standard operations
Recently Published Documents


TOTAL DOCUMENTS

72
(FIVE YEARS 18)

H-INDEX

7
(FIVE YEARS 1)

2022 ◽  
pp. 611-620
Author(s):  
Regner Sabillon

This chapter presents a systematic literature review on best practices regarding cybersecurity incident response handling and incident management. The study identifies incident handling models that are used worldwide when responding to any type of cybersecurity incident. The authors highlight the importance of understanding the current cyber threat landscape in any incident response team and their standard operations procedures. The chapter provides guidelines for building a cybersecurity incident team in terms of incident categorization, capabilities, tasks, incident cost calculation, and metrics.


Mathematics ◽  
2021 ◽  
Vol 9 (23) ◽  
pp. 3107
Author(s):  
Jiří Močkoř

The notion of a semiring-valued fuzzy set is introduced for special commutative partially pre-ordered semirings, including basic operations with these fuzzy structures. It is showed that many standard MV-algebra-valued fuzzy type structures with standard operations, such as hesitant, intuitionistic, neutrosophic or fuzzy soft sets are, for appropriate semirings, isomorphic to semiring-valued fuzzy sets with operations defined. F-transform and inverse F-transform are introduced for semiring-valued fuzzy sets and properties of these transformations are investigated. Using the transformation of MV-algebra-valued fuzzy type structures to semiring-valued fuzzy sets, the F-transforms for these fuzzy type structures is introduced. The advantage of this procedure is, among other things, that the properties of this F-transform are analogous to the properties of the classical F-transform and because these properties are proven for any semiring-valued fuzzy sets, it is not necessary to prove them for individual fuzzy type structures.


KREATOR ◽  
2021 ◽  
Vol 2 (2) ◽  
Author(s):  
Juliandri . ◽  
Anton Hadiwijaya ◽  
Yessy Yerta Situngkir

In-depth observations have been made on the printing process using the Heidelberg Speedmaster CD 102 machine. In this process, the ink unit becomes the biggest concern because of its role in the quality of the printout. Observations are made directly in the field on routine procedures carried out and discuss events in the field to identify problems and determine actions. The results of the study indicate that there are several things that must be improved related to the routine maintenance schedule, the technical setup of the inking unit and identification of potential problems as a reference for improving standard operations in the field.Keywords—Inking unit, offset printing machine, speedmaster machine


TEM Journal ◽  
2021 ◽  
pp. 298-302
Author(s):  
Rushan N. Zaripov ◽  
Ilnur M. Murakaev ◽  
Anatoly V. Ryapukhin

In this article, the issues of improving management mechanisms, assessing and identifying the risks of an economic entity's activities by monitoring and analyzing the levels of human capital and the potential of its employees are considered. There is a hypothesis about the existing fundamental tendency of changing the status of employee of organization from the performer of standard operations to the creator of the product and associated risks. A mechanism is proposed for applying a system of key performance indicators (KPI) to assess the levels of human capital and potential in order to manage the production stability and competitiveness of organization, as well as to identify and assess the risks of its activities in time.


Author(s):  
Samantha Corrado ◽  
Tejas Puranik ◽  
Olivia Pinon Fischer ◽  
Dimitri Mavris

As air traffic demand grows, robust, data-driven anomaly detection methods are required to ensure that aviation systems become safer and more efficient. The terminal airspace is identified as the most critical airspace for both individual flight-level and system-level safety and efficiency. As such, developing data-driven anomaly detection methods to analyze terminal airspace operations is paramount. With the expansion of ADS-B technology, open-source flight tracking data has become more readily available to enable larger-scale analyses of aircraft operations. This paper makes a distinction between spatial metrics in ADS-B trajectory data and energy metrics derived from ADS-B trajectory data. Motivated by the limited number of approaches that simultaneously consider both spatial and energy metrics, this paper introduces the concepts of spatial anomalies and energy anomalies. In particular, it proposes a novel, unified framework for detection of spatial and energy anomalies in ADS-B trajectory data (and associated derived metrics). The framework consists of three main parts - a data processing procedure, a spatial anomaly detection method, and an energy anomaly detection method. The framework is demonstrated utilizing four months of ADS-B trajectory data associated with arrivals at San Francisco International Airport, and the relationship between the spatial and energy anomalies in this terminal airspace is explored. The results that stem from the implementation of this framework indicate that if an aircraft is spatially not conforming to an identified set of air traffic flows representing standard spatial operations, then this aircraft is more likely to experience non-conformance to standard operations in its energy metrics. Aviation operators, such as air traffic controllers, may benefit from this observation, as it may factor into decision-making in instances where there is the potential to instruct an aircraft to spatially deviate from standard operations. Additionally, this research revealed underlying differences between trajectories that are spatially nominal yet energy-anomalous and those trajectories that are spatially anomalous and energy-anomalous. Focusing solely on energy anomaly detection does not provide insight into potential spatial-related decisions that may have been made to result in off-nominal energy behavior.


