198 research outputs found

    Investigation of suction anchor pullout capacity under undrained conditions

    Get PDF
    Master's thesis in Offshore technologyFloating units are dependent on reliable mooring systems to ensure safety during marine operations. Suction anchors have proved to be a technologically viable and cost-effective concept. They are capable of precision installation, re-use, and provide large resistive capacity. This thesis investigates load capacity and failure modes of suction anchors subjected to vertical, horizontal (lateral), and incline loading. Suction anchor design considerations, installation procedure, and associated challenges are discussed before reviewing analytical methods for calculating holding / pullout capacity. Analytical results are compared with solutions obtained from finite element analyses conducted with PLAXIS 2D. A Mohr- Coulomb failure envelope with undrained total stress parameters was used. The thesis is limited to loading conditions in undrained soil with a linear strength development. The soil characteristics correspond to clay in the Troll field, North Sea. Finite element analyses indicate that vertical loading of suction anchors in undrained soil will result in a reverse end bearing failure. They also indicate that the horizontal holding capacity is primarily a function of caisson vertical cross-sectional area and the soil strength profile. It was found that the mooring line attachment point greatly impacts the capacity of suction anchors in all load cases investigated

    Complexation of Organic Guests and Coordination of Metal Ions by Cyclodextrins: Role of Cyclodextrins in Metal-Guest Interactions

    Get PDF
    Nitroaromatic explosives, such as trinitrotoluene (TNT), are of particular environmental concern due to their recalcitrance in soils and their potent toxicity and mutagenicity to both aquatic and mammalian species. TNT was the most widely used military explosive through the era encompassing both the First and Second World Wars. As a result, there is widespread contamination of soils by TNT around weapons manufacture, testing, and disposal facilities. Fenton chemistry (ferrous ion catalyzed generation of hydroxyl radicals) has shown utility in the remediation of TNT in soils but it suffers from non-specificity and the need for acidic conditions to prevent loss of iron as iron hydroxides. Cyclodextrins (CDs) have demonstrated the ability to increase the efficiency of Fenton degradation of aromatic pollutant species. The increase in degradation efficiency observed in the CD Fenton reaction systems has been credited to the formation of a pollutant/CD/ferrous ion ternary complex which has the ability to produce hydroxyl radicals at the site of bound ferrous ions during Fenton reactions. This results in an increase in hydroxyl radical concentration near the target guest molecule relative to the bulk solution, leading to a targeted degradation of the complexed guest molecule. In order to assess the viability of CD assisted Fenton reactions for the remediation of TNT, a thorough knowledge of the kinetics, degradation products, and role of binary and ternary complexes is required. Research presented in this dissertation examined the role of CDs in the Fenton oxidation of TNT, specifically: 1) the kinetics of TNT degradation in the presence of CDs for a Fenton reaction system, 2) the products of these reactions through chromatographic and mass spectrometric methods, and 3) NMR and binding studies of binary and ternary complexes

    Designing the Extended Zero Trust Maturity Model A Holistic Approach to Assessing and Improving an Organization’s Maturity Within the Technology, Processes and People Domains of Information Security

    Get PDF
    Zero Trust is an approach to security where implicit trust is removed, forcing applications, workloads, servers and users to verify themselves every time a request is made. Furthermore, Zero Trust means assuming anything can be compromised, and designing networks, identities and systems with this in mind and following the principle of least privilege. This approach to information security has been coined as the solution to the weaknesses of traditional perimeter-based information security models, and adoption is starting to increase. However, the principles of Zero Trust are only applied within the technical domain to aspects such as networks, data and identities in past research. This indicates a knowledge gap, as the principles of Zero Trust could be applied to organizational domains such as people and processes to further strengthen information security, resulting in a holistic approach. To fill this gap, we employed design science research to develop a holistic maturity model for Zero Trust maturity based on these principles: The EZTMM. We performed two systematic literature reviews on Zero Trust and Maturity Model theory respectively and collaborated closely with experts and practitioners on the operational, tactical and strategic levels of six different organizations. The resulting maturity model was anchored in prior Zero Trust and maturity model literature, as well as practitioner and expert experiences and knowledge. The EZTMM was evaluated by our respondent organizations through two rounds of interviews before being used by one respondent organization to perform a maturity assessment of their own organization as a part of our case study evaluation. Each interview round resulted in ample feedback and learning, while the case study allowed us to evaluate and improve on the model in a real-world setting. Our contribution is twofold: A fully functional, holistic Zero Trust maturity model with an accompanying maturity assessment spreadsheet (the artifact), and our reflections and suggestions regarding further development of the EZTMM and research on the holistic application of Zero Trust principles for improved information security

