Practical experience with the application of HazOp to a software intensive system

Size: px
Start display at page:

Download "Practical experience with the application of HazOp to a software intensive system"

Transcription

1 Practical experience with the application of HazOp to a software intensive system Tor Stålhane, PhD and Kari Juul Wedde. M Sc. SINTEF Telecom and Informatics Abstract This paper describes the work done by SINTEF on HazOp on a safety critical, software intensive system and the lessons learned in the process. The lessons concern two areas the HazOp process and the use of the HazOp to formulate lower level safety requirements. We describe a HazOp process based on system functions instead of the overall system functionality and how to use software related guidewords in order to fill in the HazOp forms. For requirements generation and allocation, we describe the process of construction a FT based on the contents of the HazOp forms and how to perform the probability budgeting. Keywords HazOp, Fault Tree Analyses (FTA), System safety analysis, Software intensive systems 1. Introduction SINTEF has for some years performed safety analyses for European companies working in the areas of rail and air traffic control. One of our business ideas is to use traditional safety analyses techniques to analyze software systems. If at all possible we want to use these techniques unchanged but if this proves impractical we will augment them so that they can also be used for software. One of the safety analyses techniques where we saw a great potential was the HazOp Hazard and Operational analyses. This technique can be performed early in the development process - preliminary HazOp - or when the design is (nearly) complete - a regular HazOp. We have used both in this project. Many of the analyses we have performed earlier were for systems that were already finished and our task was to answer the question Is it safe enough? For such work HazOp is only needed in order to get an overview of the potential dangers. For the project discussed in this paper, we participated already from the concept phase and the HazOp result was one of the main forces driving the architectural design. This paper sums up our experiences on safety analyses over several years. This experiences has been increased and validated through the work in the project described below. 2. A short summary of state of the art HazOp as a method dated back to the 60s and was developed by ICI [1] for the analyses of chemical processes. The method, with its focus on the early stages of development did, however, soon catch the attention of other branches of industry where safety is an important issue. The software industry was probably the last industry to put it into use. In 1986, Nancy Leveson recommended the method for analyses of all safety critical software systems [2]. The problems pertaining to the fact that the method had been designed for chemical processes was, however, not mentioned. The same holds for EWICS treatment of the subject in 1988 [3] and for Lewis Bass paper in 1989 [4]. The first attempt to tailor HazOp to software was reported in 1989 [5]. The authors Dr. R.M. Pitblado et al recommended a standard HazOp to be performed first, followed by what the authors called a failure mode HazOp, where the authors used many of the standard

2 guidewords, but combined them with new, software adapted parameters. The first really software adapted HazOp description was published by Chudleigh and Catmur in 1992 [6]. The authors introduced new guidewords and new parameters. At the time of the publication, they had already performed several software HazOps but had been unable to publish the experiences due to clauses of confidentiality. When we sat down to make a new, better adopted, set of guidewords for software HazOp, the work of Chudleigh and Catmur was our main source of inspiration together with work done at ESTEC [7]. 3. System and related problems Figure 1 shows the system and its environment. The main purpose of the system is to generate and broadcast position information based on a set of input signals and geographical position information. For safety reasons all messages have to be monitored before and after sending. Mismatch in message contents shall cause an alarm to be sent to the receiver and if the failure conditions continuous; it shall lead to a system shutdown. Status information shall be displayed - both on a local and on a remote panel. The geographical positions are loaded and stored into the system when the system is set to maintenance mode. Data are not allowed to be entered during normal operation. Changing the operational mode is done by an operator. Receiver Sender Messages for monitoring System Safety critical part Operator Geographical positions Remote Panel Figure 1 The system The only unsafe event for this system is that misleading information is sent to the receiving system. Loss of function is for instance not a hazard. The critical functions are thus

3 as follows: Broadcast position messages and alarms Monitoring of the broadcasted messages. The ability to reveal incorrect input signals. The ability to reveal incorrect geographical data. Another interesting aspect is the role of the operator; what harm can the operator cause by applying the wrong command, pushing the wrong switch and so on. As can be seen from Figure 1, all critical functions are related to the interfaces between the safety critical part and its environment. The receiver and the senders are not part of this project and thus not part of the HazOp. For the parts inside the dashed line, however, the interface between safety critical and non-safety critical parts have to be considered thoroughly. 4. HazOp a method description 4.1. What is HazOp? As an idea, HazOp is simple - collect a group of people, ask them to identify potential hazards linked to the system and document the result. HazOp is a guided and structured brain storming process. The guidance is provided by the guidewords while the system or the system s functions provide the structure. HazOp is a people process and shares many of the standard characteristics of other group processes, first and foremost the fact that nothing comes out of a HazOp that is not first present in the mind of the participants. The method is used to get an overview of all potential hazards. It can be used in two ways, namely: For safety assessment, where we check that all potential hazards can be handled by the system. For system design, where we start with a preliminary HazOp and then enters into a loop consisting of design, HazOp and fault tree analyses in order to check whether the goals can be reached. This paper will concentrate on the use of HazOp in system development How to do a HazOp HazOp is a general technique and is just as important for hardware, software and peopleware. The following are the most important things to remember when performing a HazOp: 1. HazOp is a group process. The quality of the HazOp result is a direct function of the quality of the personnel involved. The group must contain experts on all relevant areas software, hardware, application, installation, maintenance and operation. Only in this way can we cover all potential hazards. See also [8]. 2. As a process, HazOp has many features in common with a document review and many of the same rules should be applied. First and foremost, the group s role is to identify hazards, not to come up with design solutions. 0It is important to draw clear system s boundaries so that the participants always know what is inside the system and what is outside. 1. All modes of operations must be considered. Include also installation, maintenance and operator interventions. HazOp has two important features the study nodes and the guidewords. We will give a short discussion of the role of guidewords and study nodes in the next section. The results are documented in a HazOp form. An example of such a form with some typical information is shown in figure 4.

4 The guidewords drive the HazOp process by focusing the brain storming on a set of deviations from normal operation, which can occur during operation or maintenance. In some sense the guidewords can be viewed as generalized failure modes. The guidewords used in a HazOp performed in the chemical industry are for instance No negation of the design intent, Less quantitative decrease or More quantitative increase. The guidewords are combined with a parameter for instance flow - and a study node for instance valve V3. A possible failure mode can thus be No flow in valve V3. Such guidewords are not particularly well fitted for software. There has been some work done on interpreting them for software, see for instance [5], but the idea has not gained wide acceptance. 5. From hazards to HazOp forms 5.1. Some problems pertaining to HazOp Study nodes The first important choice when starting a HazOp process is the choice of study nodes. This choice will decide the result of the HazOp and how the result can be used. We have two possible choices for study nodes, namely system components (channels, processes and data storage) or functionality. The latter will focus on what the system delivers to its environment, for instance the signals sent to the actuators. If we choose to perform a functional HazOp this can be done in two ways: 1. Define the study nodes of the system and apply the guidewords to each function available in the current study node. 2. Start with the functions defined by the system s operation and apply the guidewords to each function or sub-function. The first alternative is the method recommended for HazOp in other industries. It turned out, however, that we at least for software - got a more efficient process by selecting the second alternative. Especially, it turned out that the iterations between HazOp and fault tree analyses became much easier in this way. We identify all functions for the current system level and applied the guidewords belonging to process, data storage and channels, together with their deviations to each function. Guidewords As mentioned earlier, attempts to interpret the original HazOp guidewords in a software setting, has not been much used and we have chosen another approach. In 1995, SINTEF headed an ITUF working group with the goal of defining special guidewords for software systems. The work resulted in three sets of guidewords, one for each of the study node categories Process, Channel and Data storage. Part of the results is shown below: Table 1 Guidewords Parameter Storage Input / output Data value Guideword Unstable Destroyed Stored in wrong address Stored in such a way that it can not be read Noise or other random input is stored as data Total or partly wrong Unwanted data No data value Not complete data Data are not changed

