84 resultados para ESTUDOS DE SEGURANÇA


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Infrastructure works are included in strategic areas for the social development. For that matter that all of the investments are very important for the social development. When the population has enough water and an acceptable quality, and it includes a wastewater gathering and its treatment, the whole society became less susceptible to the water diseases. Even the Water Supply and the Sewage depend for its perfect operation of reservoirs, or of the accumulation of water to provide the popular necessity, either due to retention or for the treatment wastewarer. These structures present very specific environmental conditions, because the microclimate created around them, like high environmental humidity and for the existence of many harmful substances for the concrete, such as chloride ions presents in water. The reservoir that compose the System of Water Supply of Natal were built between 1970s and 1980s, a period whom the technical and scientific community did not have in-depth studies about the reinforced concrete mechanism of deterioration. Therefore, these reservoirs have been suffered accelerated deterioration progress, and they have been shown many pathological manifestations strikingly visible. In front of all these problems this academic work aims to identify the generally conditions of conservation of all the reservoirs components of the Water Supply System of Natal. This academic work objectives to develop a recuperation plan for use in these reservoirs, in this academic work it was achieved all the survey of pathological manifestation existing in each reservoir. It was made with local visits, photographic recorders of all manifestations viii and realization of in loco tests. The other step consisted in a application of GDE/UnB metodolgy reformulated by Fonseca (2007). In the step of local visits in each reservoir it was evaluated carbonation depth, by spreading a phenolphthalein solution with 1% of concentration; evaluation of contamination of chlorides, by spreading silver nitrate solution with 1% of concentration, and evaluation of width cracks. After the conclusion of all the testings, it was established that all reservoir, studied in this academic work, have showed an advanced deteriorating condition. It´s presents prevalent pathological manifestations as unacceptable cracks, spots, efflorescence and reinforcement corrosion, and in some cases, chlorides contamination. After the conclusion of the testings and its concatenation it was able to implementing, using GDE/UnB methodology, the order of the restoration its service life and initial safety conditions

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This dissertation presents a discussion on the level of risk awareness of students who have welding practice in the laboratories at CEFET/PI, both in Teresina and Floriano. Its main goal is to investigate risk factors involving students, teachers and employees that work in these laboratories. It s an empirical survey, held among a certain amount of students from the course in Mechanic Technology. For data analysis, the concept of risk was compared to the students direct measure of perception. The main results suggest the students must be better informed, more risk aware and more competent, in order to avoid accidents. They also point to a strong need for a more formal and effective performance to assure full consciousness about the risks involving the welding practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study aimed to analyze the percentage of compliance, related to the requirements of Practice, achieved by 23 supermarkets in neighborhood after the deployment of Food Insurance Program. For its development research methodology adopted was the application start and end of a check-list (tool-specific SBP) in 23 supermarkets, target of this study. After the deployment of PAS was made a comparative study where it was possible to see that these companies need to improve conditions related to food safety, because according to the study, none of the 23 supermarkets evaluated met the criteria recommended by the SBP to 100% of compliance for the items critical of the check-list. Only 04 of the 23 supermarkets were in the range of 80 to 90% of the overall percentage of compliance, representing only 17.3% of the sample. Most of the sample submitted in a regular situation, according to the methodology of Cardoso (2001). Of the 23 supermarkets studied, 03 supermarkets were classified as poor (13.04%), 13 as scheduled (56.52%) as good and 07 (30.43%). You can see improvements in a small part of the sample, but the decline in the percentage of compliance of 02 companies after working for the implementation of the program, showing lack of responsibility and commitment of companies which should have as its top priority to food safety that market

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The decrease in crime is one of the core issues that cause concern in society today. This study aims to propose improvements to public safety from the choice of points to the location of police units, ie the points which support the car and the police. For this, three models were developed in order to assist decision making regarding the best placement of these bases. The Model of Police Units Routing has the intention to analyze the current configuration of a given region and develop optimal routes for round preventative. The Model of Allocation and Routing for New Police Units (MARNUP) used the model of facility location called p-median weighted and traveling salesman problem (TSP) combined aiming an ideal setting for regions that do not yet have support points or to assess how far the distribution is present in relation to that found in solution. The Model Redefinition and Routing Unit Police (MRRUP) seek to change the current positioning taking into account the budgetary constraints of the decision maker. To verify the applicability of these models we used data from 602 points to instances of police command that is responsible for the capital city of Natal. The city currently has 31 police units for 36 of these 19 districts and police have some assistance. This reality can lead to higher costs and higher response times for answering emergency calls. The results of the models showed that in an ideal situation it is possible to define a distance of 500 km/round, whereas in this 900 km are covered by approximately round. However, a change from three-point lead reduced to 700 km / round which represents a decrease of 22% in the route. This reduction should help improve response time to emergency care, improving the level of service provided by the increase of solved cases, reducing police shifts and routing preventive patrols

