2,444 research outputs found

    Task analysis for error identification: Theory, method and validation

    Get PDF
    This paper presents the underlying theory of Task Analysis for Error Identification. The aim is to illustrate the development of a method that has been proposed for the evaluation of prototypical designs from the perspective of predicting human error. The paper presents the method applied to representative examples. The methodology is considered in terms of the various validation studies that have been conducted, and is discussed in the light of a specific case study

    WESTT (Workload, Error, Situational Awareness, Time and Teamwork): An analytical prototyping system for command and control

    Get PDF
    Modern developments in the use of information technology within command and control allow unprecedented scope for flexibility in the way teams deal with tasks. These developments, together with the increased recognition of the importance of knowledge management within teams present difficulties for the analyst in terms of evaluating the impacts of changes to task composition or team membership. In this paper an approach to this problem is presented that represents team behaviour in terms of three linked networks (representing task, social network structure and knowledge) within the integrative WESTT software tool. In addition, by automating analyses of workload and error based on the same data that generate the networks, WESTT allows the user to engage in the process of rapid and iterative “analytical prototyping”. For purposes of illustration an example of the use of this technique with regard to a simple tactical vignette is presented

    Count three for wear able computers

    Get PDF
    This paper is a postprint of a paper submitted to and accepted for publication in the Proceedings of the IEE Eurowearable 2003 Conference, and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library. A revised version of this paper was also published in Electronics Systems and Software, also subject to Institution of Engineering and Technology Copyright. The copy of record is also available at the IET Digital Library.A description of 'ubiquitous computer' is presented. Ubiquitous computers imply portable computers embedded into everyday objects, which would replace personal computers. Ubiquitous computers can be mapped into a three-tier scheme, differentiated by processor performance and flexibility of function. The power consumption of mobile devices is one of the most important design considerations. The size of a wearable system is often a design limitation

    Spin-wave scattering at low temperatures in manganite films

    Full text link
    The temperature TT and magnetic field HH dependence of the resistivity ρ\rho has been measured for La0.8y_{0.8-y}Sr0.2_{0.2}MnO3_{3} (y=0 and 0.128) films grown on (100) SrTiO3_{3} substrates. The low-temperature ρ\rho in the ferromagnetic metallic region follows well ρ(H,T)=ρ0(H)+A(H)ωs/sinh(ωs/2kBT)+B(H)T7/2\rho (H,T)=\rho _{0}(H)+A(H)\omega_{s}/\sinh (\hbar \omega_{s}/2k_{B}T)+B(H)T^{7/2} with ρ0\rho _{0} being the residual resistivity. We attribute the second and third term to small-polaron and spin-wave scattering, respectively. Our analysis based on these scattering mechanisms also gives the observed difference between the metal-insulator transition temperatures of the films studied. Transport measurements in applied magnetic field further indicate that spin-wave scattering is a key transport mechanism at low temperatures.Comment: 5 pages, 4 figures. to appear in Phys. Rev.

    Development of a generic activities model of command and control

    Get PDF
    This paper reports on five different models of command and control. Four different models are reviewed: a process model, a contextual control model, a decision ladder model and a functional model. Further to this, command and control activities are analysed in three distinct domains: armed forces, emergency services and civilian services. From this analysis, taxonomies of command and control activities are developed that give rise to an activities model of command and control. This model will be used to guide further research into technological support of command and control activities

    The characteristics of railway service disruption: implications for disruption management

    Get PDF
    Rail disruption management is central to operational continuity and customer satisfaction. Disruption is not a unitary phenomenon - it varies by time, cause, location and complexity of coordination. Effective, user-centred technology for rail disruption must reflect this variety. A repertory grid study was conducted to elicit disruption characteristics. Construct elicitation with a group of experts (n=7) captured 26 characteristics relevant to rail disruption. A larger group of operational staff (n=28) rated 10 types of rail incident against the 26 characteristics. The results revealed distinctions such as business impact and public perception, and the importance of management of the disruption over initial detection. There were clear differences between those events that stop the traffic, as opposed to those that only slow the traffic. The results also demonstrate the utility of repertory grid for capturing the characteristics of complex work domains

    Distributed situation awareness in dynamic systems: Theoretical development and application of an ergonomics methodology