5 The guidewords developed by ITUF were originally intended for system components. The standard we used [10] in this particular project, however, required that we focused on functions. It turned out that they also worked quite well in this case. Filling in the HazOp form The HazOp forms, which are the output of the process, are filled in by going through the list of guidewords for each system function. Thus, the parameters - which originally were components - are now augmented with the functions. For each function we run through all the guidewords plus earlier identified hazards, to check whether they are applicable to the current function and parameter. Thus, instead of using the failure unstable storage, we will use the failure unstable storage for function F3 and so on. If the failure is relevant, the condition under which it can occur is written into the Failure Condition column in the HazOp form. These conditions can be: Single conditions, such as Bit error in status word. Multiple conditions, such as Bit error in status word and not detected by CRC. For each failure we must also fill inn the effect, classification and how we shall verify that the hazard is properly taken care of later in the process Lessons learned HazOp must be done by iterations. It is not possible to do a complete HazOp in a single run through all the nodes or functions of a system. Hazards identified in one function may turn out to be relevant also for other functions, though not necessarily in the same way as the first time. Thus, when doing a HazOp and identifying a potential hazard, we must go back and check if this hazard or something related to this hazard also applies for the other functions. In addition, the hazard must be added to the list of potential hazards we need to consider for the functions that are not yet analyzed. Fault scenarios and event sequences are important. If we are performing a HazOp on a complex system it is important to use What if scenarios. This will help to identify the functionality involved in a potential hazard. Event sequences are closely related to fault scenarios and serve the same purpose. Thus, instead of just considering the failure bad data in X, we should consider the sequence of events that leads to the bad data. This will help us to create more efficient defense against the identified problem. Any solution introduced in order to get rid of a risk may introduce a new risk. Any change in architecture or design, intended to solve an identified problem, can introduce a new hazard. A typical example is a new control function intended to remove a hazard. By introducing this new function, we create new hazards and so on. This insight will affect us in the future mainly by the fact that we are aware of the problem. In addition, introducing new control mechanisms may not be a good way to get rid of a problem. It is better to remove the potential danger by changing the design than to introduce extra control mechanisms. See also the previous lesson. System HazOp versus functional HazOp. As mentioned earlier, a functional HazOp can be done either by starting with the job that the system is supposed to perform or by starting with the functions that are used. Our experience is that it helps the rest of the process tremendously if we start with defining the main functions of the system and then perform a HazOp on each function. This will simplify the rest of the safety analyses e.g. the FTA and the mapping from

6 HazOp to system s design. The result will be easier to document, understand and review. Define system boundaries It is important to have a clear description of the system s boundaries. We found that it is also important to have a clear description of which inner parts of the system are visible at the time of the HazOp. If this is not made clear we will get into trouble when we try to separate HazOp and design work. 6. From HazOp forms to design requirements 6.1. The role of HazOp in architectural design One purpose of HazOp in architectural design for safety critical systems is to perform quantitative analyses. Such analyses are done in order to get a starting point for the generation and allocation of lower level safety requirements. This process is iterative in nature and consists of FTA, probability budgeting and design modifications. HazOp applied to architectural design differs from HazOp applied on existing systems in two ways: The probability budget The iterations between lower level design and the HazOp process When applying FTA it is important to define the analysis level required. For architectural design, we constructed a FT down to the level of events representing single failure conditions in the HazOp forms. The reason for going down to single failure conditions instead of stopping at multiple failure conditions was that some of the single failure conditions could be mapped into basic events with known failure rates. In this way we could take advantage of extra knowledge and thus get a more accurate result in the probability budgeting. An important area related to probability budgeting is the lack of available failure rates for software and peopleware. This is a problem that is independent of whether the approach is applied during system development or on existing systems. Figure 2 shows a part of the HazOp form for the function Broadcast message and the FT developed based on this form. The FT is developed down to a level of single failure conditions. This example will be used throughout the rest of this chapter Probability budget When applying HazOp in architectural design, probability budgeting becomes an important part of the job. The probability budgeting is done by using FTA to allocate failure rates to the failure conditions identified in the HazOp form. In probability budgeting you start with the safety requirement for the top event. Normally you divide the failure rate equally between all events at the level below. For an OR-gate with two events, each event will get a failure rate that is half the failure rate of the starting event. For AND-gates with two events, each event will get a failure rate that is the square root of the failure rate of the starting event. This simple top down approach to budgeting can give good results, but requires that the functions are grouped in such a way that it is reasonable to have the same requirement to each group. It is for instance unreasonable that a single bit error have the same failure rate as corrupted data. As an alternative to the top down approach you can use a bottom up approach. The FT is developed down to the analyses level decided upon, for instance single failure conditions. All basic events are given failure rates according to known rates and all undeveloped events are given equal rates which is adjusted until the top requirement is met. By applying this approach you can get an early indication of which subsystem or sub-function that may cause most problems.

7 6.3. Iterations between design and the HazOp process When the budgeting is finished, you have to formulate design requirements based on the undeveloped events in the FT and their failure rates. These requirements will serve as input to the design process. Here we make design decisions based on the requirements and develop FTs for the undeveloped events from the architectural design. In the design phase the FTs have to be developed down to basic events with known failure rates. If the top requirement is not met, you can alter the local design until the requirement is met or you can to go back and alter the architectural design. FunctionF ailure ConditionE ffect C lassificationve rification Broadcast message Bit error. Not detected by CRC.M isleading informationh azards ystem Fault TreeP osition data corrupted. Single failure. Not detected.m isleading informationh azards ystem Fault TreeP osition data corrupted. Multiple failure. Not detected.m isleading informationh azards ystem Fault TreeN o transmissionl oss of functionn o safety effect Figure 2 HazOp applied on architectural design 6.4. Failure rates for software and peopleware Allocation of failure rates to software and peopleware has always been a problem. For software this problem can be solved by deciding that software developed according to a given standard has a given failure rate. All software failures are then given the same failure rate. To get failure rates for i.e. operator failures are more difficult. There exists some numbers used in the area of nuclear energy [9] but the best advice is to design the system in such a way that the operator does not have any safety critical function The process of requirements allocation The starting point for requirement allocation is the overall safety requirements stated in the systems requirements and the HazOp form from architectural design.

