AD Argentina - Supp3_ Guide on calculations

34 74 0
AD Argentina - Supp3_ Guide on calculations

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Guide on How to Develop a Small Hydropower Plant ESHA 2004 CHAPTER 6: ELECTROMECHANICAL EQUIPMENT CONTENTS 6 Electromechanical equipment 154 6.1 Powerhouse 154 6.2 Hydraulic turbines 156 6.2.1 Types and configuration 156 6.2.2 Specific speed and similitude 168 6.2.3 Preliminary design 171 6.2.4 Turbine selection criteria 174 6.2.5 Turbine efficiency 181 6.3 Speed increasers 184 6.3.1 Speed increaser types 184 6.3.2 Speed increaser design 185 6.3.3 Speed increaser maintenance 186 6.4 Generators 186 6.4.1 Generator configurations 188 6.4.2 Exciters 188 6.4.3 Voltage regulation and synchronisation 189 Asynchronous generators 189 6.5 Turbine control 189 6.6 Switchgear equipment 192 6.7 Automatic control 193 6.8 Ancillary electrical equipment 194 6.8.1 Plant service transformer 194 6.8.2 DC control power supply 194 6.8.3 Headwater and tailwater recorders 194 6.8.4 Outdoor substation 195 6.9 Examples 196 LIST OF FIGURES Figure 6.1 : Schematic view of a powerhouse –Low head 155 Figure 6.2 : Schematic view of a powerhouse –high and medium heads 155 Figure 6.3 : Schematic view of a hydropower scheme and of the measurement sections 157 Figure 6.4 : Cross section of a nozzle with deflector 158 Figure 6.5 : View of a two nozzles horizontal Pelton 159 Figure 6.6 : View of a two nozzle vertical Pelton 159 Figure 6.7 : Principle of a Turgo turbine 160 Figure 6.8 : Principle of a Cross-flow turbine 160 Figure 6.9 : Guide vane functioning principle 162 Figure 6.10: View of a Francis Turbine 162 Figure 6.11 : Kinetic energy remaining at the outlet of the runner 163 Figure 6.12 : Cross section of a double regulated Kaplan turbine 164 Figure 6.13 : Cross section of a double regulated Bulb turbine 164 152 Guide on How to Develop a Small Hydropower Plant ESHA 2004 Figure 6.14 : Cross section of a vertical Kaplan 166 Figure 6.15 : Cross section of a Kaplan siphon power plant 166 Figure 6.16 : Cross section of a Kaplan inverse siphon power plant 166 Figure 6.17 : Cross section of an inclined Kaplan power plant 166 Figure 6.18 : Cross section of a S Kaplan power plant 166 Figure 6.19 : Cross section of an inclined right angle Kaplan power plant 166 Figure 6.20 : Cross section of a pit Kaplan power plant 167 Figure 6.21 : Design of turbine runners in function of the specific speed n s 169 Figure 6.22 : Specific speed in function of the net head H n = E/g 170 Figure 6.23 : Nozzle characteristic 172 Figure 6.24 : Cross section of a Francis Runner 172 Figure 6.25 : Cross section of a Kaplan turbine 173 Figure 6.26 : Turbines' type field of application 175 Figure 6.27 : Cavitation limits 179 Figure 6.28 : Efficiency measurement on a real turbine built without laboratory development. 181 Figure 6.29 : Schematic view of the energy losses in an hydro power scheme 182 Figure 6.30 : Typical small hydro turbines efficiencies 183 Figure 6.31: Parallel shaft speed increaser 185 Figure 6.32: Bevel gear speed increaser 185 Figure 6.33: Belt speed increaser 185 Figure 6.34 : Vertical axis generator directly coupled to a Kaplan turbine 188 Figure 6.35 : Mechanical speed governor 191 Figure 6.36 Level measurement 195 LIST OF TABLES Table 6.1: Kaplan turbines configuration 165 Table 6.2: Range of specific speed for each turbine type 170 Table 6.3: Range of heads 175 Table 6.4 : Flow and head variation acceptance 176 Table 6.5: Generator synchronisation speed 180 Table 6.6: Runaway speeds of turbines 180 Table 6.7 : Typical efficiencies of small turbines 184 Table 6.8: Typical efficiencies of small generators 187 LIST OF WORLD TRADE ORGANIZATION G/ADP/N/1/ARG/1/Suppl.3 G/SCM/N/1/ARG/1/Suppl.3 26 July 1999 (99-3129) Committee on Subsidies and Countervailing Measures Original: Spanish NOTIFICATION OF LAWS AND REGULATIONS UNDER ARTICLES 18.5 AND 32.6 OF THE AGREEMENTS ARGENTINA Supplement The following communication, dated June 1999, has been received from the Permanent Mission of Argentina _ HAVING REGARD TO File No 061-000407/99 in the Registry of the Ministry of the Economy and Public Works and Services, and WHEREAS: The Final Act Embodying the Results of the Uruguay Round of Multilateral Trade Negotiations, the Ministerial Decisions and Declarations and