Thông tin tài liệu
Guide on How to Develop a Small Hydropower Plant ESHA 2004
CHAPTER 6: ELECTROMECHANICAL EQUIPMENT
CONTENTS
6 Electromechanical equipment 154
6.1 Powerhouse 154
6.2 Hydraulic turbines 156
6.2.1 Types and configuration 156
6.2.2 Specific speed and similitude 168
6.2.3 Preliminary design 171
6.2.4 Turbine selection criteria 174
6.2.5 Turbine efficiency 181
6.3 Speed increasers 184
6.3.1 Speed increaser types 184
6.3.2 Speed increaser design 185
6.3.3 Speed increaser maintenance 186
6.4 Generators 186
6.4.1 Generator configurations 188
6.4.2 Exciters 188
6.4.3 Voltage regulation and synchronisation 189
Asynchronous generators 189
6.5 Turbine control 189
6.6 Switchgear equipment 192
6.7 Automatic control 193
6.8 Ancillary electrical equipment 194
6.8.1 Plant service transformer 194
6.8.2 DC control power supply 194
6.8.3 Headwater and tailwater recorders 194
6.8.4 Outdoor substation 195
6.9 Examples 196
LIST OF FIGURES
Figure 6.1 : Schematic view of a powerhouse –Low head 155
Figure 6.2 : Schematic view of a powerhouse –high and medium heads 155
Figure 6.3 : Schematic view of a hydropower scheme and of the measurement sections 157
Figure 6.4 : Cross section of a nozzle with deflector 158
Figure 6.5 : View of a two nozzles horizontal Pelton 159
Figure 6.6 : View of a two nozzle vertical Pelton 159
Figure 6.7 : Principle of a Turgo turbine 160
Figure 6.8 : Principle of a Cross-flow turbine 160
Figure 6.9 : Guide vane functioning principle 162
Figure 6.10: View of a Francis Turbine 162
Figure 6.11 : Kinetic energy remaining at the outlet of the runner 163
Figure 6.12 : Cross section of a double regulated Kaplan turbine 164
Figure 6.13 : Cross section of a double regulated Bulb turbine 164
152
Guide on How to Develop a Small Hydropower Plant ESHA 2004
Figure 6.14 : Cross section of a vertical Kaplan 166
Figure 6.15 : Cross section of a Kaplan siphon power plant 166
Figure 6.16 : Cross section of a Kaplan inverse siphon power plant 166
Figure 6.17 : Cross section of an inclined Kaplan power plant 166
Figure 6.18 : Cross section of a S Kaplan power plant 166
Figure 6.19 : Cross section of an inclined right angle Kaplan power plant 166
Figure 6.20 : Cross section of a pit Kaplan power plant 167
Figure 6.21 : Design of turbine runners in function of the specific speed n
s
169
Figure 6.22 : Specific speed in function of the net head H
n
= E/g 170
Figure 6.23 : Nozzle characteristic 172
Figure 6.24 : Cross section of a Francis Runner 172
Figure 6.25 : Cross section of a Kaplan turbine 173
Figure 6.26 : Turbines' type field of application 175
Figure 6.27 : Cavitation limits 179
Figure 6.28 : Efficiency measurement on a real turbine built without laboratory development. 181
Figure 6.29 : Schematic view of the energy losses in an hydro power scheme 182
Figure 6.30 : Typical small hydro turbines efficiencies 183
Figure 6.31: Parallel shaft speed increaser 185
Figure 6.32: Bevel gear speed increaser 185
Figure 6.33: Belt speed increaser 185
Figure 6.34 : Vertical axis generator directly coupled to a Kaplan turbine 188
Figure 6.35 : Mechanical speed governor 191
Figure 6.36 Level measurement 195
LIST OF TABLES
Table 6.1: Kaplan turbines configuration 165
Table 6.2: Range of specific speed for each turbine type 170
Table 6.3: Range of heads 175
Table 6.4 : Flow and head variation acceptance 176
Table 6.5: Generator synchronisation speed 180
Table 6.6: Runaway speeds of turbines 180
Table 6.7 : Typical efficiencies of small turbines 184
Table 6.8: Typical efficiencies of small generators 187
LIST OF WORLD TRADE ORGANIZATION G/ADP/N/1/ARG/1/Suppl.3 G/SCM/N/1/ARG/1/Suppl.3 26 July 1999 (99-3129) Committee on Subsidies and Countervailing Measures Original: Spanish NOTIFICATION OF LAWS AND REGULATIONS UNDER ARTICLES 18.5 AND 32.6 OF THE AGREEMENTS ARGENTINA Supplement The following communication, dated June 1999, has been received from the Permanent Mission of Argentina _ HAVING REGARD TO File No 061-000407/99 in the Registry of the Ministry of the Economy and Public Works and Services, and WHEREAS: The Final Act Embodying the Results of the Uruguay Round of Multilateral Trade Negotiations, the Ministerial Decisions and Declarations and Understandings and the Marrakesh Agreement Establishing the World Trade Organization (WTO) were approved under Law No 24,425; The aforementioned Law has produced significant progress in regard to protective mechanisms against imports under conditions of unfair competition By means of Decree