The subject matter disclosed herein relates to a system and method of monitoring the operation of providing services by a utility, such as a public utility, and in particular to a system and method of securing actions performed by control systems of the utility.
Complex systems, such as public utility systems (e.g. electrical distribution, water distribution, natural gas distribution, district heating systems) or processing plants (e.g. oil refineries, food production) for example, often have a variety of equipment that may be remotely controlled. Traditionally, these systems required human operators to manually travel to the location of the equipment when a change was made. It should be appreciated that this was slow, costly, and did not allow the system operator to change the system operation to accommodate changing conditions. It should be appreciated that the centralization of the control function (whether in a single location or a plurality of locations) allows for increased efficiency, reduced costs and improved customer satisfaction.
The operation of these complex systems may be impacted by the transmission of control signals that interrupt the functioning of the system. For example, in an electrical utility system the opening of a circuit breaker may result in a loss of electrical power to customers. In some cases this type of activity may be needed, such as to de-energize a section of the electrical distribution network to allow service personnel to perform maintenance or repairs. It should be appreciated that if an operator inadvertently transmits a wrong command, or if an unauthorized user intentionally transmits a command, that unplanned outages of service may occur. In the case of an unauthorized user, attempts to restore service may be thwarted by the unauthorized user transmitting additional commands.
Accordingly, while existing monitoring and control systems are suitable for their intended purposes the need for improvement remains, particularly in providing a system that allows for categorization and selective validation of commands that may result in a service interruption.
According to one aspect of the disclosure a method of operating a utility system having a plurality of equipment for controlling the operation of the utility system is provided. The method includes receiving, from a user, a control action for at least one of the plurality of equipment and determining an impact of the control action on the operation of the utility system. It is determined, based at least in part on the impact of the control action, that a predetermined condition may occur as a result of executing the control action. An authentication check is performed on the user prior to executing the control action.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include terminating the control action when the authentication check is not satisfied. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include activating an alarm when the authentication check is not satisfied. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include generating a log entry in a database when the authentication check is not satisfied.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include the predetermined condition being a load shedding event. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include the predetermined condition being a network shutdown.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include the predetermined condition being a single event disconnect for at least one of the plurality of equipment. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include determining when the user has issued greater than a predetermined number of control actions within a predetermined number of minutes. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include performing the authentication check when the user has issued greater than the predetermined number of control actions within the predetermined number of minutes.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include the determining of the impact of the control action being performed by artificial intelligence system, the artificial intelligence system being based on a trained model. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include training of the artificial intelligence system to determine an impact of a control action.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include the training that comprises: receiving training data that comprises control actions, utility system parameters, utility system conditions prior to the execution of the control action, and utility system conditions after execution of the control action; creating a model to predict the predetermined condition by analyzing the training data; evaluating utility system conditions in live data received from the utility system based on the trained model by the artificial intelligence system, the live data including control actions and utility system conditions; and outputting a result of the evaluation of the utility system conditions after execution of the control action, the result identifying a probability level of a predetermined condition occurring. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include the training further comprises supervised training. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include the authentication check comprises using multifactor authentication.
According to another aspect of the disclosure a utility system. The utility system comprising a plurality of control equipment coupled to the utility system. A plurality of sensors are coupled to the utility system. One or more processors operably coupled to the plurality of control equipment and a plurality of sensors, wherein the one or more processors are operable to: receive, from a user, a control action for at least one of the plurality of equipment; determine an impact of the control action on the operation of the utility system; determine, based at least in part on the impact of the control action, that a predetermined condition may occur as a result of executing the control action; and perform an authentication check on the user prior to executing the control action.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the utility system may include the one or more processors being further operable to activate an alarm when the authentication check is not satisfied. In addition to one or more of the features described herein, or as an alternative, further embodiments of the utility system may include the predetermined condition having at least one of a load shedding event, a network shutdown, and a single event disconnect of one of the plurality of equipment.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the utility system may include the determining of the impact of the control action being performed by artificial intelligence system, the artificial intelligence system being based on a trained model.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the utility system may include a training of the artificial intelligence system that comprises: receiving training data that comprises control actions, utility system parameters, utility system conditions prior to the execution of the control action, and utility system conditions after execution of the control action; creating a model to predict the predetermined condition by analyzing the training data; evaluating utility system conditions in live data received from the utility system based on the trained model by the artificial intelligence system, the live data including control actions and utility system conditions; and outputting a result of the evaluation of the utility system conditions after execution of the control action, the result identifying a probability level of a predetermined condition occurring.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the utility system may include the utility system parameters and utility system conditions being based at least in part on signals from the plurality of sensors.
