This document discusses safety concepts, risk assessment, and methods to determine risk. It covers the following key points:
1. It defines safety, risk, and different types of risks like acceptable risk, voluntary vs involuntary risk, and job-related vs personal risks.
2. It explains factors that influence risk and how risk is assessed using concepts like probability and magnitude of harm.
3. It outlines goals of risk assessment to identify hazards and minimize risk through control measures to create a safer workplace.
4. It describes different methods used to determine risk, including testing safety systems, dealing with uncertainties in design, and various testing approaches like destructive, prototype, and simulation testing.
unit4.pptx professional ethics in engineeringPoornachanranKV
Is a morality or standard of righteous behaviour in relationship to citizen’s involvement in society.
Cultivation of individual habits important for a communities success.
CHALLENGES IN THE WORK PLACE
• The biggest workplace
challenge is said to be the
employee’s work ethics.
• interest in work and
attendance
• Punctuality
• commitment to the job,
and getting along with
others
• Demands inculcation of
good character in the
workplace by employees.
• good character
• The Four Temperaments
• Types of Character
• the sensitive
• the active (great and the
mediocre)
• the apathetic (purely
apathetic or dull),
• the intelligent.
• Ethics and Character
• Education and Character
• Building Character in the
Workplace
Building Character in the Workplace
1. Employee Hiring, Training, and Promotion Activities
– Institute and adopt an organization policy statement to
positive character in the workplace.
– Prominently and explicitly include character
considerations in recruiting procedures
– Emphasize the importance of character and adherence to
the ‘six pillars’ of character(trustworthiness, respect,
responsibility, fairness, caring and citizenship)
– Include evaluation of fundamental character values
– Institute recognition and reward system for the employees
– Think of your employees
Building Character in the Workplace
2. Internal Communication
– to create a friendly environment that praises positive role
modeling
– Through Internal newsletters, Workplace posters in canteens
and recreation rooms, Mailers, Electronic mails.
3. External Communication
– In relations with customers, vendors and others.
– Advertise and market honoring consensual values (the six
pillars),
– Assure that none of your products and services undermines
character building,
– Include positive messages about voluntarism and celebrate, and
– ‘Character counts’ week in advertising, billings and other
mailers.
Building Character in the Workplace
4. Financial and Human Resources
– Support local and national ‘character’ projects and the
activities of the members
– Sponsor ‘character’ movement through financial
support.
5. Community Outreach
– Use public outreach structures to encourage
mentoring and other character-building programs.
– Encourage educational and youth organizations to
become active in character building.
– Use corporate influence to encourage business groups
and other companies to support ‘character’ building.
SPIRITUALITY
• Spirituality is a way of living that emphasizes the constant
awareness and recognition of the spiritual dimension (mind and its
development) of nature and people, with a dynamic balance
between the material development and the spiritual development.
• spirituality includes the faith or belief in supernatural power
• Spirituality includes creativity, communication, recognition of the
individual as human being, respect to others, acceptance, vision,
and partnership
• Spirituality is motivation as it encourages the colleagues to perform
better. Cr
Safety and Risk – Assessment of Safety and Risk – Risk Benefit Analysis and Reducing Risk - Respect for Authority – Collective Bargaining – Confidentiality – Conflicts of Interest – Occupational Crime – Professional Rights – Employee Rights – Intellectual Property Rights (IPR) – Discrimination
unit4.pptx professional ethics in engineeringPoornachanranKV
Is a morality or standard of righteous behaviour in relationship to citizen’s involvement in society.
Cultivation of individual habits important for a communities success.
CHALLENGES IN THE WORK PLACE
• The biggest workplace
challenge is said to be the
employee’s work ethics.
• interest in work and
attendance
• Punctuality
• commitment to the job,
and getting along with
others
• Demands inculcation of
good character in the
workplace by employees.
• good character
• The Four Temperaments
• Types of Character
• the sensitive
• the active (great and the
mediocre)
• the apathetic (purely
apathetic or dull),
• the intelligent.
• Ethics and Character
• Education and Character
• Building Character in the
Workplace
Building Character in the Workplace
1. Employee Hiring, Training, and Promotion Activities
– Institute and adopt an organization policy statement to
positive character in the workplace.