Understandings and the Marrakesh Agreement Establishing the World Trade Organization (WTO) were approved under Law No 24,425; The aforementioned Law has produced significant progress in regard to protective mechanisms against imports under conditions of unfair competition By means of Decree No 1326 of 10 November 1998, the National Executive Power laid down the rules and regulations for the effective application of the Agreement on Implementation of Article VI of the General Agreement on Tariffs and Trade and the Agreement on Subsidies and Countervailing Measures approved by Law No 24,425, and appointed the implementing authorities for those rules and regulations At present, applications for initiation of a dumping and/or subsidy investigation are filed based on the questionnaires approved by Resolution No 349 of the former Secretariat for Industry and Trade of 12 November 1991 It has been deemed necessary to refine the requirements for the submission of applications for the start of an investigation concerning the application of anti-dumping or countervailing duties In order to ensure that the information necessary to start an investigation is available and thus avoid repeated requests by the Implementing Authority, the applicant must furnish the fullest possible supporting evidence in the application Based on Article of Decree No 1326/98, the Undersecretariat for Foreign Trade, through the Directorate for Unfair Competition attached to the National Directorate for the Management of Foreign Trade of that Undersecretariat and the National Commission for Foreign Trade, a decentralized agency of the Secretariat for Industry, Trade and Mining, have proposed guidelines, requirements and formalities with which the applicant must comply in applying for initiation of an investigation Consequent on the foregoing, it is indispensable to rescind Resolution No 349 dated 12 November 1991 of the former Secretariat for Industry and Trade The Directorate for Legal Affairs in the Area of Industry, Trade and Mining attached to the General Directorate for Legal Affairs in the Ministry of the Economy and Public Works and Services has intervened as appropriate This Resolution is enacted in exercise of the powers conferred under Articles and of Decree No 1326 of 10 November 1998 Wherefore, The Secretary of State for Industry, Trade and Mining RESOLVES: Article - To approve the questionnaires consisting of TWENTY-NINE (29) pages which, as Annexes to 6, are an integral part of this Resolution, and which must be completed by the applicant when filing an application for the initiation of a dumping and/or subsidy investigation Article - To approve the instructions comprising SEVEN (7) pages which, as Annex 7, form an integral part of this Resolution and which set forth the requirements that must be met by the applicant in filling out the annexes mentioned in Article Article - To rescind Resolution No 349 of the former Secretariat for Industry and Trade of 12 November 1991 approving the questionnaires for the submission of the application for initiation of a dumping and/or subsidy investigation Article - This Resolution shall be proclaimed, published, transmitted to the National Directorate of Official Records and filed Resolution No 224 Dr Alieto A Guadagni - Secretary of State for Industry, Trade and Mining ANNEX 1: GENERAL INFORMATION ON THE ENTERPRISE General information on the enterprise: 1.1 Registered name: 1.2 Domicile (full, giving postal code of the city, province, telephone and fax numbers): Actual: Headquarters: Industrial plant(s): Domicile elected in the Federal Capital: 1.3 Importer/exporter No.: 1.4 Registration No in National Industrial Registry: 1.5 Tax Identification No (CUIT): 1.6 Name of legal representative, title and telephone: 1.7 Name of expert responsible for providing information, title and telephone: 1.8 Corporate purpose of enterprise and its main economic activity: 1.9 Start-up date of the enterprise and its activities in respect of the domestic product (see paragraph 2.1): 1.10 Chambers of commerce, trade associations and federations of which the enterprise is a member: 1.11 Documents to be attached: * Memorandum and articles of association * Most recent document appointing authorities and distributing posts * Corresponding power of attorney * Photocopy of Tax ...A