998 resultados para Segurança de Equipamentos


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This dissertation presents a discussion on the level of risk awareness of students who have welding practice in the laboratories at CEFET/PI, both in Teresina and Floriano. Its main goal is to investigate risk factors involving students, teachers and employees that work in these laboratories. It s an empirical survey, held among a certain amount of students from the course in Mechanic Technology. For data analysis, the concept of risk was compared to the students direct measure of perception. The main results suggest the students must be better informed, more risk aware and more competent, in order to avoid accidents. They also point to a strong need for a more formal and effective performance to assure full consciousness about the risks involving the welding practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study aimed to analyze the percentage of compliance, related to the requirements of Practice, achieved by 23 supermarkets in neighborhood after the deployment of Food Insurance Program. For its development research methodology adopted was the application start and end of a check-list (tool-specific SBP) in 23 supermarkets, target of this study. After the deployment of PAS was made a comparative study where it was possible to see that these companies need to improve conditions related to food safety, because according to the study, none of the 23 supermarkets evaluated met the criteria recommended by the SBP to 100% of compliance for the items critical of the check-list. Only 04 of the 23 supermarkets were in the range of 80 to 90% of the overall percentage of compliance, representing only 17.3% of the sample. Most of the sample submitted in a regular situation, according to the methodology of Cardoso (2001). Of the 23 supermarkets studied, 03 supermarkets were classified as poor (13.04%), 13 as scheduled (56.52%) as good and 07 (30.43%). You can see improvements in a small part of the sample, but the decline in the percentage of compliance of 02 companies after working for the implementation of the program, showing lack of responsibility and commitment of companies which should have as its top priority to food safety that market

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The decrease in crime is one of the core issues that cause concern in society today. This study aims to propose improvements to public safety from the choice of points to the location of police units, ie the points which support the car and the police. For this, three models were developed in order to assist decision making regarding the best placement of these bases. The Model of Police Units Routing has the intention to analyze the current configuration of a given region and develop optimal routes for round preventative. The Model of Allocation and Routing for New Police Units (MARNUP) used the model of facility location called p-median weighted and traveling salesman problem (TSP) combined aiming an ideal setting for regions that do not yet have support points or to assess how far the distribution is present in relation to that found in solution. The Model Redefinition and Routing Unit Police (MRRUP) seek to change the current positioning taking into account the budgetary constraints of the decision maker. To verify the applicability of these models we used data from 602 points to instances of police command that is responsible for the capital city of Natal. The city currently has 31 police units for 36 of these 19 districts and police have some assistance. This reality can lead to higher costs and higher response times for answering emergency calls. The results of the models showed that in an ideal situation it is possible to define a distance of 500 km/round, whereas in this 900 km are covered by approximately round. However, a change from three-point lead reduced to 700 km / round which represents a decrease of 22% in the route. This reduction should help improve response time to emergency care, improving the level of service provided by the increase of solved cases, reducing police shifts and routing preventive patrols

