997 resultados para fator de segurança
Resumo:
The commitment assumed by Brazil to ILO in order to pursue actions toward the ILO/OSH-2001 adoption in the country poses the issue of modeling the institutional arrangement the set roles and relationship between government, standards organizations, health and safety organizations, professionals and other institutions to deploy the ILO/OSH-2001. This Thesis develop institutional arrangement models based on the current model and also in the ISO 9000 scheme and others. It is studied the US case with OSHA and VPP, the OHSAS 18001 and ANSI/AIHA Z-10, in addition to actual context of the regulating norms NR s. The scenarios developed are put to evaluation on feasibility, potential changes and effects on current MTE auditors work scheme. The main results are five scenarios developed and that the MTE auditors tend to be reactive to the change toward the ILO/OSH-2001.
Resumo:
This Master s Thesis deals with an analysis of the Regulatory Standards NR-9 e NR-13 on the perspective of occupational health and safety management systems (OHSMS) such as ILO deployed ILO/OSH-2001. Since the revamped OHSAS 18001:2007 complies with the ILO/OSH-2001 model it is used as benchmark to compare against the NR-9 and NR-13. The analysis suggests that the NR-9 has some important features present on the OHSAS 18001:2007 but lacks important others. The NR-13 turns out to be far from a modern model of OHSMS such as OHSAS 18001:2007 and a deep reformulation should be done in order to achieve the Brazil commitment with ILO to adopt OHSMS. Also, a small survey with companies with ISO 9000 certificates suggests that a NR-13 revised toward OHSMS would be welcome, but also that some more advanced issues present in ILO/OSH-2001 should be imposed by law in order to be achieved
Resumo:
Information is one of the most valuable organization s assets, mainly on a global and highly competitive world. On this scenery there are two antagonists forces: on one side, organizations struggle for keeping protected its information, specially those considered as strategic, on the other side, the invaders, leaded by innumerous reasons - such as hobby, challenge or one single protest with the intention of capturing and corrupting the information of other organizations. This thesis presents the descriptive results of one research that had as its main objective to identify which variables influence the Executives´ and CIOs´ perceptions toward Information Security. In addition, the research also identified the profile of Rio Grande do Norte s organizations and its Executives/CIOs concerning Information Security, computed the level of agreement of the respondents according to NBR ISO/IEC 17799 (Information technology Code of practice for information security management) on its dimension Access Control. The research was based on a model, which took into account the following variables: origin of the organization s capital, sector of production, number of PCs networked, number of employees with rights to network, number of attacks suffered by the organizations, respondent´s positions, education level, literacy on Information Technology and specific training on network. In the goal´s point of view, the research was classified as exploratory and descriptive, and, in relation of the approach, quantitative. One questionnaire was applied on 33 Executives and CIOs of the 50 Rio Grande do Norte s organizations that collected the highest taxes of ICMS - Imposto sobre Circulação de Mercadorias on 2000. After the data collecting, cluster analysis and chi-square statistical tools were used for data analysis. The research made clear that the Executives and CIOs of Rio Grande do Norte s organizations have low level of agreement concerning the rules of the NBR ISO/IEC 17799. It also made evident that the Executives and CIOs have its perception toward Information Security influenced by the number of PCs networked and by the number of attacks suffered by the organizations
Resumo:
The electronic mail service is one of the most Internet services that grow in the corporate environment. This evolution is bringing several problems for the organizations, especially to information that circulates inside of the corporate net. The lack of correct orientation to the people, about the usage and the security importance of these resources, is leaving breaches and causing misusage and overuse of service, for example. In recent literature, it starts to coming out several ideas, which has helped to rganizations how to plain and how to implement the information security system to the electronic mail in computer environment. However, these ideas are still not placed in practice in many companies, public or private. This dissertation tries to demonstrate the results of a research that has like goal, identify the importance that user training has over the information security policy, through a case study inside of private superior education institute in this state. Besides, this work had by basic orientation the ISO/IEC 17799, which talk about People Security. This study was developed over a proposed model to this research, which looked for offer conditions to guide the institution studied, how to plan better a information security policy to the electronic mail. Also, this research has an exploratory and