76 research outputs found

    LIFECYCLE MANAGEMENT OF OFFSHORE AND ONSHORE WIND FARMS

    Get PDF
    Since the demand for renewable energy sources on a global scale has increased substantially over the past few years, a great number of businesses have made investments in this industry and are doing their utmost to make additional developments and discoveries in the field of wind energy. Wind farms, both onshore and offshore, are considered to be key contributors to the production of sustainable energy because they offer significant benefits, including a reduction in the negative effects on the environment and the production of harmful gases. The purpose of this thesis was to analyse and explore the lifecycle activities of a wind farm, in order to determine the failure modes, failure effects, and failure consequences of the critical components, as well as the strategies that can be used to counteract these failures. As many wind farms are reaching their end of life, so this thesis also focused on the techniques and strategies that can be done before dismantling, The thesis also includes a reliability analysis, failure mode effect and criticality analysis of generator and gearbox of wind turbine, and also lifecycle cost analysis of an offshore wind farm. These studies improved our knowledge of offshore windfarm operations, maintenance strategies and give a brief information about cost reduction techniques. Several steps from maintenance strategies based on NORSOK Z-008 and ISO-14224, as well as knowledge gained from research papers and interviews with engineers in moreld, were implemented to achieve the goals of this thesis

    Framework for examination of software quality characteristics in conflict: A security and usability exemplar

    Get PDF
    Ā© 2020, Ā© 2020 The Author(s). This open access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license. Standards and best practices for software quality guide on handling each quality characteristic individually, but not when two or more characteristics come into conflict such as security and usability. The objectives of this paper are twofold: (a) to argue on the importance of handling the conflicts between quality characteristics in general; (b) to formulate a framework for conflict examination of the software quality characteristics, we do so while considering the specific case of security and usability. In line with the objectives, a framework called Pattern-oriented Design Framework (PoDF) was formulated. The PoDF provides a mechanism for identification of the conflicts, modeling the conflicts to illuminate the reason for their occurrence, and eliciting the suitable trade-offs between the conflicting characteristics. The suitable trade-offs are thus documented as design patterns. The patterns can assist developers and designers in handling the conflicts in other but similar context of use. To validate and instantiate the PoDF, two studies were conducted. Usable security patterns discovered as a result of the studies are also presented in the paper

    CO-CREATING REQUIREMENTS FOR THE EMERGING ELECTRONIC IDENTITY MANAGEMENT PLATFORM

    Get PDF
    Digital transformation of public sector entails prominence to electronic identity (e-ID) management platforms. The new, user-centric systems for e-ID management can be enhanced with Artificial intelligence (AI) and distributed ledger technology (DLT). However, such technological complexity can make these systems counter-intuitive for an ordinary user. Existing research identifies that the socio-technical arrangements for e-ID platforms are often ignored. In this study, we investigate what kind of requirements users have for an e-ID management platform in public sector. We employed principles of cocreation methodology to design and run a series of workshops in five European municipalities. Despite technological propositions of an e-ID platform, accessibility, usability, and security attributes were the most debated issues among the prospective users. The results from the co-creative requirements elicitation suggest for broadening the discussions around e-ID management platforms to encompass social and socio-technical aspects in the design and development of these systems

    Evaluation of Anomalous Coronary Arteries on 64 Slice Multidetector Computerized Tomographic Angiography