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work provides great contribution to the documental study of the Work Safety courses offered by CEFETs in Brazil, under the perspective of safety management and occupational health, using as a referential the specification OHSAS 18001 (BSI, 1999), as well as directions provided by OIT (ILO, 2001). The theoretical research compares technical and managing competences of the projects of Work Safety courses at CEFETs with the international legislation mentioned above. For field research, questionnaires containing open and close questions were answered by teachers and students aiming at identifying the importance of technical and managing competences for the formation of Work Safety technicians, besides trying to identify which level of minimal formal knowledge should be required to perform managing activities in the area of Work Safety Management Systems and Occupational Health (SGSSO, in Portuguese). The results of the theoretical research point out differences between the projects of the Work Safety technical courses at CEFETs under the perspective of SGSSO. The field research shows that students and teachers opinions converge about most technical and managing competences. In relation to academic formation, the research suggests divergences to the criterion stated by the norm ISO 19011(ABNT, 2002)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The commitment assumed by Brazil to ILO in order to pursue actions toward the ILO/OSH-2001 adoption in the country poses the issue of modeling the institutional arrangement the set roles and relationship between government, standards organizations, health and safety organizations, professionals and other institutions to deploy the ILO/OSH-2001. This Thesis develop institutional arrangement models based on the current model and also in the ISO 9000 scheme and others. It is studied the US case with OSHA and VPP, the OHSAS 18001 and ANSI/AIHA Z-10, in addition to actual context of the regulating norms NR s. The scenarios developed are put to evaluation on feasibility, potential changes and effects on current MTE auditors work scheme. The main results are five scenarios developed and that the MTE auditors tend to be reactive to the change toward the ILO/OSH-2001.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This Master s Thesis deals with an analysis of the Regulatory Standards NR-9 e NR-13 on the perspective of occupational health and safety management systems (OHSMS) such as ILO deployed ILO/OSH-2001. Since the revamped OHSAS 18001:2007 complies with the ILO/OSH-2001 model it is used as benchmark to compare against the NR-9 and NR-13. The analysis suggests that the NR-9 has some important features present on the OHSAS 18001:2007 but lacks important others. The NR-13 turns out to be far from a modern model of OHSMS such as OHSAS 18001:2007 and a deep reformulation should be done in order to achieve the Brazil commitment with ILO to adopt OHSMS. Also, a small survey with companies with ISO 9000 certificates suggests that a NR-13 revised toward OHSMS would be welcome, but also that some more advanced issues present in ILO/OSH-2001 should be imposed by law in order to be achieved

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information is one of the most valuable organization s assets, mainly on a global and highly competitive world. On this scenery there are two antagonists forces: on one side, organizations struggle for keeping protected its information, specially those considered as strategic, on the other side, the invaders, leaded by innumerous reasons - such as hobby, challenge or one single protest with the intention of capturing and corrupting the information of other organizations. This thesis presents the descriptive results of one research that had as its main objective to identify which variables influence the Executives´ and CIOs´ perceptions toward Information Security. In addition, the research also identified the profile of Rio Grande do Norte s organizations and its Executives/CIOs concerning Information Security, computed the level of agreement of the respondents according to NBR ISO/IEC 17799 (Information technology Code of practice for information security management) on its dimension Access Control. The research was based on a model, which took into account the following variables: origin of the organization s capital, sector of production, number of PCs networked, number of employees with rights to network, number of attacks suffered by the organizations, respondent´s positions, education level, literacy on Information Technology and specific training on network. In the goal´s point of view, the research was classified as exploratory and descriptive, and, in relation of the approach, quantitative. One questionnaire was applied on 33 Executives and CIOs of the 50 Rio Grande do Norte s organizations that collected the highest taxes of ICMS - Imposto sobre Circulação de Mercadorias on 2000. After the data collecting, cluster analysis and chi-square statistical tools were used for data analysis. The research made clear that the Executives and CIOs of Rio Grande do Norte s organizations have low level of agreement concerning the rules of the NBR ISO/IEC 17799. It also made evident that the Executives and CIOs have its perception toward Information Security influenced by the number of PCs networked and by the number of attacks suffered by the organizations