Project Management Primer or “a guide on how to make projects work” by Nick Jenkins ©Nick Jenkins, 2005 http://www.nickjenkins.net This work is licensed under the Creative Commons (Attribution-NonCommercial-ShareAlike) 2.5 License To view a copy of this license, visit [http://creativecommons.org/licenses/by-nc- sa/2.5/]; or, (b) send a letter to “Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA”. In summary - you are free: to copy, distribute, display, and perform the work and to make derivative works. You must attribute the work by directly mentioning the author's name. You may not use this work for commercial purposes and if you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this one. For any reuse or distribution, you must make clear to others the license terms of this work. Any of these conditions can be waived if you get permission from the copyright holder. Your fair use and other rights are in no way affected by the above. Please see the license for full details. Table of Contents INTRODUCTION 3 BASIC PRINCIPLES 4 Ten Axioms for Success 4 Scope Triangle 6 The Critical Path 7 The Mythical Man Month 8 SCOPE 10 Scope, Visions and Goals 10 A Decent Proposal 12 Requirements 15 Requirements capture 17 Documenting Requirements 19 Traceability 22 PLANNING 23 The Purpose of a Project Plan 23 The Fine Art of Scheduling 24 Costing and Budgeting 29 Risk Management 31 Change Management 33 EXECUTION 35 Staying on track 35 Managing People 36 IMPLEMENTATION 39 REVIEW 42 GLOSSARY 43 A Project Management Primer (©Nick Jenkins 2005) 2 - 43 I n t r o d u c t i o n Many projects fail because of the simplest of causes. You don’t have to be a genius to deliver a project on time, nor do you have to be steeped a mystical project management methodology to be a project manager. If an averagely competent person can’t deliver a project successfully after reading this then I will run buck naked through Times Square on my 75 th birthday. See if I don’t! That reminds me of a joke… A tourist walked into a pet shop and was looking at the animals on display. While he was there, another customer walked in and said to the shopkeeper, "I'll have a C monkey please." The shopkeeper nodded, went over to a cage at the side of the shop and took out a monkey. He fitted a collar and leash, handed it to the customer, saying, "That'll be £5,000." The customer paid and walked out with his monkey. Startled, the tourist went over to the shopkeeper and said, "That was a very expensive monkey. Most of them are only a few hundred pounds. Why did it cost so much?" The shopkeeper answered, "Ah, that monkey can program in C - very fast, tight code, no bugs, well worth the money." The tourist looked at a monkey in another cage. "Hey, that one's even more expensive! £10,000! What does it do?" "Oh, that one's a C++ monkey; it can manage object-oriented programming, Visual C++, even some Java. All the really useful stuff," said the shopkeeper. The tourist looked around for a little longer and saw a third monkey in a cage of its own. The price tag around its neck read £50,000. The tourist gasped to the shopkeeper, [...]... thank Vivien Anayian for the inspiration behind Ajax Edit Comments, which consequently started me with Ajax and WordPress I’d also like to thank Ajay D’souza and Mark Ghosh Both have helped me tremendously along my WordPress journey Finally, I’d like to thank the folks at Automattic and the contributors behind WordPress Introduction 16 How About a Little Ajax? I’m rather biased when it comes to Ajax. .. sending and receiving requests) Client-side Event Occurs Client-side Processing Server-side Send Ajax Request Server-side Processing Process Response Send Ajax Response Output Results Figure 1 Ajax Process Now implementing Ajax, and implementing it well, is another story So let’s read on 24 WordPress and Ajax Ajax Best Practices As with any technology, Ajax can easily be abused I’ve seen too many sites... foundation for using Ajax with WordPress After the foundation has been laid, you will be walked through several real-world examples By the end of the book, you should not only have a thorough understanding of Ajax, but how Ajax functions within WordPress itself The code examples I present are from my own (sometimes painful) experiences with using Ajax I’ve cried I’ve bled And I hope to