Sunday, December 12, 2010

When Did History Begin?

You must have heard the statement that 'history has begun at Sumer.' The evidence we have today indeed show that it actually had begun between 4000-1000 BC.; If history had started with writing then the first page was written in Mesopotamia about 6000 years ago!

Sumerians started keeping record of their times in the form of pictograms on clay tablets, and around 3000 BC. a form of cuneiform writing and a full syllabic alphabet appeared. Peoples in the neighbouring lands has adopted, amended and used this alphabet according to their needs.

Thursday, November 11, 2010

sparks of reflection

Do you know why the windshield of a car so big and rearview mirror of a car so small? Because our PAST are not as important as our FUTURE. Look to the future and move forward!

Sunday, October 10, 2010

Superior Beings aka Out-of-this-world entities, so called "divine" beings

They are "superior" because human beings consider themselves inferior and powerless in the face of the natural phenomena almost all of which either originate from the skies or the result of atmospheric events. Sky is "up there." The force of aerial phenomena is "overwhelming."

There must be "something" or "someone up there doing all this to the earthlings living down on the earth." Furthermore the earthly phenomena like earthquakes, volcanoes, eruptions and subsidences, possibilities, probabilities and chance all come together and create this idea of "superior beings."

Thursday, September 9, 2010

At the root of faith we have incomprehensibility, perplexity, obscurity, ambiguity, mystification (choose the one you please)

Those who wrote down the rules of the faiths did it intentionally. What did the believers do? They just believed, and they still do, because none of the supposed facts of faith is clear. So the believers had no choice but to take the stories for granted. They had no choice because they needed something and the faith has provided for their needs. They had no choice because the whole thing was an enigma, and the best thing seemed to be to believe without questioning.

Sunday, August 8, 2010

Manifold


Manifold is an object that has no end or limitation but not an infinity, but closed like a globe shape and has no sharp curves or surfaces. Which are algebraic manifolds, is also the geometry objects that can be expressed in the equation. Simple illustration: x²+ y² = 1 is a circle, while xy = 1 is a form of hyperbola.


Wednesday, July 7, 2010

Smart Valve Control

another smart valve control, using microsoft visual basic 3.0 and electronic interfacing. Well, I build this model (1998) using stepper motor (for valve control) and LDR for sensing the fluid inside the tank.

Sunday, June 6, 2010

Are you sure what you know is right?

What is the western perception of primal religions? What do you know about these primitive societies and their beliefs? Let's find the answers by citing those examples (The Elements of World Religions, Liz Flower) which will take us on our road to the sole God: The popular belief is that primal religions are animistic, ancestor-worshipping, sacrificial, fetishistic, ritualistic, shamanistic, superstitious, and polytheistic. But the truth is rather different.

Most of these tribal and primal societies have a very strong social structure. And much of their religion is based on that structure. Dignity in life and death is paramount. Morality is conformation to traditions. Everything has a particular reason, everything has its place. They have a surprising tolerance. Most communities recognize that their belief is theirs, and do not necessarily involve the community next door. There are differences of course. We come across a plurality of beliefs, myths, cosmologies and rituals.

The bottom line is: There is a strong social structure.. Religion is based on that structure.. Dignity is paramount.. Everything has its reason.. Everything has its place.. There is tolerance to other beliefs.. Everything sounds more natural and simpler than today.

Which is better? Today's speculation and ambiguity or their simplicity?

Although there are great differences, the primal religions worldwide have originated from a half dozen basic beliefs. Majority of the primal religions are monotheistic. Surprised? All of them have a fundamental belief in the power of spirits. There is ancestor worship/reverence in the majority of primal religions. A kind of prayer, gifts, and sacrifice exist in most of them. There are also a medicine man and a shaman or a witch doctor. Lastly, majority of these primal religions have celebrations of a new season or a new year.

Wednesday, May 5, 2010

I miss this things

what an old 6200 mix_plant in the new old face RSLogix :) First time I wrote the program using AI 6200 Logistic, paired with winlinx and rsview32 in 1997, in the next 7 years I opened it using RSLogix, RSLinx and RSView. I think no one remember about old AI 6200 Ladder Logistic and "mr.never fail" PLC5/40E.