8 1. Start a FT with the unsafe event for the overall system as the top event. The safety requirement for this event is taken from the systems requirements. In the system under consideration this unsafe event is Misleading information. 2. Construct an OR-gate connecting the main system functions. Allocate a budget for each function. Broadcast message in figure 2 is such a main function. 3. For each main function, construct an OR-gate connecting all failure conditions leading to the same effect. In order to get a more readable FT, related failure conditions can be grouped. In our example Position data corrupted is such a group. 4. If the failure condition is a multiple condition, the comprising single conditions are combined by an AND-gate, for instance Single data failure and Not detected. 5. Check for common causes. If this is not performed, the failure rate for the top event will be too high. In the example we have both single and multiple data failure where multiple failure includes single failure. The example does not compensate for common cause failures. 6. Allocate available failure rates to the basic events, i.e. Not detected by CRC. 7. Budget for the rest of the failure events and compute the failure rate for the top event. Iterate until the requirement is met. 8. If you are not able to meet the safety requirements, the system architecture have to be changed, and a new HazOp has to be performed. 1Formulate design requirements based on the undeveloped events in the FT. In the example, there will be three safety requirements Lessons learned Use a bottom up approach for failure probability budgeting We recommend using FTA and a bottom up approach to probability budgeting. In this way you can early in the architectural design process get an indication of which parts or functions in your system that will cause problems in meeting the overall safety requirements. Develop the FT down to the level for single failure conditions According to our experience, the analysis level required in architectural design is down to events representing single failure conditions. In the first version of our FT, we developed the FT as far as we were able to do with the knowledge available. Due to different level of knowledge in different areas, some hazards were developed down to a component level while others stopped at a high level. If we had used this FT as a basis for formulating design requirements, the requirements would be on quite different levels of abstraction and not well suited for design decisions. Iterate between HazOp and FTA. It can not be expected that the overall system safety requirement is met in the first FTA. You have two alternatives: 2Change the system architecture in such a way that one or more hazards will disappear. 3Reduce the failure probability by adding controlling or detection mechanisms to the system. The HazOp form and FTs can be used as a guide in order to choose the mechanism having the most effect on the overall failure probability. One to one mapping between elements in the HazOp form and FT event If the contents of the HazOp forms have a good structure, the FT can be constructed by a one to one mapping between elements in the HazOp form and events in the FT. 4Effect top event for all failure conditions leading to this effect 5Multiple failure condition grouping event for the comprising single events 6Single failure condition basic or undeveloped event

9 One design requirement for each undeveloped event in the FT Formulate one design requirement - allocated to a function or item - for each undeveloped event in the FT. At this level a SW failure is a SW failure At the architectural level we are not able to distinguish between the failure rates for different software failures. Even if we know that several failure conditions have to occur, we can not connect them with OR-gates or AND-gates the way we do for other types of events. Using the given standard for development of safety critical software, the failure rate for software is given. The following computing rules for SW failures must be applied: 7SW failure rate AND SW failure rate = SW failure rate 8SW failure rate OR SW failure rate = SW failure rate 7. Conclusions and further work We have seen how HazOp can be an integrated part of the design process in order to formulate and allocate design safety requirements for the lower levels. Pertaining to architectural design of software intensive systems, the following are important: 9The HazOp process must be iterative. This goes both for filling in the HazOp forms and for iteration between the HazOp process in the architectural design and the lower level design. 10It is more efficient to perform HazOp on a set of defined functions than to start out with the overall functionality. 11Applying HazOp in design includes probability budgeting. In order to perform this task in an efficient manner, failure rates for software and peopleware are required. HazOp as a method is well suited for software intensive systems. In order to be more suited for the design process, however, further work is needed in the following areas: 12List of generic hazards, according to application area 13Standard failure rates for peopleware and software failures 14SINTEF will try alone or together with European partners to initiate research in one or more of these areas. 8. References [1] A Guide to Hazard and Operability Studies. Chemical Industries Association Ltd [2] Nancy G. Leveson. Software safety: Why, What and How. Computing Survey. Vol. 18, no. 2, June 1986 [3] EWICS TC7, Safety - Assessment and Design of Industrial Computer Systems. Techniques Directory, August 1988 [4] Lewis bass and Daniel L. Martin, Cost-Effective Software Safety Analyses. Proceedings of the Annual reliability and maintainability Symposium, Atlanta, Georgia, January 24-26, [5] R.M. Pitblado et al. safety Assessment of Computer Controlled Process Plants. Proceedings of the 6th International Symposium on Loss Prevention and Safety Promotion in the Process Industries, Oslo, Norway, June 19-27, [6] M. Chudleigh and J. Catmur, Safety Assessment of Computer Systems using HazOp and Audit techniques. Proceedings of Safecomp 92, [7] Guidelines for Considering a Software Intensive System within FMECA Studies, ESTEC January, 1992 [8] Rito Kuivanen, Methodology for simulating robot system safety design. ISBN VTT, Espoo, Finland, [9] David I. Gertman and Harold S. Blackman, Human Reliability and Safety Analysis data Handbook. John Wiley & Sons, Inc. New York [10] SAE International, Guidelines and methods for conducting the safety assessment process on civil airborn equipment. SAE ARP 4761, December 1996

10

Fault tree analysis for maintenance needs

Fault tree analysis for maintenance needs Home Search Collections Journals About Contact us My IOPscience Fault tree analysis for maintenance needs This article has been downloaded from IOPscience. Please scroll down to see the full text article.

More information

Seminar - Organic Computing

Seminar - Organic Computing Seminar - Organic Computing Self-Organisation of OC-Systems Markus Franke 25.01.2006 Typeset by FoilTEX Timetable 1. Overview 2. Characteristics of SO-Systems 3. Concern with Nature 4. Design-Concepts

More information

ECE-492 SENIOR ADVANCED DESIGN PROJECT

ECE-492 SENIOR ADVANCED DESIGN PROJECT ECE-492 SENIOR ADVANCED DESIGN PROJECT Meeting #3 1 ECE-492 Meeting#3 Q1: Who is not on a team? Q2: Which students/teams still did not select a topic? 2 ENGINEERING DESIGN You have studied a great deal

More information

Software Maintenance

Software Maintenance 1 What is Software Maintenance? Software Maintenance is a very broad activity that includes error corrections, enhancements of capabilities, deletion of obsolete capabilities, and optimization. 2 Categories

More information

Software Development Plan

Software Development Plan Version 2.0e Software Development Plan Tom Welch, CPC Copyright 1997-2001, Tom Welch, CPC Page 1 COVER Date Project Name Project Manager Contact Info Document # Revision Level Label Business Confidential

More information

On Human Computer Interaction, HCI. Dr. Saif al Zahir Electrical and Computer Engineering Department UBC

