Engineering & Technology Reference
Engineering & Technology (E&T) Reference is a collection of multidisciplinary technical articles and real-industry case studies.
Sectors
Browse articles by Sectors:
View all articles
-
Digital Radiography and Computed Tomography Methods for Gas Turbine Inspection
- Author(s): Stephen Halliwell
- Source:
Engineering & Technology Reference,
2017,
6pp.
- Publication date 01 December 2017
- + Show details - Hide details
-
p.
(6)
Failure of steam turbine rotors and blades while in service can cause significant damage to the plant and put at risk the safety of personnel. Current inspection techniques result in large operational cost being incurred by the power generator. In response to this challenge, the Electrical Power Research Institute (EPRI) of the USA sponsored a project to develop and validate a system for in-situ examination of the blades and connections to enable early detection of defects in pinned-finger low-pressure turbine blades using Digital Radiography (DR) techniques. The project successfully provided a practical, safely deployable DR system which achieved the inspection performance criteria.
-
Cyber security for smart grid components
- Author(s): Ronald Katzman and Mark Cioni
- Source:
Engineering & Technology Reference,
2017,
6pp.
- Publication date 20 October 2017
- + Show details - Hide details
-
p.
(6)
The strong focus on smart grid security over the past several years has resulted in a substantial evolution of standards and guidance, as well as an increased awareness by leaders and stakeholders around the importance of a strong security posture. In essence, the industry has made very significant progress in the what and why aspects of smart grid security. Given the authors’ extensive experience in smart grid design, deployment and operation they can assert the even greater importance of execution in establishing that strong posture. Their study focuses on the considerations and challenges inherent with the development, implementation, operation and sustainability of security in smart grid ecosystems. Smart Grid security components often do not lend themselves to traditional IT-centric controls nor automated deployment, instrumentation, monitoring and response. They will identify a set of core tenets that serve to enable a strong security posture and corresponding application based on their experience.
-
Soil–Structure Interactions for Offshore Wind Turbines
- Author(s): Subhamoy Bhattacharya ; Georgios Nikitas ; Laszlo Arany ; Nikolaos Nikitas
- Source:
Engineering & Technology Reference,
2017,
[24, 16]pp.
- Publication date 02 September 2017
- + Show details - Hide details
-
p.
([24, 16])
Soil–structure interaction (SSI) for offshore wind turbine supporting structures is essentially the interaction of the foundation/foundations with the supporting soil due to the complex set of loading. This study reviews the different aspects of SSI for different types of foundations used or proposed to support offshore wind turbines. Due to cyclic and dynamic nature of the loading that acts on the wind turbine structure, the dominant SSI will depend to a large extent on the global modes of vibration of the overall structure. This study summarises the modes of vibration of offshore wind turbines structures supported on different types of foundations based on observations from scaled model tests and numerical analysis. As these are new structures with limited monitoring data, field records are scarce. Where possible, field records available in the public domain are also used to compare with experimental findings.
-
Part 4: Flexibility – Modular Power Protection in Industrial Applications: Understanding the ‘ilities’
- Author(s): David Bond
- Source:
Engineering & Technology Reference,
2017,
4pp.
- Publication date 22 June 2017
- + Show details - Hide details
-
p.
(4)
Modular power protection and conversion technology, particularly in the form of UPSs, has long been used in commercial applications, but take-up in industrial applications has, to date, been relatively slow. This relatively slow uptake is due, in part, to a limited understanding of the ‘ilities’ (‘Availability’, ‘Reliability’, ‘Scalability’, ‘Flexibility’ and ‘Maintainability’) commonly associated with modular technology and how the various ‘ilities’ complement each other. In this fourth of five papers, the author will define flexibility in the context of the increasingly important and popular modular technology and will discuss how truly flexible systems allow system designers to design power protection systems capable of adapting to the potentially changing needs of a site and/or its critical load.
-
Part 1: Modularity – Modular Power Protection in Industrial Applications: Understanding the ‘ilities’
- Author(s): David Bond
- Source:
Engineering & Technology Reference,
2017,
3pp.
- Publication date 22 June 2017
- + Show details - Hide details
-
p.
