Algorithm for Heat Exchanger Control System Sample Clauses

Algorithm for Heat Exchanger Control System. The algorithm of operation of these valves could be as follows: If the temperature of water supplied to the building exceeds 420C the bigger valve will shut off. In the case of a temperature increase beyond 450C the smaller valve will also shut off and the discharge of geothermal water to sewage will be stopped. In the case of a temperature drop beyond 450C the electromagnetic valves will open in a reverse order. In the algorithm it is important to take into account the “sleep” regime of hot water use, when at night the consumption of the hot water is practically stopped. In this case the valve operation based on temperature sensor signals is insufficient, because in this case the temperature in the reservoir housing the temperature sensors will drop due to heat loss to the environment. In this case the electromagnetic valves would stay closed to avoid unproductive spillage of geothermal hot water. In order to avoid such a condition, it is necessary to monitor the pressure drop in outgoing hot water pipe and supply this information to the processor. Therefore, the valves will open only when there would be a temperature drop below 450C and there would be a temperature drop in the outgoing pipe, meaning that there is hot water consumption in the building.
AutoNDA by SimpleDocs

Related to Algorithm for Heat Exchanger Control System

  • CONTROL SYSTEM (a) SELLER shall provide and maintain a quality control system to an industry recognized Quality Standard and in compliance with any other specific quality requirements identified in this Contract.

  • Quality control system (i) The Contractor shall establish a quality control mechanism to ensure compliance with the provisions of this Agreement (the “Quality Assurance Plan” or “QAP”).

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • Commingling of Resold Services with Unbundled Network Elements and Combinations of Unbundled Network Elements 6.7.1 To the extent it is Technically Feasible and pursuant to the terms of Section 9.1, CLEC may Commingle Telecommunications Services purchased on a resale basis with an Unbundled Network Element or combination of Unbundled Network Elements.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.

  • PATROL VIDEO SYSTEMS 2 1. As part of the law enforcement services to be provided to CITY, COUNTY 3 has provided, or will provide, patrol video systems (hereinafter called “PVS”) 4 that are or will be mounted in patrol vehicles designated by COUNTY for 5 use within CITY service area.

Time is Money Join Law Insider Premium to draft better contracts faster.