These and other advantages and features will become more apparent from the following description taken in conjunction with the drawings.
The subject matter, which is regarded as the disclosure, is particularly pointed out and distinctly claimed in the claims at the conclusion of the specification. The foregoing and other features, and advantages of the disclosure are apparent from the following detailed description taken in conjunction with the accompanying drawings in which:
The detailed description explains embodiments of the disclosure, together with advantages and features, by way of example with reference to the drawings.
Embodiments of the present disclosure provide for a system for operating a utility system, such as an electrical distribution network for example. Further embodiments provide for automatically categorizing a command signal and selectively authenticating user based on a predicted system response. Still further embodiments of the present disclosure facilitate an artificial intelligence (AI) system to be trained using supervised learning to categorize a command signal based on a predicted system response and authenticating the user based thereon. Further, in one or more embodiments of the present disclosure, the AI system can selectively continue the executions of the command signal in response to a validation of an authentication signal.
It should be appreciated that while aspects of this disclosure refer to a method and system for operating an electrical distribution system, this is for exemplary purposes and the claims should not be so limited. In other embodiments, other types of complex or interconnected systems may be operated in a similar manner, these systems may include, but are not limited to natural gas distribution systems, water distribution systems, steam distribution systems, food production facilities, oil refinery systems, railroad traffic control systems, and aircraft traffic control systems for example.
It should further be appreciated that embodiments herein provide for a system and method of providing a technical solution for improving security of a complex or interconnected system, such as an electrical distribution or transmission system for example, in an efficient manner based at least in part on the type of transaction or command that is being executed. As such, embodiments of the system and method provided herein improve security while minimizing or at least reducing the overhead or impact of the security measures on operations while simultaneously reducing, mitigating, or eliminating undesirable actions by unauthorized or malicious actor(s).
Referring now to
The main transmission system 104 typically consists of high transmission voltage power lines, anywhere from 69 KV to 500 KV for example, and associated transmission and distribution equipment which carry the electrical power from the point of production at the power plants 102 to the end users located on local electrical distribution systems 106, 109. The local distribution systems 106, 109 are connected to the main distribution system by area substations 112 which reduce transmission voltage to distribution levels such as 13 KV, 27 KV or 33 KV. Area substations 112 typically contain one or more transformers, switching, protection, and control equipment. Area substations 112 all include circuit breakers to interrupt faults such as short circuits or over-load currents that may occur. Substations 112 may also include equipment such as fuses, surge protection, controls, meters, capacitors, and load tap changers for voltage regulation.
The area substations 112 connect to one or more local electrical distribution systems, such as local distribution system 106, for example, that provides electrical power to a commercial area having end users such as an office building 114 or a manufacturing facility 116. In an embodiment, the area substation 112 may have two or more feeder circuits that provide electrical power to different feeder circuit branches 107, 108 of the local distribution system 106.
The residential distribution system 109 includes one or more residential buildings 126 and light industrial or commercial operations. Similar to the commercial distribution network 106, the residential system 109 is divided into multiple branch feeders 110, 111 that are fed by the substation 112. In an embodiment, the local distribution system 109 is arranged such that approximately up to 6 MVA of power is provided on each branch circuit for electrical loads such as residential buildings.
In each of the local distribution systems 106, 109, there may be disconnect equipment 40, 130, sometimes referred to as a recloser, that allows the electrical separation of different parts of the local distribution system 106, 109. In this way if there is a loss of service on one part, such as section 108 or section 111 (e.g. a tree falls during a storm), by opening the disconnect equipment 40, 130 service may be returned to the other sections 107, 110.
It should be appreciated that the utility system 100 may have one or more control centers 150, 160. The control center 150 may regulate and control the flow of electrical power through the main transmission system 104, while the control center 160 may control the flow of electrical power in the distribution systems 106, 109. It should be appreciated that the control centers 150, 160 may be connected to different pieces of control equipment within their respective systems 104, 106, 109 that allows operators within the control systems to effect changes in the systems 104, 106, 109 to adapt the systems 104, 106, 109 to different operating conditions. The control centers 150, 160 may further receive signals from a network of sensors 152, 162 that measure parameters and conditions on the utility system 100. At least some of the sensors 152, 162 may be coupled to or integral with the control equipment within the systems 104, 106, 109. The control centers 150, 160 may be connected to the control equipment, such as disconnect equipment 40, 130 for example, and sensors 152, 162 by wired or wireless communications mediums.
