2019 8th International Conference on Industrial Technology and Management (ICITM) 2019
DOI: 10.1109/icitm.2019.8710731
|View full text |Cite
|
Sign up to set email alerts
|

Towards the Selection of Optimum Alarms System in Leading Industry Automation Software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Smartphones and mobile devices can provide a portable remote access of production plants to the operating engineers [20]. They can remotely silence an alarm or send commands to the industrial process [24]. With the increasing trend of mobile devices in daily lives [22], same sort of UIs is now demanded in industrial control systems as well.…”
Section: ) Mobile Based Hmi Approachesmentioning
confidence: 99%
“…Smartphones and mobile devices can provide a portable remote access of production plants to the operating engineers [20]. They can remotely silence an alarm or send commands to the industrial process [24]. With the increasing trend of mobile devices in daily lives [22], same sort of UIs is now demanded in industrial control systems as well.…”
Section: ) Mobile Based Hmi Approachesmentioning
confidence: 99%
“…Particularly, there are four major types of alarms i.e. Limit, Deviation, Rate-of-Change (RoC) and Digital Alarms [37]. In this regard, alarm server should be able to support all four types of alarms.…”
Section: Figure 2 Architecture Of Alarm System In Industrial Controlmentioning
confidence: 99%
“…However, such studies are unable to simultaneously support both iOS and Android platforms. On the other hand, there exist complete and reliable alarms solutions in industry automation suites [37] (e.g. Genesis64 etc.).…”
Section: Figure 2 Architecture Of Alarm System In Industrial Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to achieve the deep integration of IT (Information Technology) and OT (Operational Technology), various Linux operating systems have been widely applied in critical industrial devices, for example, an open-source industrial IoT gateway is designed by exploiting the micro-service of Docker, whose software solutions are mainly based on Linux [8]; a software CNC (Computerized Numerical Control) controller which runs the Linux real-time operating system is developed to implement the EPL (Ethernet Powerlink) stack as a real-time kernel module [9]; SIMATIC WinCC which is widely used in today's industrial control systems can also provide the cross-platform support for Linux [10]. As a result, the vulnerabilities of Linux operating system become a subject worthy of special attention, and some potential security threats which aim at damaging or infecting the Linux operating system are coming to the surface.…”
Section: Introductionmentioning
confidence: 99%