Research Article
Automation of a Pharmaceutical Batch Mixer Using Programmable Logic Controller (PLC) and Supervisory Control and Data Acquisition System (SCADA)
Augustine Kweku Mbeah*,
Erwin Normanyo
Issue:
Volume 12, Issue 4, December 2024
Pages:
71-107
Received:
9 August 2024
Accepted:
5 November 2024
Published:
26 November 2024
Abstract: This research results from the need for an effective, reliable, and highly flexible method of control of processes within a small pharmaceutical environment and will be programmed using Ladder Logic programming Language, Siemens Step 7, which entails integrating hardware and software to provide dependable and effective operations. The mixer is controlled through a Supervisory Control and Data Acquisition (SCADA) system and programmed using Ladder Logic in Siemens Step 7 PLC Programming Software. Temperature control, agitation control, and ingredient addition sequences were all integrated by the automated system. The performance of the modeled system is validated through computer simulations. The Batch Mixer is controlled using a Variable Speed Drive (VSD), enabling precise execution of the required processes throughout the entire mixing cycle. Each phase of the process is carefully controlled and monitored, with detailed simulation results demonstrating enhanced performance and efficiency in the proposed batch mixer system, as well as offering a mathematical model of the Batch Mixer and outlining the performance variables that the PLC systems use in detail. As a backup validation tool, Rockwell Automation's RSLogix 5000 PLC is used to verify the validation. The study demonstrates the effectiveness of using Siemens STEP 7 PLC for automation and validation, and with RSLogix 5000 PLC for confirmation of validation, ensuring reliable and efficient pharmaceutical batch mixing operations.
Abstract: This research results from the need for an effective, reliable, and highly flexible method of control of processes within a small pharmaceutical environment and will be programmed using Ladder Logic programming Language, Siemens Step 7, which entails integrating hardware and software to provide dependable and effective operations. The mixer is cont...
Show More
Research Article
How to Improve the Security of Password Checkers
Tri Minh Ngo*
Issue:
Volume 12, Issue 4, December 2024
Pages:
108-113
Received:
18 October 2024
Accepted:
2 December 2024
Published:
18 December 2024
DOI:
10.11648/j.acis.20241204.12
Downloads:
Views:
Abstract: After years of the attempt to replace password with other alternatives such as biometrics and smart cards, password is still the most pervasive user authentication mechanism. The password checking authentication is widely used for financial services, online social networks, and many other applications. This paper aims to analyze the security of a password checker qualitatively and quantitatively, and show how to improve it. Qualitative security analysis, in which it does not allow any information flow from secret date to public data, considers that the password checker is not a secure process. Therefore, an alternative analysis for the password checker is to analyze quantitatively, i.e., quantifying its information flow and determining how much secret information has been leaked. This method can be used to decide whether we can tolerate small leakages. A quantitative security analysis can be seen as a generalization of a qualitative one. To improve the security of the password checker, we propose a noisy-output policy, i.e., a situation where a system operator is able to add noise to the output: instead of always producing the exact outcomes, the system sometimes reports noisy outcomes. The noisy outcomes reduce the correlation between the output and the input, and thus reduce the leakage.
Abstract: After years of the attempt to replace password with other alternatives such as biometrics and smart cards, password is still the most pervasive user authentication mechanism. The password checking authentication is widely used for financial services, online social networks, and many other applications. This paper aims to analyze the security of a p...
Show More