It should be appreciated that changing the operating state of equipment, or combinations of equipment, that are connected to the utility system 100 may result in a loss of service for customers, or potentially for the damaging of other equipment in the utility system 100. Thus, if an operator or an unauthorized user issues certain categories of commands, it may have undesired effects on the utility system 100 or portions thereof. It should be appreciated that in a complex system, such as utility system 100, only a small number of commands may results in undesired effects relative to the number of commands that are being executed.
Referring now to
The method 200 then proceeds to query block 208 where it is determined whether an authentication process should be initiated. When the probability of a control action resulting in a loss of service is less than a threshold, the query block 208 results in a negative and the control action is performed in block 210. In some embodiments, the loss of service may have to be above a threshold before the authentication is performed. For example, a 70% probability of loss of service to a single residential customer may not result in an authentication, but a 51% probability of a loss of service to a 1000 residential customers may initiate the authentication.
When the query block 208 results in an undesired operating condition (e.g. a high probability of loss of service to a large number of customers), the method 200 proceeds to block 212 where authentication is initiated. In the example embodiment, the authentication method is a multifactor authentication method. Multifactor authentication is a method that verifies a user by requiring two or more factors/evidence. The factors may include knowledge, possession, inherence, or location for example. The knowledge factor is something only the user knows, such as a password/code for example. The possession factor is something only the user has, such as a cellular phone or a security token. The inherence factor is a physical characteristic of the user, such as biometrics for example. The location factor is a somewhere the user is, such as connected to a specific network or a GPS location for example.
The method 200 then proceeds to query block 214 where authentication is confirmed. Where the user successfully provides the correct factors (when using a multifactor system), the query block 214 returns a positive (e.g the authentication check is satisfied) and the method 200 proceeds to block 210 where the action is performed. When the user does not provide the correct factors (e.g. the authentication check is not satisfied), the method 200 proceeds to block 216 where the control action is terminated. The method 200 may then proceed to optional block 218 where an alarm may be activated to alert other users/operators of an attempt to perform an undesired operating condition. In some embodiments, block 218 may be context sensitive, such as executing based on the severity of the undesired condition that could have occurred for example.
It should be appreciated that while embodiments herein may refer to the authentication of the user using multifactor authentication, this is for example purposes and the claims should not be so limited. In other embodiments other types of authentication now in use or later developed may be used, such as but not limited to blockchain, certificate, biometric, and token based authentication systems for example.
Referring to
In this embodiment, the method 300 may operate on a series of rules that identify undesired operating condition. It should be appreciated that while the embodiment of provides query blocks 308, 310, 312 as examples, in other embodiments the method may check the control-action/command against more or fewer rules. In an embodiment, the control-action/commands against which the method checks may be user-defined by the system operator for example.
In query block 308, the method 300 determines whether the control action will result in a load shedding event. As used herein, a load shedding is a system whereby the electrical utility can either disconnect or alter the operation of equipment (e.g. loads) at a customer's facility under certain conditions. For example, some electrical utilities have a program that allows them increase a temperature on an air conditioning thermostat to reduce energy consumption. When the query block 308 returns a negative (no load shedding), the method 300 proceeds to query block 310 where it is determined whether the control action will result in a partial or complete shutdown of the electrical distribution network. When the query block 310 returns a negative (no network shutdown), the method proceeds to query block 312.
In query block 312, the control action is evaluated to determine if the settings of a piece of equipment, such as disconnect equipment 40, 130 for example, is set to an undesired condition. In an embodiment where the equipment 40, 130 is a recloser device for example, an undesired setting may be to have the device lock open (e.g. disconnect electrical service) in response to a single tripping condition. In the case of a recloser device, this may be undesired because it may comprise the intended purpose of the device. In the case of a recloser device, it is intended to open and reclose multiple times in an attempt to automatically clear a fault that occurs on the system (e.g. a branch that falls on the powerline). When the query block 312 returns a negative (no undesired device setting change), the method 300 proceeds to block 314 where the control action is continued to be executed. It should be appreciated that once authentication has been confirmed, the system continues the execution of the command signal, including any additional processes or methods that would have been performed as part of the execution process. As used herein, the execution of a command does not mean the command will be immediately executed.
When query blocks 308, 310 return a positive, meaning a load shedding event or network shutdown will occur, the method 300 proceeds to block 316 where an authentication process is initiated. In an embodiment, when query block 312 returns a positive, the method 300 proceeds to query block 318 where it is determined if the user is issued a number of control actions greater than a threshold within a predetermined amount of time. When query block 318 returns a negative, the method 300 proceeds to continue the execution of the control action in block 314. When the query block 318 returns a positive, the method 300 once again loops to block 316 where an authentication process is initiated.
