Spelling suggestions: "subject:"assurance"" "subject:"issurance""
361 |
An Empirical Investigation Of The Influence Of Fear Appeals On Attitudes And Behavioral Intentions Associated With Recommended Individual Computer Security ActionsJohnston, Allen C 13 May 2006 (has links)
Through persuasive communication, IT executives strive to align the actions of end users with the desired security posture of management and of the firm. In many cases, the element of fear is incorporated within these communications. However, within the context of computer security and information assurance, it is not yet clear how these fear-inducing arguments, known as fear appeals, will ultimately impact the actions of end users. The purpose of this study is to examine the influence of fear appeals on the compliance of end users with recommendations to enact specific individual computer security actions toward the amelioration of threats. A two-phase examination was adopted that involved two distinct data collection and analysis procedures, and culminated in the development and testing of a conceptual model representing an infusion of theories based on prior research in Social Psychology and Information Systems (IS), namely the Extended Parallel Process Model (EPPM) and the Unified Theory of Acceptance and Use of Technology (UTAUT). Results of the study suggest that fear appeals do impact end users attitudes and behavioral intentions to comply with recommended individual acts of security, and that the impact is not uniform across all end users, but is determined in part by perceptions of self-efficacy, response efficacy, threat severity, threat susceptibility, and social influence. The findings suggest that self-efficacy and, to a lesser extent, response efficacy predict attitudes and behavioral intentions to engage individual computer security actions, and that these relationships are governed by perceptions of threat severity and threat susceptibility. The findings of this research will contribute to IS expectancy research, human-computer interaction, and organizational communication by revealing a new paradigm in which IT users form perceptions of the technology, not on the basis of performance gains, but on the basis of utility for threat amelioration.
|
362 |
Golden Opportunities for White Collar Productivity Improvements in Quality AssuranceAlgee, Jane M. 01 January 1985 (has links) (PDF)
The efficient processing of defective or nonconforming hardware and paperwork is important to both defense contractors and the government. Management's concern of excessive costs in this area initiated an investigation into the actual activities, personnel, and computer systems involved in such processing. Applicable military specifications and an assortment of corporate and divisional procedures were reviewed to obtain baseline data. Additional information was sought through personal interviews and visits to the manufacturing areas. The activity flow was documented in block diagrams and time estimates and labor requirements were applied. The detailed labor estimates were input to a LOTUS123 spreadsheet and used to determine average labor cost per disposition type, i.e., rework, scrap, return-to-vendor, or repair. The spreadsheet facilitates quick cost analysis of proposed management changes to the procedure and system. The estimates were merged with actual distribution of dispositions in an expected cost probability network to identify high cost areas and potential savings. Suggested improvements are evaluated by using the expected cost network and the electronic spreadsheet. Library research on recent publications form industry and academe provide further information in an area rich with potential savings: the white collar worker and quality assurance.
|
363 |
Severity of Non-Normality in Pavement Quality Assurance Acceptance Quality Characteristics Data and the Adverse Effects on Acceptance and PayUddin, Mohammad M., Goodrum, Paul M., Mahboub, Kamyar C. 01 January 2011 (has links)
Nonnormality in the form of skewness and kurtosis was examined in lot acceptance quality characteristics data from seven state highway agencies for their highway construction quality assurance programs. Lot skewness and kurtosis varied significantly. For most lot data sets, skewness values varied in the range of 0.0 ± 1.0, whereas most kurtosis values varied in the range of 0.0 ± 2.0. The analysis also reveals that, on average, 50% of lot test data sets were nonnormal with 15% of lot data sets having skewness greater than ±1.0 and kurtosis greater than ±2.0. This is a significant finding because most state transportation agencies' pay factor algorithms assume normally distributed lot. Further investigation showed that high skewness and kurtosis were associated with higher lot variability. This variability produced misleading results in regard to inflated Type I error and low power for the F-test. However, the t-test was found to be quite robust for distinguishing mean differences. Significant deviation was observed in lot pay factors based on percent within limits between assumed normal data and normalized data. Effects of nonnormal distribution on the lot pay factor were found to be varied on the basis of the specification limits, the distribution of defective materials on the tails in the case of two-sided limits, and the orientation of the nonnormal distribution itself.
|
364 |
Advanced Data Analytics for Quality Assurance of Smart Additive ManufacturingShen, Bo 07 July 2022 (has links)
Additive manufacturing (AM) is a powerful emerging technology for fabricating components with complex geometries using a variety of materials. However, despite the promising potential, due to the complexity of the process dynamics, how to ensure product quality and consistency of AM parts efficiently during the process remains challenging. Therefore, this dissertation aims to develop advanced machine learning methods for online process monitoring and quality assurance of smart additive manufacturing.
Driven by edge computing, the Industrial Internet of Things (IIoT), sensors and other smart technologies, data collection, communication, analytics, and control are infiltrating every aspect of manufacturing. The data provides excellent opportunities to improve and revolutionize manufacturing for both quality and productivity. Despite the massive volume of data generated during a very short time, approximately 90 percent of data gets wasted or unused. The goal of sensing and data analytics for advanced manufacturing is to capture the full insight that data and analytics can discover to help address the most pressing problems. To achieve the above goal, several data-driven approaches have been developed in this dissertation to achieve effective data preprocessing, feature extraction, and inverse design. We also develop related theories for these data-driven approaches to guarantee their performance. The performances have been validated using sensor data from AM processes. Specifically, four new methodologies are proposed and implemented as listed below:
1. To make the unqualified thermal data meet the spatial and temporal resolution requirement of microstructure prediction, a super resolution for multi-sources image stream data using smooth and sparse tensor completion is proposed and applied to data acquisition of additive manufacturing. The qualified thermal data is able to extract useful information like boundary velocity, thermal gradient, etc.