No 1326 of 10 November 1998, the National Executive Power laid down the rules and regulations for the effective application of the Agreement on Implementation of Article VI of the General Agreement on Tariffs and Trade and the Agreement on Subsidies and Countervailing Measures approved by Law No 24,425, and appointed the implementing authorities for those rules and regulations At present, applications for initiation of a dumping and/or subsidy investigation are filed based on the questionnaires approved by Resolution No 349 of the former Secretariat for Industry and Trade of 12 November 1991 It has been deemed necessary to refine the requirements for the submission of applications for the start of an investigation concerning the application of anti-dumping or countervailing duties In order to ensure that the information necessary to start an investigation is available and thus avoid repeated requests by the Implementing Authority, the applicant must furnish the fullest possible supporting evidence in the application Based on Article of Decree No 1326/98, the Undersecretariat for Foreign Trade, through the Directorate for Unfair Competition attached to the National Directorate for the Management of Foreign Trade of that Undersecretariat and the National Commission for Foreign Trade, a decentralized agency of the Secretariat for Industry, Trade and Mining, have proposed guidelines, requirements and formalities with which the applicant must comply in applying for initiation of an investigation Consequent on the foregoing, it is indispensable to rescind Resolution No 349 dated 12 November 1991 of the former Secretariat for Industry and Trade The Directorate for Legal Affairs in the Area of Industry, Trade and Mining attached to the General Directorate for Legal Affairs in the Ministry of the Economy and Public Works and Services has intervened as appropriate This Resolution is enacted in exercise of the powers conferred under Articles and of Decree No 1326 of 10 November 1998 Wherefore, The Secretary of State for Industry, Trade and Mining RESOLVES: Article - To approve the questionnaires consisting of TWENTY-NINE (29) pages which, as Annexes to 6, are an integral part of this Resolution, and which must be completed by the applicant when filing an application for the initiation of a dumping and/or subsidy investigation Article - To approve the instructions comprising SEVEN (7) pages which, as Annex 7, form an integral part of this Resolution and which set forth the requirements that must be met by the applicant in filling out the annexes mentioned in Article Article - To rescind Resolution No 349 of the former Secretariat for Industry and Trade of 12 November 1991 approving the questionnaires for the submission of the application for initiation of a dumping and/or subsidy investigation Article - This Resolution shall be proclaimed, published, transmitted to the National Directorate of Official Records and filed Resolution No 224 Dr Alieto A Guadagni - Secretary of State for Industry, Trade and Mining ANNEX 1: GENERAL INFORMATION ON THE ENTERPRISE General information on the enterprise: 1.1 Registered name: 1.2 Domicile (full, giving postal code of the city, province, telephone and fax numbers): Actual: Headquarters: Industrial plant(s): Domicile elected in the Federal Capital: 1.3 Importer/exporter No.: 1.4 Registration No in National Industrial Registry: 1.5 Tax Identification No (CUIT): 1.6 Name of legal representative, title and telephone: 1.7 Name of expert responsible for providing information, title and telephone: 1.8 Corporate purpose of enterprise and its main economic activity: 1.9 Start-up date of the enterprise and its activities in respect of the domestic product (see paragraph 2.1): 1.10 Chambers of commerce, trade associations and federations of which the enterprise is a member: 1.11 Documents to be attached: * Memorandum and articles of association * Most recent document appointing authorities and distributing posts * Corresponding power of attorney * Photocopy of Tax ...A Project Management Primer
or “a guide on how to make projects work”
by Nick Jenkins
©Nick Jenkins, 2005
http://www.nickjenkins.net
This work is licensed under the Creative Commons (Attribution-NonCommercial-ShareAlike)
2.5 License To view a copy of this license, visit [http://creativecommons.org/licenses/by-nc-
sa/2.5/]; or, (b) send a letter to “Creative Commons, 543 Howard Street, 5th Floor, San
Francisco, California, 94105, USA”.
