33 resultados para Computer control systems
Resumo:
In Italy, standards for the management of free-roaming dogs (FRDs) are defined by regional norms, generating a high variability of approaches around the country. Despite efforts carried out by the competent authorities, FRDs are still a reality impacting upon animal health and welfare and public costs. A similar scenario can be found in many other Mediterranean and Balkan counties. Here we present 14 years of data (2000–2013) retrieved from the admission dog registry of a public shelter (PS) responsible for the collection of stray dogs from one Italian province. The aim of this retrospective study was to describe the local FRD population, identifying its source and to evaluate the effectiveness of the actions implemented by the local authorities. In the investigated period, 7,475 dogs were admitted to the PS. Despite the intense sterilisation plan (mean 381.7 sterilisations per year), the overall number of dogs entering PS did not decrease consistently across the years. Results highlighted a lack of responsibility of owners by failing to sterilise and identify their dogs and allowing intact animals to roam free, therefore producing uncontrolled and unwanted litters. The current dog population management strategy, based on both sheltering and capture-neuter-release programmes, is insufficient to tackle the straying phenomenon. Educational and sterilisation programmes should be an integral part of a successfully implemented FRD control plan. Our results provide further insight on free-roaming dog population dynamics and control systems, and may have important implications for many other local contexts across Europe trying to overcome the straying phenomenon.
Resumo:
In this brief, a hybrid filter algorithm is developed to deal with the state estimation (SE) problem for power systems by taking into account the impact from the phasor measurement units (PMUs). Our aim is to include PMU measurements when designing the dynamic state estimators for power systems with traditional measurements. Also, as data dropouts inevitably occur in the transmission channels of traditional measurements from the meters to the control center, the missing measurement phenomenon is also tackled in the state estimator design. In the framework of extended Kalman filter (EKF) algorithm, the PMU measurements are treated as inequality constraints on the states with the aid of the statistical criterion, and then the addressed SE problem becomes a constrained optimization one based on the probability-maximization method. The resulting constrained optimization problem is then solved using the particle swarm optimization algorithm together with the penalty function approach. The proposed algorithm is applied to estimate the states of the power systems with both traditional and PMU measurements in the presence of probabilistic data missing phenomenon. Extensive simulations are carried out on the IEEE 14-bus test system and it is shown that the proposed algorithm gives much improved estimation performances over the traditional EKF method.
Resumo:
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.