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The electronic mail service is one of the most Internet services that grow in the corporate environment. This evolution is bringing several problems for the organizations, especially to information that circulates inside of the corporate net. The lack of correct orientation to the people, about the usage and the security importance of these resources, is leaving breaches and causing misusage and overuse of service, for example. In recent literature, it starts to coming out several ideas, which has helped to rganizations how to plain and how to implement the information security system to the electronic mail in computer environment. However, these ideas are still not placed in practice in many companies, public or private. This dissertation tries to demonstrate the results of a research that has like goal, identify the importance that user training has over the information security policy, through a case study inside of private superior education institute in this state. Besides, this work had by basic orientation the ISO/IEC 17799, which talk about People Security. This study was developed over a proposed model to this research, which looked for offer conditions to guide the institution studied, how to plan better a information security policy to the electronic mail. Also, this research has an exploratory and descreptive nature and your type, qualitative. Firstly, it was applied na questionary to the information technology manager, as better way to get some general data and to deepen the contact which still then, it was being kept through e-mail. Thereupon this first contact, eleven interviews were done with the same manager, beside one interview with twenty-four users, among employees e students. After that to collect and transcript the interviews, were review with the manager all informations given, to correct any mistakes and to update that informations, to then, start the data analyze. The research suggests that the institution has a pro attitude about the information security policy and the electronic mail usage. However, it was clear that answers have their perception about information security under a very inexperient way, derived of a planning lack in relation to training program capable to solve the problem

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study evaluates the level of accessibility for people with visual impairment (blindness and low vision) hotels in the city of Natal-RN, Brazil, and provides principles, guidelines and means of projective make hotels accessible, to promote comfort, autonomy and security of these people. We used a qualitative research methodology and quantitative trait descriptive, analytical and interpretive. Was taken as a base for field studies Ergonomic Analysis of Work, beginning with a study of the demands of accessibility of hotels and analyzing the modeling activity in these establishments through the application of interactional and observational techniques, such as film, photographic records, conversational actions and observation protocols. A protocol was developed and applied to evaluate the compliance of accessibility of hotels in the face of Brazilian technical standard NBR 9050 (2004). We used methods of Cognitive Task Analysis (CTA) associated with simulated activities to identify the processes of decision making and analyzing the observables of the activities performed by people with visual impairment (POS). Interviews were conducted with people who are blind and low vision in various cities in order to meet accessibility difficulties they faced in hotels and recommendations for improvement that they indicate. The mapping results showed that of 16 hotels 4 and 5 star studied in Natal-RN, reached only 7% of the 50 items of the protocol, while none of them reached 70% of the items. About the results obtained in simulated activities and analyzed from the ATC, we saw that the hotel where it was performed this step shows a need to adequately address the guests with visual impairments

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This Masters degree dissertation presents a research that aims at analyzing the activities regarding within a hotel managers work in Natal/RN - Brazil, This Masters degree dissertation presents the research that aims at analyzing the activities regarding the hotel managers work in Natal / RN - Brazil, performing diagnosis of their activities and relating the aspects that impact the quality and productivity of hotel services and managers occupational health. This research is characterized as a case study with a qualitative approach, taking the method of Ergonomic Work Analysis which is the analysis of the managers work activity as a reference to the focus; and combining the use of observational and interactional methods. Ergonomics and macroergonomics are used in this study not only to understand the physical, cognitive and organizational constraints of the manager s duties, but also to characterize the work organizational architecture and design of that hotel. High workload, accumulation of tasks and diversion of functions performed by managers were noticed, increasing thereby the physical and psychological suffering for them. It was found that the activity of managers is characterized by the ambivalence of power, limited autonomy, cooperation, interdependence between managers and the fear of incompetence. It was also noticed that managers devote more time to the day job (37%), another time to sleep (30%), while only 33% of the rest of the day are meant for activities like taking care of health, family, social life and study. Although there are few studies addressing the health and safety of hotel managers, this research revealed that 84% of the surveyed hotel managers complain of musculoskeletal pain which 50% are obese and are 100% sedentary. It was also observed that managers adopt unsuitable postures for carrying out the work activities that contribute to becoming injured or work-related musculoskeletal disorders in the near future. Ergonomic measures were recommended as an investment in the skills and the training of managers, encouraging cooperative work, appropriateness of workload, limiting overtime, preserving the enjoyment of breaks during work and weekly holidays, changing the layout of the work sector , usage of communication technology to prevent displacement, compensatory physical activities, furniture adaptation, among others