On Human Computer Interaction, HCI. Dr. Saif al Zahir Electrical and Computer Engineering Department UBC On Human Computer Interaction, HCI Dr. Saif al Zahir Electrical and Computer Engineering Department UBC Human Computer Interaction HCI HCI is the study of people, computer technology, and the ways these

More information

Circuit Simulators: A Revolutionary E-Learning Platform

Circuit Simulators: A Revolutionary E-Learning Platform Circuit Simulators: A Revolutionary E-Learning Platform Mahi Itagi Padre Conceicao College of Engineering, Verna, Goa, India. itagimahi@gmail.com Akhil Deshpande Gogte Institute of Technology, Udyambag,

More information

LEGO MINDSTORMS Education EV3 Coding Activities

LEGO MINDSTORMS Education EV3 Coding Activities LEGO MINDSTORMS Education EV3 Coding Activities s t e e h s k r o W t n e d Stu LEGOeducation.com/MINDSTORMS Contents ACTIVITY 1 Performing a Three Point Turn 3-6 ACTIVITY 2 Written Instructions for a

More information

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING Yong Sun, a * Colin Fidge b and Lin Ma a a CRC for Integrated Engineering Asset Management, School of Engineering Systems, Queensland

More information

Architecting Interaction Styles

Architecting Interaction Styles - provocation facilitation leading empathic interviewing whiteboard simulation judo tactics when in an impasse: provoke effective when used sparsely especially recommended when new in a field: contribute

More information

Geo Risk Scan Getting grips on geotechnical risks

Geo Risk Scan Getting grips on geotechnical risks Geo Risk Scan Getting grips on geotechnical risks T.J. Bles & M.Th. van Staveren Deltares, Delft, the Netherlands P.P.T. Litjens & P.M.C.B.M. Cools Rijkswaterstaat Competence Center for Infrastructure,

More information

Moderator: Gary Weckman Ohio University USA

Moderator: Gary Weckman Ohio University USA Moderator: Gary Weckman Ohio University USA Robustness in Real-time Complex Systems What is complexity? Interactions? Defy understanding? What is robustness? Predictable performance? Ability to absorb

More information

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS Václav Kocian, Eva Volná, Michal Janošek, Martin Kotyrba University of Ostrava Department of Informatics and Computers Dvořákova 7,

More information

Edexcel GCSE. Statistics 1389 Paper 1H. June Mark Scheme. Statistics Edexcel GCSE

Edexcel GCSE. Statistics 1389 Paper 1H. June Mark Scheme. Statistics Edexcel GCSE Edexcel GCSE Statistics 1389 Paper 1H June 2007 Mark Scheme Edexcel GCSE Statistics 1389 NOTES ON MARKING PRINCIPLES 1 Types of mark M marks: method marks A marks: accuracy marks B marks: unconditional

More information

Effect of Cognitive Apprenticeship Instructional Method on Auto-Mechanics Students

Effect of Cognitive Apprenticeship Instructional Method on Auto-Mechanics Students Effect of Cognitive Apprenticeship Instructional Method on Auto-Mechanics Students Abubakar Mohammed Idris Department of Industrial and Technology Education School of Science and Science Education, Federal

More information

CREATING SHARABLE LEARNING OBJECTS FROM EXISTING DIGITAL COURSE CONTENT

CREATING SHARABLE LEARNING OBJECTS FROM EXISTING DIGITAL COURSE CONTENT CREATING SHARABLE LEARNING OBJECTS FROM EXISTING DIGITAL COURSE CONTENT Rajendra G. Singh Margaret Bernard Ross Gardler rajsingh@tstt.net.tt mbernard@fsa.uwi.tt rgardler@saafe.org Department of Mathematics

More information

The Good Judgment Project: A large scale test of different methods of combining expert predictions

The Good Judgment Project: A large scale test of different methods of combining expert predictions The Good Judgment Project: A large scale test of different methods of combining expert predictions Lyle Ungar, Barb Mellors, Jon Baron, Phil Tetlock, Jaime Ramos, Sam Swift The University of Pennsylvania

More information

Introduction to Causal Inference. Problem Set 1. Required Problems

Introduction to Causal Inference. Problem Set 1. Required Problems Introduction to Causal Inference Problem Set 1 Professor: Teppei Yamamoto Due Friday, July 15 (at beginning of class) Only the required problems are due on the above date. The optional problems will not

More information

PUBLIC CASE REPORT Use of the GeoGebra software at upper secondary school

PUBLIC CASE REPORT Use of the GeoGebra software at upper secondary school PUBLIC CASE REPORT Use of the GeoGebra software at upper secondary school Linked to the pedagogical activity: Use of the GeoGebra software at upper secondary school Written by: Philippe Leclère, Cyrille

More information

Interpreting ACER Test Results

Interpreting ACER Test Results Interpreting ACER Test Results This document briefly explains the different reports provided by the online ACER Progressive Achievement Tests (PAT). More detailed information can be found in the relevant

More information

A Context-Driven Use Case Creation Process for Specifying Automotive Driver Assistance Systems

A Context-Driven Use Case Creation Process for Specifying Automotive Driver Assistance Systems A Context-Driven Use Case Creation Process for Specifying Automotive Driver Assistance Systems Hannes Omasreiter, Eduard Metzker DaimlerChrysler AG Research Information and Communication Postfach 23 60

More information

On the Combined Behavior of Autonomous Resource Management Agents

On the Combined Behavior of Autonomous Resource Management Agents On the Combined Behavior of Autonomous Resource Management Agents Siri Fagernes 1 and Alva L. Couch 2 1 Faculty of Engineering Oslo University College Oslo, Norway siri.fagernes@iu.hio.no 2 Computer Science

More information

An Introduction to Simio for Beginners

An Introduction to Simio for Beginners An Introduction to Simio for Beginners C. Dennis Pegden, Ph.D. This white paper is intended to introduce Simio to a user new to simulation. It is intended for the manufacturing engineer, hospital quality

More information

Computer Science. Embedded systems today. Microcontroller MCR

Computer Science. Embedded systems today. Microcontroller MCR Computer Science Microcontroller Embedded systems today Prof. Dr. Siepmann Fachhochschule Aachen - Aachen University of Applied Sciences 24. März 2009-2 Minuteman missile 1962 Prof. Dr. Siepmann Fachhochschule

More information

Case study Norway case 1

Case study Norway case 1 Case study Norway case 1 School : B (primary school) Theme: Science microorganisms Dates of lessons: March 26-27 th 2015 Age of students: 10-11 (grade 5) Data sources: Pre- and post-interview with 1 teacher

More information

Procedia - Social and Behavioral Sciences 237 ( 2017 )

Procedia - Social and Behavioral Sciences 237 ( 2017 ) Available online at www.sciencedirect.com ScienceDirect Procedia - Social and Behavioral Sciences 237 ( 2017 ) 613 617 7th International Conference on Intercultural Education Education, Health and ICT

More information

Probability estimates in a scenario tree

Probability estimates in a scenario tree 101 Chapter 11 Probability estimates in a scenario tree An expert is a person who has made all the mistakes that can be made in a very narrow field. Niels Bohr (1885 1962) Scenario trees require many numbers.