descreptive nature and your type, qualitative. Firstly, it was applied na questionary to the information technology manager, as better way to get some general data and to deepen the contact which still then, it was being kept through e-mail. Thereupon this first contact, eleven interviews were done with the same manager, beside one interview with twenty-four users, among employees e students. After that to collect and transcript the interviews, were review with the manager all informations given, to correct any mistakes and to update that informations, to then, start the data analyze. The research suggests that the institution has a pro attitude about the information security policy and the electronic mail usage. However, it was clear that answers have their perception about information security under a very inexperient way, derived of a planning lack in relation to training program capable to solve the problem
Resumo:
The natural gas perform a essential paper, not only in primary sectors of energy, but also in others sectors of economy. The use natural gas will have expansion in Brazil, motivated by governmental decision to increase the participation of this fuel in the Brazilian energy matrix from 4% to 12% up until 2010. in order to reach the objective related to increase the consumption of natural gas in the energy matrix and to propose solutions to attend the electric requirements of heart and refrigeration, using natural gas as primary power plant. This thesis has a main objective to analysis the perception of businessmen of hotel sector about the feasability of investment with micro-cogeneration system by natural gas in their hotel in turistic sector, in Natal/RN. It s show a case for the hotels selected analyzing the actual knowledge of businessmen about alternative of new technology in generation of owner energy. There was make a interview using a standard form researching information about this topic. In this interview has shown 4 (four) canaries for businessmen with different configurations of investment in micro-cogeneration. Two of this canaries uses the project finance like option to make fasible this projects. The resulteis showed who businessmen has insecurity to make decision to put in office alone, or with a local company, and perhaps with a national company to perform for a alternative energy system, justifying, the alone feasability and without information by local businessmen. Apart from that, they are receptive for a option to put in office in micro-cogeneration configured in the settings using project finance
Resumo:
This work presents a suggestion of a security system of land automation having as objective main the creation of a system capable from easy method, supervise the installations of a building with the goal to preserver security personal and patrimonial necessities, aim at portability low cost and use easiness. Was designed an alarms central and access controller that has digital and analogical inputs for sensors and outputs for buzzer, telephonic dialing and electronic lock. The system is supervised by software that makes solicitations of information to the alarms central through the one computer's serial port (RS-232). The supervisory software was developed in platform LabVIEW with displays the received data on a graphical interface informing the sensors' current states distributed in the building and system events as alarns occurrences. This system also can be viewed through the Internet for people registered by the land security's system administrator
Resumo:
This work deals with the development of an experimental study on a power supply of high frequency that provides the toch plasmica to be implemented in PLASPETRO project, which consists of two static converters developed by using Insulated Gate Bipolar Transistor (IGBT). The drivers used to control these keys are triggered by Digital Signal Processor (DSP) through optical fibers to reduce problems with electromagnetic interference (EMI). The first stage consists of a pre-regulator in the form of an AC to DC converter with three-phase boost power factor correction which is the main theme of this work, while the second is the source of high frequency itself. A series-resonant inverter consists of four (4) cell inverters operating in a frequency around 115 kHz each one in soft switching mode, alternating itself to supply the load (plasma torch) an alternating current with a frequency of 450 kHz. The first stage has the function of providing the series-resonant inverter a DC voltage, with the value controlled from the power supply provided by the electrical system of the utility, and correct the power factor of the system as a whole. This level of DC bus voltage at the output of the first stage will be used to control the power transferred by the inverter to the load, and it may vary from 550 VDC to a maximum of 800 VDC. To control the voltage level of DC bus driver used a proportional integral (PI) controller and to achieve the unity power factor it was used two other proportional integral currents controllers. Computational simulations were performed to assist in sizing and forecasting performance. All the control and communications needed to stage supervisory were implemented on a DSP
Resumo:
Previous works have studied the characteristics and peculiarities of P2P networks, especially security information aspects. Most works, in some way, deal with the sharing of resources and, in particular, the storage of files. This work complements previous studies and adds new definitions relating to this kind of systems. A system for safe storage of files (SAS-P2P) was specified and built, based on P2P technology, using the JXTA platform. This system uses standard X.509 and PKCS # 12 digital certificates, issued and managed by a public key infrastructure, which was also specified and developed based on P2P technology (PKIX-P2P). The information is stored in a special file with XML format which is especially prepared, facilitating handling and interoperability among applications. The intention of developing the SAS-P2P system was to offer a complementary service for Giga Natal network users, through which the participants in this network can collaboratively build a shared storage area, with important security features such as availability, confidentiality, authenticity and fault tolerance. Besides the specification, development of prototypes and testing of the SAS-P2P system, tests of the PKIX-P2P Manager module were also performed, in order to determine its fault tolerance and the effective calculation of the reputation of the certifying authorities participating in the system
Resumo:
The traditional perimeter-based approach for computer network security (the castle and the moat model) hinders the progress of enterprise systems and promotes, both in administrators and users, the delusion that systems are protected. To deal with the new range of threats, a new data-safety oriented paradigm, called de-perimeterisation , began to be studied in the last decade. One of the requirements for the implementation of the de-perimeterised model of security is the definition of a safe and effective mechanism for federated identity. This work seeks to fill this gap by presenting the specification, modelling and implementation of a mechanism for federated identity, based on the combination of SAML and X.509 digital certificates stored in smart-cards, following the A3 standard of ICP-Brasil (Brazilian official certificate authority and PKI)
Resumo:
The use of Field Programmable Gate Array (FPGA) for development of digital control strategies for power electronics applications has aroused a growing interest of many researchers. This interest is due to the great advantages offered by FPGA, which include: lower design effort, high performance and highly flexible prototyping. This work proposes the development and implementation of an unified one-cycle controller for boost CFP rectifier based on FPGA. This controller can be applied to a total of twelve converters, six inverters and six rectifiers defined by four single phase VSI topologies and three voltage modulation types. The topologies considered in this work are: full-bridge, interleaved full-bridge, half-bridge and interleaved half-bridge. While modulations are classified in bipolar voltage modulation (BVM), unipolar voltage modulation (UVM) and clamped voltage modulation (CVM). The proposed project is developed and prototyped using tools Matlab/Simulink® together with the DSP Builder library provided by Altera®. The proposed controller was validated with simulation and experimental results
Resumo:
This research study deals with the production and distribution of drinking water with quality and safety in order to meet the needs of the Man. Points out the limitations of the methodology for assessing water quality in use today. Approaches the recommendations of the World Health Organization (WHO) for adoption, by the companies responsible for producing and distributing water, of assessment methodologies and risk management (HACCP), in order to ensure the quality and safety of water drinking. Suggests strategies for implementing the plan for water safety plan. Uses the process of water production, composed by Maxaranguape river basin, the water treatment plant and distribution system, which is part of the Plan for Expansion of the Supply System of Natal, as case study. The results, it was possible to devise strategies for implementation of the Water Safety Plan (WSP), which comprises the following steps: a) a preliminary stage. b) assessment system. c) process monitoring. d) management plan and e) validation and verification of the PSA. At each stage are included actions for its implementation. The implementation of the PSA shows a new type of water production, in which the fountain as a whole (watershed and point of capture), the Water Treatment Plant (WTP) and distribution, shall compose the production process, over which to build quality and safety of the final product (drinking water)
Resumo:
Starting from the premise that we live in the society of spectacle, as proclaimed by Guy Debbord, and, in this context, the media feeds itself off of this spectacularization and constructs a culture of images and production of goods, providing templates from which the subject can identify himself/herself as being male or female, successful or unsuccessful, powerful or powerless. In other words, the culture conveyed by the media produces material for the creation of identities through which individuals insert and recognize themselves in contemporary society. Observing the election campaigns, we can see clearly that this profusion of identities is fairly explored in the advertising propaganda used by the candidates, particularly in the propaganda broadcasted on the Free Electoral Time on TV. Instigated by the explicit relation between the media and politics within the society of the spectacle, this study aims to investigate the main identities that emerge in the discursive practices of the media in the election campaigns of 2010 for president of the Republic and governor of the State of Rio Grande do Norte that had as protagonists the candidates at that moment Dilma Rousseff (PT) for president and Rosalba Ciarline (DEM) for governor. To do so, we based ourselves on the theory of Bakhtin Circle, which considers the statement as a unit of verbal communication and conceives language as a dialogical phenomena and a discursive practice and also in the conceptions of dialogical relationships, social voices and chronotope formulated by the previous mentioned theory. Still in the theoretical field, we have established an interconnection with the theories coming from the Cultural Studies (Hall, Woodward) about the identity, which conceives it as multiple, fragmented, non-fixed, so that, the subject assumes different identities, not always coherent, at different times, depending on the context in which they are approached. The research is situated in the frames of Applied Linguistics, which considers language as the center of its studies and settles on the border of an open number of areas of knowledge expanding its possibilities of investigation by means of the interdisciplinary. Our corpus consists in 20 electoral propaganda videos aired on TV during the Free Election Time in 2010 campaign; among these, 14 videos are Dilma Rousseff s propaganda and 06 videos are Rosalba Ciarline s propaganda. We seek for the purpose of the analysis to identify the identities which emerge from the discourses about the candidates in propaganda videos broadcasted in the referred campaign, as well as realize the dialogical relations established in these discourses and even if the identity construction of these subjects is located in the same axiological axis. The corpus analysis revealed that the multiple cultural identities of the candidates campaigning emerge in the discourses circulating in the electoral propaganda aired on TV such as: the identities of pioneer woman, competent, sensitive, mother, grandmother, religious. And, yet, those are changeable as the electoral demands, in other words, the need to obtain support and votes, outline a fluid identity construction about the candidate to the position in question
Resumo:
Neste artigo apresentamos a análise de interpretações de estudantes em trabalhos desenvolvidos em duas disciplinas de cursos de Licenciatura em Física, nas quais realizamos atividades bastante distintas, uma envolvendo a leitura e outra a observação pelos licenciandos. Buscamos compreender falas escritas pelos estudantes como parte dessas atividades, e procuramos evidenciar a diversidade de interpretações e a relevância desse trabalho para a formação inicial. O apoio teórico em que nos sustentamos foi a análise de discurso na vertente originada na França por Michel Pêcheux. A consideração da não transparência da linguagem, e as noções de condições de produção, memória discursiva e repetição, bem como alguns aportes sobre possíveis papéis da observação na construção científica, contribuíram para a compreensão de discursos escritos pelos estudantes. Mostramos a diversidade de interpretações dos licenciados: ao opinarem sobre a possibilidade ou não de se trabalhar a física moderna e contemporânea no ensino médio, depois de lerem um texto envolvendo esse tema, e ao redigirem um texto sobre a observação na pesquisa científica.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
O desenvolvimento de Sistemas de Gestão da Segurança e Saúde no Trabalho (SGSST) ganha um significado cada vez mais importante no desempenho das empresas, pois, por meio deles, é possível obter a promoção da saúde e satisfação dos trabalhadores e a redução dos riscos de acidentes. No entanto, para que um SGSST obtenha bons resultados, as empresas precisam estar atentas às dificuldades comumente encontradas durante o seu processo de implantação, procurando solucioná-las de maneira antecipada e estruturada. Pelo exposto, este trabalho tem como principal objetivo apresentar diretrizes, baseadas no referencial teórico e nos resultados dos estudos de caso realizados, para implantação de SGSSTs em empresas fabricantes de baterias automotivas. Para o seu desenvolvimento adotou-se o método de pesquisa qualitativa a partir da realização de dois estudos de caso em empresas fabricantes de baterias automotivas localizadas na cidade de Bauru. Os instrumentos de coleta de dados foram entrevistas semiestruturadas, análise de documentos e observação in loco. Ao final do artigo, são propostas diretrizes relacionadas aos seguintes elementos: alta direção, estratégia organizacional, cultura organizacional, departamento de Segurança e Saúde do Trabalho (SST), técnicos de SST, recursos humanos, treinamento, equipes multidisciplinares, comunicação interna, resistência à mudança, indicadores de desempenho, ferramentas gerenciais para solução de problemas de SST, gestão de projetos, recompensas e incentivos, e integração do sistema.