    Get PDF
    The purpose of this paper is to propose foundations for a theory of situation awareness based on the analysis of interactions between agents (i.e., both human and non-human) in subsystems. This approach may help promote a better understanding of technology-mediated interaction in systems, as well as helping in the formulation of hypotheses and predictions concerning distributed situation awareness. It is proposed that agents within a system each hold their own situation awareness which may be very different from (although compatible with) other agents. It is argued that we should not always hope for, or indeed want, sharing of this awareness, as different system agents have different purposes. This view marks situation awareness as a 1 dynamic and collaborative process that binds agents together on tasks on a moment-by-moment basis. Implications of this viewpoint for development of a new theory of, and accompanying methodology for, distributed situation awareness are offered

    Chesapeake Bay National Estuarine Research Reserve in Virginia Management Plan: 2022-2027

    Get PDF
    Established through the Coastal Zone Management Act, the National Estuarine Research Reserve System (NERRS) represents a partnership program between the National Oceanic and Atmospheric Administration (NOAA) and the coastal states to promote informed management of the Nation’s estuaries and habitats. Designated in 1991, and administered by the Virginia Institute of Marine Science (VIMS) of William & Mary, the Chesapeake Bay National Estuarine Research Reserve in Virginia (CBNERR-VA or Reserve) is one of 30 protected areas, which encompass over 1.3 million acres and make up the NERRS. As the nation\u27s largest estuary, the Chesapeake Bay contains a diverse collection of habitats and salinity regimes. In order to incorporate the diversity of habitats in the lower Bay subregion, CBNERR-VA incorporates a multi-component network along the salinity gradient of the York River estuary (YRE). The Reserve’s four components are: (1) Goodwin Islands (148 ha; 366 ac), an archipelago of polyhaline saltmarsh islands surrounded by inter-tidal flats, extensive submerged aquatic vegetation beds, and shallow open estuarine waters near the mouth of the YRE; (2) Catlett Islands (220 ha; 542 ac), consisting of multiple parallel ridges of forested wetland hammocks, maritime-forest uplands, and emergent mesohaline salt marshes; (3) Taskinas Creek (433 ha; 1070 ac), containing non-tidal feeder streams that drain oak-hickory forests, maple-gum-ash swamps and freshwater marshes which transition into tidal oligo and mesohaline salt marshes; and (4) Sweet Hall Marsh (443 ha; 1094 ac), an extensive tidal freshwater-oligohaline marsh ecosystem located in the Pamunkey River, one of two major tributaries of the York River. This plan aligns with and complements the NERRS 2017-2022 Strategic Plan and VIMS\u27s 2015-2020 Strategic Plan while building upon previous accomplishments and the desire to address current priority issues and meet future challenges. Its intent is to provide a vision and framework to guide Reserve activities for program undertakings over the five-year period from 2022-2027

    Pseudo-potentials and loading surfaces for an endochronic plasticity theory with isotropic damage

    Get PDF
    The endochronic theory, developed in the early 70s, allows the plastic behavior of materials to be represented by introducing the notion of intrinsic time. With different viewpoints, several authors discussed the relationship between this theory and the classical theory of plasticity. Two major differences are the presence of plastic strains during unloading phases and the absence of an elastic domain. Later, the endochronic plasticity theory was modified in order to introduce the effect of damage. In the present paper, a basic endochronic model with isotropic damage is formulated starting from the postulate of strain equivalence. Unlike the previous similar analyses, in this presentation the formal tools chosen to formulate the model are those of convex analysis, often used in classical plasticity: namely pseudopotentials, indicator functions, subdifferentials, etc. As a result, the notion of loading surface for an endochronic model of plasticity with damage is investigated and an insightful comparison with classical models is made possible. A damage pseudopotential definition allowing a very general damage evolution is given

    Run 2 Upgrades to the CMS Level-1 Calorimeter Trigger

    Get PDF
    The CMS Level-1 calorimeter trigger is being upgraded in two stages to maintain performance as the LHC increases pile-up and instantaneous luminosity in its second run. In the first stage, improved algorithms including event-by-event pile-up corrections are used. New algorithms for heavy ion running have also been developed. In the second stage, higher granularity inputs and a time-multiplexed approach allow for improved position and energy resolution. Data processing in both stages of the upgrade is performed with new, Xilinx Virtex-7 based AMC cards.Comment: 10 pages, 7 figure
    corecore