More information

CPS122 Lecture: Identifying Responsibilities; CRC Cards. 1. To show how to use CRC cards to identify objects and find responsibilities

CPS122 Lecture: Identifying Responsibilities; CRC Cards. 1. To show how to use CRC cards to identify objects and find responsibilities Objectives: CPS122 Lecture: Identifying Responsibilities; CRC Cards last revised February 7, 2012 1. To show how to use CRC cards to identify objects and find responsibilities Materials: 1. ATM System

More information

Data Fusion Models in WSNs: Comparison and Analysis

Data Fusion Models in WSNs: Comparison and Analysis Proceedings of 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1) Data Fusion s in WSNs: Comparison and Analysis Marwah M Almasri, and Khaled M Elleithy, Senior Member,

More information

Preprint.

Preprint. http://www.diva-portal.org Preprint This is the submitted version of a paper presented at Privacy in Statistical Databases'2006 (PSD'2006), Rome, Italy, 13-15 December, 2006. Citation for the original

More information

SSE - Supervision of Electrical Systems

SSE - Supervision of Electrical Systems Coordinating unit: 205 - ESEIAAT - Terrassa School of Industrial, Aerospace and Audiovisual Engineering Teaching unit: 709 - EE - Department of Electrical Engineering Academic year: Degree: 2017 BACHELOR'S

More information

A student diagnosing and evaluation system for laboratory-based academic exercises

A student diagnosing and evaluation system for laboratory-based academic exercises A student diagnosing and evaluation system for laboratory-based academic exercises Maria Samarakou, Emmanouil Fylladitakis and Pantelis Prentakis Technological Educational Institute (T.E.I.) of Athens

More information

Specification and Evaluation of Machine Translation Toy Systems - Criteria for laboratory assignments

Specification and Evaluation of Machine Translation Toy Systems - Criteria for laboratory assignments Specification and Evaluation of Machine Translation Toy Systems - Criteria for laboratory assignments Cristina Vertan, Walther v. Hahn University of Hamburg, Natural Language Systems Division Hamburg,

More information

On-Line Data Analytics

On-Line Data Analytics International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE III, SEPTEMBER 2011] [ISSN: 2231-4946] On-Line Data Analytics Yugandhar Vemulapalli #, Devarapalli Raghu *, Raja Jacob

More information

Litterature review of Soft Systems Methodology

Litterature review of Soft Systems Methodology Thomas Schmidt nimrod@mip.sdu.dk October 31, 2006 The primary ressource for this reivew is Peter Checklands article Soft Systems Metodology, secondary ressources are the book Soft Systems Methodology in

More information

Program Change Proposal:

Program Change Proposal: Program Change Proposal: Provided to Faculty in the following affected units: Department of Management Department of Marketing School of Allied Health 1 Department of Kinesiology 2 Department of Animal

More information

Axiom 2013 Team Description Paper

Axiom 2013 Team Description Paper Axiom 2013 Team Description Paper Mohammad Ghazanfari, S Omid Shirkhorshidi, Farbod Samsamipour, Hossein Rahmatizadeh Zagheli, Mohammad Mahdavi, Payam Mohajeri, S Abbas Alamolhoda Robotics Scientific Association

More information

Measurement & Analysis in the Real World

Measurement & Analysis in the Real World Measurement & Analysis in the Real World Tools for Cleaning Messy Data Will Hayes SEI Robert Stoddard SEI Rhonda Brown SEI Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie

More information

Developing True/False Test Sheet Generating System with Diagnosing Basic Cognitive Ability

Developing True/False Test Sheet Generating System with Diagnosing Basic Cognitive Ability Developing True/False Test Sheet Generating System with Diagnosing Basic Cognitive Ability Shih-Bin Chen Dept. of Information and Computer Engineering, Chung-Yuan Christian University Chung-Li, Taiwan

More information

Implementing a tool to Support KAOS-Beta Process Model Using EPF

Implementing a tool to Support KAOS-Beta Process Model Using EPF Implementing a tool to Support KAOS-Beta Process Model Using EPF Malihe Tabatabaie Malihe.Tabatabaie@cs.york.ac.uk Department of Computer Science The University of York United Kingdom Eclipse Process Framework

More information

DIGITAL GAMING & INTERACTIVE MEDIA BACHELOR S DEGREE. Junior Year. Summer (Bridge Quarter) Fall Winter Spring GAME Credits.

DIGITAL GAMING & INTERACTIVE MEDIA BACHELOR S DEGREE. Junior Year. Summer (Bridge Quarter) Fall Winter Spring GAME Credits. DIGITAL GAMING & INTERACTIVE MEDIA BACHELOR S DEGREE Sample 2-Year Academic Plan DRAFT Junior Year Summer (Bridge Quarter) Fall Winter Spring MMDP/GAME 124 GAME 310 GAME 318 GAME 330 Introduction to Maya

More information

Section 3.4. Logframe Module. This module will help you understand and use the logical framework in project design and proposal writing.

Section 3.4. Logframe Module. This module will help you understand and use the logical framework in project design and proposal writing. Section 3.4 Logframe Module This module will help you understand and use the logical framework in project design and proposal writing. THIS MODULE INCLUDES: Contents (Direct links clickable belo[abstract]w)

More information

Deploying Agile Practices in Organizations: A Case Study

Deploying Agile Practices in Organizations: A Case Study Copyright: EuroSPI 2005, Will be presented at 9-11 November, Budapest, Hungary Deploying Agile Practices in Organizations: A Case Study Minna Pikkarainen 1, Outi Salo 1, and Jari Still 2 1 VTT Technical

More information

MSW POLICY, PLANNING & ADMINISTRATION (PP&A) CONCENTRATION

MSW POLICY, PLANNING & ADMINISTRATION (PP&A) CONCENTRATION MSW POLICY, PLANNING & ADMINISTRATION (PP&A) CONCENTRATION Overview of the Policy, Planning, and Administration Concentration Policy, Planning, and Administration Concentration Goals and Objectives Policy,

More information

Generating Test Cases From Use Cases

Generating Test Cases From Use Cases 1 of 13 1/10/2007 10:41 AM Generating Test Cases From Use Cases by Jim Heumann Requirements Management Evangelist Rational Software pdf (155 K) In many organizations, software testing accounts for 30 to

More information

SAP EDUCATION SAMPLE QUESTIONS: C_TPLM40_65. Questions. In the audit structure, what can link an audit and a quality notification?