(3)
Modular power protection and conversion technology, particularly in the form of UPSs, has long been used in commercial applications, but take-up in industrial areas has, to date, been relatively slow. Why is this so? Whenever anyone describes the benefits of ‘modular’ power protection systems they invariably discuss topics such as ‘Availability’, ‘Reliability’, ‘Scalability’, ‘Flexibility’ and ‘Maintainability’, but what exactly does each of these ‘ilities’ mean and why are they important? This study is the first in a series of five in which the author, explains the terminology behind this increasingly important and popular technology.
-
Part 2: Availability – Modular Power Protection in Industrial Applications: Understanding the ‘ilities’
- Author(s): David Bond
- Source:
Engineering & Technology Reference,
2017,
3pp.
- Publication date 22 June 2017
- + Show details - Hide details
-
p.
(3)
Modular power protection and conversion technology, particularly in the form of Uninterruptible Power Supply (UPSs), has long been used in commercial applications but take-up in industrial applications has, to date, been relatively slow. This relatively slow uptake is due, in part, to a limited understanding of the ‘ilities’ (‘Availability’, ‘Reliability’, ‘Scalability’, ‘Flexibility’ and ‘Maintainability’) commonly associated with modular technology and how the various ‘ilities’ complement each other. In the second of five articles, David Bond, Managing Director at Benning Power Electronics (UK) Ltd. will explain Availability and Reliability in the context of the increasingly important and popular modular technology.
-
High-Temperature Piezoelectric Sensors for the Energy Industry
- Author(s): Dr Tim Stevenson
- Source:
Engineering & Technology Reference,
2017,
12pp.
- Publication date 01 August 2017
- + Show details - Hide details
-
p.
(12)
Effective integrity monitoring of assets subject to corrosion and erosion while minimising the exposure of personnel and ecosystem to hazardous environments, is a challenge in many industries. One solution to this problem is permanently installed condition monitoring (PICM) equipment, which can continuously provide information on the rate of corrosion, erosion or other fault mechanisms. Coupled with this increasingly popular PICM concept is the need to operate these inspection systems in even the most severe environments. This often involves operating in extreme temperatures to allow in situ monitoring of the processes that cause failure, in order to prevent the outages and unplanned shutdowns that reduce the productivity of the process or power plant assets. Here piezoelectric materials, the essential electro-mechanical heart of ultrasonic PICM devices, are presented to highlight how novel high-temperature variants are enabling condition monitoring systems to operate in the most extreme environments. The system applicability for wall thickness monitoring in high-temperature environments is demonstrated through experimental studies on pipes at temperatures up to 350°C.
-
Software Development for Photovoltaic Systems Simulation and Design
- Author(s): Ismaël Lokhat
- Source:
Engineering & Technology Reference,
2017,
12pp.
- Publication date 20 July 2017
- + Show details - Hide details
-
p.
(12)
The price drop of photovoltaic (PV) modules and other balance of sytem components has led to an increase in ‘soft’ costs, which include the design and the engineering of the system. Reducing these soft costs has thus become one of the challenges the PV industry has to tackle to achieve further global systems costs limitation. A sound use of software can enable time savings during the design process and a better system performance thanks to optimisation features. This study focuses on three aspects addressed by software for solar PV: layout, yield estimation and electrical sizing. These three topics show strong interaction and overlap most of the time; therefore an efficient design process would require the ability for the different pieces of software to communicate.
-
Common grid connection-related risks and mitigations for power generation projects
- Author(s): Bora Demiralan
- Source:
Engineering & Technology Reference,
2017,
8pp.
- Publication date 15 July 2017
- + Show details - Hide details
-
p.
(8)
The risks involved in grid connection for a power generation project are considered critical because of the potential impact on the project financial model and development schedule. This exposure to technical and financial risks during different grid connection stages could potentially prevent investment in the project. The identification of grid connection-related risks is not straightforward due to the regional variations in connection processes, technical characteristics of the grid, and compliance criteria. However, based on the author's experience from his previous grid connection and infrastructure due diligence experiences, there are common risk developers and lenders typically face. These often affect the cost and/or timescale of building the grid connection assets themselves or can impact operational costs later in the project life, and can adversely impact the project's financial viability and development schedule. Issues in the grid connection process may even cause legal conflicts between network operators and project stakeholders. Therefore, this high-level study provides an overview of common risks associated with the distribution grid connections of power generation projects, considers how these can be mitigated and the types of technical support that project developers and lenders may find useful at different stages of the grid connection process in Great Britain.