    Designing the Extended Zero Trust Maturity Model A Holistic Approach to Assessing and Improving an Organization’s Maturity Within the Technology, Processes and People Domains of Information Security

    Get PDF
    Zero Trust is an approach to security where implicit trust is removed, forcing applications, workloads, servers and users to verify themselves every time a request is made. Furthermore, Zero Trust means assuming anything can be compromised, and designing networks, identities and systems with this in mind and following the principle of least privilege. This approach to information security has been coined as the solution to the weaknesses of traditional perimeter-based information security models, and adoption is starting to increase. However, the principles of Zero Trust are only applied within the technical domain to aspects such as networks, data and identities in past research. This indicates a knowledge gap, as the principles of Zero Trust could be applied to organizational domains such as people and processes to further strengthen information security, resulting in a holistic approach. To fill this gap, we employed design science research to develop a holistic maturity model for Zero Trust maturity based on these principles: The EZTMM. We performed two systematic literature reviews on Zero Trust and Maturity Model theory respectively and collaborated closely with experts and practitioners on the operational, tactical and strategic levels of six different organizations. The resulting maturity model was anchored in prior Zero Trust and maturity model literature, as well as practitioner and expert experiences and knowledge. The EZTMM was evaluated by our respondent organizations through two rounds of interviews before being used by one respondent organization to perform a maturity assessment of their own organization as a part of our case study evaluation. Each interview round resulted in ample feedback and learning, while the case study allowed us to evaluate and improve on the model in a real-world setting. Our contribution is twofold: A fully functional, holistic Zero Trust maturity model with an accompanying maturity assessment spreadsheet (the artifact), and our reflections and suggestions regarding further development of the EZTMM and research on the holistic application of Zero Trust principles for improved information security

    Hydrate Plugging and Flow Remediation during CO2 Injection in Sediments

    Get PDF
    Successful geological sequestration of carbon depends strongly on reservoir seal integrity and storage capacity, including CO2 injection efficiency. Formation of solid hydrates in the near-wellbore area during CO2 injection can cause permeability impairment and, eventually, injectivity loss. In this study, flow remediation in hydrate-plugged sandstone was assessed as function of hydrate morphology and saturation. CO2 and CH4 hydrates formed consistently at elevated pressures and low temperatures, reflecting gas-invaded zones containing residual brine near the injection well. Flow remediation by methanol injection benefited from miscibility with water; the methanol solution contacted and dissociated CO2 hydrates via liquid water channels. Injection of N2 gas did not result in flow remediation of non-porous CO2 and CH4 hydrates, likely due to insufficient gas permeability. In contrast, N2 as a thermodynamic inhibitor dissociated porous CH4 hydrates at lower hydrate saturations (<0.48 frac.). Core-scale thermal stimulation proved to be the most efficient remediation method for near-zero permeability conditions. However, once thermal stimulation ended and pure CO2 injection recommenced at hydrate-forming conditions, secondary hydrate formation occurred aggressively due to the memory effect. Field-specific remediation methods must be included in the well design to avoid key operational challenges during carbon injection and storage.publishedVersio