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work provides great contribution to the documental study of the Work Safety courses offered by CEFETs in Brazil, under the perspective of safety management and occupational health, using as a referential the specification OHSAS 18001 (BSI, 1999), as well as directions provided by OIT (ILO, 2001). The theoretical research compares technical and managing competences of the projects of Work Safety courses at CEFETs with the international legislation mentioned above. For field research, questionnaires containing open and close questions were answered by teachers and students aiming at identifying the importance of technical and managing competences for the formation of Work Safety technicians, besides trying to identify which level of minimal formal knowledge should be required to perform managing activities in the area of Work Safety Management Systems and Occupational Health (SGSSO, in Portuguese). The results of the theoretical research point out differences between the projects of the Work Safety technical courses at CEFETs under the perspective of SGSSO. The field research shows that students and teachers opinions converge about most technical and managing competences. In relation to academic formation, the research suggests divergences to the criterion stated by the norm ISO 19011(ABNT, 2002)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The commitment assumed by Brazil to ILO in order to pursue actions toward the ILO/OSH-2001 adoption in the country poses the issue of modeling the institutional arrangement the set roles and relationship between government, standards organizations, health and safety organizations, professionals and other institutions to deploy the ILO/OSH-2001. This Thesis develop institutional arrangement models based on the current model and also in the ISO 9000 scheme and others. It is studied the US case with OSHA and VPP, the OHSAS 18001 and ANSI/AIHA Z-10, in addition to actual context of the regulating norms NR s. The scenarios developed are put to evaluation on feasibility, potential changes and effects on current MTE auditors work scheme. The main results are five scenarios developed and that the MTE auditors tend to be reactive to the change toward the ILO/OSH-2001.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This Master s Thesis deals with an analysis of the Regulatory Standards NR-9 e NR-13 on the perspective of occupational health and safety management systems (OHSMS) such as ILO deployed ILO/OSH-2001. Since the revamped OHSAS 18001:2007 complies with the ILO/OSH-2001 model it is used as benchmark to compare against the NR-9 and NR-13. The analysis suggests that the NR-9 has some important features present on the OHSAS 18001:2007 but lacks important others. The NR-13 turns out to be far from a modern model of OHSMS such as OHSAS 18001:2007 and a deep reformulation should be done in order to achieve the Brazil commitment with ILO to adopt OHSMS. Also, a small survey with companies with ISO 9000 certificates suggests that a NR-13 revised toward OHSMS would be welcome, but also that some more advanced issues present in ILO/OSH-2001 should be imposed by law in order to be achieved

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study presents itself as a contribution to the solidification of the Natural Gas industry, within the scope of the development of new products. The goal of this paper is to analyze the factors that lead to the success of new products through the evaluation of the activities done during the process of development of these products in the Natural Gas sector. To achieve this goal a case study was done in a small company of this segment. At first, as a basis for the study, a bibliographical research was done with books, theses, dissertations, monographies, publications in national and international periodicals, congress annals and publications in the internet related to the subject. Afterwards, a case study was done, aiming at the acquisition of further knowledge about the real process of development of products in a small company of the Natural Gas sector, allowing for the performance of the evaluation. The case study was done at Gas Project and Systems do Brasil, a company that works with the development of electronic equipment to the conversion of car engines to natural gas, through direct observations and interviews with the person responsible for the development and management of products. Through the evaluation of the process it was observed that the activities related to it are done in an informal way and some activities are considered unnecessary for their success. The results also suggest an emphasis in the technological activities, something that was not observed in the activities related to the market. The instruments used in this evaluation prove to be efficient to evaluate the process of development of new products in other companies, including those of different areas. Taking into account the relevance of the studied theme to the strengthening of the Natural Gas industry, it is necessary to do further complementary studies

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information is one of the most valuable organization s assets, mainly on a global and highly competitive world. On this scenery there are two antagonists forces: on one side, organizations struggle for keeping protected its information, specially those considered as strategic, on the other side, the invaders, leaded by innumerous reasons - such as hobby, challenge or one single protest with the intention of capturing and corrupting the information of other organizations. This thesis presents the descriptive results of one research that had as its main objective to identify which variables influence the Executives´ and CIOs´ perceptions toward Information Security. In addition, the research also identified the profile of Rio Grande do Norte s organizations and its Executives/CIOs concerning Information Security, computed the level of agreement of the respondents according to NBR ISO/IEC 17799 (Information technology Code of practice for information security management) on its dimension Access Control. The research was based on a model, which took into account the following variables: origin of the organization s capital, sector of production, number of PCs networked, number of employees with rights to network, number of attacks suffered by the organizations, respondent´s positions, education level, literacy on Information Technology and specific training on network. In the goal´s point of view, the research was classified as exploratory and descriptive, and, in relation of the approach, quantitative. One questionnaire was applied on 33 Executives and CIOs of the 50 Rio Grande do Norte s organizations that collected the highest taxes of ICMS - Imposto sobre Circulação de Mercadorias on 2000. After the data collecting, cluster analysis and chi-square statistical tools were used for data analysis. The research made clear that the Executives and CIOs of Rio Grande do Norte s organizations have low level of agreement concerning the rules of the NBR ISO/IEC 17799. It also made evident that the Executives and CIOs have its perception toward Information Security influenced by the number of PCs networked and by the number of attacks suffered by the organizations