-
Case studies in the applications of additive manufacturing for the medical field: with a focus on plastic parts
- Author(s): Hannah Clare Wray Hazi
- Source:
Engineering & Technology Reference,
2017,
12pp.
- Publication date 12 July 2017
- + Show details - Hide details
-
p.
(12)
Additive manufacturing comprises a powerful family of technologies which have recently evolved to offer the ability of final production as well as prototyping and design work. However, there are some limitations which restrict the universal adoption of additive manufacturing as a substitute for conventional processes such as injection moulding. This study presents the current state-of-the-art in additive manufacturing through a series of examples and case studies in the medical field. An in-depth case study of an improved glucose testing strip is used as an example of a hybrid approach combining conventional and additive manufacturing. These examples are used to explore the advantages and disadvantages of additive manufacturing and a new set of criteria is drawn up to evaluate whether a medical product should be produced through additive or conventional techniques.
-
Securing ICS – going beyond IT
- Author(s): Stefan Liversidge
- Source:
Engineering & Technology Reference,
2017,
5pp.
- Publication date 12 July 2017
- + Show details - Hide details
-
p.
(5)
It is often stated that industrial control system (ICS) environments are difficult to protect from cyber attack. The use of legacy equipment, extended system life cycles, real-time requirements etc. are often quoted as reasons why ICS is so difficult to protect. These are valid arguments and should not be dismissed; however, the danger with this message is that ICS owner/operators may become daunted by prospect of implementing a cyber security programme. There is little acknowledgment of how the characteristics of ICS can be leveraged to provide a significant security benefit. Applying IT best practise is not always suitable for ICS environments, causing operational issues and security controls that fail to reach their potential. ICS environments allow the implementation of strict deny-by-default, allow-by-exception policies. Such strict configurations may be unmanageable in many IT environments due to the fluid nature within IT, where users may want to use a variety of different programmes and services. ICS environments are much more static meaning that strict configurations are manageable, resulting in a more robust control system where compliance with change management procedures and health and safety executive (HSE) work permit systems are enforced and auditable. By blindly applying IT policy, the benefits of this environment could be missed.
-
Part 3: Scalability – Modular Power Protection in Industrial Applications: Understanding the ‘ilities’
- Author(s): David Bond
- Source:
Engineering & Technology Reference,
2017,
4pp.
- Publication date 23 June 2017
- + Show details - Hide details
-
p.
(4)
Modular power protection and conversion technology, particularly in the form of UPSs, has long been used in commercial applications, but take-up in industrial applications has, to date, been relatively slow. This relatively slow uptake is due, in part, to a limited understanding of the ‘ilities’ (‘Availability’, ‘Reliability’, ‘Scalability’, ‘Flexibility’ and ‘Maintainability’), commonly associated with modular technology and how the various ‘ilities’ complement each other. In this, the third of five articles, David Bond, Managing Director at Benning Power Electronics (UK) Ltd, explains scalability in the context of the increasingly important and popular modular technology and discusses how scalability can be used to optimise total cost of ownership (TCO).
Most viewed content
Most cited content for this Journal
-
Challenges in Design of Foundations for Offshore Wind Turbines
- Author(s): Professor Subhamoy Bhattacharya
-
Advanced Persistent Threat
- Author(s): Rob Sloan
-
Synchrophasors data analytics framework for power grid control and dynamic stability monitoring
- Author(s): Innocent Kamwa ; Louis Geoffroy ; Subhransu R. Samantaray ; Amit Jain
-
Condition Monitoring of Power Electronics for Offshore Wind
- Author(s): Li Ran ; Sylvia Konaklieva ; Paul McKeever ; Philip Mawby
-
Synchronous reluctance motor technology: industrial opportunities, challenges and future direction
- Author(s): Christopher Donaghy-Spargo
Coming Soon!
A Statistical Analysis of Vulnerability Discovery: Microsoft Operating Systems
Software vulnerabilities that lie within operating systems present significant issues to security professionals and senior managers. Therefore information about the propagation and lifecycle that vulnerabilities exhibit within software systems is crucial to understanding the risks that organisations face. The authors present a review of the software vulnerability literature, an overview of contemporary vulnerability discovery models and a case study centred on the Microsoft Windows series of operating systems.
