of 6.32 mm ID. The test pressures were 7.75 and 8.12 MPa corresponding to 1.05 and 1.1 times the critical pressure of CO{sub 2}, respectively. The mass flux and heat flux, which were in the range of 285 {approx} 1200 kg/m2s and 30 {approx} 170 kW/m2, were changed at a given system pressure. The corresponding Reynolds numbers are 1.8 x 10{sup 4} {approx} 7.5 x 10{sup 4}. The effect of mass flux and heat flux was dominant factor in the supercritical pressure heat transfer while the effect of pressure was negligible. The Bishop's correlation predicted the test result most closely and Bae and Kim's recent correlation was the next. The heat transfer deterioration occurred when GR)b/Re{sub b}{sup 2.7} > 2.0 x 10{sup -5}. As soon as the heat transfer was deteriorated, it entered a new regime and did not recover the normal heat transfer nevertheless Gr{sub b}/Re{sub b}{sup 2.7} reduced below 2.0 x 10{sup -5}. It may mean that the correlation must be developed for the normal and deterioration regime separately.

  6. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  7. Combination of electron beam irradiation and thermal treatment to enhance the shelf-life of traditional Indian fermented food (Idli)

    International Nuclear Information System (INIS)

    Mulmule, Manoj D.; Shimmy, Shankar M.; Bambole, Vaishali; Jamdar, Sahayog N.; Rawat, K.P.; Sarma, K.S.S.

    2017-01-01

    Idli, a steam-cooked breakfast food item consumed in India, is famous as a staple food for its spongy texture and unique fermented taste. Idli preparation is a time consuming process; although instant Idli pre-mixes as powder or batter are available in the market, they do not have the distinctive taste and aroma similar to the Idli prepared at home. Hence ready-to-eat (RTE) form of this food is in demand. Therefore, an attempt was made to prepare RTE Idli bearing similar taste as home-cooked Idli with an extended shelf-life of up to two months at an ambient temperature using Electron Beam Irradiation (EBI) at dosages 2.5 kGy, 5 kGy and 7.5 kGy and combination processing comprised of EBI dosage at 2.5 kGy and thermal treatment (80 °C for 20 min). The treated Idli's were microbiologically and sensorially evaluated at storage periods of zero day, 14 days, 30 days and 60 days. Idli's irradiated at 7.5 kGy and subjected to combination processing at 2.5 kGy and thermal treatment were shelf-stable for 60 days. 2.5 kGy and 5 kGy radiation dosages alone were not sufficient to preserve Idli samples for more than 14 days. Undesirable change in sensory properties of Idli was observed at an EBI dosage of 7.5 kGy. Sensory properties of combination processed Idli's were found to undergo minor change over the storage period. The present work suggests that lowest radiation dosage in combination with thermal treatment could be useful to achieve the extended shelf-life without considerably impairing the organoleptic quality of Ready-to-Eat Idli. - Highlights: • Idli (traditional Indian fermented food) was prepared in ready-to-eat (RTE) form. • Ready-to-eat Idli was then subjected to combination processing comprised of lowest irradiation dosage of 2.5 kGy with mild heat treatment to extend its shelf life. • Increase in hardness and decrease in brightness of combination processed Idli was observed. • Combination processed Idli was microbiologically safe and

  8. [Clinical Significance of ID4 Gene Mehtylation in Demethylation-Treated MDS Cell Line and 2 MDS Patients].

    Science.gov (United States)

    Kang, Hui-Yuan; Wang, Xin-Rong; Gao, Li; Wang, Wei; Li, Mian-Yang; Wang, Li-Li; Wang, Cheng-Bin; Yu, Li

