Version control system of CAD documents and PLC projects

被引:2
作者
Khudyakov, P. Yu [1 ,2 ]
Kisel'nikov, A. Yu [1 ,2 ]
Startcev, I. M. [1 ,3 ]
Kovalev, A. A. [1 ,3 ]
机构
[1] Ural Fed Univ, 19 Mira St, Ekaterinburg 620002, Russia
[2] Tech Univ UMMC, 3 Uspenskiy Ave, Verkhnyaya Pyshma 624090, Russia
[3] Ural State Univ Railway Transport, 66 Kolmogorov St, Ekaterinburg 620034, Russia
来源
INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4 | 2018年 / 1015卷
关键词
D O I
10.1088/1742-6596/1015/4/042020
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The paper presents the process of developing a version control system for CAD documents and PLC projects. The software was tested and the optimal composition of the modules was selected. The introduction of the system has made it possible to increase the safety and stability of the process control systems, as well as to reduce the number of conflicts for versions of CAD files. The number of incidents at the enterprise related to the use of incorrect versions of PLC projects is reduced to 0.
引用
收藏
页数:5
相关论文
共 10 条
[1]   A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis [J].
Abdo, H. ;
Kaouk, M. ;
Flaus, J. -M. ;
Masse, F. .
COMPUTERS & SECURITY, 2018, 72 :175-195
[2]   A mixed fuzzy probabilistic approach for risk assessment of dynamic systems [J].
Abdo, H. ;
Flaus, J-M .
IFAC PAPERSONLINE, 2015, 48 (03) :960-965
[3]   A review on the applications of programmable logic controllers (PLCs) [J].
Alphonsus, Ephrem Ryan ;
Abdullah, Mohammad Omar .
RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2016, 60 :1185-1205
[4]   Risk-based maintenance - Techniques and applications [J].
Arunraj, N. S. ;
Maiti, J. .
JOURNAL OF HAZARDOUS MATERIALS, 2007, 142 (03) :653-661
[5]  
Barbosa R. R. R., 2012, P IEEE 17 INT C EM T, P1, DOI [10.1109/ETFA.2012.6489745, DOI 10.1109/ETFA.2012.6489745]
[6]   The industrial control system cyber defence triage process [J].
Cook, Allan ;
Janicke, Heige ;
Smith, Richard ;
Maglaras, Leandros .
COMPUTERS & SECURITY, 2017, 70 :467-481
[7]   Visualizing and exploring software version control repositories using interactive tag clouds over formal concept lattices [J].
Greene, Gillian J. ;
Esterhuizen, Marvin ;
Fischer, Bernd .
INFORMATION AND SOFTWARE TECHNOLOGY, 2017, 87 :223-241
[8]   Combined application of Product Lifecycle and Software Configuration Management systems for ITER remote handling [J].
Muhammad, Ali ;
Esque, Salvador ;
Aha, Liisa ;
Mattila, Jouni ;
Siuko, Mikko ;
Vilenius, Matti ;
Jarvenpaa, Jorma ;
Irving, Mike ;
Damiani, Carlo ;
Semeraro, Luigi .
FUSION ENGINEERING AND DESIGN, 2009, 84 (7-11) :1367-1371
[9]   Assessing and augmenting SCADA cyber security: A survey of techniques [J].
Nazir, Sajid ;
Patel, Shushma ;
Patel, Dilip .
COMPUTERS & SECURITY, 2017, 70 :436-454
[10]   Cyber security of a power grid: State-of-the-art [J].
Sun, Chih-Che ;
Hahn, Adam ;
Liu, Chen-Ching .
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2018, 99 :45-56