share my agony (err,... as if we’re going on a journey together to achieve Ajax nirvana So what are you waiting for? Let’s begin 20 WordPress and Ajax Chapter 1 What is Ajax? 22 What is Ajax? First things first What the heck is Ajax anyways besides a lovely acronym (Asynchronous JavaScript and XML)? It’s definitely not a common household cleaner (at least, not on the Internet) Let’s just say that Ajax consists of a bunch... Texas home His education includes a Master’s in Business Administration and a degree in Electronics Engineering Technology When he’s not killing trees or reindeer, he blogs at his personal site, ronalfy.com Credits and Thanks First, I would like to thank my family, friends, and God for getting me through a very tough per- WordPress and Ajax Acknowledgments 13 sonal situation in 2009 Without them, this... user hits the back button or refreshes, then what? He has to start all over from scratch (and he’s about to call the Internet troll on you) • Loading content on websites Ever been to one of those sites that load the content when you 26 WordPress and Ajax click on a button or drop-down menu option? Not good There’s no back button functionality, no way to bookmark the content, and if you refresh, you’re... many sites that depend on Ajax for navigation or to access crucial and/ or critical content without alternatives From my perspective, Ajax should be absolutely transparent and unobtrusive to the user I’m thinking of Flickr and Netflix when I say this Both sites mentioned use Ajax to add to the user experience, rather than detract from it When you click on that caption or description, or leave that star... cover) • Using Ajax upon a page load This last one is more of a guideline as there are many exceptions Notable exceptions include scripts that track statistics and would like to avoid caching plugins If you are implementing an Ajax process and the project delves into the realm of faking browser history National Cyber Security Strategies Practical Guide on Development and Execution December 2012 I National Cyber Security Strategies Practical Guide on Development and Execution National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private sector and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU Member States in implementing relevant EU legislation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU Member States by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at www.enisa.europa.eu Follow us on Facebook Twitter LinkedIn Youtube and RSS feeds ENISA project team Nicole FALESSI, Resilience and CIIP Unit, ENISA Razvan GAVRILA, Resilience and CIIP Unit, ENISA Maj Ritter KLEJNSTRUP, Resilience and CIIP Unit, ENISA Konstantinos MOULINOS, Resilience and CIIP Unit, ENISA Contact details For questions related to this report or any other general inquiries about the resilience programme please use the following contact address: resilience [at] enisa.europa.eu Legal notice Please note that this publication represents the views and interpretations of the authors and editors, unless stated otherwise. This publication should not be construed to be a legal action of ENISA or the ENISA bodies unless adopted pursuant to the ENISA Regulation (EC) No. 460/2004 as lastly amended by Regulation (EU) No. 580/2011. This publication does not necessarily represent the state-of-the-art and ENISA may update it from time to time. Third-party sources are quoted as appropriate. ENISA is not responsible for the content of the external sources including external websites referenced in this publication. This publication is intended for information purposes only. It must be accessible free of charge. Neither ENISA nor any person acting on its behalf is responsible for the use that might be made of the information contained in this publication. Reproduction is authorised provided the source is acknowledged. © European Network and Information Security Agency (ENISA), 2012 II National Cyber Security Strategies Practical Guide on Development and Execution Contents Executive summary 1 1 Introduction 2 1.1 The European policy context 2 1.2 Scope 5 1.3 Target audience 6 1.4 Methodology 6 1.5 How to use this guide 6 2 National cyber security strategy lifecycle 7 3 Develop and execute the national cyber-security strategy 8 3.1 Set the vision, scope, objectives and