    2015-04-01

    To evaluate significance of ID4 gene mehtylation in demethylating myelodysplastic syndrome(MDS) cell Line MUTZ1 and 2 patients with MDS. The methylation-specific PCR (MS-PCR) and reverse transcription-PCR (RT-PCR) were applied to identify the methylation status and gene expression of ID4 gene in MDS cell line MUTZ1, a patient with aplastic anemia(AA) and a donor with normal bone marrow (NBM). RT-PCR was applied to detect the ID4 gene expression status in MUTZ1 cell line treated with decitabine at 3 different concentrations. Then bisulfite sequencing PCR (BSP) was applied to detect ID4 gene methylation status in 2 MDS parients treated with decitabine. The MDS cell line MUTZ-1 displayed a complete methylation of ID4 gene promoter with little mRNA expression. Inversely, bone marrow of an AA patient and NBM showed complete unmethylation of this gene with intensity mRNA expression. With the increase of decitabine concentration, ID4 gene mRNA expression was more and more increased. After decitabine treatment, ID4 gene methylation-positive frequencies of both the 2 MDS patients were much more decreased than that of the first treatment. So, ID4 gene mRNA expression inhibited by promoter hypemethylation could be recovered by using demethylation medicine. ID4 as a new potential anti-oncogene suggests that its methylation may become a marker for selection and assessment of therapeutic schedules in patients with MDS.

  9. 78 FR 23952 - Notice of Temporary Closure on Public Lands in Elmore County, ID

    Science.gov (United States)

    2013-04-23

    ...] Notice of Temporary Closure on Public Lands in Elmore County, ID AGENCY: Bureau of Land Management, Interior. ACTION: Notice of temporary closure. SUMMARY: Notice is hereby given that the Stout Fire closure to motorized vehicle use is in effect on public lands administered by the Four Rivers Field Office...

  10. 77 FR 14417 - Notice of Temporary Closure on Public Lands in Gooding and Elmore Counties, ID

    Science.gov (United States)

    2012-03-09

    ...] Notice of Temporary Closure on Public Lands in Gooding and Elmore Counties, ID AGENCY: Bureau of Land Management, Interior. ACTION: Notice of temporary closure. SUMMARY: Notice is hereby given that the Blair Fire closure to motorized vehicle use is in effect on public lands administered by the Four Rivers and...

  11. 78 FR 20135 - Notice of Temporary Closure on Public Lands in Boise County, ID

    Science.gov (United States)

    2013-04-03

    ...] Notice of Temporary Closure on Public Lands in Boise County, ID AGENCY: Bureau of Land Management, Interior. ACTION: Notice of Temporary Closure SUMMARY: Notice is hereby given that the Springs Fire closure to all human use is in effect on public lands administered by the Four Rivers Field Office, Bureau of...

  12. 76 FR 48877 - Kootenai National Wildlife Refuge, Boundary County, ID; Draft Comprehensive Conservation Plan and...

    Science.gov (United States)

    2011-08-09

    ..., Kootenai National Wildlife Refuge, 287 Westside Road, Bonners Ferry, ID 83805. Web site: http://www.fws.gov..., wildlife observation and photography, and environmental education and interpretation. We will review and... the auto tour route to provide for safety. Big game and upland game (grouse) hunting would be allowed...

  13. 77 FR 16556 - Kootenai National Wildlife Refuge, Boundary County, ID; Final Comprehensive Conservation Plan and...

    Science.gov (United States)

    2012-03-21

    ...: Dianna Ellis, Refuge Manager, Kootenai National Wildlife Refuge, 287 Westside Road, Bonners Ferry, ID..., wildlife observation and photography, and environmental education and interpretation. We will review and... safety. Allowing big game and upland game (grouse) hunting on the 295 acres of timber on the west side of...

  14. Drug evaluation: FavId, a patient-specific idiotypic vaccine for non-Hodgkin's lymphoma.

    Czech Academy of Sciences Publication Activity Database

    Reiniš, Milan

    2007-01-01

    Roč. 9, č. 3 (2007), s. 291-298 ISSN 1464-8431 Institutional research plan: CEZ:AV0Z50520514 Keywords : non-Hodgkin's lymphoma * lymphoma vaccine FavId Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 2.526, year: 2007

  15. Typing of two Middle Eastern populations with the Precision ID Ancestry Panel

    DEFF Research Database (Denmark)

    Truelsen, Ditte Mikkelsen; Farzad, Maryam Sharafi; Mogensen, Helle Smidt

    2017-01-01

    , Turkish and Iranian individuals were SNP typed with Massively Parallel Sequencing with the Precision ID Ancestry Panel (Thermo Fisher Scientific) to assess whether it was possible to differentiate geographically proximate populations in the Middle East using this kit. Analyses showed that it were...