The authentication block 316 may be a multifactor authentication as described herein. The method 300 then proceeds to block 320 where authentication is confirmed, such as by the user providing a password (knowledge factor) and a scans their thumb with a fingerprint readers (inherence factor) for example. When the query block 320 returns a positive (i.e. user authentication check is satisfied), then the method 300 loops back to block 314 and control action is continued to be executed. When the query block 320 returns a negative (i.e. user authentication check is not satisfied), then the method 300 proceeds to block 322 and the control action is terminated/rejected, the attempt to perform the control action is logged (e.g. in a database) and optionally an alarm is activated to alert other operators at the attempt to perform the control action.
It should be appreciated that the method 300 provides advantages in allowing a system operator to select which control-actions/commands to utilize the authentication stem. The control-actions/commends may be selected based on risk based criteria that takes into consideration a number of factors, such as but not limited to criticality of the equipment or the portion of the network, the sensitivity of the network, the impact on the network as a whole, and dynamic responses of the network for example.
In some embodiments, the determination of the severity of impact of a control action (such as impact engine 206 for example) may be determined using a machine learning or artificial intelligence system.
Turning now to
As shown in
The computer system 500 comprises an input/output (I/O) adapter 506 and a communications adapter 507 coupled to the system bus 502. The I/O adapter 506 may be a small computer system interface (SCSI) adapter that communicates with a hard disk 508 and/or any other similar component. The I/O adapter 506 and the hard disk 508 are collectively referred to herein as a mass storage 510.
Software 511 for execution on the computer system 500 may be stored in the mass storage 510. The mass storage 510 is an example of a tangible storage medium readable by the processors 501, where the software 511 is stored as instructions for execution by the processors 501 to cause the computer system 500 to operate, such as is described hereinbelow with respect to the various Figures. Examples of computer program product and the execution of such instruction is discussed herein in more detail. The communications adapter 507 interconnects the system bus 502 with a network 512, which may be an outside network, enabling the computer system 500 to communicate with other such systems. In one embodiment, a portion of the system memory 503 and the mass storage 510 collectively store an operating system, which may be any appropriate operating system, such as the z/OS or AIX operating system from IBM Corporation, to coordinate the functions of the various components shown in
Additional input/output devices are shown as connected to the system bus 502 via a display adapter 515 and an interface adapter 516 and. In one embodiment, the adapters 506, 507, 515, and 516 may be connected to one or more I/O buses that are connected to the system bus 502 via an intermediate bus bridge (not shown). A display 519 (e.g., a screen or a display monitor) is connected to the system bus 502 by a display adapter 515, which may include a graphics controller to improve the performance of graphics-intensive applications and a video controller. A keyboard 521, a mouse 522, a speaker 523, etc. can be interconnected to the system bus 502 via the interface adapter 516, which may include, for example, a Super I/O chip integrating multiple device adapters into a single integrated circuit. Suitable I/O buses for connecting peripheral devices such as hard disk controllers, network adapters, and graphics adapters typically include common protocols, such as the Peripheral Component Interconnect (PCI). Thus, as configured in
In some embodiments, the communications adapter 507 can transmit data using any suitable interface or protocol, such as the internet small computer system interface, among others. The network 512 may be a cellular network, a radio network, a wide area network (WAN), a local area network (LAN), or the Internet, among others. An external computing device may connect to the computer system 500 through the network 512. In some examples, an external computing device may be an external web server or a cloud computing node.
It is to be understood that the block diagram of
The method 600 of training the AI system 425 may further include identifying, by the operator 420, undesired conditions that did not result in a loss of service or damage to equipment. Such undesired conditions may include voltage drops or sagging for example. The training may further include examples of corrective actions that were taken (e.g. other control actions) in response to an undesired operating condition. These conditions are analyzed in block 604.
As the operator 420 identifies undesired conditions the occur, or potential undesired conditions that could occur if a particular control action is performed, the AI system 425 is trained to recognize patterns of undesired conditions by such supervised training. It should be noted that the operator 420 can mark potential undesired conditions that may occur if a particular control action is performed, without actually performing the control action The training data further includes the desired condition, i.e. the expected operating condition or state. The AI system 425 generates a model that can determine the accuracy an electrical network operating conditions based on the training at block 606.
