Risk Management in Event Planning
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Tutorial Introduction
Tutorial Introduction PURPOSE: - To explain MCU processing of reset and and interrupt events OBJECTIVES: - Describe the differences between resets and interrupts. - Identify different sources of resets and interrupts. - Describe the MCU reset recovery process. - Identify the steps to configure and service an interrupt event. - Describe MCU exception processing. CONTENT: - 20 pages - 3 questions LEARNING TIME: - 25 minutes PREREQUESITE: - The 68HC08 CPU training module and a basic understanding of reset and interrupt events Welcome to this tutorial on resets and interrupts. The tutorial describes the different sources of reset and interrupt events and provides detailed training on 68HC08 MCU exception processing. Please note that on subsequent pages, you will find reference buttons in the upper right of the content window that access additional content. Upon completion of this tutorial, you’ll be able to describe the differences between resets and interrupts, identify different sources of reset and interrupt events, and describe MCU exception processing. The recommended prerequisite for this tutorial is the 68HC08 CPU training module. It is also assumed that you have a basic knowledge of reset and interrupt events. Click the Forward arrow when you’re ready to begin the tutorial. 1 Resets and Interrupts Overview • Reset sources: - External - power on, reset pin driven low - Internal - COP, LVI, illegal opcode, illegal address • Resets initialize the MCU to startup condition. • Interrupt sources: - Hardware - Software • Interrupts vector the program counter to a service routine. Resets and interrupts are responses to exceptional events during program execution. Resets can be caused by a signal on the external reset pin or by an internal reset signal. -
Personal Protective Equipment ______
Personal Protective Equipment __________________________________________________________________ Page Introduction Purpose ………. 2 Background ………. 2 Who’s Covered? …….... 3 Explanation of Key Terms ………. 3 How It Works Hazard Assessment ………. 4 Hazard Control ………. 5 Training ………. 5 Documentation ………. 6 Appendix A – Hazard Assessment/Training Certification Form ………. 7 B – Personal Protective Equipment (PPE) Guidelines ………. 8 University of Arizona Risk Management & Safety Health and Safety Instruction April 2007 ________________________________ Page 2 Health and Safety Instruction ______________________________________________________________________ INTRODUCTION Purpose The purpose of this Health and Safety Instruction (HSI) is to protect employees from hazards in the workplace by using personal protective equipment to supplement other primary hazard controls. Background Hazards exist in every workplace in many different forms: sharp edges, falling objects, flying sparks, chemicals, noise and a myriad of other potentially dangerous situations. Controlling hazards with engineering and administrative controls is the best way to protect employees When these controls are not feasible or do not provide sufficient protection, personal protective equipment (PPE) must be use. In line with this rational for controlling or eliminating workplace hazards, the Occupational Safety and Health Administration (OSHA) issued the Personal Protective Equipment standard, also know as "The PPE Standard." Under this standard, the University is required to: • Conduct hazard assessments to determine if PPE is necessary to protect employees and certify in writing that assessments have been performed. • Select appropriate PPE, where necessary. • Provide employees training on proper care, use and limitations of the selected PPE. • Ensure the PPE is properly used. This HSI, developed by Risk Management & Safety outlines the minimum requirements to protect employees from hazards in the workplace by using personal protective equipment to supplement other primary hazard controls. -
Introduction to Exception Handling
Introduction to Exception Handling Chapter 9 • Sometimes the best outcome can be when Exception nothing unusual happens HdliHandling • However, the case where exceptional things happen must also be ppprepared for – Java exception handling facilities are used when the invocation of a method may cause something exceptional to occur – Often the exception is some type of error condition Copyright © 2012 Pearson Addison‐Wesley. All rights reserved. 9‐2 Introduction to Exception Handling try-throw-catch Mechanism • Java library software (or programmer‐defined code) • The basic way of handling exceptions in Java consists of provides a mechanism that signals when something the try-throw-catch trio • The try block contains the code for the basic algorithm unusual happens – It tells what to do when everything goes smoothly – This is called throwing an exception • It is called a try block because it "tries" to execute the case where all goes as planned • In another place in the program, the programmer – It can also contain code that throws an exception if something must provide code that deals with the exceptional unusual happens try case { – This is called handling the exception CodeThatMayThrowAnException } Copyright © 2012 Pearson Addison‐Wesley. All rights reserved. 9‐3 Copyright © 2012 Pearson Addison‐Wesley. All rights reserved. 9‐4 try-throw-catch Mechanism try-throw-catch Mechanism throw new • A throw statement is siilimilar to a methdhod call: ExceptionClassName(PossiblySomeArguments); throw new ExceptionClassName(SomeString); • When an -
