348 research outputs found

    Major aviation accident investigation methodologies used by ITSA members

    Get PDF
    The International Civil Aviation Organization (ICAO) Annex 13 framework for aviation investigation is longstanding and well developed but does not require or audit use of methodologies for investigation analysis, including research literature safety/accident models (SAMs). Government Safety Investigation Authority (SIA) websites rarely mention methodologies. Limited published research engages directly with SIAs. A research/practice gap has been suggested. To address ICAO, SIA and research gaps, this qualitative multi-case study examines SIA use and documentation of methodologies for accident analysis. Nine of seventeen SIA members of the International Transportation Safety Association (ITSA) that investigate aviation accidents agreed to participate and provided written answers to our research questions, relevant internal documentation, and exemplar investigation reports. Our key findings are that participant SIAs have augmented ICAO requirements internally by their use of methodologies but that this usage was generally not obvious in published investigation reports and other SIA website material. It also varied significantly among the participants. All participant SIAs reported use of multiple methodologies, sometimes in the same investigation. Explicitly reported SIA methodology usage included: six Reason-based, six Rasmussen-based, three ‘recent systemic’, five ‘BowTie’, five ‘bespoke’, and seven using various other methodologies like ‘SHELL’. The industry impact of this qualitative research is hoped to be significant by being shared with participant SIAs unaware of each other\u27s practice, enabling consideration of different options. It can inform additional aviation SIAs, ICAO, air safety investigators, and other high-risk industry regulators and investigators. Safety researchers may be better placed to develop SAMs with greater practical industry relevance

    Worlds apart: industrial and academic focus areas in software testing

    Get PDF
    To determine how industry and academia approach software testing, researchers compared the titles of presentations from selected conferences in each of the two communities. The results shed light on the root cause of low industry-academia collaboration and led to suggestions on how to improve this situation

    Dlùth is Inneach: Linguistic and Institutional Foundations for Gaelic Corpus Planning

    Get PDF
    This report presents the results of a one-year research project, commissioned by Bòrd na Gàidhlig BnG) and carried out by a Soillse Research team, whose goal was to answer the following question: What corpus planning principles are appropriate for the strengthening and promotion of Scottish Gaelic, and what effective coordination would result in their implementation? This report contains the following agreed outcomes: a clear and consistent linguistic foundation for Gaelic corpus planning, according with Bòrd na Gàidhlig’s acquisition, usage and status planning initiatives, and most likely to be supported by Gaelic users. a programme of priorities to be addressed by Gaelic corpus planning. recommendations on a means of coordination that will be effective in terms of cost and management (i.e. an institutional framework

    BUILDING TRUST IN CLOUD COMPUTING -ISOLATION IN CONTAINER BASED VIRTUALISATION

    Get PDF
    Container-based virtualisation has weak isolation compare with traditional VMs. Container-based virtualisation is based on kernel OS. Share kernel OS could increase the possibility of attacks. Therefore, the container-based virtualisation provides weak isolation. The lack of isolation from the host could be increase security threats on the container-based virtualisation. The attacker could gain access to all system in the container-based virtualisation because share the kernel OS. The container is a good idea to isolate the applications. However, container-based virtualisation does not provide isolation for users within containers. Therefore, each user can gain all container resources if the user gains access to the container. Cloud computing is revolutionizing many ecosystems through offering companies computing resources that are easy to use, connect, configure, and are automatic and chosen to a suitable scale. In this project, a prototype that could represent a real world data centre is implemented by using container-based virtualisation. TAIC allows each user in the system can perform particular actions within the container. Each user should have permission to do specific tasks within the containers. Only authorised users can access the resources within the containers that lead to making the user data availability. Set of rules using in this architecture that responsible for protecting user data and making it privacy. User data could not be changed by other users that make the user data integrity. Secure containers lead to build a secure environment that could be used in cloud computing and build trust relationships between cloud service provider and users. This architecture modification raises a wide range of security and privacy issues that need to be put into consideration. Isolation in container-based virtualisation is a critical issue. Therefore, the thesis will also present a novel Trust Architecture for Isolation in Containers (TAIC) system to protect the containers from malicious guests and isolate users within the containers to boost the security of data that is stored in them through provide policies that allow each user to perform a specific tasks within containers and provision of data protection and security to cloud computing. Further, due to the centralised nature of data stored in cloud infrastructures, my proposed design will minimise data leakage and improve monitoring

    Population dynamics, delta vulnerability and environmental change: comparison of the Mekong, Ganges–Brahmaputra and Amazon delta regions

    Get PDF
    Tropical delta regions are at risk of multiple threats including relative sea level rise and human alterations, making them more and more vulnerable to extreme floods, storms, surges, salinity intrusion, and other hazards which could also increase in magnitude and frequency with a changing climate. Given the environmental vulnerability of tropical deltas, understanding the interlinkages between population dynamics and environmental change in these regions is crucial for ensuring efficient policy planning and progress toward social and ecological sustainability. Here, we provide an overview of population trends and dynamics in the Ganges–Brahmaputra, Mekong and Amazon deltas. Using multiple data sources, including census data and Demographic and Health Surveys, a discussion regarding the components of population change is undertaken in the context of environmental factors affecting the demographic landscape of the three delta regions. We find that the demographic trends in all cases are broadly reflective of national trends, although important differences exist within and across the study areas. Moreover, all three delta regions have been experiencing shifts in population structures resulting in aging populations, the latter being most rapid in the Mekong delta. The environmental impacts on the different components of population change are important, and more extensive research is required to effectively quantify the underlying relationships. The paper concludes by discussing selected policy implications in the context of sustainable development of delta regions and beyond

    Some Reliability Aspects of Photovoltaic Modules

    Get PDF
    Solar cells and photovoltaic modules are energy conversion components that produce electricity when exposed to light. The originality of photovoltaic energy as we understand it here is to directly transform light into electricity. Thin-film silicon in particular is better at low and diffuse illuminations and decreases less than the crystalline when the temperature increases while reducing the amount of material and manufacturing costs. However, the quality of the material and the efficiency of the conversion limit their use on a large scale. If the light absorption of the ultra-thin layers of the active material could be improved, this would lead to low recombination currents, higher open-circuit voltages and higher conversion efficiency. PV systems often communicate with utilities, aggregators and other grid operators over the public Internet, so the power system attack surface has significantly expanded. Solar energy systems are equipped with a range of grid-support functions, which—if controlled or programmed improperly—present a risk of power system disturbances
    • …
    corecore