In summary - you are free: to copy, distribute, display, and perform the work and to make
derivative works. You must attribute the work by directly mentioning the author's name. You
may not use this work for commercial purposes and if you alter, transform, or build upon this
work, you may distribute the resulting work only under a license identical to this one. For any
reuse or distribution, you must make clear to others the license terms of this work. Any of
these conditions can be waived if you get permission from the copyright holder. Your fair use
and other rights are in no way affected by the above. Please see the license for full details.
Table of Contents
INTRODUCTION 3
BASIC PRINCIPLES 4
Ten Axioms for Success 4
Scope Triangle 6
The Critical Path 7
The Mythical Man Month 8
SCOPE 10
Scope, Visions and Goals 10
A Decent Proposal 12
Requirements 15
Requirements capture 17
Documenting Requirements 19
Traceability 22
PLANNING 23
The Purpose of a Project Plan 23
The Fine Art of Scheduling 24
Costing and Budgeting 29
Risk Management 31
Change Management 33
EXECUTION 35
Staying on track 35
Managing People 36
IMPLEMENTATION 39
REVIEW 42
GLOSSARY 43
A Project Management Primer (©Nick Jenkins 2005) 2 - 43
I n t r o d u c t i o n
Many projects fail because of the simplest of causes. You don’t have to be a genius to deliver a
project on time, nor do you have to be steeped a mystical project management methodology to be
a project manager. If an averagely competent person can’t deliver a project successfully after
reading this then I will run buck naked through Times Square on my 75
th
birthday. See if I don’t!
That reminds me of a joke…
A tourist walked into a pet shop and was looking at the animals on display. While he was there, another
customer walked in and said to the shopkeeper, "I'll have a C monkey please." The shopkeeper nodded,
went over to a cage at the side of the shop and took out a monkey. He fitted a collar and leash, handed it
to the customer, saying, "That'll be £5,000."
The customer paid and walked out with his monkey. Startled, the tourist went over to the shopkeeper
and said, "That was a very expensive monkey. Most of them are only a few hundred pounds. Why did it
cost so much?" The shopkeeper answered, "Ah, that monkey can program in C - very fast, tight code, no
bugs, well worth the money."
The tourist looked at a monkey in another cage. "Hey, that one's even more expensive! £10,000! What
does it do?"
"Oh, that one's a C++ monkey; it can manage object-oriented programming, Visual C++, even some Java.
All the really useful stuff," said the shopkeeper.
