This paper studies different rotor topologies for the design of a 2 MW doubly-fed reluctance generator for a wind turbine application. There have been several papers that put forward different options for this type of machine and the control has been extensively studied. This paper uses the same stator size and application to enable comparative operation. This machine has two 3-phase winding sets — a 4 pole and an 8-pole arrangement, and a 6-pole reluctance type of rotor. Different designs for the rotor are investigated in terms of either their duct arrangement or solid salient pole structure. The key issue for this machine is the coupling between the stator winding sets.
Clinical skills' training is arguably the weakest point in medical schools' curriculum. This study briefly describes how we at the Split University School of Medicine cope with this problem. We consider that, over the last decades, a considerable advancement in teaching methodologies, tools, and assessment of students has been made. However, there are many unresolved issues, most notably: (i) the institutional value system, impeding the motivation of the teaching staff; (ii) lack of a strong mentoring system; (iii) organization, timing, and placement of training in the curriculum; (iv) lack of publications pertinent to training; and (v) unwillingness of patients to participate in student training. To improve the existing training models we suggest increased institutional awareness of obstacles, as well as willingness to develop mechanisms for increasing the motivation of faculty. It is necessary to introduce changes in the structure and timing of training and to complement it with a catalog, practicum, and portfolio of clinical skills. At Split University School of Medicine, we developed a new paradigm aimed to improve the teaching of clinical skills called "Neptune-CSS," which stands for New Paradigm in Training of Undergraduate Clinical Skills in Split.
We propose a tool-assisted approach to address process-related threats on SCADA systems. Process-related threats have not been addressed before in a systematic manner. Our approach consists of two steps: threat analysis and threat mitigation. For the threat analysis, we combine two methodologies (PHEA and HAZOP) to systematically identify process-related threats. The threat mitigation is supported by our tool, MELISSA, that helps to detect incidents (attacks or user mistakes). MELISSA uses SCADA system logs and visualization techniques to highlight potential incidents. A preliminary case study suggests that our approach is effective in detecting anomalous events that might alter the regular SCADA process work-flow.
Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!
Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo
Saznaj više