  16. Karikaturist Aivar Juhanson näitab KuKu klubis oma töid

    Index Scriptorium Estoniae

    2009-01-01

    Loit Jõekalda kureeritud joonistustriennaali raames eksponeerivad oma töid Ave Avalo, Kärt Hammer, Eero Ijavoinen, Kristjan Kittus, Mari-Liis Laanemaa, Triinu Lille, Valli Lember-Bogatkina jpt. kunstnikud. Ajalehe "Eesti Ekspress" karikaturisti Aivar Juhansoni tööde näitus Tallinnas KuKu klubis

  17. Use of false ID cards and other deceptive methods to purchase alcoholic beverages during high school.

    Science.gov (United States)

    Schwartz, R H; Farrow, J A; Banks, B; Giesel, A E

    1998-01-01

    Altered motor vehicle drivers's licenses or other falsified or counterfeit photo identification cards are widely and illegally used by teenagers to obtain beer and other alcohol beverages. We obtained information on the methods currently used by teenagers to purchase beer and wine by asking nine hundred teenagers, between 16-19 years old to complete a brief, confidential questionnaire. High school students most often obtained alcoholic beverages by requesting someone of legal age to purchase it for them. College students used borrowed, altered, or counterfeit identification (ID) more often than high school students. Photo IDs purchased through mail order from a magazine advertisement were used infrequently and when use was attempted, they were sometimes (25%) unsuccessful. Fifteen percent of high school students, 14% of college freshmen, and 24% of teenage drug abusers were able to purchase beer by the case with borrowed, altered, or fake ID. Suggestions to reduce sales of alcohol-containing beverages to minors include universal "carding" of prospective purchasers, use of two view or hologram photos on a drivers' license, requiring three different ID cards at the point of purchase, and penalties to stores that fail to make a good effort to identify underage customers.

  18. Assessment of the relationship between ACE I/D gene polymorphism and renal allograft survival.

    Science.gov (United States)

    Yang, Chun-Hua; Lu, Yi; Chen, Xue-Xia; Xian, Wen-Feng; Tu, Wei-Feng; Li, Hong-Yan

    2015-12-01

    The relationship between the angiotensin-converting enzyme (ACE) insertion/deletion (I/D) gene polymorphism and renal allograft survival after renal transplantation from the published reports are still debatable. This study was performed to evaluate the relationship between the ACE I/D gene polymorphism and renal allograft survival after renal transplantation using meta-analysis. Eligible studies were identified from PubMed and Cochrane Library on 1 November 2014, and eligible studies were recruited and synthesized using a meta-analysis methodology. Twelve investigations were included in this meta-analysis for the assessment of the relationship between the ACE I/D gene polymorphism and renal allograft survival. In this meta-analysis, the ACE I/D gene polymorphism was not associated with renal allograft survival after renal transplantation for overall populations, Caucasians, Brazilians and Africans. Interestingly, the ACE D allele and DD genotype were associated with renal allograft survival after renal transplantation in the Asian population. ACE D allele and DD genotype were associated with renal allograft survival after renal transplantation in the Asian population. However, more studies should be performed to confirm this association. © The Author(s) 2015.

  19. Hizbollah lubab : "Me tahame ameeriklastega häid suhteid" / Mohamad Afif ; interv. Ivar Soopan

    Index Scriptorium Estoniae

    Afif, Mohamad

    2005-01-01

    Liibanoni shiiitide organisatsiooni Hizbollah meediasuhete direktor ütleb, et Hizbollah ei ole terroriorganisatsioon. Religioosse ja poliitilise grupina tahab Hizbollah häid suhteid teistega kõikjal maailmas, kuid probleem on poliitikas, selles, kuidas USA suhtub nende regiooni, tõekspidamistesse

  20. What's Going on in Your Professor's Head? Demonstrating the Id, Ego, and Superego

    Science.gov (United States)

    Segrist, Dan J.

    2009-01-01

    This article describes an in-class activity designed to demonstrate Freud's structural theory of the psyche, specifically the roles of the id, ego, and superego, as well as the interplay among them. Additionally, the activity visually illustrates Freud's ideas about the levels of consciousness associated with these 3 components. Pre-post quiz…