Risk Management for a Small Business Participant Guide
Risk Management for a Small Business Participant Guide Table of Contents Welcome ................................................................................................................................................................................. 3 What Do You Know? Risk Management for a Small Business ........................................................................................ 4 Pre-Test .................................................................................................................................................................................. 5 Risk Management ................................................................................................................................................................. 6 Discussion Point #1: Risks from Positive Situations .......................................................................................................... 6 Internal Risks ........................................................................................................................................................................ 6 Discussion Point #2: Internal Risks ..................................................................................................................................... 8 External Risks ....................................................................................................................................................................... 8 Discussion Point #3: External Risks ................................................................................................................................... -
Introduction to Object-Oriented Programming in MATLAB
Object Oriented & Event-Driven Programming with MATLAB Ameya Deoras © 2014 The MathWorks, Inc.1 Agenda . Object-oriented programming in MATLAB – Classes in MATLAB – Advantages of object oriented design – Example: Designing a portfolio tracker . Events in MATLAB – Event-driven programming fundamentals – Writing event handlers – Example: Building a real-time portfolio tracker 2 Case Study: Portfolio Tracker 45.8 61.88 DD.N JNJ.N 45.7 61.86 45.6 61.84 45.5 61.82 61.8 06:05 06:06 06:07 06:06 06:07 49 -660 WMT.N Portfolio 48.9 48.8 -665 48.7 06:06 06:07 78.8 MMM.N -670 78.6 78.4 78.2 -675 06:04 06:05 06:06 06:07 06:02 06:03 06:04 06:05 06:06 06:07 . Subscribe to real-time quotes for 4 equities from Reuters service . Track real-time combined portfolio valueVisualize instrument & portfolio history graphically in real-time 3 What is a program? Data x = 12 while (x < 100) x = x+1 if (x == 23) x = 12 disp('Hello') while (x < 100) end x = x+1 end if (x == 23) disp('Hello') end Assignment end Looping Test Increment Test to Act Code Take Action End End Actions 4 Progression of Programming Techniques value Data variable structure Level of Abstraction / Sophistication function script command line Algorithm 5 Progression of Programming Techniques value Data variable structure (properties) Level of Abstraction / Sophistication class (methods) function script command line Algorithm 6 Object-Oriented Terminology . Class – Outline of an idea AKAM – Properties (data) GOOG YHOO MSFT – Methods (algorithms) ORCL An element of the set – object . -
Lesson-2: Interrupt and Interrupt Service Routine Concept
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM Lesson-2: Interrupt and Interrupt Service Routine Concept Chapter 6 L2: "Embedded Systems- Architecture, Programming and Design", 2015 1 Raj Kamal, Publs.: McGraw-Hill Education Interrupt Concept • Interrupt means event, which invites attention of the processor on occurrence of some action at hardware or software interrupt instruction event. Chapter 6 L2: "Embedded Systems- Architecture, Programming and Design", 2015 2 Raj Kamal, Publs.: McGraw-Hill Education Action on Interrupt In response to the interrupt, a routine or program (called foreground program), which is running presently interrupts and an interrupt service routine (ISR) executes. Chapter 6 L2: "Embedded Systems- Architecture, Programming and Design", 2015 3 Raj Kamal, Publs.: McGraw-Hill Education Interrupt Service Routine ISR is also called device driver in case of the devices and called exception or signal or trap handler in case of software interrupts Chapter 6 L2: "Embedded Systems- Architecture, Programming and Design", 2015 4 Raj Kamal, Publs.: McGraw-Hill Education Interrupt approach for the port or device functions Processor executes the program, called interrupt service routine or signal handler or trap handler or exception handler or device driver, related to input or output from the port or device or related to a device function on an interrupt and does not wait and look for the input ready or output completion or device-status ready or set Chapter 6 L2: "Embedded Systems- Architecture, Programming and Design", -
