Browse Definitions :
Definition

closed loop control system

A closed loop control system is a set of mechanical or electronic devices that automatically regulates a process variable to a desired state or set point without human interaction. Closed loop control systems contrast with open loop control systems, which require manual input.

A control loop is the system of hardware components and software control functions involved in measuring and adjusting a variable that controls an individual process. Closed loop control systems are widely used in industry applications including agriculture, chemical plants, quality control, nuclear power plants, water treatment plants and environmental control. Closed loop control systems enable automation in a number of industrial and environmental settings and regulate processes in industrial control systems (ICS) such as supervisory control and data acquisition (SCADA) and distributed control systems (DCS).

Closed loop control systems are widely used in various industry applications including agriculture, chemical plants, quality control, nuclear power plants, water treatment plants and environmental control.

Unlike open loop control systems or switchable control loops, closed loops don't take input from human operators. This means that other than adjustment by control systems, they operate automatically and independently. In closed loop control, the action is entirely dependent on the process variable. In regards to a heating system, for example, a closed loop might maintain a temperature as a set point, automatically switching on when temperature is below the set point. Open control, in contrast, would enable individuals to set timers and turn instant on heat.

This was last updated in December 2017

Continue Reading About closed loop control system

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close