The tourist looked around for a little longer and saw a third monkey in a cage of its own. The price tag
around its neck read £50,000. The tourist gasped to the shopkeeper, [...]... thank Vivien Anayian for the inspiration behind Ajax Edit Comments, which consequently started me with Ajax and WordPress I’d also like to thank Ajay D’souza and Mark Ghosh Both have helped me tremendously along my WordPress journey Finally, I’d like to thank the folks at Automattic and the contributors behind WordPress Introduction 16 How About a Little Ajax? I’m rather biased when it comes to Ajax. .. sending and receiving requests) Client-side Event Occurs Client-side Processing Server-side Send Ajax Request Server-side Processing Process Response Send Ajax Response Output Results Figure 1 Ajax Process Now implementing Ajax, and implementing it well, is another story So let’s read on 24 WordPress and Ajax Ajax Best Practices As with any technology, Ajax can easily be abused I’ve seen too many sites... foundation for using Ajax with WordPress After the foundation has been laid, you will be walked through several real-world examples By the end of the book, you should not only have a thorough understanding of Ajax, but how Ajax functions within WordPress itself The code examples I present are from my own (sometimes painful) experiences with using Ajax I’ve cried I’ve bled And I hope to share my agony (err,... as if we’re going on a journey together to achieve Ajax nirvana So what are you waiting for? Let’s begin 20 WordPress and Ajax Chapter 1 What is Ajax? 22 What is Ajax? First things first What the heck is Ajax anyways besides a lovely acronym (Asynchronous JavaScript and XML)? It’s definitely not a common household cleaner (at least, not on the Internet) Let’s just say that Ajax consists of a bunch... Texas home His education includes a Master’s in Business Administration and a degree in Electronics Engineering Technology When he’s not killing trees or reindeer, he blogs at his personal site, ronalfy.com Credits and Thanks First, I would like to thank my family, friends, and God for getting me through a very tough per- WordPress and Ajax Acknowledgments 13 sonal situation in 2009 Without them, this... user hits the back button or refreshes, then what? He has to start all over from scratch (and he’s about to call the Internet troll on you) • Loading content on websites Ever been to one of those sites that load the content when you 26 WordPress and Ajax click on a button or drop-down menu option? Not good There’s no back button functionality, no way to bookmark the content, and if you refresh, you’re... many sites that depend on Ajax for navigation or to access crucial and/ or critical content without alternatives From my perspective, Ajax should be absolutely transparent and unobtrusive to the user I’m thinking of Flickr and Netflix when I say this Both sites mentioned use Ajax to add to the user experience, rather than detract from it When you click on that caption or description, or leave that star... cover) • Using Ajax upon a page load This last one is more of a guideline as there are many exceptions Notable exceptions include scripts that track statistics and would like to avoid caching plugins If you are implementing an Ajax process and the project delves into the realm of faking browser history
National Cyber Security Strategies
Practical Guide on Development and Execution
December 2012
I
National Cyber Security Strategies
Practical Guide on Development and Execution
National Cyber Security Strategies
About ENISA
The European Network and Information Security Agency (ENISA) is a centre of network and
information security expertise for the EU, its Member States, the private sector and Europe’s
citizens. ENISA works with these groups to develop advice and recommendations on good
practice in information security. It assists EU Member States in implementing relevant EU
legislation and works to improve the resilience of Europe’s critical information infrastructure
and networks. ENISA seeks to enhance existing expertise in EU Member States by supporting
the development of cross-border communities committed to improving network and
information security throughout the EU. More information about ENISA and its work can be
found at www.enisa.europa.eu
Follow us on Facebook Twitter LinkedIn Youtube and RSS feeds
ENISA project team
Nicole FALESSI, Resilience and CIIP Unit, ENISA
Razvan GAVRILA, Resilience and CIIP Unit, ENISA
Maj Ritter KLEJNSTRUP, Resilience and CIIP Unit, ENISA
Konstantinos MOULINOS, Resilience and CIIP Unit, ENISA
Contact details
For questions related to this report or any other general inquiries about the resilience
programme please use the following contact address: resilience [at] enisa.europa.eu
Legal notice
Please note that this publication represents the views and interpretations of the authors and
editors, unless stated otherwise. This publication should not be construed to be a legal action
of ENISA or the ENISA bodies unless adopted pursuant to the ENISA Regulation (EC) No.
460/2004 as lastly amended by Regulation (EU) No. 580/2011. This publication does not
necessarily represent the state-of-the-art and ENISA may update it from time to time.
Third-party sources are quoted as appropriate. ENISA is not responsible for the content of the
external sources including external websites referenced in this publication.
This publication is intended for information purposes only. It must be accessible free of charge.
Neither ENISA nor any person acting on its behalf is responsible for the use that might be made
of the information contained in this publication.
Reproduction is authorised provided the source is acknowledged.
