Zoekresultaten

Producten 911

product

The balance between safety and productivity and its relationship with human factors and safety awareness and communication in aircraft manufacturing

Background: This paper presents the findings of a pilot research survey which assessed the degree of balance between safety and productivity, and its relationship with awareness and communication of human factors and safety rules in the aircraft manufacturing environment.Methods: The study was carried out at two Australian aircraft manufacturing facilities where a Likertscale questionnaire was administered to a representative sample. The research instrument included topics relevant to the safety and human factors training provided to the target workforce. The answers were processed in overall, and against demographic characteristics of the sample population.Results: The workers were sufficiently aware of how human factors and safety rules influence their performance and acknowledged that supervisors had adequately communicated such topics. Safety and productivity seemed equally balanced across the sample. A preference for the former over the latter wasassociated with a higher awareness about human factors and safety rules, but not linked with safety communication. The size of the facility and the length and type of employment were occasionally correlated with responses to some communication and human factors topics and the equilibrium between productivity and safety.Conclusion: Although human factors training had been provided and sufficient bidirectional communication was present across the sample, it seems that quality and complexity factors might have influencedthe effects of those safety related practices on the safety-productivity balance for specific parts of the population studied. Customization of safety training and communication to specific characteristics of employees may be necessary to achieve the desired outcomes.

PDF

The balance between safety and productivity and its relationship with human factors and safety awareness and communication in aircraft manufacturing
product

Qualification for information security professionals

Worldwide there is a lack of well-educated and experienced information security specialists. The first step to address this issue is arranging enough people with a well-known and acceptable basic level of information security competences. However, there might be a lot of information security education and training, but there is anything but a well-defined outflow level with a known and acceptable basic level of information security competences. There exists a chaotic situation in respect of the qualification of information security professionals, with the emergence of a large number of difficult to compare certificates and job titles. Apparently the information security field requires uniform qualifications that are internationally recognized. Such qualifications could be an excellent way of unambiguously clarifying the knowledge and skills of information security professionals. Furthermore it gives educational institutions a framework which facilitates the development of appropriate information security education and training.

PDF

Qualification for information security professionals
product

The paradox of technology in online education during the COVID-19 pandemic

The purpose of this paper is to reflect on the experiences of safety and security management students, enrolled in an undergraduate course in the Netherlands, and present quantitative data from an online survey that aimed to explore the factors that have contributed to students’ satisfaction with, and engagement in, online classes during the COVID-19 pandemic. The main findings suggest an interesting paradox of technology, which is worth further exploration in future research. Firstly, students with self perceived higher technological skill levels tend to reject online education more often as they see substantial shortcomings of classes in the way they are administered as compared to the vast available opportunities for real innovation. Secondly, as opposed to democratising education and allowing for custom-made, individualistic education schedules that help less-privileged students, online education can also lead to the displacement of education by income-generating activities altogether. Lastly, as much as technology allowed universities during the COVID-19 pandemic to continue with education, the transition to the environment, which is defined by highly interactive and engaging potential, may in fact be a net contributor to the feelings of social isolation, digital educational inequality and tension around commercialisation in higher education.

MULTIFILE

Projecten 6

project

Avoiding the invisible

The utilization of drones in various industries, such as agriculture, infrastructure inspection, and surveillance, has significantly increased in recent years. However, navigating low-altitude environments poses a challenge due to potential collisions with “unseen” obstacles like power lines and poles, leading to safety concerns and equipment damage. Traditional obstacle avoidance systems often struggle with detecting thin and transparent obstacles, making them ill-suited for scenarios involving power lines, which are essential yet difficult to perceive visually. Together with partners that are active in logistics and safety and security domains, this project proposal aims at conducting feasibility study on advanced obstacle detection and avoidance system for low-flying drones. To that end, the main research question is, “How can AI-enabled, robust and module invisible obstacle avoidance technology can be developed for low-flying drones? During this feasibility study, cutting-edge sensor technologies, such as LiDAR, radar, camera and advanced machine learning algorithms will be investigated to what extent they can be used be to accurately detect “Not easily seen” obstacles in real-time. The successful conclusion of this project will lead to a bigger project that aims to contribute to the advancement of drone safety and operational capabilities in low-altitude environments, opening new possibilities for applications in industries where low-flying drones and obstacle avoidance are critical.