    Get PDF
    Introduction: Anomalous Coronary arteries is a well-known congenital entity with variable effects. The majority of such patients are asymptomatic but some can have adverse effects like ischemia and arrhythmia. Its association with Sudden Cardiac Death in young is established. Objective: To determine the frequency of   ACA on MDCT in patients referred for coronary artery disease assessment and to determine the origin, course, and morphological variable of SCD of ACA on MDCT. Materials and Methods: The study was done in the Department of Cardiovascular Imaging at the Punjab Institute of Cardiology. A retrospective data of patients undergoing CTA for CAD between a  period of Jan 2009 and Dec 2017 were analyzed for the presence of  Anomalous Coronary Artery (ACA). All patients having anomalous origin from opposite coronary cusp and its course were included. The patients with myocardial bridging and coronary artery fistula were excluded. Results: Total patients analyzed with MDCT for CAD and graft assessment between Jan 2009 and December 2017 were 8028. Fifty-three patients were excluded because of poor image quality. Among these ACA were found in 166 (2.08%). Gender distributions were 126 (75.9%) males and 40 (24.09%) females, the mean age in years was 49.31 Ā± 13.23. The most common ACA was Right coronary artery 83 followed by Left Circumflex 44 (26.50%), Left Anterior Descending Artery 22 (13.25%), and Left Main Stem 17 (10.24%) respectively. Fifty-three (31.92%) patients had previously unknown ACA and were found to have ACA on MDCT and 82 (49.39%) patients were referred following ICA for the confirmation of ACA. The Inter-arterial course was predominant in RCA and Left Coronary Artery 97% and 77% respectively. A retro artic course was predominant (100%) in LCx. Seven patients had associated cyanotic heart disease with ACA. Two patients(one LAD and one RCA) had origin from the Main Pulmonary artery. Conclusion: MDCT is the imaging modality of choice for the evaluation of ACA. It can identify the origin of ACA from opposite coronary cusp and defines the malignant course of ACA for the potential risk of sudden cardiac death

    Anomalous Origin of a Right Coronary Artery from Pulmonary Artery

    Get PDF
    Congenital defects of the coronary arteries are noted in 0.2ā€“1.4% of the general population. The first case of an anomalous origin of right coronary artery from pulmonary artery (ARCAPA) was described by Brooks in 1885. ARCAPA has an overall incidence of 0.002% in the general population. Most of the cases are asymptomatic; however, it can lead to serious complications such as heart failure, ischemia, and sudden death. A 57-year-old man presented to the cardiologistā€™s office with complaints of shortness of breath and fatigue. The patient also had a previous history of coronary stents and heart failure. Initially, he was evaluated with a stress test which was reported as abnormal. The patient then underwent an invasive coronary angiography that revealed anomalous origin of the right coronary artery (RCA) and multivessel disease. Cardiothoracic surgery evaluated the patient and coronary artery bypass graft was performed. During the surgery, the anomalous origin of RCA from the pulmonary artery was identified and was successfully corrected by reimplanting the RCA into the ascending aorta. The anomalous origin of RCA is a rare yet life-threatening condition. The RCA due to its location of origin from the pulmonary artery tends to be a low-pressure vessel with a very thin and fragile wall. It also serves as a retrograde venous conduit from the left coronary circulation into the pulmonary artery. This connection results in a left-to-right shunt that explains the increase in oxygen saturation in the pulmonary artery and the high cardiac output which is normally seen in these cases. The clinical presentation can vary from coronary ischemia to heart failure or sudden death. Therefore, surgical correction is recommended even in asymptomatic patients. We present a case of an anomalous origin of RCA from the pulmonary artery which, unlike the origin of left coronary from pulmonary artery, is very rare. Patients with this condition should have early correction even if they are asymptomatic in order to prevent long-term complications

    Potential of biomass for bioenergy in Pakistan based on present case and future perspectives

    Get PDF
    Authors have no conflict of interest and would like to acknowledge the National University of Sciences&Technology (NUST), Pakistan.Peer reviewedPostprin

    Mitigation strategies against the phishing attacks : a systematic literature review

    Get PDF
    Phishing attacks are among the most prevalent attack mechanisms employed by attackers. The consequences of successful phishing include (and are not limited to) financial losses, impact on reputation, and identity theft. The paper presents a systematic literature review featuring 248 articles (from the beginning of 2018 until March 2023) across the main digital libraries to identify, (1) the existing mitigation strategies against phishing attacks, and the underlying technologies considered in the development of these strategies; (2) the most considered phishing vectors in the development of the mitigation strategies; (3) anti-phishing guidelines and recommendations for organizations and end-users respectively; and (4) gaps and open issues that exist in the state of the art. The paper advocates for the need to consider the abilities of human users during the design and development of the mitigation strategies as only technology-centric solutions will not suffice to cater to the challenges posed by phishing attacks
    • ā€¦
    corecore