scholarly journals Overlapping control systems with optimal information exchange

Automatica ◽  
2009 ◽  
Vol 45 (5) ◽  
pp. 1176-1181 ◽  
Author(s):  
Somayeh Sojoudi ◽  
Amir G. Aghdam
Author(s):  
A. N. Brysin ◽  
Yu. A. Zhuravleva ◽  
A. S. Mikaeva ◽  
S. A. Mikaeva

The article describes an electronic multifunctional adder for electricity metering SEM-3. The authors give the technical characteristics, the device and the principle of its operation. The presented adder is designed to monitor and account for the consumption of electricity generation and power directly from consumers, as well as in automated centralized accounting and control systems, and is designed for round-the-clock operation. The adder can collect and transmit information over six independent serial interfaces. The adder with a builtin GSM module provides bidirectional information exchange via cellular modem communication with remote devices and the transfer of accumulated data to the upper level of the automated electricity metering system. It provides bidirectional exchange of information over a local network with a PC over the built-in 10/100 Base-T Ethernet interface.


2021 ◽  
Vol 94 ◽  
pp. 144-155
Author(s):  
E. P. Grabchak ◽  
◽  
E. L. Loginov ◽  

Introduction. One of the most important tasks in achieving reliability and safety of power supply as an element of ensuring technospheric security is the modernization of automated information and control systems for the transmitting and receiving sides, which ensures resistance against known types of attacks. The aim of the study is to solve the problem of secure information exchange within the framework of automated information and control systems, taking into account the low security of technological communication channels of power facilities to achieve the reliability and safety of power supply as an element of ensuring technospheric security based on the development of intelligent methods for detecting dangerous influences and intrusions to neutralize information security threats in relation to commands to control power equipment. Research methods. Within the framework of the study, general scientific and special methods of scientific knowledge were used, including analysis, synthesis, generalization, which were based on the main provisions and patterns of behavior of systems and information theory. Research results. It is proposed to create innovative algorithms for controlling power equipment, built on the basis of libraries of reference commands and reference sequences of commands used to replace commands intentionally or accidentally distorted by erroneous bits, as well as diagnosing vulnerabilities of information and control systems to ensure the correctness of the process of controlling power equipment. Conclusion. The listed technologies will make it possible to create a new class of efficient algorithms for power equipment control, built on the basis of intelligent methods for detecting dangerous influences and intrusions to neutralize information security threats in relation to control commands based on the analysis of high-level behavioral characteristics of the protected information and control system with the function of controlling the transition of the controlled system to the next a condition that depends on the exact correspondence of the generated commands to the reference commands and the reference sequence of commands, which will ensure the correctness of the control process of power equipment. Key words: energy, information and control networks, reliability, security, power supply, algorithms, monitoring, protection, information.


2020 ◽  
Vol 16 (2) ◽  
pp. 58-64
Author(s):  
Serhii Zinchenko ◽  
Vadym Mateichuk ◽  
Pavlo Nosov ◽  
Ihor Popovych ◽  
Oleksandr Solovey ◽  
...  

Abstract One of the ways to reduce human influence on the control process is the development of automated and automatic control systems. Modern control systems are quite complex and require preliminary ground testing. The article considers the issues of creating Imitation Modelling Stand for such control system synthesis and testing. For this reason, a Control System Model was integrated into the local computer network of the navigation simulator NTPRO 5000. The authors of the paper developed and tested software for information exchange between the navigation simulator and the Control System Model. The authors also developed a functional module of collision avoidance with many targets for testing in a closed loop system with virtual training objects. The results showed that the developed Imitation Modelling Stand allowed developing and testing functional modules of the control systems. In comparison with the found analogues, it is easy to include in a closed simulation cycle various models of command devices, actuators, control objects, objects of training scene, weather conditions; it is universal both for solving problems of manual control and for developing and testing automatic and automated control systems; it is not highly specialised and is created at minimal costs.


2006 ◽  
Vol 81 (3) ◽  
pp. 677-712 ◽  
Author(s):  
Madhav V. Rajan ◽  
Richard E. Saouma

At the heart of decentralization lies the notion that tasks are delegated by owners to managers who possess superior local information. The extent of this information asymmetry is often an endogenous construct, as it is influenced by the owner's choice of internal accounting systems and the manager's investment in acquiring local expertise. In this paper, we explore how varying levels of pre-contract, asymmetric information affect the owner-manager relationship. We provide three main sets of insights. First, we find that the owner's payoffs are initially decreasing, and strictly convex everywhere, in the quality of the manager's private information. The owner thus prefers to deal with either a perfectly informed or a perfectly uninformed manager, and we characterize conditions for either to be the preferred choice. Second, in contrast to recent work, we demonstrate that when information can be communicated internally, the optimal strength of managerial incentives unambiguously decreases as the manager becomes better informed. Third, we derive the surprising result that a self-interested manager does not always prefer to maximize his informational advantage. Our work has implications for the optimal design of organizations, and for internal accounting and control systems in particular.


Sign in / Sign up

Export Citation Format

Share Document