169 resultados para agile methods


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Energy efficiency is an important topic when considering electric motor drives market. Although more efficient electric motor types are available, the induction motor remains as the most common industrial motor type. IEC methods for determining losses and efficiency of converter-fed induction motors were introduced recently with the release of technical specification IEC/TS 60034-2-3. Determining the induction motor losses with IEC/TS 60034-2-3 method 2-3-A and assessing the practical applicability of the method are the main interests of this study. The method 2-3-A introduces a specific test converter waveform to be used in the measurements. Differences between the induction motor losses with a test converter supply, and with a DTC converter supply are investigated. In the IEC methods, the tests are run at motor rated fundamental voltage, which, in practice, requires the frequency converter to be fed with a risen input voltage. In this study, the tests are run on both frequency converters with artificially risen converter input voltage, resulting in rated motor fundamental input voltage as required by IEC. For comparison, the tests are run with both converters on normal grid input voltage supply, which results in lower motor fundamental voltage and reduced flux level, but should be more relevant from practical point of view. According to IEC method 2-3-A, tests are run at rated motor load, and to ensure comparability of the results, the rated load is used in the grid-fed converter measurements, although motor is overloaded while producing the rated torque at reduced flux level. The IEC 2-3-A method requires also sinusoidal supply test results with IEC method 2-1-1B. Therefore, the induction motor losses with the recently updated IEC 60034-2-1 method 2-1-1B are determined at the motor rated voltage, but also at two lower motor voltages, which are according to the output fundamental voltages of the two network-supplied converters. The method 2-3-A was found to be complex to apply but the results were stable. According to the results, the method 2-3-A and the test converter supply are usable for comparing losses and efficiency of different induction motors at the operating point of rated voltage, rated frequency and rated load, but the measurements do not give any prediction of the motor losses at final application. One might therefore strongly criticize the method’s main principles. It seems, that the release of IEC 60034-2-3 as a technical specification instead of a final standard for now was justified, since the practical relevance of the main method is questionable.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Imagine the potential implications of an organization whose business and IT processes are well aligned and are capable of reactively and proactively responding to the external and internal changes. The Philips IT Infrastructure and Operations department (I&O) is undergoing a series of transformation activities to help Philips business keeping up with the changes. I&O would serve a critical function in any business sectors; given that the I&O’s strategy switched from “design, build and run” to “specify, acquire and performance manage”, that function is amplified. In 2013, I&O’s biggest transforming programme I&O Futures engaged multiple interdisciplinary departments and programs on decommissioning legacy processes and restructuring new processes with respect to the Information Technology Internet Library (ITIL), helping I&O to achieve a common infrastructure and operating platform (CI&OP). The author joined I&O Futures in the early 2014 and contributed to the CI&OP release 1, during which a designed model Bing Box and its evaluations were conducted through the lens of six sigma’s structured define-measure-analyze-improve-control (DMAIC) improvement approach. This Bing Box model was intended to firstly combine business and IT principles, namely Lean IT, Agile, ITIL best practices, and Aspect-oriented programming (AOP) into a framework. Secondly, the author implemented the modularized optimization cycles according to the defined framework into Philips’ ITIL-based processes and, subsequently, to enhance business process performance as well as to increase efficiency of the optimization cycles. The unique of this thesis is that the Bing Box model not only provided comprehensive optimization approaches and principles for business process performance, but also integrated and standardized optimization modules for the optimization process itself. The research followed a design research guideline that seek to extend the boundaries of human and organizational capabilities by creating new and innovative artifacts. The Chapter 2 firstly reviewed the current research on Lean Six Sigma, Agile, AOP and ITIL, aiming at identifying the broad conceptual bases for this study. In Chapter 3, we included the process of constructing the Bing Box model. The Chapter 4 described the adoption of Bing Box model: two-implementation case validated by stakeholders through observations and interviews. Chapter 5 contained the concluding remarks, the limitation of this research work and the future research areas. Chapter 6 provided the references used in this thesis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Phenomena in cyber domain, especially threats to security and privacy, have proven an increasingly heated topic addressed by different writers and scholars at an increasing pace – both nationally and internationally. However little public research has been done on the subject of cyber intelligence. The main research question of the thesis was: To what extent is the applicability of cyber intelligence acquisition methods circumstantial? The study was conducted in sequential a manner, starting with defining the concept of intelligence in cyber domain and identifying its key attributes, followed by identifying the range of intelligence methods in cyber domain, criteria influencing their applicability, and types of operatives utilizing cyber intelligence. The methods and criteria were refined into a hierarchical model. The existing conceptions of cyber intelligence were mapped through an extensive literature study on a wide variety of sources. The established understanding was further developed through 15 semi-structured interviews with experts of different backgrounds, whose wide range of points of view proved to substantially enhance the perspective on the subject. Four of the interviewed experts participated in a relatively extensive survey based on the constructed hierarchical model on cyber intelligence that was formulated in to an AHP hierarchy and executed in the Expert Choice Comparion online application. It was concluded that Intelligence in cyber domain is an endorsing, cross-cutting intelligence discipline that adds value to all aspects of conventional intelligence and furthermore that it bears a substantial amount of characteristic traits – both advantageous and disadvantageous – and furthermore that the applicability of cyber intelligence methods is partly circumstantially limited.