SAP EDUCATION SAMPLE QUESTIONS: C_TPLM40_65. Questions. In the audit structure, what can link an audit and a quality notification? SAP EDUCATION SAMPLE QUESTIONS: C_TPLM40_65 SAP Certified Application Associate Quality Management with SAP ERP 6.0 EhP5 Disclaimer: These sample questions are for self-evaluation purposes only and do

More information

GACE Computer Science Assessment Test at a Glance

GACE Computer Science Assessment Test at a Glance GACE Computer Science Assessment Test at a Glance Updated May 2017 See the GACE Computer Science Assessment Study Companion for practice questions and preparation resources. Assessment Name Computer Science

More information

SIE: Speech Enabled Interface for E-Learning

SIE: Speech Enabled Interface for E-Learning SIE: Speech Enabled Interface for E-Learning Shikha M.Tech Student Lovely Professional University, Phagwara, Punjab INDIA ABSTRACT In today s world, e-learning is very important and popular. E- learning

More information

University of Groningen. Systemen, planning, netwerken Bosman, Aart

University of Groningen. Systemen, planning, netwerken Bosman, Aart University of Groningen Systemen, planning, netwerken Bosman, Aart IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document

More information

California Professional Standards for Education Leaders (CPSELs)

California Professional Standards for Education Leaders (CPSELs) Standard 1 STANDARD 1: DEVELOPMENT AND IMPLEMENTATION OF A SHARED VISION Education leaders facilitate the development and implementation of a shared vision of learning and growth of all students. Element

More information

Emergency Safety Interventions: Requirements

Emergency Safety Interventions: Requirements Emergency Safety Interventions: Requirements April 28, 2017 Topeka Public Schools David Eichler Project STAY Questions are Encouraged! If you wish to ask a question, raise your hand and an aisle runner

More information

Earl of March SS Physical and Health Education Grade 11 Summative Project (15%)

Earl of March SS Physical and Health Education Grade 11 Summative Project (15%) Earl of March SS Physical and Health Education Grade 11 Summative Project (15%) Student Name: PPL 3OQ/P - Summative Project (8%) Task 1 - Time and Stress Management Assignment Objective: To understand,

More information

INPE São José dos Campos

INPE São José dos Campos INPE-5479 PRE/1778 MONLINEAR ASPECTS OF DATA INTEGRATION FOR LAND COVER CLASSIFICATION IN A NEDRAL NETWORK ENVIRONNENT Maria Suelena S. Barros Valter Rodrigues INPE São José dos Campos 1993 SECRETARIA

More information

PART 1. A. Safer Keyboarding Introduction. B. Fifteen Principles of Safer Keyboarding Instruction

PART 1. A. Safer Keyboarding Introduction. B. Fifteen Principles of Safer Keyboarding Instruction Subject: Speech & Handwriting/Input Technologies Newsletter 1Q 2003 - Idaho Date: Sun, 02 Feb 2003 20:15:01-0700 From: Karl Barksdale To: info@speakingsolutions.com This is the

More information

STANISLAUS COUNTY CIVIL GRAND JURY CASE #08-04 LA GRANGE ELEMENTARY SCHOOL DISTRICT

STANISLAUS COUNTY CIVIL GRAND JURY CASE #08-04 LA GRANGE ELEMENTARY SCHOOL DISTRICT STANISLAUS COUNTY CIVIL GRAND JURY 2007-2008 CASE #08-04 LA GRANGE ELEMENTARY SCHOOL DISTRICT SUMMARY A complaint was submitted to the Stanislaus County Grand Jury alleging that the La Grange Elementary

More information

Activities, Exercises, Assignments Copyright 2009 Cem Kaner 1

Activities, Exercises, Assignments Copyright 2009 Cem Kaner 1 Patterns of activities, iti exercises and assignments Workshop on Teaching Software Testing January 31, 2009 Cem Kaner, J.D., Ph.D. kaner@kaner.com Professor of Software Engineering Florida Institute of

More information

A 3D SIMULATION GAME TO PRESENT CURTAIN WALL SYSTEMS IN ARCHITECTURAL EDUCATION

A 3D SIMULATION GAME TO PRESENT CURTAIN WALL SYSTEMS IN ARCHITECTURAL EDUCATION A 3D SIMULATION GAME TO PRESENT CURTAIN WALL SYSTEMS IN ARCHITECTURAL EDUCATION Eray ŞAHBAZ* & Fuat FİDAN** *Eray ŞAHBAZ, PhD, Department of Architecture, Karabuk University, Karabuk, Turkey, E-Mail: eraysahbaz@karabuk.edu.tr

More information

AUTOMATED TROUBLESHOOTING OF MOBILE NETWORKS USING BAYESIAN NETWORKS

AUTOMATED TROUBLESHOOTING OF MOBILE NETWORKS USING BAYESIAN NETWORKS AUTOMATED TROUBLESHOOTING OF MOBILE NETWORKS USING BAYESIAN NETWORKS R.Barco 1, R.Guerrero 2, G.Hylander 2, L.Nielsen 3, M.Partanen 2, S.Patel 4 1 Dpt. Ingeniería de Comunicaciones. Universidad de Málaga.

More information

The Netherlands. Jeroen Huisman. Introduction

The Netherlands. Jeroen Huisman. Introduction 4 The Netherlands Jeroen Huisman Introduction Looking solely at the legislation, one could claim that the Dutch higher education system has been officially known as a binary system since 1986. At that

More information

Designing Autonomous Robot Systems - Evaluation of the R3-COP Decision Support System Approach

Designing Autonomous Robot Systems - Evaluation of the R3-COP Decision Support System Approach Designing Autonomous Robot Systems - Evaluation of the R3-COP Decision Support System Approach Tapio Heikkilä, Lars Dalgaard, Jukka Koskinen To cite this version: Tapio Heikkilä, Lars Dalgaard, Jukka Koskinen.

More information

A MULTI-AGENT SYSTEM FOR A DISTANCE SUPPORT IN EDUCATIONAL ROBOTICS

A MULTI-AGENT SYSTEM FOR A DISTANCE SUPPORT IN EDUCATIONAL ROBOTICS A MULTI-AGENT SYSTEM FOR A DISTANCE SUPPORT IN EDUCATIONAL ROBOTICS Sébastien GEORGE Christophe DESPRES Laboratoire d Informatique de l Université du Maine Avenue René Laennec, 72085 Le Mans Cedex 9, France

More information

REFERENCE GUIDE AND TEST PRODUCED BY VIDEO COMMUNICATIONS

REFERENCE GUIDE AND TEST PRODUCED BY VIDEO COMMUNICATIONS INTERVENTION STRATEGIES FOR SCHOOL BUS DRIVERS REFERENCE GUIDE AND TEST PRODUCED BY VIDEO COMMUNICATIONS INTRODUCTION Special ed students, as well as regular ed students often exhibit inappropriate behavior.