– Prominently and explicitly include character
considerations in recruiting procedures
– Emphasize the importance of character and adherence to
the ‘six pillars’ of character(trustworthiness, respect,
responsibility, fairness, caring and citizenship)
– Include evaluation of fundamental character values
– Institute recognition and reward system for the employees
– Think of your employees
Building Character in the Workplace
2. Internal Communication
– to create a friendly environment that praises positive role
modeling
– Through Internal newsletters, Workplace posters in canteens
and recreation rooms, Mailers, Electronic mails.
3. External Communication
– In relations with customers, vendors and others.
– Advertise and market honoring consensual values (the six
pillars),
– Assure that none of your products and services undermines
character building,
– Include positive messages about voluntarism and celebrate, and
– ‘Character counts’ week in advertising, billings and other
mailers.
Building Character in the Workplace
4. Financial and Human Resources
– Support local and national ‘character’ projects and the
activities of the members
– Sponsor ‘character’ movement through financial
support.
5. Community Outreach
– Use public outreach structures to encourage
mentoring and other character-building programs.
– Encourage educational and youth organizations to
become active in character building.
– Use corporate influence to encourage business groups
and other companies to support ‘character’ building.
SPIRITUALITY
• Spirituality is a way of living that emphasizes the constant
awareness and recognition of the spiritual dimension (mind and its
development) of nature and people, with a dynamic balance
between the material development and the spiritual development.
• spirituality includes the faith or belief in supernatural power
• Spirituality includes creativity, communication, recognition of the
individual as human being, respect to others, acceptance, vision,
and partnership
• Spirituality is motivation as it encourages the colleagues to perform
better. Cr
Safety and Risk – Assessment of Safety and Risk – Risk Benefit Analysis and Reducing Risk - Respect for Authority – Collective Bargaining – Confidentiality – Conflicts of Interest – Occupational Crime – Professional Rights – Employee Rights – Intellectual Property Rights (IPR) – Discrimination
Unit-3 Professional Ethics in EngineeringNandakumar P
About an engineer's responsibility towards safety and risk taken by him/her in critical circumstance.
This PPT will give them a basic approach towards engineer's work towards safety for the society.
Overall Safety of plants and Personals, it's really important to know about the safety precautions before you start to do any thing in the operation side. Particularly in the Process Industries or where there lot of reasons of risk.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Unit-3 Professional Ethics in EngineeringNandakumar P
About an engineer's responsibility towards safety and risk taken by him/her in critical circumstance.
This PPT will give them a basic approach towards engineer's work towards safety for the society.
Overall Safety of plants and Personals, it's really important to know about the safety precautions before you start to do any thing in the operation side. Particularly in the Process Industries or where there lot of reasons of risk.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
1. SAFETY, RESPONSIBILITY AND RIGHTS
PEE - CHAPTER 4
S A N T H O S H - K H AV I YA N - A K S H I T H A A - N AVA L A D I
2. TOPICS
1 .SA F E TY A ND ITS CO NCEPTS
2.RISK AND ITS TYPES
3 . A S S ES E ME NT O F SA F E TY A ND R IS K
4 .ME THO DS TO DE TE R MINE R IS K
2
3. SAFETY AND ITS CONCEPTS
W H AT I S S A F E T Y ?
Safety: The state of being safe
Safe: Protected from danger
Safety differs for every person, where
what may be safe for one person may
not be for another.
Absolute safety that satisfies all
individuals or group under all
conditions is neither attainable nor
affordable.
3
4. WILLIAM W.LOWRENCE’S
DEFINITION
W H AT I S S A F E T Y ?
INITIAL VERSION:
A thing is safe if its risks are judged to be
acceptable
MODIEFIED DEFINITION:
A thing is safe(to a certain degree) with
respect to a given person or group at a
given time, if its risks were fully known, if
those risks would be judged acceptable(to
that certain degree), in light settled value
principle.
4
5. RISK
WHAT IS RISK?
5
It is the potential that something unwanted and
harmful may occur.
LOWRENCE: “Risk is the compound measure of the
probability and magnitude of adverse effect”.
RISK= Probability of the harm x Magnitude of the
harm
Effects of risk: it includes dangers of bodily harm,
economic loss, environment degradation.
Causes of risk: Risks or harms are caused by delayed
job completion, faulty products or systems and
economically or environmentally injurious solutions to
technological problems.