Lecture Notes on Programming Languages Elvis C
101 Lecture Notes on Programming Languages Elvis C. Foster Lecture 11: Exception and Event Handling This lecture discusses how programming languages support exceptions. Topics to be covered include: . Introduction . Exception Handling in C++ . Exception Handling in Java . Exception Handling in Ada and Other Pascal-like Languages . Event Handling Copyright © 2000 – 2016 by Elvis C. Foster All rights reserved. No part of this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, or otherwise, without prior written permission of the author. 102 Lecture 11: Exception and Event Handling Elvis C. Foster 11.1 Introduction Inexperienced programmers usually think their program will always work as expected. On the other hand, experienced programmers know that things do not always work as expected. Smart programming is about taking care of the expected as well as the unexpected. Programmers refer to the unexpected situations as exceptions. The following are some examples of scenarios that will cause program errors (exceptions): . The user enters a character where an integer is expected; . The program uses an array subscript that is outside of the range of valid subscript values for a given array; . An attempt is made at dividing by zero; . An attempt is made to write to a file that does not exist. There are three broad categories of programming errors: . Syntax errors . Logic errors . Runtime errors We have already shown how programming languages take care of syntax errors through the translation process (review lecture 3). Logic errors are the responsibility of the programmer, but programming languages help by providing debugging features that the programmer can use. -
Programmable Logic Controllers Interrupt Basics
Programmable Logic Controllers Interrupts Electrical & Computer Engineering Dr. D. J. Jackson Lecture 13-1 Interrupt Basics In terms of a PLC What is an interrupt? When can the controller operation be interrupted? Priority of User Interrupts Interrupt Latency Interrupt Instructions Electrical & Computer Engineering Dr. D. J. Jackson Lecture 13-2 13-1 What is an Interrupt? • An interrupt is an event that causes the controller to suspend the task it is currently performing, perform a different task, and then return to the suspended task at the point where it suspended. • The Micrologix PLCs support the following User Interrupts: – User Fault Routine – Event Interrupts (4) – High-Speed Counter Interrupts(1) – Selectable Timed Interrupt Electrical & Computer Engineering Dr. D. J. Jackson Lecture 13-3 Interrupt Operation • An interrupt must be configured and enabled to execute. When any one of the interrupts is configured (and enabled) and subsequently occurs, the user program: 1. suspends its execution 2. performs a defined task based upon which interrupt occurred 3. returns to the suspended operation. Electrical & Computer Engineering Dr. D. J. Jackson Lecture 13-4 13-2 Interrupt Operation (continued) • Specifically, if the controller program is executing normally and an interrupt event occurs: 1. the controller stops its normal execution 2. determines which interrupt occurred 3. goes immediately to rung 0 of the subroutine specified for that User Interrupt 4. begins executing the User Interrupt subroutine (or set of subroutines if the specified subroutine calls a subsequent subroutine) 5. completes the subroutine(s) 6. resumes normal execution from the point where the controller program was interrupted Electrical & Computer Engineering Dr. -
Hot Work Permit Program
Hot Work Permit Program Risk Management 1 Hot Work Permit Program Risk Management July 2019 Table of Contents I. Program Goals and Objectives ...................................................................................................................3 II. Scope and Application ................................................................................................................................3 III. Definitions ..................................................................................................................................................3 IV. Responsibilities ...........................................................................................................................................4 V. Record Keeping ..........................................................................................................................................4 VI. Procedures .................................................................................................................................................5 VII. Hot Work Permit Form ...............................................................................................................................8 VIII. Regulatory Authority and Related Information .........................................................................................9 IX. Contact .......................................................................................................................................................9 2 Hot Work Permit Program Risk Management -
Guide Six Steps to Risk Management