More information

This Performance Standards include four major components. They are

This Performance Standards include four major components. They are Environmental Physics Standards The Georgia Performance Standards are designed to provide students with the knowledge and skills for proficiency in science. The Project 2061 s Benchmarks for Science Literacy

More information

CPS122 Lecture: Identifying Responsibilities; CRC Cards. 1. To show how to use CRC cards to identify objects and find responsibilities

CPS122 Lecture: Identifying Responsibilities; CRC Cards. 1. To show how to use CRC cards to identify objects and find responsibilities Objectives: CPS122 Lecture: Identifying Responsibilities; CRC Cards last revised March 16, 2015 1. To show how to use CRC cards to identify objects and find responsibilities Materials: 1. ATM System example

More information

Increasing the Learning Potential from Events: Case studies

Increasing the Learning Potential from Events: Case studies 433 A publication of VOL. 31, 2013 CHEMICAL ENGINEERING TRANSACTIONS Guest Editors: Eddy De Rademaeker, Bruno Fabiano, Simberto Senni Buratti Copyright 2013, AIDIC Servizi S.r.l., ISBN 978-88-95608-22-8;

More information

Participation rules for the. Pegasus-AIAA Student Conference

Participation rules for the. Pegasus-AIAA Student Conference Participation rules for the Pegasus-AIAA Student Conference TABLE OF CONTENTS INTRODUCTION... 2 THE CONFERENCE CATEGORIES... 3 Graduate Division (MS)... 3 Faculty Advisors... 3 Exhibition Presentations...

More information

D Road Maps 6. A Guide to Learning System Dynamics. System Dynamics in Education Project

D Road Maps 6. A Guide to Learning System Dynamics. System Dynamics in Education Project D-4506-5 1 Road Maps 6 A Guide to Learning System Dynamics System Dynamics in Education Project 2 A Guide to Learning System Dynamics D-4506-5 Road Maps 6 System Dynamics in Education Project System Dynamics

More information

Envision Success FY2014-FY2017 Strategic Goal 1: Enhancing pathways that guide students to achieve their academic, career, and personal goals

Envision Success FY2014-FY2017 Strategic Goal 1: Enhancing pathways that guide students to achieve their academic, career, and personal goals Strategic Goal 1: Enhancing pathways that guide students to achieve their academic, career, and personal goals Institutional Priority: Improve the front door experience Identify metrics appropriate to

More information

Applying Fuzzy Rule-Based System on FMEA to Assess the Risks on Project-Based Software Engineering Education

Applying Fuzzy Rule-Based System on FMEA to Assess the Risks on Project-Based Software Engineering Education Journal of Software Engineering and Applications, 2017, 10, 591-604 http://www.scirp.org/journal/jsea ISSN Online: 1945-3124 ISSN Print: 1945-3116 Applying Fuzzy Rule-Based System on FMEA to Assess the

More information

Class Numbers: & Personal Financial Management. Sections: RVCC & RVDC. Summer 2008 FIN Fully Online

Class Numbers: & Personal Financial Management. Sections: RVCC & RVDC. Summer 2008 FIN Fully Online Summer 2008 FIN 3140 Personal Financial Management Fully Online Sections: RVCC & RVDC Class Numbers: 53262 & 53559 Instructor: Jim Keys Office: RB 207B, University Park Campus Office Phone: 305-348-3268

More information

HAZOP-based identification of events in use cases

HAZOP-based identification of events in use cases Empir Software Eng (2015) 20: 82 DOI 10.1007/s10664-013-9277-5 HAZOP-based identification of events in use cases An empirical study Jakub Jurkiewicz Jerzy Nawrocki Mirosław Ochodek Tomasz Głowacki Published

More information

A Case-Based Approach To Imitation Learning in Robotic Agents

A Case-Based Approach To Imitation Learning in Robotic Agents A Case-Based Approach To Imitation Learning in Robotic Agents Tesca Fitzgerald, Ashok Goel School of Interactive Computing Georgia Institute of Technology, Atlanta, GA 30332, USA {tesca.fitzgerald,goel}@cc.gatech.edu

More information

LEARN TO PROGRAM, SECOND EDITION (THE FACETS OF RUBY SERIES) BY CHRIS PINE

LEARN TO PROGRAM, SECOND EDITION (THE FACETS OF RUBY SERIES) BY CHRIS PINE Read Online and Download Ebook LEARN TO PROGRAM, SECOND EDITION (THE FACETS OF RUBY SERIES) BY CHRIS PINE DOWNLOAD EBOOK : LEARN TO PROGRAM, SECOND EDITION (THE FACETS OF RUBY SERIES) BY CHRIS PINE PDF

More information

DegreeWorks Advisor Reference Guide

DegreeWorks Advisor Reference Guide DegreeWorks Advisor Reference Guide Table of Contents 1. DegreeWorks Basics... 2 Overview... 2 Application Features... 3 Getting Started... 4 DegreeWorks Basics FAQs... 10 2. What-If Audits... 12 Overview...

More information

Major Milestones, Team Activities, and Individual Deliverables

Major Milestones, Team Activities, and Individual Deliverables Major Milestones, Team Activities, and Individual Deliverables Milestone #1: Team Semester Proposal Your team should write a proposal that describes project objectives, existing relevant technology, engineering

More information

CORE CURRICULUM FOR REIKI

CORE CURRICULUM FOR REIKI CORE CURRICULUM FOR REIKI Published July 2017 by The Complementary and Natural Healthcare Council (CNHC) copyright CNHC Contents Introduction... page 3 Overall aims of the course... page 3 Learning outcomes

More information

Learning Methods for Fuzzy Systems

Learning Methods for Fuzzy Systems Learning Methods for Fuzzy Systems Rudolf Kruse and Andreas Nürnberger Department of Computer Science, University of Magdeburg Universitätsplatz, D-396 Magdeburg, Germany Phone : +49.39.67.876, Fax : +49.39.67.8

More information

P. Belsis, C. Sgouropoulou, K. Sfikas, G. Pantziou, C. Skourlas, J. Varnas

P. Belsis, C. Sgouropoulou, K. Sfikas, G. Pantziou, C. Skourlas, J. Varnas Exploiting Distance Learning Methods and Multimediaenhanced instructional content to support IT Curricula in Greek Technological Educational Institutes P. Belsis, C. Sgouropoulou, K. Sfikas, G. Pantziou,

More information

The Impact of Honors Programs on Undergraduate Academic Performance, Retention, and Graduation

The Impact of Honors Programs on Undergraduate Academic Performance, Retention, and Graduation University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Journal of the National Collegiate Honors Council - -Online Archive National Collegiate Honors Council Fall 2004 The Impact

More information

The open source development model has unique characteristics that make it in some

The open source development model has unique characteristics that make it in some Is the Development Model Right for Your Organization? A roadmap to open source adoption by Ibrahim Haddad The open source development model has unique characteristics that make it in some instances a superior

More information

THE PENNSYLVANIA STATE UNIVERSITY SCHREYER HONORS COLLEGE DEPARTMENT OF MATHEMATICS ASSESSING THE EFFECTIVENESS OF MULTIPLE CHOICE MATH TESTS

THE PENNSYLVANIA STATE UNIVERSITY SCHREYER HONORS COLLEGE DEPARTMENT OF MATHEMATICS ASSESSING THE EFFECTIVENESS OF MULTIPLE CHOICE MATH TESTS THE PENNSYLVANIA STATE UNIVERSITY SCHREYER HONORS COLLEGE DEPARTMENT OF MATHEMATICS ASSESSING THE EFFECTIVENESS OF MULTIPLE CHOICE MATH TESTS ELIZABETH ANNE SOMERS Spring 2011 A thesis submitted in partial