6. FACTORS INFLUENCING RISK
1. Probability of risk (possibility of occurrence of risk)
2. Consequences of risk (Physical damage or death, economic loss,
damage to property, loss of money, degradation of environment)
3. Voluntary risk (some people may take risk voluntarily for thrill and
fun)
4. Magnitude of risk (number of people / area involved in risk)
5. Proximity of risk (closeness of effects caused by risk)
6. Method of information widely spreaded on risk
7. Job related risk (whether the risk is compulsorily / forcibly taken by
persons)
7. SAFETY SND RISK
The knowledge about acceptance level of risk is useful to engineers.
Designers can redesign the product/project to include safety measures so as to:
1. To allow the product to fail safely
2. Abandon it safely.
3. Provide for safe escape/evacuation from the product or site, and thus
eliminate or minimize the human loss.
Risk is the result of unsafe situation, sometime unanticipated during its uses.
Probability of Safety = 1-Probability of risk
= Probability of occurrence x consequences in magnitude
8. TYPES OF RISKS
1. Acceptable risk
2. Voluntary and involuntary risk
3. Job related risks
4. Personal risks
5. Public risks
8
9. Acceptable risk:
It refers to the level of human and property injury or
loss from an industrial process that is considered to be
tolerable by individual, household, group, organization,
community, region, state, or nation in view of social,
political & economic-benefit analysis.
Ex: the risk of flooding can be accepted once every
500yrs but its unacceptable in every 10yrs.
Its management’s responsibility to set their company’s
level of risk. Each company has its own acceptable risk
level, which is derived from its legal regulatory
compliance responsibilities. 9
10. Voluntary risk:
To risk either by own actions or action taken by others .
Risk happening with lifestyle choices.
They are the risk that people take knowing that they
may have consequences.
Ex: smoking tobacco, driving car and climbing ladder.
Involuntary risk:
Risk that people take either not knowing they are at risk
or they are unable to control.
Ex: tsunamis, lightning, tornadoes.
10
11. Job related to risk:
Exposure to such risk is voluntary in nature cuz one
always refuse to work or may control over job.
But generally workers don’t have choice; stick only
jobs available to them.
Personal risk:
Assessing is difficult.
Ex: people living near chemical plant voluntarily or
involuntarily; a person working in nuclear plant.
Public risk:
Assessing is relatively easy.
Ex: accidents in transportation, treatment. 11
12. ASSESSMENT OF SAFETY AND RISK:
12
I. It is very difficult to attain 100% absolute safety.
II. In an engineering product, if there is any improvement in safety, it often
goes with an increase in the cost of the product.
III. On the other side, the products which are not safe always increase the
secondary costs to the producer such as warranty expenses, loss of
customer’s good will and down time production process.
IV. It is always a great challenge to engineers to balance quality and safety
against cost.
V. In general, engineer’s tendency is to design and produce high quality
products, but business managers tend to keep the cost down.
VI. Therefore it is necessary to understand relationship between safety,
costs and price
13. GOAL OF RISK ASSESSMENT
13
The aim of risk assessment
process is to evaluate
hazards, then remove that
hazard or minimize the level
of its risk by adding control
measures, as necessary.
By doing so, you have
created a safer and
healthier workplace.
Relationship between risk and cost to manufacture
15. DETERMINATION OF RISK
1. KNOWLEDGE OF RISK: To assess a risk, an engineer must first identify it.
To identify a risk, an engineer must first know the information about the
safety of standard products.
2. UNCERTAINITIES IN DESGN: while designing a product, the design
engineer must deal with many uncertainties. Many of risks can be
expressed as probabilities and as educated guesses.
3. TESTING FOR SAFETY: Once the product is designed, bot prototypes and
finished devices must be thoroughly tested. The testing is not just to
determine whether the product meets the specification, it should also
involve in testing to see if the product is safe. It is essential that in any
engineering design, all safety systems be tested to ensure that they work
as planned.
IN ORDER TO DETERMINE THE RISK, ONE SHOULD HAVE KNOWLEDGE ABOUT:
16. DIFFERENT METHODS TO DETERMINE THE RISK
1. TESTING ON THE FUNCTIONS OF SAFETY SYSTEM COMPONENTS
2. DESTRUCTIVE TESTING: In this approach, testing is done till the
component fails. It is too expensive, but very realistic and useful.
3. PROTOTYPE TESTING: In this approach, the testing is done on a
proportional scale model with all vital components fixed in the system.
Dimensional analysis could be used to project the result at the actual
conditions.
4. SIMULATION TESTING: With the help of computer. The simulations are
done. The safe boundary may be obtained. The effects of some controlled
input variables on the outcomes can be predicted in a better way.