Lopend
project

een Twents Onderzoek naar Extreem Laaggeluidsproducerende drones (OEL)

Despite their various appealing features, drones also have some undesirable side-effects. One of them is the psychoacoustic effect that originates from their buzzing noise that causes significant noise pollutions. This has an effect on nature (animals run away) and on humans (noise nuisance and thus stress and health problems). In addition, these buzzing noises contribute to alerting criminals when low-flying drones are deployed for safety and security applications. Therefore, there is an urgent demand from SMEs for practical knowledge and technologies that make existing drones silent, which is the main focus of this project. This project contributes directly to the KET Digital Innovations\Robotics and multiple themes of the top sectors: Agriculture, Water and Food, Health & Care and Safety. The main objective of this project is: Investigate the desirability and possibilities of extremely silent drone technologies for agriculture, public space and safety This is an innovative project and there exist no such drone technology that attempts to reduce the noises coming from drones. The knowledge within this project will be converted into the first proof-of-concepts that makes the technology the first Minimum Viable Product suitable for market evaluations. The partners of this project include WhisperUAV, which has designed the first concept of a silent drone. As a fiber-reinforced 3D composite component printer, Fiberneering plays a crucial role in the (further) development of silent drone technologies into testable prototypes. Sorama is involved as an expert company in the context of mapping the sound fields in and around drones. The University of Twente is involved as a consultant and co-developer, and Research group of mechatronics at Saxion is involved as concept developer, system and user requirement verifier and validator. As an unmanned systems innovation cluster, Space53 will be involved as innovation and networking consultant.

Afgerond
project

Integrated distributed SCADA security through local approximations of power flow equations

The integration of renewable energy resources, controllable devices and energy storage into electricity distribution grids requires Decentralized Energy Management to ensure a stable distribution process. This demands the full integration of information and communication technology into the control of distribution grids. Supervisory Control and Data Acquisition (SCADA) is used to communicate measurements and commands between individual components and the control server. In the future this control is especially needed at medium voltage and probably also at the low voltage. This leads to an increased connectivity and thereby makes the system more vulnerable to cyber-attacks. According to the research agenda NCSRA III, the energy domain is becoming a prime target for cyber-attacks, e.g., abusing control protocol vulnerabilities. Detection of such attacks in SCADA networks is challenging when only relying on existing network Intrusion Detection Systems (IDSs). Although these systems were designed specifically for SCADA, they do not necessarily detect malicious control commands sent in legitimate format. However, analyzing each command in the context of the physical system has the potential to reveal certain inconsistencies. We propose to use dedicated intrusion detection mechanisms, which are fundamentally different from existing techniques used in the Internet. Up to now distribution grids are monitored and controlled centrally, whereby measurements are taken at field stations and send to the control room, which then issues commands back to actuators. In future smart grids, communication with and remote control of field stations is required. Attackers, who gain access to the corresponding communication links to substations can intercept and even exchange commands, which would not be detected by central security mechanisms. We argue that centralized SCADA systems should be enhanced by a distributed intrusion-detection approach to meet the new security challenges. Recently, as a first step a process-aware monitoring approach has been proposed as an additional layer that can be applied directly at Remote Terminal Units (RTUs). However, this allows purely local consistency checks. Instead, we propose a distributed and integrated approach for process-aware monitoring, which includes knowledge about the grid topology and measurements from neighboring RTUs to detect malicious incoming commands. The proposed approach requires a near real-time model of the relevant physical process, direct and secure communication between adjacent RTUs, and synchronized sensor measurements in trustable real-time, labeled with accurate global time-stamps. We investigate, to which extend the grid topology can be integrated into the IDS, while maintaining near real-time performance. Based on topology information and efficient solving of power flow equation we aim to detect e.g. non-consistent voltage drops or the occurrence of over/under-voltage and -current. By this, centrally requested switching commands and transformer tap change commands can be checked on consistency and safety based on the current state of the physical system. The developed concepts are not only relevant to increase the security of the distribution grids but are also crucial to deal with future developments like e.g. the safe integration of microgrids in the distribution networks or the operation of decentralized heat or biogas networks.

Afgerond

Partijen 2

partij

Cyber Security and Safety

Lectoraat

partij

Professorship Maritime IT Security

Lectoraat