priorities 8 3.2 Follow a national risk assessment approach 10 3.3 Take stock of existing policies, regulations and capabilities 11 3.4 Develop a clear governance structure 11 3.5 Identify and engage stakeholders 13 3.6 Establish trusted information-sharing mechanisms 15 3.7 Develop national cyber contingency plans 16 3.8 Organise cyber security exercises 17 3.9 Establish baseline security requirements 19 3.10 Establish incident reporting mechanisms 20 3.11 User awareness 21 3.12 Foster R&D 22 3.13 Strengthen training and educational programmes 23 3.14 Establish an incident response Updated Compliance Guideline April 2007 Quick Guide on Processing Jerky and Compliance Guideline for Meat and Poultry Jerky Produced by Small and Very Small Plants Updated Compliance Guideline April 2007 Compliance Guideline for Meat and Poultry Jerky Produced by Small and Very Small Plants 2 Quick Guide on Processing Jerky The Compliance Guideline for Meat and Poultry Jerky lists seven (7) processing steps in the production of meat and poultry jerky where some level of microbial intervention can be applied to maximize lethality. While it may not be necessary for some establishments to apply all seven of these steps, the lethality treatment and drying steps must be used in all processes to ensure that a safe product is produced. Lethality treatment: For meat jerky, use of the time-temperature combinations provided in the lethality compliance guidelines (Appendix A of the final rule “Performance Standards for the Production of Certain Meat and Poultry Products”; http://www.fsis.usda.gov/OPPDE/rdad/FRPubs/95-033F/95-033F_Appendix_A.htm) can be used to ensure the safety of the product. For poultry jerky, the minimum internal temperatures listed in the lethality compliance guidelines of 160°F for uncured poultry (see complete Compliance Guideline regarding 155°F for cured and smoked poultry) can be used to achieve an adequate lethality. The time-temperature combinations listed in the “Time-Temperature Tables For Cooking Ready-To-Eat Poultry Products” can also be used for lethality. The 90% humidity parameter must be applied throughout the lethality treatment for meat and poultry jerky if the lethality compliance guidelines (Appendix A) are used as supporting documentation. The humidity must be maintained at ≥90% for the time that the product is heated at the temperature specified in Appendix A. Some simple and practical measures that can be used to aid in meeting the humidity parameters in the lethality compliance guidelines include: • Sealing the oven dampers to provide a closed system and to prevent moisture loss. • Adding humidity to the system by placing one or more shallow, wide pans of water in the oven or by injecting steam in the oven. The establishment is expected to measure and maintain the relative humidity during the lethality treatment. The process should be monitored using wet and dry bulb thermometers. The use of wet and dry bulb measurements can be used to determine relative humidity ( http://home.fuse.net/clymer/water/wet.html). Drying: After the lethality treatment, the product is dried to meet a water activity level that will stabilize the finished product for food safety purposes. A water activity critical limit for stabilization of 0.85 or lower should control growth of all bacterial pathogens of concern. The finished product must also meet the moisture protein ration (MPR) product standard. Updated Compliance Guideline April 2007 Compliance Guideline for Meat and Poultry Jerky Produced by Small and Very Small Plants 3 Compliance Guideline for Meat and Poultry Jerky Produced by Small and Very Small Plants Purpose ... United States dollars 7.7.10 Additional information Any additional comments or explanations deemed appropriate for the initiation of the investigation must be submitted on separate sheets 7.7.11... Industry, Trade and Mining; * The Undersecretariat for Foreign Trade (Directorate for Unfair Competition); * The National Commission for Foreign Trade 7.4 Mode of submission: The application must... original and one copy, each with a back-up version on magnetic medium (diskette) in the Windows environment (Word 6.0 and Excel 5.0) All requested information must conform to Annexes 1-6 7.5 Place

Ngày đăng: 20/10/2017, 19:33

Tài liệu cùng người dùng

Tài liệu liên quan