Patent classifications
F05D2270/00
Gas turbine engine
A gas turbine engine includes: a main passage through which compressed air extracted from a compressor is guided to a bearing; and an oil supply device that includes an oil tank storing oil and supplies the oil to the main passage through which the compressed air flows to generate oil mist. The oil supply device includes: a pressure reducer disposed at the main passage; a bypass passage that bypasses the pressure reducer and connects an upstream passage and a downstream passage; a holding chamber disposed at the bypass passage and having a predetermined volume; a switching mechanism that permits or blocks communication between the holding chamber and the oil tank, communication between the holding chamber and the upstream passage, and communication between the holding chamber and the downstream passage; and a controller that controls the switching mechanism.
Combined power generation plant and combined power generation plant control method
In the present invention, a coal gasification combined power generation facility comprises: a feed water supply line (72); a condensate pump (39) and an intermediate-pressure feed water pump (40); a turbine bypass line (32) that bypasses a steam turbine and supplies steam to the condenser (73); and a spray water line (76) that supplies the feed water to the turbine bypass line (32). The coal gasification combined power generation facility has a normal operation mode and a bypass operation mode, and in the bypass operation mode, a control device (80) supplies the feed water to the turbine bypass line (32) and performs a first opening degree control to control the opening degree of the supply adjustment valve so that the amount of feed water supplied to the exhaust heat recovery boiler becomes less than that in the normal operation mode.
Secure engine communication
A method of communication, within a processing system of a gas turbine engine, between a first electronic component and a second electronic component, comprising: generating by the first electronic component, a request, comprising a digital certificate, intern comprising a first host public key and a first client public key, signed with a first host private key, to initiate a trusted communication session with a second electronic component; encrypting at the first electronic component, at least a portion of the request with a first client private key; transmitting the request to the second electronic component; the first host private key and the first host public key defining a first asymmetric keypair and the first client private key and the first client public key defining a second asymmetric keypair.
Monitoring system, monitoring method and monitoring program for steam-using facility
A monitoring system that monitors a steam-using facility includes a temperature sensor that is a trap temperature sensor configured to detect a temperature of a steam trap provided in a steam discharge unit and/or a steam temperature sensor configured to detect a temperature of steam flowing into the steam trap and a pressure sensor configured to detect a pressure of steam flowing into the steam trap. The monitoring system determines that there is an occurrence of an abnormality or a sign of the abnormality in the steam trap when (i) a temperature detection value obtained by the temperature sensor and/or statistical temperature data obtained by performing statistical processing on the temperature detection value deviates from a predetermined criterion thereof and (ii) a pressure detection value obtained by the pressure sensor and/or statistical pressure data obtained by performing statistical processing on the pressure detection value deviates from a predetermined criterion thereof.
Speed-controlled conditioning valve for high pressure compressor
A rotor for a gas turbine engine has: a first rotor disk; an interstage flange that extends from the first rotor disk to a flange end portion that has an axial end surface and first radial outer and inner surfaces; a circumferential groove, formed in the flange end portion and extending from the axial end surface toward the first rotor disk; radial outer and inner slots formed in the first radial outer and inner surfaces along the circumferential groove and extend through the first radial outer and inner surfaces; and a valve member disposed within the circumferential groove and is secured within the circumferential groove when the flange end portion is connected to a second rotor disk, wherein the valve member deflects from rotor rotational speeds to seal or unseal the radial outer slot.
COMBINED POWER GENERATION PLANT AND COMBINED POWER GENERATION PLANT CONTROL METHOD
A coal gasification combined power generation facility includes a feed water supply line that supplies feed water condensed by a condenser to an exhaust heat recovery boiler; a supply adjustment valve that adjusts the flow amount of feed water supplied to the exhaust heat recovery boiler; a turbine bypass line that bypasses a steam turbine and supplies steam to the condenser; and a spray water line that supplies the feed water to the turbine bypass line. The coal gasification combined power generation facility has a bypass operation mode, wherein a control device supplies the feed water to the turbine bypass line and performs a first opening degree control to control the opening degree of the supply adjustment valve so that the amount of feed water supplied to the exhaust heat recovery boiler becomes less than that in a normal operation mode.
System with thin walled cooling plate for an electronic enclosure
A cooling system with a thin walled cooling plate. The system includes an enclosure with a cover that defines an interior space and that has an open side. Temperature sensitive devices are contained in the interior space. A cooling plate closes the open side and includes an inner side with a surface that is substantially flat and that faces into the interior. The cooling plate defines a flow channel adjacent the inner side that is configured to channel a circulating fluid to remove heat from the interior space. The flow channel extends across substantially all of the opening. An outer side of the cooling plate may be anodized to block heat from entering the interior space through the cooling plate.
Method and process for securing an executable image
Control systems and methods for securely loading software in a power control system. In some examples, the control system includes a computing device and a plurality of security modules. The computing device may obtain and divide an executable image into a plurality of images. The computing device may generate a control hash as a function of the plurality of images, and record the control hash. The computing device may store each of the plurality of images in a plurality of security modules. At boot up, the computing device may load, from each security module, the stored image, and store each image to a memory device. The computing device may generate a hash based on the stored images, and compare the generated hash to the recorded control hash. Based on the comparison, the computing device may allow execution of the executable image.
BLOCKCHAIN BASED VEHICLE CONTROL
A vehicle control method of starting and shutting down an engine, in which a processor receives a blockchain update comprising a first transaction with instructions to perform an engine startup or shutdown; the blockchain update is validated; an engine startup or shutdown is performed based on the validated blockchain update; where the engine startup or shutdown is delayed based on validating a predetermined number of subsequent blockchain updates, including a second transaction with instructions to perform the engine startup or shutdown.
METHOD AND PROCESS FOR SECURING AN EXECUTABLE IMAGE
Control systems and methods for securely loading software in a power control system. In some examples, the control system includes a computing device and a plurality of security modules. The computing device may obtain and divide an executable image into a plurality of images. The computing device may generate a control hash as a function of the plurality of images, and record the control hash. The computing device may store each of the plurality of images in a plurality of security modules. At boot up, the computing device may load, from each security module, the stored image, and store each image to a memory device. The computing device may generate a hash based on the stored images, and compare the generated hash to the recorded control hash. Based on the comparison, the computing device may allow execution of the executable image.