Paul Lewis & Jeremy Hilton Centre for Cyber Security and Information Systems, Defence Academy of the UK, Cranfield University, UK
Security Awareness for Executives
As cyber security moves from a concern of the Information Technology Department to an agenda item in the boardroom and a risk to the organisation, executives require awareness of the issues more than ever. Distilling a complex, multi-faceted, technical subject into language and key points that can be understood by non-technical decision makers is key if an organisation is to implement an effective cyber security strategy. While every organisation will have a unique set of circumstances, varied priorities and differing levels of cyber security maturity, the information provided here will allow for a tailored approach. This document seeks to set out the decisions which must be made regarding the structure of an awareness programme, the requirement for engaging the executive leadership and is intended to detail how the CISO (or other chosen individual or external third party) should engage executives, the key messages that must be shared, and tips for effectively preparing and presenting the information.
Rob Sloan Head of Cyber Content and Data, Dow Jones Risk and Compliance, Dow Jones & Co, New York, USA
Privacy and Security – A Discussion of the Relationship
Privacy is a topic that has often gone hand in hand with security. Security professionals frequently find themselves straddling this line when involved in surveillance or employee monitoring. There are operational, legislative and ethical considerations to be made as well as the consideration of good security practice and hygiene. Privacy and security have also grown in the mainstream media with most publications carrying some form of opinion or reporting on the topics with carrying degrees of accuracy or hysteria. Good business practice and governance working with a solid understanding of data protection is the route to success. The ethics of surveillance in both business and the public domain will continue to be a much discussed and contentious issue and the public interest is set to grow as mainstream media continue to embrace it. The apparent public fear of surveillance by Government bodies often seems at odds with its willingness to hand over its details for free online or digital services and this lack of understanding also needs to be challenged when discussing privacy; why trust a commercial organisation more than your own security services if the monitoring is part of a strategy to secure a nation and its people, business and infrastructure?
Kenneth Sercy Utility Regulation Specialist, South Carolina Coastal Conservation League, Columbia, USA
Robert T. Carey Research Associate, Strom Thurmond Institute, Clemson University, Clemson, USA
Ellen W. Saltzman Research Associate, Strom Thurmond Institute, Clemson University, Clemson, USA
Types of Hydrogen Use in Transportation and Hydrogen Refuelling Stations
Hydrogen has immense potential as an energy vector. Once produced and stored the energy contained can be exploited in energy generation. This exploitation is thought to be able to rival more traditional methods of energy generation such as coal and gas powered power stations. Typically, hydrogen is expected to be deployed in fuel cells; however, there exist options in combusting the hydrogen to release the stored energy. Early markets and economic demand will force the first steps of hydrogen technology. At present road vehicles are seen as the technology of choice, with early adopters keen to take up this technology as the authors move forward to a low carbon future. Parallel to this is the need to have such an infrastructure to support deployment. In this study, they look at a few of the key areas where hydrogen is in transportation and discuss the infrastructure that is required to support the technology.
Dr Daniel Symes & Dr Aman Dhir Centre for Hydrogen & Fuel Cell Research, School of Chemical Engineering, University of Birmingham,Birmingham, UK
Natural Ventilation and Space Subdivision: Documentation and Simulation using Building Information Modelling Analytics and a Subsonic Wind Tunnel for Internal Spaces
Natural ventilation is contingent on many factors including wind velocity, size and location of openings, room size and how the room is split by demising walls. The specific subdivision of a room into two spaces of unequal size has an effect on the airflow through the space. In a room such as a bedroom with opposing windows, positive airflow can be achieved through the use of internal openings by way of open doors. However, the placement of these doors and the location of the demising wall can produce very different results. In 1969, Baruch Givoni studied and diagrammed these differing affects in his book Man, Climate and Architecture. This study recreates the eight conditions presented by Givoni and compares them with results from computer simulations utilising building information modelling analytics and a subsonic wind tunnel. It concludes by recognising the importance of rapid visualisation for designers in translating theoretical studies to actual buildings.
Karen M. Kensek & Ryan Hansanuwat School of Architecture, University of Southern California, Los Angeles, CA, USA
Control Systems: A Guide to Minimising Risk through Security
This study begins with an introduction into automation systems and their application in industry, with the evolution of distributed control systems over standard information technology (IT) networks and the security risks these pose. It then moves onto a comprehensive breakdown on how security risks are minimised in industrial control systems and how this is achieved through strategies, standards, IT functions and certification programmes. The main focus is on security strategies which in summary target security threats without impacting on production processes; the protection concept detailed comprises of general defence strategies which are intended to resist a variety of attacks. The outcome of these areas is how they reduce risk in control systems with a concluding statement that covers implementing security strategies in security solutions. All acronyms used throughout will be detailed in the introduction.
