35,103 research outputs found

    Hazard identification, risk assessment and risk control: a study at construction site

    Get PDF
    Occupational Safety and Health Act (OSHA) is an Act to make further provisions for securing the safety, health and welfare of persons at work, for protecting others against risks to safety or health in connection with the activities of persons at work, to establish the National Council for Occupational Safety and Health, and for matters connected therewith. This study focuses on infrastructure construction in Pagoh Education Hub. In present days, despite of knowledge in OSHA act, workers often proceed the work without considering any safety precaution or act at workplace as stated in OSHA Act. Due to ignorance of workers and employee on OSHA Act, workers are exposed to danger and hazard at their workplace causing them minor or worst fatal injury. The data collection was carried out through site investigation using Preliminary Hazard Analysis (PHA), HIRARC form and interview session with several workers in the constructio. The main objective of this study is to support the idea to coordinate and redefined the practice of occupational safety and health as workers discipline at their workplace based on existing potential hazard. This study was conducted to identify the hazard that occur at the workplace and analyse the safety precaution taken by the workers and employer to avoid accidents. As a result, this study listed several suggestions to improve the practice of occupational safety and health among workers in the workplace

    A management framework for automating network experiments and user behaviour emulation on large scale testbed facilities

    Get PDF
    Generic test environments such as Emu lab allow to perform large scale tests on different network topologies. While these facilities offer a tool to easily configure the topology, setting up realistic network scenarios afterwards is a manual and time consuming task involving the configuration of dozens of servers, including the installation of software suites and the emulation of subscriber behaviour. Also collecting the evaluation results afterwards can be complex and time consuming. This article discusses a management framework that allows both automating the configuration of networking experiments through a Graphical User Interface and automating the collection of measurements and visualisation of experimental results afterwards

    Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study

    Full text link
    Security risk management can be applied on well-defined or existing systems; in this case, the objective is to identify existing vulnerabilities, assess the risks and provide for the adequate countermeasures. Security risk management can also be applied very early in the system's development life-cycle, when its architecture is still poorly defined; in this case, the objective is to positively influence the design work so as to produce a secure architecture from the start. The latter work is made difficult by the uncertainties on the architecture and the multiple round-trips required to keep the risk assessment study and the system architecture aligned. This is particularly true for very large projects running over many years. This paper addresses the issues raised by those risk assessment studies performed early in the system's development life-cycle. Based on industrial experience, it asserts that attack trees can help solve the human cognitive scalability issue related to securing those large, continuously-changing system-designs. However, big attack trees are difficult to build, and even more difficult to maintain. This paper therefore proposes a systematic approach to automate the construction and maintenance of such big attack trees, based on the system's operational and logical architectures, the system's traditional risk assessment study and a security knowledge database.Comment: In Proceedings GraMSec 2014, arXiv:1404.163

    Virtual HR Departments: Getting Out of the Middle

    Get PDF
    In this chapter, we explore the notion of virtual HR departments: a network-based organization built on partnerships and mediated by information technologies in order to be simultaneously strategic, flexible, cost-efficient, and service-oriented. We draw on experiences and initiatives at Merck Pharmaceuticals in order to show how information technology in establishing an infrastructure for virtual HR. Then, we present a model for mapping the architecture of HR activities that includes both internal and external sourcing options. We conclude by offering some recommendations for management practice as well as future research

    An Autonomous Engine for Services Configuration and Deployment.

    Full text link
    The runtime management of the infrastructure providing service-based systems is a complex task, up to the point where manual operation struggles to be cost effective. As the functionality is provided by a set of dynamically composed distributed services, in order to achieve a management objective multiple operations have to be applied over the distributed elements of the managed infrastructure. Moreover, the manager must cope with the highly heterogeneous characteristics and management interfaces of the runtime resources. With this in mind, this paper proposes to support the configuration and deployment of services with an automated closed control loop. The automation is enabled by the definition of a generic information model, which captures all the information relevant to the management of the services with the same abstractions, describing the runtime elements, service dependencies, and business objectives. On top of that, a technique based on satisfiability is described which automatically diagnoses the state of the managed environment and obtains the required changes for correcting it (e.g., installation, service binding, update, or configuration). The results from a set of case studies extracted from the banking domain are provided to validate the feasibility of this propos

    Automated post-fault diagnosis of power system disturbances

    Get PDF
    In order to automate the analysis of SCADA and digital fault recorder (DFR) data for a transmission network operator in the UK, the authors have developed an industrial strength multi-agent system entitled protection engineering diagnostic agents (PEDA). The PEDA system integrates a number of legacy intelligent systems for analyzing power system data as autonomous intelligent agents. The integration achieved through multi-agent systems technology enhances the diagnostic support offered to engineers by focusing the analysis on the most pertinent DFR data based on the results of the analysis of SCADA. Since November 2004 the PEDA system has been operating online at a UK utility. In this paper the authors focus on the underlying intelligent system techniques, i.e. rule-based expert systems, model-based reasoning and state-of-the-art multi-agent system technology, that PEDA employs and the lessons learnt through its deployment and online use
    • …
    corecore