Training of workers in production safety using digital technologies

Author(s):  
E.V. Halin

The preparation and control of the knowledge of workers in the field of industrial safety using networked digital intelligent learning systems containing formalized knowledge in text and graphical representation and simulation models in the form of distributed databases and knowledge is considered as an essential element of the organization of safe production based on digital technologies. When integrating training systems into a specific digital production, educational content, if necessary, is supplemented and developed by those responsible for training and the learners themselves as part of the educational resource of digital organizations for training and retraining personnel. Keywords digital learning; intelligent technologies; production safety; digital manufacturing; personal information; information security; digital instruction; digital certification

2021 ◽  
pp. 10-20
Author(s):  
E.V. Khalin

The preparation and control of the knowledge of those working on industrial safety using networked digital intelligent learning systems containing formalized knowledge in text and graphical representation and simulation models in the form of distributed databases and knowledge is considered as the most important element of the organization of safe production based on digital technologies. When integrating training systems into a specific digital production, educational content, if necessary, is supplemented and developed by those responsible for training and the students themselves as part of the educational resource of digital organizations for training and retraining personnel.


2020 ◽  
Vol 3 (11) ◽  
pp. 1100-1104
Author(s):  
Hussein Naeem Aldhaheri ◽  
Ihsan Edan AlSaimary ◽  
Murtadha Mohammed ALMusafer

      The Aim of this study was to determine Immunogenetic expression of  Toll-like receptor gene clusters related to prostatitis, to give acknowledge about Role of TLR in prostatitis immunity in men from Basrah and Maysan provinces. A case–control study included 135 confirmed prostatitis patients And 50 persons as a control group. Data about age, marital status, working, infertility, family history and personal information like (Infection, Allergy, Steroid therapy, Residency, Smoking, Alcohol Drinking, Blood group, Body max index (BMI) and the clinical finding for all patients of Prostatitis were collected. This study shows the effect of PSA level in patients with prostatitis and control group, with P-value <0.0001 therefore the study shows a positive significant between elevated PSA levels and Prostatitis.


2021 ◽  
pp. 0142064X2110248
Author(s):  
Kyung Min Kim

In 2 Cor. 10–13, Paul tries to prove his authority as a reliable leader by using two different masculinity standards. Paul manifests his power and control over the Corinthian church members by using an image of paterfamilias (11.2-3; 12.14). Paternal control of others was an essential element of hegemonic masculinity in the Greco-Roman world. Moreover, Paul proves his manliness by revealing his endurance and submission to divine authority (11.21b–12.10) according to the Hellenistic Jewish masculinity. I argue that Paul is embedded in these different cultural assumptions regarding masculinity and that he refers to these assumptions to persuade Gentile and Jewish groups in the Corinthian church.


2014 ◽  
Vol 556-562 ◽  
pp. 1358-1361 ◽  
Author(s):  
Wen Bo Zhu ◽  
Fen Zhu Ji ◽  
Xiao Xu Zhou

Wire of the brake pedal is not directly connected to the hydraulic environment in the braking By-wire system so the driver has no direct pedal feel. Then pedal simulator is an important part in the brake-by-wire system. A pedal force simulator was designed based on the traditional brake pedal curve of pedal force and pedal travel, AMESim and Matlab / Simulink were used as a platform to build simulation models and control algorithms. The simulation results show that the pedal stroke simulator and the control strategy meet the performance requirements of traditional braking system. It can be used in brake by wire system.


2020 ◽  
pp. 8-12
Author(s):  
Elena Soldatova

Digital technologies are used not only to automate business processes and improve them, but are also increasingly applied in the field of labor protection. They are aimed at creating and training employees in various safety skills. Elena Soldatova, general director of OOO (LLC) Leader Info and founder of SOLDES company, tells about digitalization of business processes, what the level of industrial safety depends on, and how to improve the safety culture at the enterprise.


Author(s):  
Dheeraj Agarwal ◽  
Linghai Lu ◽  
Gareth D. Padfield ◽  
Mark D. White ◽  
Neil Cameron

High-fidelity rotorcraft flight simulation relies on the availability of a quality flight model that further demands a good level of understanding of the complexities arising from aerodynamic couplings and interference effects. One such example is the difficulty in the prediction of the characteristics of the rotorcraft lateral-directional oscillation (LDO) mode in simulation. Achieving an acceptable level of the damping of this mode is a design challenge requiring simulation models with sufficient fidelity that reveal sources of destabilizing effects. This paper is focused on using System Identification to highlight such fidelity issues using Liverpool's FLIGHTLAB Bell 412 simulation model and in-flight LDO measurements from the bare airframe National Research Council's (Canada) Advanced Systems Research Aircraft. The simulation model was renovated to improve the fidelity of the model. The results show a close match between the identified models and flight test for the LDO mode frequency and damping. Comparison of identified stability and control derivatives with those predicted by the simulation model highlight areas of good and poor fidelity.


2021 ◽  
pp. 28-33
Author(s):  
E.V. Khalin

The functional capabilities provided by the digital production safety training system for those responsible for training allow the software complex to be maintained in a stable operational state when exposed to emergency situations, to fulfill all the necessary needs of responsible users with the authority to create effective training programs and to test the knowledge of workers on production safety, to quickly form up-to-date digital reporting documentation for the organization.


Author(s):  
Jama Shelton ◽  
Kel Kroehle ◽  
Emilie K. Clark ◽  
Kristie Seelman ◽  
SJ Dodd

The enforcement of the gender binary is a root cause of gender-based violence (GBV) for trans people. Disrupting GBV requires that we ensure that ‘gender’ is not presumed synonymous with White cisgender womanhood. Transfeminists suggest that attaining gender equity requires confronting all forms of oppression that police people and their bodies, including White supremacy, colonialism and capitalism (Silva and Ornat, 2016; Simpkins, 2016). Part of this project, we argue, includes confronting the structures of GBV embedded within digital technologies that are increasingly part of our everyday lives. Informed by transfeminist theory (Koyama, 2003; Stryker and Bettcher, 2016; Simpkins, 2016; Weerawardhana, 2018), we interrogate the ways in which digital technologies naturalise and reinforce GBV against bodies marked as divergent. We examine the subtler ways that digital technology can fortify binary gender as a mechanism of power and control. We highlight how gendered forms of data violence cannot be disentangled from digital technologies that surveil, police or punish on the basis of race, nationhood and citizenship, particularly in relation to predictive policing practices. We conclude with recommendations to guide technological development to reduce the violence enacted upon trans people and those whose gender presentations transgress society’s normative criteria for what constitutes a compliant (read: appropriately gendered) citizen.<br /><br />Key messages<br /><ul><li>Violence against trans people is inherently gender-based.</li><br /><li>A root cause of gender-based violence against trans people is the strict reinforcement of the gender binary.</li><br /><li>Digital technology and predictive policing can fortify binary gender as a mechanism of power and control.</li><br /><li>Designers of digital technologies and the policymakers regulating surveillance capitalism must interrogate the ways in which their work upholds the gender binary and gender-based violence against trans people.</li></ul>


Sign in / Sign up

Export Citation Format

Share Document