1,393 research outputs found
Optimization of shake inspections
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering; in conjunction with the Leaders for Global Operations Program at MIT, 2011.Cataloged from PDF version of thesis.Includes bibliographical references (p. 88-89).The Boeing 737 program has recently announced an increase in the production rate from 31.5 airplanes per month to 35 airplanes per month. Throughout the production value stream, opportunities to improve quality and reduce flow time are being thoroughly investigated. This thesis contributes to the investigation by focusing on improving the inspection process through a prototype computer data collection tool and the formation of a corrective action team.by Bradley C. Geswein.S.M.M.B.A
The Graduate MIS Security Course: Objectives And Challenges
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses and worms. The labs and lectures are intended to instruct students in the inspection and protection of information assets, as well as detection of and reaction to threats to information assets
Integrally Geared Compressors
Discussion GroupHow to specify an integrally geared compressor
Typical process applications
Controlling an integral gear compressor - IGV, VFD
Rotordynamic consideration
Privacy in the Genomic Era
Genome sequencing technology has advanced at a rapid pace and it is now
possible to generate highly-detailed genotypes inexpensively. The collection
and analysis of such data has the potential to support various applications,
including personalized medical services. While the benefits of the genomics
revolution are trumpeted by the biomedical community, the increased
availability of such data has major implications for personal privacy; notably
because the genome has certain essential features, which include (but are not
limited to) (i) an association with traits and certain diseases, (ii)
identification capability (e.g., forensics), and (iii) revelation of family
relationships. Moreover, direct-to-consumer DNA testing increases the
likelihood that genome data will be made available in less regulated
environments, such as the Internet and for-profit companies. The problem of
genome data privacy thus resides at the crossroads of computer science,
medicine, and public policy. While the computer scientists have addressed data
privacy for various data types, there has been less attention dedicated to
genomic data. Thus, the goal of this paper is to provide a systematization of
knowledge for the computer science community. In doing so, we address some of
the (sometimes erroneous) beliefs of this field and we report on a survey we
conducted about genome data privacy with biomedical specialists. Then, after
characterizing the genome privacy problem, we review the state-of-the-art
regarding privacy attacks on genomic data and strategies for mitigating such
attacks, as well as contextualizing these attacks from the perspective of
medicine and public policy. This paper concludes with an enumeration of the
challenges for genome data privacy and presents a framework to systematize the
analysis of threats and the design of countermeasures as the field moves
forward
Estimating Hourly Solar Radiation for One-Axis Tracking Focusing Collectors
Performance simulations of focusing parabolic collectors are hampered by a limited amount of useful insolation data. Hourly values of total radiation on a horizontal surface are the most common data available from the National Oceanographic & Atmospheric Administration. This paper develops a method to convert this total horizontal radiation to direct radiation on the surface of the tracking collector
Excellence in Teaching and Learning in Reusable Learning Objects
Our ongoing work at London Metropolitan University investigates effective ways to design learning environments that add mobile learning into blended higher education modules. Our approach is one of evolutionary, iterative refinement of the learning environment based on student feedback. Blended learning effectiveness can be viewed as a function of effective pedagogical practices. Accordingly, a key question is: What combination of instructional strategies and delivery media will best produce the desired learning outcome for the intended audience? The paper will (i) outline the background issues that led to the development of the blended mLearning approach (ii) describe the initial survey that informed our design, (iii) outline the blended mLearning design, (iv) present our evaluation findings with students, and (v) conclude by commenting on the wider applicability of our approach.London Metropolitan Universit
Analysis and comparison of Scalextric, SCX, and Carrera Digital slot car systems: A mechatronic engineering design case study
Digital slot cars operate by transmitting both power and data over a single pair of wires much like DCC-controlled model railways and some home automation systems. In this manuscript we analyse and compare the cars, track, controllers, and electronic data transmission protocols of the three popular digital slot car systems
- …