    En tematisk analyse av norske energiselskapers bærekraft og verdiskaping

    Get PDF
    Denne masteravhandlingen har som formål å gi innsikt i hvordan selskaper i den norske energisektoren tenker om bærekraft, og hvordan de tenker at bærekraft kan påvirke deres verdiskaping. Finanstilsynet har rettet kritikk mot norske selskapers arbeid med bærekraftsrapportering. Selskapene er opptatt av å måle oppnåelse av bærekraftsmål, men er i liten grad opptatt av sammenhengen mellom bærekraft og deres evne til å skape verdi. Deres manglende oppmerksomhet rundt dette tyder på at næringslivet i for liten grad tenker igjennom hvordan usikkerhetsfaktorer knyttet til FNs bærekraftsmål kan påvirke selskapets verdi. Det er derfor behov for empirisk forskning på hvordan de tenker rundt dette. Dette forskningsprosjektet tar for seg følgende problemstilling: Hvordan tenker næringslivet rundt egen bærekraftstrategi, risiko og verdi? Dette deles inn i fire underproblemstillinger: * Hvilken forståelse har selskapet selv av bærekraft? * Hvordan tenker næringslivet rundt bærekraftstrategien sin? * Er det en sammenheng i bedriften mellom det å drive bærekraftig samtidig som man skaper verdi? * Hva er sammenhengen mellom risiko og bærekraft? Problemstillingen besvares ved hjelp av kvalitativ metode. Dette suppleres med litteratursøk på relevant forskning. Datainnsamling er gjort ved semistrukturerte intervjuer av 5 ansatte i ulike norske energiselskaper. Datamaterialet er analysert ved hjelp av tematisk analyse. Denne prosessen innebar koding og tematisering av funn. Resultatene viser at respondentene har god kunnskap om bærekraft, og at bærekraft er godt integrert i bedriftenes strategi. Det er også sammenheng mellom å drive bærekraftig og å skape verdi. Selskapene er i økende grad observante på risikoer knyttet til bærekraft, og ser den finansielle påvirkningen de kan ha. Enkelte utfordringer gjør imidlertid arbeidet med bærekraft krevende. Resultatene viser at det er behov for tydelige retningslinjer for prioritering i beslutningsprosesser.The aim of this master thesis is to provide insight into how companies in the Norwegian energy sector think about sustainability, and how they believe sustainability can affect their value creation. The Norwegian Financial Supervisory Authority has criticized Norwegian companies' work on sustainability reporting. Companies are focused on measuring the achievement of sustainability goals but are less focused on the connection between sustainability and their ability to create value. Their lack of attention to this suggests that the business sector is not considering how uncertainty factors related to the UN's sustainability goals can affect a company's value. There is therefore a need for empirical research on how they think about this. This research project addresses the following research question: How does the business sector think about its own sustainability strategy, risk, and value? This is divided into four sub-questions: * What understanding does the company have of sustainability? * How does the business sector think about its sustainability strategy? * Is there a connection in the company between operating sustainably and creating value? * What is the relationship between risk and sustainability? The research question is answered using a qualitative method. This is supplemented by a literature search on other relevant research. Data collection was done through semi-structured interviews with 5 employees in different Norwegian energy companies. The data material was analyzed using thematic analysis. This process involved coding and thematizing findings. The results show that the respondents have good knowledge of sustainability and that sustainability is well integrated into the companies' strategies. There is also a connection between operating sustainably and creating value. Companies are increasingly aware of risks related to sustainability and see the financial impact they can have. However, some challenges make sustainability work demanding. The results show that there is a need for clear guidelines for prioritization in decision-making processes

    EØS-statlige selskapers rett til tingsinnbegrepspant i Norge

    Get PDF
    MasteroppgaveJUS399MAJURMAJUR-

    Designing Extended Zero Trust Maturity Model – From Technical to Socio-Technical

    Get PDF
    Recent successful cybersecurity attacks have exploited trust to compromise organizational information systems. Scholars and practitioners agree that the issue originates from the organizational perimeter security approach, within which perimeter trust is assumed. To improve the situation, building security principles on the idea that trust is not inherent but earned has been proposed, coined as Zero Trust. However, the current discussions spearheaded by technology-minded practitioners have focused mostly on trust at the network security and architecture levels, largely omitting the organizational aspects of security. To address this gap, we build on socio-technical approach and maturity models to develop a novel artifact with security experts, addressing the need for organizational Zero Trust through the Extended Zero Trust Maturity Model. Our research contributes to discussions on holistic information security management by extending the principles of Zero Trust from technical into socio-technical approach and responds to calls to reconsider foundational assumptions of IS security

    Unlocking multimodal PET-MR synergies for geoscience

    Get PDF
    The recent combination of positron emission tomography (PET) and magnetic resonance (MR) imaging modalities in one clinical diagnostic tool represents a scientific advancement with high potential impact in geoscientific research; by enabling simultaneous and explicit quantification of up to three distinct fluids in the same porous system. Decoupled information from PET-MR imaging was used here, for the first time, to quantify spatial and temporal porous media fluid flow. Three-dimensional fluid distribution was quantified simultaneously and independently by each imaging modality, and fluid phases were correlated with high reproducibility between modalities and repetitive fluid injections.publishedVersio
    corecore