Browse Definitions :
Definition

closed loop control system

Contributor(s): Matthew Haughn

A closed loop control system is a set of mechanical or electronic devices that automatically regulates a process variable to a desired state or set point without human interaction. Closed loop control systems contrast with open loop control systems, which require manual input.

A control loop is the system of hardware components and software control functions involved in measuring and adjusting a variable that controls an individual process. Closed loop control systems are widely used in industry applications including agriculture, chemical plants, quality control, nuclear power plants, water treatment plants and environmental control. Closed loop control systems enable automation in a number of industrial and environmental settings and regulate processes in industrial control systems (ICS) such as supervisory control and data acquisition (SCADA) and distributed control systems (DCS).

Closed loop control systems are widely used in various industry applications including agriculture, chemical plants, quality control, nuclear power plants, water treatment plants and environmental control.

Unlike open loop control systems or switchable control loops, closed loops don't take input from human operators. This means that other than adjustment by control systems, they operate automatically and independently. In closed loop control, the action is entirely dependent on the process variable. In regards to a heating system, for example, a closed loop might maintain a temperature as a set point, automatically switching on when temperature is below the set point. Open control, in contrast, would enable individuals to set timers and turn instant on heat.

This was last updated in December 2017

Continue Reading About closed loop control system

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

im a default
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close