© European Network and Information Security Agency (ENISA), 2012
II
National Cyber Security Strategies
Practical Guide on Development and Execution
Contents
Executive summary 1
1 Introduction 2
1.1 The European policy context 2
1.2 Scope 5
1.3 Target audience 6
1.4 Methodology 6
1.5 How to use this guide 6
2 National cyber security strategy lifecycle 7
3 Develop and execute the national cyber-security strategy 8
3.1 Set the vision, scope, objectives and priorities 8
3.2 Follow a national risk assessment approach 10
3.3 Take stock of existing policies, regulations and capabilities 11
3.4 Develop a clear governance structure 11
3.5 Identify and engage stakeholders 13
3.6 Establish trusted information-sharing mechanisms 15
3.7 Develop national cyber contingency plans 16
3.8 Organise cyber security exercises 17
3.9 Establish baseline security requirements 19
3.10 Establish incident reporting mechanisms 20
3.11 User awareness 21
3.12 Foster R&D 22
3.13 Strengthen training and educational programmes 23
3.14 Establish an incident response Updated Compliance Guideline April 2007
Quick Guide on Processing Jerky
and
Compliance Guideline for Meat and Poultry Jerky
Produced by Small and Very Small Plants
Updated Compliance Guideline April 2007
Compliance Guideline for Meat and Poultry Jerky
Produced by Small and Very Small Plants
2
Quick Guide on Processing Jerky
The Compliance Guideline for Meat and Poultry Jerky lists seven (7) processing steps in
the production of meat and poultry jerky where some level of microbial intervention can
be applied to maximize lethality. While it may not be necessary for some establishments
to apply all seven of these steps, the lethality treatment and drying steps must be used in
all processes to ensure that a safe product is produced.
Lethality treatment: For meat jerky, use of the time-temperature combinations
provided in the lethality compliance guidelines (Appendix A of the final rule
“Performance Standards for the Production of Certain Meat and Poultry Products”;
http://www.fsis.usda.gov/OPPDE/rdad/FRPubs/95-033F/95-033F_Appendix_A.htm) can
be used to ensure the safety of the product. For poultry jerky, the minimum internal
temperatures listed in the lethality compliance guidelines of 160°F for uncured poultry
(see complete Compliance Guideline regarding 155°F for cured and smoked poultry) can
be used to achieve an adequate lethality. The time-temperature combinations listed in the
“Time-Temperature Tables For Cooking Ready-To-Eat Poultry Products” can also be
used for lethality.
The 90% humidity parameter must be applied throughout the lethality treatment
for meat and poultry jerky if the lethality compliance guidelines (Appendix A) are
used as supporting documentation. The humidity must be maintained at ≥90% for the
time that the product is heated at the temperature specified in Appendix A.
Some simple and practical measures that can be used to aid in meeting the humidity
parameters in the lethality compliance guidelines include:
• Sealing the oven dampers to provide a closed system and to prevent moisture
loss.
• Adding humidity to the system by placing one or more shallow, wide pans of
water in the oven or by injecting steam in the oven.
The establishment is expected to measure and
maintain the relative humidity during the
lethality treatment. The process should be monitored using wet and dry bulb
thermometers. The use of wet and dry bulb measurements can be used to determine
relative humidity (
http://home.fuse.net/clymer/water/wet.html).
Drying: After the lethality treatment, the product is dried to meet a water activity level
that will stabilize the finished product for food safety purposes. A water activity critical
limit for stabilization of 0.85 or lower should control growth of all bacterial pathogens of
concern. The finished product must also meet the moisture protein ration (MPR) product
standard.
Updated Compliance Guideline April 2007
Compliance Guideline for Meat and Poultry Jerky
Produced by Small and Very Small Plants
3
Compliance Guideline for Meat and Poultry Jerky
Produced by Small and Very Small Plants
Purpose
... United States dollars 7.7.10 Additional information Any additional comments or explanations deemed appropriate for the initiation of the investigation must be submitted on separate sheets 7.7.11... Industry, Trade and Mining; * The Undersecretariat for Foreign Trade (Directorate for Unfair Competition); * The National Commission for Foreign Trade 7.4 Mode of submission: The application must... original and one copy, each with a back-up version on magnetic medium (diskette) in the Windows environment (Word 6.0 and Excel 5.0) All requested information must conform to Annexes 1-6 7.5 Place
Ngày đăng: 20/10/2017, 19:33
Xem thêm: AD Argentina - Supp3_ Guide on calculations, AD Argentina - Supp3_ Guide on calculations