Process Engineering White Papers

41-60 of 61 < first | | | last >
  • Design Tips for Sensing Probes

    This application note from Delta Controls outlines selection and installation criteria for using admittance probes to monitor the level of powders, liquids and other materials. Dielectric constants of more than 200 materials are included.

    Delta Controls
  • Specifying industrial fieldbus networks for automation

    Automation designers face many challenges and tradeoffs in the development of a successful network solution. This white paper discusses the necessary choices in selecting a network technology appropriate for various specific applications.

    Texas Instruments
  • Securing Process Control Network External Communications

    In the real world, sharing PCN data with external systems and accessing PCN systems from external sources is fast becoming a business necessity. This paper provides some generic guidelines for enabling secure connectivity between PCNs and external systems.

  • PACs for industrial control: The future of control

    With a number of vendors producing Programmable Automation Controllers that combine the functionality of a PC and reliability of a PLC, PACs today are increasingly being incorporated into control systems. This white paper explores the origins of the PAC, how PACs differ from PLCs and PCs, and the future direction of industrial control with PACs.

    National Instruments
  • Hazard Communication Guidelines for Compliance

    OSHA’s Hazard Communication Standard (HCS) is based on a simple concept—that employees have both a need and a right to know the hazards and identities of the chemicals they are exposed to when working.

  • Security vulnerability assessment revealed

    Plant security is a key priority at many plants. This 10-page paper provides background what the methodology for a plant vulnerability analysis involves. It covers topics such as how to get started, available tools, and risk assessment.

  • Methods of determining safety integrity level (SIL)

    This 17-page whitepaper discusses the application of two popular methods of determining SIL requirements – risk graph methods and layer of protection analysis (LOPA) – to process industry installations.

    4-sight consulting
  • Understanding alarm management

    This nine-page PDF whitepaper discusses the pitfalls of alarm management and how mistakes in the past have been quite costly. It then addresses these mistakes and gives an overview of proper alarm management.

    4-sight Consulting
  • How to control a process with long dead time

    A process with a large dead time presents a special challenge for a controller --  any controller. This short paper explains how to get the best control of large dead time processes.

  • Level measurement of bulk solids and powders

    This 26-page white paper from Monitor Technologies discusses the difficulties in measuring bulk solids and powders in bins, silos and hoppers.  Download this document to learn which technologies are out there that can make this job easier.

    Monitor Technologies
  • Security Vulnerability Analysis

    Plant security is a key priority at many plants. This 10-page paper provides background what the methodology for a plant vulnerability analysis involves. It covers topics such as how to get started, available tools, and risk assessment.

  • Ziegler-Nichols Tuning Rules And Limitations

    The standard reference for PID tuning seems to be the Ziegler-Nichols tuning rules developed in 1942 on a pneumatic controller. Here is how to tune a controller using these rules.

  • RFID in Manufacturing

    In the wake of a Wal-Mart mandate requiring top suppliers to put Radio Frequency Indentification (RFID) tags on cases and pallets of consumer goods by January 2005, Rockwell Automation offers this white paper to help educate manufacturers on how to maximize their investment in RFID technology throughout their enterprise and supply chains. The paper provides a practical guide to extracting measurable value from RFID implementations in plant and warehousing operations.

  • Layered Security in Plant Control Environments

    Process control vendors are migrating plant control technologies to more open network and operating environments. This White Paper explains how layered security can be accomplished by adopting a "best practices" model, developing and implementing an access control plan, and compartmentalizing the network.

    Ensuren Corp.
  • Application of Fingerprints to Increase Security

    This 9-page paper summarizes the various applications and benefits of the use of fingerprints to restrict access to information and transactions. It covers access via the Internet and other networks as well as physical access.

  • Control System Security: Interacting with IT

    Operations staff and plant engineers also have a keen interest in the security of control networks. They are responsible for the reliability, availability, safety and integrity of the process. Their facilities are the ones producing products and earning revenues, so their concerns, priorities and knowledge must also be considered when determining security options.

  • Achieve 21 CFR Part 11 Compliance

    This technical white paper discusses Yokogawa’s CENTUM CS 3000 R3 DCS (Distributed Control System) product and the extent of its compliance with Part 11 of Title 21 of the Code of Federal Regulations (21 CFR Part 11), the Electronic Records/Electronic Signatures Rule.

41-60 of 61 < first | | | last >