Guide Six step to risk management www.worksafe.nt.gov.au Disclaimer This publication contains information regarding work health and safety. It includes some of your obligations under the Work Health and Safety (National Uniform Legislation) Act – the WHS Act – that NT WorkSafe administers. The information provided is a guide only and must be read in conjunction with the appropriate legislation to ensure you understand and comply with your legal obligations. Acknowledgement This guide is based on material produced by WorkSafe ACT at www.worksafe.act.gov.au Version: 1.2 Publish date: September 2018 Contents Introduction ..............................................................................................................................4 Good management practice.....................................................................................................4 Defining Hazard and Risk.....................................................................................................5 Systematic approach to the management of Hazards and associated Risks ......................5 Step 1: Hazard identification ....................................................................................................6 Examples of Hazards ...........................................................................................................6 Step 2: Risk identification.........................................................................................................7 Examples of risk identification ..............................................................................................7 -
Permit to Work Systems
Loss prevention standards Permit to Work Systems High risk work can become even more hazardous due to unsafe conditions and human error. Formal controls, such as a permit to work system, must be followed by everyone and enforced properly to be effective. Aviva: Public Permit to Work Systems Introduction The aim of a permit to work system is to remove both unsafe conditions and human error from a high-risk process, by imposing a formal system detailing exactly what work is to be done and when and how to undertake the job safely. Permit to work systems are used where the potential hazards are significant and a formal documented system is required to control the work and minimise the risk of personal injury, loss or damage. Operation of the Permit to Work System Examples of work in which a permit to work system should be used include: • Entry into confined spaces • Work involving the splitting or breaking into of pressurised pipelines • Work on high voltage electrical systems above 3,000 volts • Hot work, e.g. welding, brazing, soldering, etc. • Work in isolated situations or where access is difficult • Work at height • Work near to, or requiring the use of highly flammable/explosive/toxic substances • Fumigation operations using gases • High-risk operations involving contractors, such as excavation works, or demolition works Designing the Permit to Work System Permit to work systems demand robust, formal and effective controls in place to prevent danger, as well as good standards of organisation to ensure compliance. - include fire extinguishers being available for hot work, or harnesses and resuscitation equipment available when entering confined spaces. -
Modular Reasoning in the Presence of Event Subtyping Mehdi Bagherzadeh Iowa State University, [email protected]
Computer Science Technical Reports Computer Science 8-4-2014 Modular Reasoning in the Presence of Event Subtyping Mehdi Bagherzadeh Iowa State University, [email protected] Robert Dyer Bowling Green State University, [email protected] Rex D. Fernando University of Wisconsin - Madison, [email protected] Hridesh Rajan Iowa State University, [email protected] Jose Sanchez University of Central Florida, [email protected] Follow this and additional works at: http://lib.dr.iastate.edu/cs_techreports Part of the Programming Languages and Compilers Commons Recommended Citation Bagherzadeh, Mehdi; Dyer, Robert; Fernando, Rex D.; Rajan, Hridesh; and Sanchez, Jose, "Modular Reasoning in the Presence of Event Subtyping" (2014). Computer Science Technical Reports. 363. http://lib.dr.iastate.edu/cs_techreports/363 This Article is brought to you for free and open access by the Computer Science at Iowa State University Digital Repository. It has been accepted for inclusion in Computer Science Technical Reports by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Modular Reasoning in the Presence of Event Subtyping Abstract Separating crosscutting concerns while preserving modular reasoning is challenging. Type-based interfaces (event types) separate modularized crosscutting concerns (observers) and traditional object-oriented concerns (subjects). Event types paired with event specifications have been shown to be effective in enabling modular reasoning about subjects and observers. Similar to class subtyping there are benefits ot organizing event types into subtyping hierarchies. However, unrelated behaviors of observers and their arbitrary execution orders could cause unique, somewhat counterintuitive, reasoning challenges in the presence of event subtyping. These challenges threaten both tractability of reasoning and reuse of event types.