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The electronic mail service is one of the most Internet services that grow in the corporate environment. This evolution is bringing several problems for the organizations, especially to information that circulates inside of the corporate net. The lack of correct orientation to the people, about the usage and the security importance of these resources, is leaving breaches and causing misusage and overuse of service, for example. In recent literature, it starts to coming out several ideas, which has helped to rganizations how to plain and how to implement the information security system to the electronic mail in computer environment. However, these ideas are still not placed in practice in many companies, public or private. This dissertation tries to demonstrate the results of a research that has like goal, identify the importance that user training has over the information security policy, through a case study inside of private superior education institute in this state. Besides, this work had by basic orientation the ISO/IEC 17799, which talk about People Security. This study was developed over a proposed model to this research, which looked for offer conditions to guide the institution studied, how to plan better a information security policy to the electronic mail. Also, this research has an exploratory and descreptive nature and your type, qualitative. Firstly, it was applied na questionary to the information technology manager, as better way to get some general data and to deepen the contact which still then, it was being kept through e-mail. Thereupon this first contact, eleven interviews were done with the same manager, beside one interview with twenty-four users, among employees e students. After that to collect and transcript the interviews, were review with the manager all informations given, to correct any mistakes and to update that informations, to then, start the data analyze. The research suggests that the institution has a pro attitude about the information security policy and the electronic mail usage. However, it was clear that answers have their perception about information security under a very inexperient way, derived of a planning lack in relation to training program capable to solve the problem

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increasing of the number of attacks in the computer networks has been treated with the increment of the resources that are applied directly in the active routers equip-ments of these networks. In this context, the firewalls had been consolidated as essential elements in the input and output control process of packets in a network. With the advent of intrusion detectors systems (IDS), efforts have been done in the direction to incorporate packets filtering based in standards of traditional firewalls. This integration incorporates the IDS functions (as filtering based on signatures, until then a passive element) with the already existing functions in firewall. In opposite of the efficiency due this incorporation in the blockage of signature known attacks, the filtering in the application level provokes a natural retard in the analyzed packets, and it can reduce the machine performance to filter the others packets because of machine resources demand by this level of filtering. This work presents models of treatment for this problem based in the packets re-routing for analysis by a sub-network with specific filterings. The suggestion of implementa- tion of this model aims reducing the performance problem and opening a space for the consolidation of scenes where others not conventional filtering solutions (spam blockage, P2P traffic control/blockage, etc.) can be inserted in the filtering sub-network, without inplying in overload of the main firewall in a corporative network

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work presents a suggestion of a security system of land automation having as objective main the creation of a system capable from easy method, supervise the installations of a building with the goal to preserver security personal and patrimonial necessities, aim at portability low cost and use easiness. Was designed an alarms central and access controller that has digital and analogical inputs for sensors and outputs for buzzer, telephonic dialing and electronic lock. The system is supervised by software that makes solicitations of information to the alarms central through the one computer's serial port (RS-232). The supervisory software was developed in platform LabVIEW with displays the received data on a graphical interface informing the sensors' current states distributed in the building and system events as alarns occurrences. This system also can be viewed through the Internet for people registered by the land security's system administrator