This chapter presents a systematic literature review on best practices regarding cybersecurity incident response handling and incident management. The study identifies incident handling models that are used worldwide when responding to any type of cybersecurity incident. The authors highlight the importance of understanding the current cyber threat landscape in any incident response team and their standard operations procedures. The chapter provides guidelines for building a cybersecurity incident team in terms of incident categorization, capabilities, tasks, incident cost calculation, and metrics.


2020 ◽  
pp. 534-541
Author(s):  
T. Paientko

The article is devoted to solving the problematic issues of confirming the amounts of income and expenses that arise in accounting for long-term debt. A review of the literature has shown that domestic researchers do not pay enough attention to the method of determining the effective rate in various situations. It is incorrect to use the approaches of western researchers in determining the effective rate, as in Ukraine there is no unified approach for determining a risk-free rate. The purpose of the article is to justify the approaches to determining the effective interest rate when accounting for long-term debt in order to reflect correctly income and expenses arising from the discount calculation. Over the past few years, during tax audits, tax inspectors do not recognize or recognize income and expenses of income taxpayers that arise from the reflection of the discount in an incomplete amount. As a result, the taxpayers have income tax arrears, the amounts of which they do not agree with, and therefore they must go to court. The issue of confirmation of the amount of income or expenses arising as a result of reflection of the discount is controversial and complicated, therefore often requires the involvement of a forensic expert economist. In practice, there are nonstandard situations, namely: reflection in the accounting of long-term debt with an uncertain maturity; – reflection in the accounting of interest-free financial aid; reflection in the accounting of non-standard loans. It has been determined that the source of the problem is the lack of common approaches to justify the effective rate used in discounting. The court practice of settling disputes between taxpayers and the tax service has been analyzed. It is grounded, in what non-standard operations problems can arise in determining the effective rate. It is determined what approaches to the determination of discount rate should be applied in the realities of Ukraine. It has been substantiated that in order to protect the position of judicial experts when preparing opinions on the issues of reflection of income and costs arising from the discount, it is necessary to develop and approve the methodology for determining the effective rate for calculating the discount.


2020 ◽  
pp. 68-73
Author(s):  
I. B. Babynkina ◽  
A. A. Novikova ◽  
G. P. Babynkina

Summary. The aim. Improving the results of treatment of patients with decompensated forms of chronic venous insufficiency in post-thrombophlebitic and varicose diseases based on the use of differentiated pathogenetically substantiated surgical tactics. Materials and methods. The basis of the work is the study of the results of surgical treatment of 102 patients not previously operated on with postthrombophlebitic disease of the lower extremities in the decompensated stage of CVI. All patients underwent combined surgical treatment, including the elimination of perforating insufficiency and various modifications of the operation on the superficial veins to eliminate vertical reflux. Results and discussion. The combined operation for clipping perforating veins allows the operation to interrupt blood circulation through insolvent perforating veins, including on an outpatient basis, minimizing tissue trauma during puncture rather than sectional access to a vein. The cosmetic effect of the operation is significantly increased, which is especially important in the treatment of women. Since the operation can be performed on an outpatient basis, the number of days of incapacity for work is significantly reduced compared to standard operations on perforating veins, which is a particularly important circumstance in modern economic conditions. Conclusion. Using the proposed method allows to achieve optimal conditions for the restoration of trophism of affected tissues, leading to a decrease in the number of complications and a reduction in hospitalization.


Author(s):  
Dimitar Dimitrov ◽  
◽  
Radko Radev ◽  

The ongoing COVID-19 pandemic is having a tremendous impact on the business organizations, governments and people around the Globe. No matter if it is a public, or private organization, the leaders and management have changed their approaches, standard operations, the way they communicate, processes and procedures. In this paper is analyzed the impact of Data Analytics on two main management pillars and more specifically: Business Operations and Human Resources Management; more precisely, how they are impacted and changed in the pandemics. We analyzed how Global IT Companies are reacting and using analytics as a tool that helps them in the day to day operations, representing some used models and patterns.


2020 ◽  
Vol 60 (2) ◽  
pp. 620
Author(s):  
Arthur de Mul

In Q2 2020, a fully automated rig will enter the coal seam gas fields of Queensland, to work for a major operator. It is expected to be 20–30% faster than current operations. This document describes the upfront iterative design process with local potential users. Following discussions with various contractors and operators it became evident that there was a gap to bridge between operator and contractor targets and in what current operations have to offer. Both strive for the highest safety levels and operational efficiency, reducing the overall time per well, completed by minimising environmental impact. The above fits in the overall industry trend of transformation from mechanised rigs towards fully automated hands-free operated rigs. It was with these ingredients that the basis of a new iterative design process was formed, in which input from the operator field lieutenants, contractor rig crews and the supporting office was translated into a technical design. The target was set to reduce 20–30% of time per well. Key elements were the choice for road legal trailerised loads with no loose items, which resulted in rig moves of 4–6 h. Fully automated sequenced pipe tripping and casing running contributed to big improvements in efficiency and safety level (no people on the floor during standard operations). Performance can be real-time evaluated and optimised by collecting all rig and downhole data on the OPC server. The server also controls the mud system, downhole data and other important systems. This enables through-life time optimisation.


Sign in / Sign up

Export Citation Format

Share Document