Sunday, April 4, 2010

VB 3.0 Heat and Mass Balance for Deaerator

This program developed using Visual Basic 3.0 for calculate the deaerator of small scale CFSPP's heat and mass balance. The variable inputs are:

  1. Pressure [bar]
  2. Temperature [C]
  3. Deaerator efficiency [%]
Calculation results are:

  1. Steam Flow required from high pressure pipe (from turbine)[kg/s]
  2. Water Flow required from LP Heater [kg/s]

and also calculate The Steam and water properties:

  1. Enthalpy [kj/kg]
  2. Steam_flow [kg/s]
  3. Specific Volume [m3/kg]
  4. Specific Entropy [kJ/kg.K]
  5. Internal energy [kJ/kg]
  6. Dynamic Viscosity [kg/m.s]
  7. Thermal Conduct [W/m.K]

Wednesday, March 3, 2010

Strategies to Developing SCADA Security

Development of the industry, makes more complex problems faced related to control systems and security. In general, SCADA is still relevant enough to be used as a control system that is capable of controlling several machines control in different areas. In line with the increasing fragility of attacks against SCADA cyber attack that also need proper treatment.

SCADA security systems today require the integration of several functions of controllers such as firewalls, proxy servers, operating systems, coating application systems, communications, and policies and procedures. For the implementation of SCADA security strategy then you need security measures to keep the network as follows:

Strategies Developing SCADA
  • Border Router and Firewalls
  • Cyber ​​attacks are usually carried out by sending the software to penetrate the internal private network. If the security system is not protected SCADA Firewalls are configured correctly then your security system is not good enough to protect passwords, IP addresses, files and so on.

  • Proxy Servers
  • Packets of data sent or passing through TCP / IP should have been entered in the resource control layer applications such as Hyper Text Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP). To strengthen the security system SCADA proxy server acts as a firewall to protect the traffic between a protected network and the Internet. These systems are relatively safe although security with proxy servers will not eliminate the threat of the layer attacks application.

  • Operating Systems
  • As the brain of the computer system, the operating system became the main target of cyber attacks. There are 2 options for securing this system namely through the operating system upgrade to newer versions or migration by replacing opeating system to a higher version. For the safety of Operating Systems should really upgrade to the latest version and there is no compromise for any irregularities that exist.

  • Applications
  • Some viruses are intentionally sent to undermine the security of SCADA systems such as buffer overruns, worms, Trojan Horse, Active-X5 codes, and other malicious programs that we need to anticipate. Viruses and works by paralyzing anti-virus software and bypassing the firewall as if it had no security protection there

  • Policies and Procedures
  • In addition to programs designed to address cyber attacks, it is necessary also the policies that govern the discipline of the user in performing the procedure. The policies and procedures include the selection of a secure password with a combination for example with at least one symbol, a capital letter and a number, and should be more than eight characters.

  • SCADA Firewalls
  • SCADA network security can be strengthened with layers of firewalls between the system SCADA network and the Internet. System security threats are often due to internal factors such as the employee who accidentally did not record the procedures performed and it turns out it can be compromised using the hacking method that is similar to what he did.

  • SCADA Internal Network Design
  • Internal SCADA network must have its own IP and run by using intelligent switches and sub-masking techniques appropriate to protect the system from cyber attack. The use of Ethernet Wireless and Wired Equivalent Protocol (WEP) can be an alternative to change the default name of the Service Set Identifier6 (SSID).

Conclusion

Supervisory Control and Data Acquisition (SCADA) system is the important control processes in many countries. This system performs important functions vital to many companies such as electric power companies, gas - natural, petroleum, water treatment, sewage treatment, and even the railway. However, considerations in terms of safety in the design of this system have received less attention, so the potential for interference from unauthorized access can occur. This review above will provide you several important phases to protect your system from cyber attack. By learning more methods you will get alternatives and the implementation of effective and economical control system.

Tuesday, February 2, 2010

Superheated Steam

Superheated Steam is steam which does not have any water droplets. When saturated steam is heated, the water droplets which are suspended get converted into steam. Superheated steam is also called dry steam. Superheated Steam is used to drive turbines.

Superheated steam has a lower density and higher temperature.

The main advantage of superheated steam is that there are no droplets. In turbines, where the steam moves at high velocity, any water droplet which hits the turbine blades can seriously damage the blades or cause corrosion.

Superheated Steam can store large quantities of internal energy and can release them during expansion. This is utilized in turbines. Superheated Steam has higher change in specific volume when it cools. This enables better efficiency in turbine operation.

Superheated Steam has low oxygen. Hence, there is a reduced risk of corrosion in components using superheated steam.

Friday, January 1, 2010

Saturated Steam

When water is heated to the boiling point at a given pressure, its temperature rises. However, once the boiling point is reached, the temperature stops to rise. The energy which is fed to the water is used to convert the water to vapour.

The heat which is given to the water converts it into the vapour state. This is known as the latent heat of vaporization. The steam produced in this stage contains water droplets. The temperature does not rise till all the water has been converted into steam.

The steam which contains suspended droplets of water is called saturated Steam.

Saturated Steam is used widely in the industry for drying, heating. It is also used in cooking as it has a high energy transfer coefficient.

If the steam is heated further, all the water is converted into steam. The steam, at this stage, is called superheated steam