837,992 research outputs found

    Another Approach to Enhance Airline Safety: Using Management Safety Tools

    Get PDF
    The ultimate goal of conducting an accident investigation is to prevent similar accidents from happening again and to make operations safer system-wide. Based on the findings extracted from the investigation, the "lesson learned" becomes a genuine part of the safety database making risk management available to safety analysts. The airline industry is no exception. In the US, the FAA has advocated the usage of the System Safety concept in enhancing safety since 2000. Yet, in today s usage of System Safety, the airline industry mainly focuses on risk management, which is a reactive process of the System Safety discipline. In order to extend the merit of System Safety and to prevent accidents beforehand, a specific System Safety tool needs to be applied; so a model of hazard prediction can be formed. To do so, the authors initiated this study by reviewing 189 final accident reports from the National Transportation Safety Board (NTSB) covering FAR Part 121 scheduled operations. The discovered accident causes (direct hazards) were categorized into 10 groups Flight Operations, Ground Crew, Turbulence, Maintenance, Foreign Object Damage (FOD), Flight Attendant, Air Traffic Control, Manufacturer, Passenger, and Federal Aviation Administration. These direct hazards were associated with 36 root factors prepared for an error-elimination model using Fault Tree Analysis (FTA), a leading tool for System Safety experts. An FTA block-diagram model was created, followed by a probability simulation of accidents. Five case studies and reports were provided in order to fully demonstrate the usefulness of System Safety tools in promoting airline safety

    Rancang Bangun Sistem Informasi Penyalur Dana Bantuan Siswa ( Bos ) Berbasis Web

    Full text link
    Application of Information Technology has now spread almost in all fields is no exception in the management of the School Operational Fund allows all operational funds management activities informasi.Kebutuhan technology will utilize information technology is closely connected with the role of fund management boss as a standard program of education that is needed to finance the activities nonpersonnel operation for 1 ( one ) year as part of the overall education funding to education units can conduct educational activities on a regular and ongoing basis in accordance with National Education Standards . With the construction of Management Information Systems Applications " ASISMEN " School Operational Assistance " BOS " , which can provide information to the school principal and school treasurer or educational institutions regarding the distribution of financial problems by the BOS . So that the information provided is presented in the form of special reports that can be presented properly and periodically easily understood and easy to use. One example is the implementation of financial information systems in enterprises or other institutions , as well as in SDN Tangerang The final result of this research is a system that can provide accurate and up to date report that meets the objectives of the national education standard 8 set by the central government

    Course Syllabus (final and complete exams)

    Get PDF
    For personal use only. Please do not repost or distribute

    A survey on cyber security for smart grid communications

    Get PDF
    A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it requires significant dependence on intelligent and secure communication infrastructures. It requires security frameworks for distributed communications, pervasive computing and sensing technologies in smart grid. However, as many of the communication technologies currently recommended to use by a smart grid is vulnerable in cyber security, it could lead to unreliable system operations, causing unnecessary expenditure, even consequential disaster to both utilities and consumers. In this paper, we summarize the cyber security requirements and the possible vulnerabilities in smart grid communications and survey the current solutions on cyber security for smart grid communications. © 2012 IEEE

    Reconciling the Volcker Rule with the Dodd-Frank Act’s Objectives: How to Best Combat Systemic Risk

    Get PDF
    This Note examines the Dodd-Frank Act’s ban on proprietary trading and on banks sponsoring hedge funds and private equity funds, known as the Volcker Rule. This Rule has been a point of contention since the Act was passed in 2010. Some argue that the ban is either a detriment to bond market liquidity or is unnecessary because a tenuous nexus exists between proprietary trading and true causes of the 2008 financial crisis. Proponents cite the role of proprietary trading in the crisis and the inherent risk that banks accept when engaging in such trading. The controversy surrounding the Volcker Rule has led individuals in politics and finance to discuss whether to amend, or even repeal, the Rule. This Note explores arguments for and against the Volcker Rule and ultimately offers recommendations to amend the Rule while maintaining its (and Dodd-Frank’s) venerable goal of curbing systemic risk. First, this Note begins with a discussion of the causes of the financial crisis and systemic risk before explaining the Rule’s provisions. This background provides the groundwork for the ongoing debate about the Volcker Rule and whether there should be a change in the language of the Rule. Proponents and opponents have clashed on multiple issues, such as whether proprietary trading played a significant role in the financial crisis and whether it actually reduces systemic risk. Understanding arguments on both sides is crucial to assess whether and how the Volcker Rule should be amended in light of systemic risk. This Note concludes that neither outright repeal of the Rule nor leaving it fully intact are appropriate. Rather, this Note offers recommendations to amend it in a way that balances banks’ desires to engage in profitable trading with the global interest in curbing systemic risk in the financial system

    Implementation and Development of Vehicle Tracking and Immobilization Technologies

    Get PDF
    Since the mid-1980s, limited use has been made of vehicle tracking using satellite communications to mitigate the security and safety risks created by the highway transportation of certain types of hazardous materials. However, vehicle-tracking technology applied to safety and security is increasingly being researched and piloted, and it has been the subject of several government reports and legislative mandates. At the same time, the motor carrier industry has been investing in and implementing vehicle tracking, for a number of reasons, particularly the increase in efficiency achieved through better management of both personnel (drivers) and assets (trucks or, as they are known, tractors; cargo loads; and trailers). While vehicle tracking and immobilization technologies can play a significant role in preventing truck-borne hazardous materials from being used as weapons against key targets, they are not a & ”silver bullet.” However, the experience of DTTS and the FMCSA and TSA pilot projects indicates that when these technologies are combined with other security measures, and when the information they provide is used in conjunction with information supplied outside of the tracking system, they can provide defensive value to any effort to protect assets from attacks using hazmat as a weapon. This report is a sister publication to MTI Report 09-03, Potential Terrorist Uses of Highway-Borne Hazardous Materials. That publication was created in response to the Department of Homeland Security´s request that the Mineta Transportation Institute´s National Transportation Security Center of Excellence provide research and insights regarding the security risks created by the highway transportation of hazardous materials

    The "MIND" Scalable PIM Architecture

    Get PDF
    MIND (Memory, Intelligence, and Network Device) is an advanced parallel computer architecture for high performance computing and scalable embedded processing. It is a Processor-in-Memory (PIM) architecture integrating both DRAM bit cells and CMOS logic devices on the same silicon die. MIND is multicore with multiple memory/processor nodes on each chip and supports global shared memory across systems of MIND components. MIND is distinguished from other PIM architectures in that it incorporates mechanisms for efficient support of a global parallel execution model based on the semantics of message-driven multithreaded split-transaction processing. MIND is designed to operate either in conjunction with other conventional microprocessors or in standalone arrays of like devices. It also incorporates mechanisms for fault tolerance, real time execution, and active power management. This paper describes the major elements and operational methods of the MIND architecture
    • …
    corecore