Once the model 725 is trained, the method 700 further includes operating the AI system 425 in an operational phase to determine the accuracy of registration in live data, at block 608 (
Accordingly, the AI system 425, by using the trained model 725, can determine the electrical distribution system response to the control action(s) 710, at block 608. The network response is determined as the classification output/categorization 720 of the trained model. The AI system 425 supports the operator 420, from an inexperienced user to an experienced user, during network operation, which can be complicated unusual situations, equipment malfunctions, maintenance operations, weather conditions, or any other such factors. The AI system 425 checks system response and creates an evaluation of the accuracy of the predicted response, at block 610. The evaluation is a quality parameter of the estimated network response. In one or more embodiments of the present disclosure, the AI system 425 creates one of three levels of notification for an operator/user. For example, if the predicted response occurs, the AI system 425 provides the operator with a passing notification. For example, a specific colored notification, such as green color, specific icon, or any other notification that represents that the predicted network response is verified as accurate.
Alternatively, if the predicted network response is inaccurate (e.g. the electrical distribution network), the AI system 425 provides a notification that indicates a failure such as a red-colored notification, a specific icon, or any other such failure notification. In another alternative case, if a confidence level in the predicted network response does not exceed a predetermined threshold, the AI system 425 provides a ‘maybe’ notification. For example, the maybe notification can be represented by a specific colored notification, such as yellow, or a specific icon, or any other such representation.
Furthermore, the AI system 425 creates flags in the user interface that identify portions in the network distribution system map where the AI system 425 has identified that the predicted network response is not accurate. The flags can be visual notifications of the specific portions in the map, such as circles, icons, or any other user interface indication. The operator 420 can switch through these flags and decide if the warning of the AI system 425 is reasonable or unreasonable. The visual attributes include color, size, icon, image, or any other such attribute used to render the flag on the visual depiction of the electrical distribution network.
Further, the input from the operator 420 is not only used to improve the registration but also to train the AI system 425 further with the new registration data. The updates from the operator 420 are input as additional training data into the AI system 425, which tweaks the trained model 725 further based on such training data.
The one or more embodiments of the present disclosure can accordingly support the operator 420 to create improved results with the generated model or point cloud of the environment.
The AI system 425, in one or more embodiments of the present disclosure, uses a convolutional neural network (CNN) that is used to progressively extract higher- and higher-level representations of the network responses in a complex electrical distribution network. Instead of preprocessing the data to derive predicted responses, the CNN learns how to extract network responses, and ultimately infer whether a control action or set of control actions will result in an undesired operating condition. The CNNs can use a Rectified Linear Unit (ReLU) transformation to introduce nonlinearity in the trained model 725.
In one or more embodiments of the present disclosure, the trained model 1025 can be created using a classification model that provides the categorization 1020 as “Accurate network response” or “Inaccurate network response,” or “Pass” or “Fail.” Classification Models are used to predict the category of the control action 710. Alternatively, the trained model 725 is a regression model that is used to determine the categorization 720 as a real value, such as a fitting value by which the predicted network response is not accurate, for example. The regression model can be linear regression, logistic regression, polynomial regression, ridge regression, or any other such regression model.
It should be noted that other supervised machine learning techniques can be used to build the trained model 725 apart from the techniques described herein.
Technical effects and benefits of the disclosed embodiments include, but are not limited to, monitoring control actions issued by a user on a network and selectively preventing execution of the control action to prevent or reduce the risk of an undesired operating condition based on a predicted network response unless the user is authenticated.
The term “about” is intended to include the degree of error associated with measurement of the particular quantity based upon the equipment available at the time of filing the application. For example, “about” can include a range of ±8% or 5%, or 2% of a given value.
One or more computer-readable medium(s) may be utilized. The computer-readable medium may be a computer-readable signal medium or a computer-readable storage medium. A computer-readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In one aspect, the computer-readable storage medium may be a tangible medium containing or storing a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer-readable signal medium may be any computer-readable medium that is not a computer-readable storage medium, and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
The computer-readable medium may contain program code embodied thereon, which may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing. In addition, computer program code for carrying out operations for implementing aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
It will be appreciated that aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block or step of the flowchart illustrations and/or block diagrams, and combinations of blocks or steps in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer-readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks. The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
Terms such as processor, controller, computer, DSP, FPGA are understood in this document to mean a computing device that may be located within an instrument, distributed in multiple elements throughout an instrument, or placed external to an instrument.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, element components, and/or groups thereof.
While the disclosure is provided in detail in connection with only a limited number of embodiments, it should be readily understood that the disclosure is not limited to such disclosed embodiments. Rather, the disclosure can be modified to incorporate any number of variations, alterations, substitutions or equivalent arrangements not heretofore described, but which are commensurate with the spirit and scope of the disclosure. Additionally, while various embodiments of the disclosure have been described, it is to be understood that the exemplary embodiment(s) may include only some of the described exemplary aspects. Accordingly, the disclosure is not to be seen as limited by the foregoing description but is only limited by the scope of the appended claims.