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Due of industrial informatics several attempts have been done to develop notations and semantics, which are used for classifying and describing different kind of system behavior, particularly in the modeling phase. Such attempts provide the infrastructure to resolve some real problems of engineering and construct practical systems that aim at, mainly, to increase the productivity, quality, and security of the process. Despite the many studies that have attempted to develop friendly methods for industrial controller programming, they are still programmed by conventional trial-and-error methods and, in practice, there is little written documentation on these systems. The ideal solution would be to use a computational environment that allows industrial engineers to implement the system using high-level language and that follows international standards. Accordingly, this work proposes a methodology for plant and control modelling of the discrete event systems that include sequential, parallel and timed operations, using a formalism based on Statecharts, denominated Basic Statechart (BSC). The methodology also permits automatic procedures to validate and implement these systems. To validate our methodology, we presented two case studies with typical examples of the manufacturing sector. The first example shows a sequential control for a tagged machine, which is used to illustrated dependences between the devices of the plant. In the second example, we discuss more than one strategy for controlling a manufacturing cell. The model with no control has 72 states (distinct configurations) and, the model with sequential control generated 20 different states, but they only act in 8 distinct configurations. The model with parallel control generated 210 different states, but these 210 configurations act only in 26 distinct configurations, therefore, one strategy control less restrictive than previous. Lastly, we presented one example for highlight the modular characteristic of our methodology, which it is very important to maintenance of applications. In this example, the sensors for identifying pieces in the plant were removed. So, changes in the control model are needed to transmit the information of the input buffer sensor to the others positions of the cell

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work presents a suggestion of a security system of land automation having as objective main the creation of a system capable from easy method, supervise the installations of a building with the goal to preserver security personal and patrimonial necessities, aim at portability low cost and use easiness. Was designed an alarms central and access controller that has digital and analogical inputs for sensors and outputs for buzzer, telephonic dialing and electronic lock. The system is supervised by software that makes solicitations of information to the alarms central through the one computer's serial port (RS-232). The supervisory software was developed in platform LabVIEW with displays the received data on a graphical interface informing the sensors' current states distributed in the building and system events as alarns occurrences. This system also can be viewed through the Internet for people registered by the land security's system administrator

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless sensors and actuators Networks specified by IEEE 802.15.4, are becoming increasingly being applied to instrumentation, as in instrumentation of oil wells with completion Plunger Lift type. Due to specific characteristics of the environment being installed, it s find the risk of compromising network security, and presenting several attack scenarios and the potential damage from them. It`s found the need for a more detailed security study of these networks, which calls for use of encryption algorithms, like AES-128 bits and RC6. So then it was implement the algorithms RC6 and AES-128, in an 8 bits microcontroller, and study its performance characteristics, critical for embedded applications. From these results it was developed a Hybrid Algorithm Cryptographic, ACH, which showed intermediate characteristics between the AES and RC6, more appropriate for use in applications with limitations of power consumption and memory. Also was present a comparative study of quality of security among the three algorithms, proving ACH cryptographic capability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This document proposes to describe a pilot plant for oil wells equipped with plunger lift. In addition to a small size (21,5 meters) and be on the surface, the plant s well has part of its structure in transparent acrylic, allowing easy visualization of phenomena inherent to the method. The rock formation where the well draws its pilot plant fluids (water and air) is simulated by a machine room where they are located the compressor and water pump for the production of air and water. To keep the flow of air and water with known and controlled values the lines that connect the machine room to the wellhole are equipped with flow sensors and valves. It s developed a supervisory system that allows the user a real-time monitoring of pressures and flow rates involved. From the supervisor is still allowed the user can choose how they will be controlled cycles of the process, whether by time, pressure or manually, and set the values of air flow to the water used in cycles. These values can be defined from a set point or from the percentage of valve opening. Results from tests performed on the plant using the most common forms of control by time and pressure in the coating are showed. Finally, they are confronted with results generated by a simulator configured with the the pilot plant s feature