More information

Application of Virtual Instruments (VIs) for an enhanced learning environment

Application of Virtual Instruments (VIs) for an enhanced learning environment Application of Virtual Instruments (VIs) for an enhanced learning environment Philip Smyth, Dermot Brabazon, Eilish McLoughlin Schools of Mechanical and Physical Sciences Dublin City University Ireland

More information

Utilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant Sudheer Takekar 1 Dr. D.N. Raut 2

Utilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant Sudheer Takekar 1 Dr. D.N. Raut 2 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 04, 2014 ISSN (online): 2321-0613 Utilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant

More information

A Pipelined Approach for Iterative Software Process Model

A Pipelined Approach for Iterative Software Process Model A Pipelined Approach for Iterative Software Process Model Ms.Prasanthi E R, Ms.Aparna Rathi, Ms.Vardhani J P, Mr.Vivek Krishna Electronics and Radar Development Establishment C V Raman Nagar, Bangalore-560093,

More information

Five Challenges for the Collaborative Classroom and How to Solve Them

Five Challenges for the Collaborative Classroom and How to Solve Them An white paper sponsored by ELMO Five Challenges for the Collaborative Classroom and How to Solve Them CONTENTS 2 Why Create a Collaborative Classroom? 3 Key Challenges to Digital Collaboration 5 How Huddle

More information

SAMPLE. PJM410: Assessing and Managing Risk. Course Description and Outcomes. Participation & Attendance. Credit Hours: 3

SAMPLE. PJM410: Assessing and Managing Risk. Course Description and Outcomes. Participation & Attendance. Credit Hours: 3 PJM410: Assessing and Managing Risk Credit Hours: 3 Contact Hours: This is a 3 credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number

More information

TEACHING AND EXAMINATION REGULATIONS (TER) (see Article 7.13 of the Higher Education and Research Act) MASTER S PROGRAMME EMBEDDED SYSTEMS

TEACHING AND EXAMINATION REGULATIONS (TER) (see Article 7.13 of the Higher Education and Research Act) MASTER S PROGRAMME EMBEDDED SYSTEMS TEACHING AND EXAMINATION REGULATIONS (TER) (see Article 7.13 of the Higher Education and Research Act) 2015-2016 MASTER S PROGRAMME EMBEDDED SYSTEMS UNIVERSITY OF TWENTE 1 SECTION 1 GENERAL... 3 ARTICLE

More information

Alberta Police Cognitive Ability Test (APCAT) General Information

Alberta Police Cognitive Ability Test (APCAT) General Information Alberta Police Cognitive Ability Test (APCAT) General Information 1. What does the APCAT measure? The APCAT test measures one s potential to successfully complete police recruit training and to perform

More information

Multidisciplinary Engineering Systems 2 nd and 3rd Year College-Wide Courses

Multidisciplinary Engineering Systems 2 nd and 3rd Year College-Wide Courses Multidisciplinary Engineering Systems 2 nd and 3rd Year College-Wide Courses Kevin Craig College of Engineering Marquette University Milwaukee, WI, USA Mark Nagurka College of Engineering Marquette University

More information

IMPROVE THE QUALITY OF WELDING

IMPROVE THE QUALITY OF WELDING Virtual Welding Simulator PATENT PENDING Application No. 1020/CHE/2013 AT FIRST GLANCE The Virtual Welding Simulator is an advanced technology based training and performance evaluation simulator. It simulates

More information

Team Dispersal. Some shaping ideas

Team Dispersal. Some shaping ideas Team Dispersal Some shaping ideas The storyline is how distributed teams can be a liability or an asset or anything in between. It isn t simply a case of neutralizing the down side Nick Clare, January

More information

Program Assessment and Alignment

Program Assessment and Alignment Program Assessment and Alignment Lieutenant Colonel Daniel J. McCarthy, Assistant Professor Lieutenant Colonel Michael J. Kwinn, Jr., PhD, Associate Professor Department of Systems Engineering United States

More information

MYCIN. The MYCIN Task

MYCIN. The MYCIN Task MYCIN Developed at Stanford University in 1972 Regarded as the first true expert system Assists physicians in the treatment of blood infections Many revisions and extensions over the years The MYCIN Task

More information

PH.D. IN COMPUTER SCIENCE PROGRAM (POST M.S.)

PH.D. IN COMPUTER SCIENCE PROGRAM (POST M.S.) PH.D. IN COMPUTER SCIENCE PROGRAM (POST M.S.) OVERVIEW ADMISSION REQUIREMENTS PROGRAM REQUIREMENTS OVERVIEW FOR THE PH.D. IN COMPUTER SCIENCE Overview The doctoral program is designed for those students

More information

Evidence-based Practice: A Workshop for Training Adult Basic Education, TANF and One Stop Practitioners and Program Administrators

Evidence-based Practice: A Workshop for Training Adult Basic Education, TANF and One Stop Practitioners and Program Administrators Evidence-based Practice: A Workshop for Training Adult Basic Education, TANF and One Stop Practitioners and Program Administrators May 2007 Developed by Cristine Smith, Beth Bingman, Lennox McLendon and

More information

MAKINO GmbH. Training centres in the following European cities:

MAKINO GmbH. Training centres in the following European cities: MAKINO GmbH Training centres in the following European cities: Bratislava, Hamburg, Kirchheim unter Teck and Milano (Detailed addresses are given in the annex) Training programme 2nd Semester 2016 Selecting

More information

"On-board training tools for long term missions" Experiment Overview. 1. Abstract:

On-board training tools for long term missions Experiment Overview. 1. Abstract: "On-board training tools for long term missions" Experiment Overview 1. Abstract 2. Keywords 3. Introduction 4. Technical Equipment 5. Experimental Procedure 6. References Principal Investigators: BTE:

More information

(Effective from )

(Effective from ) PADHO PARDESH - SCHEME OF INTEREST SUBSIDY ON EDUCATIONAL LOANS FOR OVERSEAS STUDIES FOR THE STUDENTS BELONGING TO THE MINORITY COMMUNITIES (Effective from 2013-14) GOVERNMENT OF INDIA MINISTRY OF MINORITY

More information

Designing a Computer to Play Nim: A Mini-Capstone Project in Digital Design I

Designing a Computer to Play Nim: A Mini-Capstone Project in Digital Design I Session 1793 Designing a Computer to Play Nim: A Mini-Capstone Project in Digital Design I John Greco, Ph.D. Department of Electrical and Computer Engineering Lafayette College Easton, PA 18042 Abstract

More information

VOCATIONAL QUALIFICATION IN YOUTH AND LEISURE INSTRUCTION 2009

VOCATIONAL QUALIFICATION IN YOUTH AND LEISURE INSTRUCTION 2009 Requirements for Vocational Qualifications VOCATIONAL QUALIFICATION IN YOUTH AND LEISURE INSTRUCTION 2009 Regulation 17/011/2009 Publications 2013:4 Publications 2013:4 Requirements for Vocational Qualifications

More information