Paul Hingley &Tom Hammond Safety-Condition Monitoring and Industrial IT Security, Siemens Industry Sector, Siemens, UK
A Review of Nuclear Power within the United Kingdom
This paper presents an overview of nuclear power within the UK. First a brief summary of the evolution of NPPs is given. The importance of the electricity grid to the NPP and vice-versa is highlighted. The need for reliable and secure electrical supplies to power the safety systems of the NPP is of vital importance. Following the lessons learned from the post Fukishima Daiichi nuclear accident, a review of the newly proposed safety systems associated with the new generation of nuclear power reactor design is presented. These will possess multiple levels of redundant “passive” safety systems to cater for the loss of all power supplies to the NPP and attempt to keep the reactor core cooled.
Richard Poole, Technology Application Engineer (HVDC Protection and Control), National Grid, Electricity Transmission PLC UK
Updated:05/08/15GET INVOLVED WITH ENGINEERING & TECHNOLOGY REFERENCE RAISE YOUR PROFESSIONAL PROFILE AS AN ADVISOR, AUTHOR OR REVIEWER. Join a prestigious group of subject experts leading the development of today's engineering technology. For more information contact us today: [email protected] Engineering & Technology Reference is a new, multidisciplinary, online reference source being developed by the IET to provide practical technical knowledge and insight into technology solutions. |
Its goal is to help practitioners, researchers and students at all levels understand and solve the technological challenges that they encounter on a day-to-day basis and to improve engineering know-how, with its growing collection of articles and case studies that include lessons learnt and real-world insights.
Each reference article provides a detailed description of the technology being used in a specific area, how it works, the challenges faced and the solutions adopted.
ARE YOU A SUBJECT EXPERT IN THE FOLLOWING TOPICS?
Built Environment BIM; Intelligent Buildings; Energy Efficiency; Vehicle Infrastructures; Safety Issues; and Resource Efficiency Design & Production Additive Manufacturing; Energy Consumption; Inclusive Design; Sustainable Manufacturing; Robotics and Autonomous Systems; and Innovation to Commercialisation Energy Renewable Energies (Wind, Solar, Hydro, Biofuel); Smart Grids; Energy Security; Power Electronics, Production; Energy Networks; and Energy Storage Information & Communications Cyber Security; Cloud Computing; Internet of Things; Control Engineering; Data Centres; Green ICT; Mobile Data; Next Generation Networks; Quality Software; Wireless and Spectrum Transport Autonomous Vehicles; Hybrid/Electric Vehicles; Security and Risk; Transport Asset Management; Marine Engineering; Economic Growth; Intelligent Transportation Systems; High Speed Rail. |
WANT TO TAKE PART?
We are searching for leading practitioners and subject experts for the following roles:
• contributor: write a 3,000-4,000-word technical article or a 1,500-2,000-word case study
• advisor: work closely with the editorial team to plan and direct content acquisition and suggest potential contributors and reviewers
• reviewer: act as a peer reviewer and assess articles for technical accuracy and relevance
View just some of the many contributors here
ENJOY THE FOLLOWING BENEFITS WHEN YOU CONTRIBUTE AN ARTICLE
• Gain professional recognition and become part of a global community of subject-matter experts
• For IET members – time spent writing or reviewing counts towards Continuing Professional Development (CPD) under the IET CPD Monitoring Scheme
• Worldwide readership of articles, possibly including the IET’s 160,000 members
• The opportunity to showcase your work alongside other leading experts
• Articles will be available online via the IET Digital Library which provides access to the very best in engineering and technology research and information.
If you are interested in contributing an article or case study for publication on Engineering & Technology Reference, please email our editorial staff with a brief biography and a 200-word outline or proposal.
Please do not send completed articles at this stage. For further information, or to submit a proposal, please contact:
Simon Hamlet, Product Manager - email: [email protected], telephone: +44 (0)1438 765686
Sarah Lynch, Commissioning Editor - email: [email protected], telephone: +44 (0)1438 767625
Amber Thomas, Commissioning Editor - email: [email protected], telephone: +44 (0)1438 765536
For general enquiries, please contact the Engineering & Technology Reference editorial office [email protected]