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The industries are getting more and more rigorous, when security is in question, no matter is to avoid financial damages due to accidents and low productivity, or when it s related to the environment protection. It was thinking about great world accidents around the world involving aircrafts and industrial process (nuclear, petrochemical and so on) that we decided to invest in systems that could detect fault and diagnosis (FDD) them. The FDD systems can avoid eventual fault helping man on the maintenance and exchange of defective equipments. Nowadays, the issues that involve detection, isolation, diagnose and the controlling of tolerance fault are gathering strength in the academic and industrial environment. It is based on this fact, in this work, we discuss the importance of techniques that can assist in the development of systems for Fault Detection and Diagnosis (FDD) and propose a hybrid method for FDD in dynamic systems. We present a brief history to contextualize the techniques used in working environments. The detection of fault in the proposed system is based on state observers in conjunction with other statistical techniques. The principal idea is to use the observer himself, in addition to serving as an analytical redundancy, in allowing the creation of a residue. This residue is used in FDD. A signature database assists in the identification of system faults, which based on the signatures derived from trend analysis of the residue signal and its difference, performs the classification of the faults based purely on a decision tree. This FDD system is tested and validated in two plants: a simulated plant with coupled tanks and didactic plant with industrial instrumentation. All collected results of those tests will be discussed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Previous works have studied the characteristics and peculiarities of P2P networks, especially security information aspects. Most works, in some way, deal with the sharing of resources and, in particular, the storage of files. This work complements previous studies and adds new definitions relating to this kind of systems. A system for safe storage of files (SAS-P2P) was specified and built, based on P2P technology, using the JXTA platform. This system uses standard X.509 and PKCS # 12 digital certificates, issued and managed by a public key infrastructure, which was also specified and developed based on P2P technology (PKIX-P2P). The information is stored in a special file with XML format which is especially prepared, facilitating handling and interoperability among applications. The intention of developing the SAS-P2P system was to offer a complementary service for Giga Natal network users, through which the participants in this network can collaboratively build a shared storage area, with important security features such as availability, confidentiality, authenticity and fault tolerance. Besides the specification, development of prototypes and testing of the SAS-P2P system, tests of the PKIX-P2P Manager module were also performed, in order to determine its fault tolerance and the effective calculation of the reputation of the certifying authorities participating in the system

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Foi desenvolvido um conjunto de equipamentos com o objetivo de mapear as áreas infestadas por macrófitas aquáticas, auxiliando operações de manejo mecânico, as quais são realizadas por uma colhedora desenvolvida especificamente para essa finalidade. O conjunto de equipamentos foi constituído por um GPS com programa de correção diferencial, acoplado a um palmtop, um sistema com dois teclados ligados em dataloggers e um transdutor de deslocamento linear LT. O GPS, através do palmtop, proporcionava o mapeamento da área de deslocamento, auxiliando o operador na movimentação da máquina, otimizando a operação e evitando, dessa forma, a sobreposição das faixas de coleta na área a ser manejada. Um dos teclados monitorava a movimentação e operação da colhedora, além da presença de obstáculos, como tocos e bancos de areia, enquanto o outro gerava dados sobre a presença de determinada espécie de planta, como E. densa, E. najas e C. demersum, além do nível de infestação destas plantas. O transdutor, instalado na plataforma frontal da colhedora, se movimentava linearmente, gerando informações sobre a profundidade da coleta realizada. Dessa forma, pôde-se observar que o desenvolvimento desse conjunto de equipamentos foi de grande utilidade e auxiliou a operação de controle mecânico de áreas infestadas por macrófitas aquáticas imersas, possibilitando, assim, o planejamento de operações de manejo e controle subseqüentes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The traditional perimeter-based approach for computer network security (the castle and the moat model) hinders the progress of enterprise systems and promotes, both in administrators and users, the delusion that systems are protected. To deal with the new range of threats, a new data-safety oriented paradigm, called de-perimeterisation , began to be studied in the last decade. One of the requirements for the implementation of the de-perimeterised model of security is the definition of a safe and effective mechanism for federated identity. This work seeks to fill this gap by presenting the specification, modelling and implementation of a mechanism for federated identity, based on the combination of SAML and X.509 digital certificates stored in smart-cards, following the A3 standard of ICP-Brasil (Brazilian official certificate authority and PKI)