2. To effectively extract features for high dimensional data with limited samples, a clustered discriminant regression is created for classification problems in healthcare and additive manufacturing. The proposed feature extraction method together with classic classifiers can achieve better classification performance than the convolutional neural network for image classification.
3. To extract the melt pool information from the processed X-ray video in metal AM process, a smooth sparse Robust Tensor Decomposition model is devised to decompose the data into the static background, smooth foreground, and noise, respectively. The proposed method exhibits superior performance in extracting the melt pool information on X-ray data.
4. To learn the material property for different printing settings, a multi-task Gaussian process upper confidence bound is developed for the sequential experiment design, where a no-regret algorithm is implemented. The proposed algorithm aims to learn the optimal material property for different printing settings.
By fully utilizing the sensor data with innovative data analytics, the above-proposed methodologies are used to perform interdisciplinary research, promote technical innovations, and achieve balanced theoretical/practical advancements. In addition, these methodologies are inherently integrated into a generic framework. Thus, they can be easily extended to other manufacturing processes, systems, or even other application areas such as healthcare systems. / Doctor of Philosophy / Additive manufacturing (AM) technology is rapidly changing the industry, and data from various sensors and simulation software can further improve AM product quality. The objective of this dissertation is to develop methodologies for process monitoring and quality assurance using advanced data analytics.
In this dissertation, four new methodologies are developed to address the problems of unqualified data, high dimensional data with limited samples, and inverse design. Related theories are also studied to identify the conditions by which the performance of the developed methodologies can be guaranteed. To validate the effectiveness and efficiency of proposed methodologies, various data sets from sensors and simulation software are used for testing and validation. The results demonstrate that the proposed methods are promising for different AM applications. The future applications of the accomplished work in this dissertation are not just limited to AM. The developed methodologies can be easily transferred for applications in other domains such as healthcare, computer vision, etc.
|
365 |
Certifiability analysis of machine learning systems for low-risk automotive applicationsVasudevan, V., Abdullatif, Amr R.A., Kabir, Sohag, Campean, Felician 02 September 2024 (has links)
Yes / Machine learning (ML) is increasingly employed for automating complex tasks, specifically in autonomous driving. While ML applications bring us closer to fully autonomous systems, they simultaneously introduce security and safety risks specific to safety-critical systems. Existing methods of software development and systems based on ML are fundamentally different. Moreover, the existing certification methods for automotive systems cannot fully certify the safe operation of ML-based components and subsystems. This is because existing safety certification criteria were formulated before the advent of ML. Therefore, new or adapted methods are needed to certify ML-based systems. This article analyses the existing safety standard, ISO26262, for
automotive applications, to determine the certifiability of ML approaches used in low-risk automotive applications. This will contribute towards addressing the task of assuring the security and safety of ML-based autonomous driving systems, particularly for low-risk automotive applications, to gain the trust of regulators, certification agencies, and stakeholders.
|
366 |
Developing Dependable IoT Systems: Safety PerspectiveAbdulhamid, Alhassan, Kabir, Sohag, Ghafir, Ibrahim, Lei, Ci 05 September 2023 (has links)
Yes / The rapid proliferation of internet-connected devices in public and private spaces offers humanity numerous conveniences, including many safety benefits. However, unlocking the full potential of the Internet of Things (IoT) would require the assurance that IoT devices and applications do not pose any safety hazards to the stakeholders. While numerous efforts have been made to address security-related challenges in the IoT environment, safety issues have yet to receive similar attention. The safety attribute of IoT systems has been one of the system’s vital non-functional properties and a remarkable attribute of its dependability. IoT systems are susceptible to safety breaches due to a variety of factors, such as hardware failures, misconfigurations, conflicting interactions of devices, human error, and deliberate attacks. Maintaining safety requirements is challenging due to the complexity, autonomy, and heterogeneity of the IoT environment. This article explores safety challenges across the IoT architecture and some application domains and highlights the importance of safety attributes, requirements, and mechanisms in IoT design. By analysing these issues, we can protect people from hazards that could negatively impact their health, safety, and the environment. / The full text will be available at the end of the publisher's embargo: 11th Feb 2025
|
367 |
Compressive Sensing Approaches for Sensor based Predictive Analytics in Manufacturing and Service SystemsBastani, Kaveh 14 March 2016 (has links)
Recent advancements in sensing technologies offer new opportunities for quality improvement and assurance in manufacturing and service systems. The sensor advances provide a vast amount of data, accommodating quality improvement decisions such as fault diagnosis (root cause analysis), and real-time process monitoring. These quality improvement decisions are typically made based on the predictive analysis of the sensor data, so called sensor-based predictive analytics. Sensor-based predictive analytics encompasses a variety of statistical, machine learning, and data mining techniques to identify patterns between the sensor data and historical facts. Given these patterns, predictions are made about the quality state of the process, and corrective actions are taken accordingly.
Although the recent advances in sensing technologies have facilitated the quality improvement decisions, they typically result in high dimensional sensor data, making the use of sensor-based predictive analytics challenging due to their inherently intensive computation. This research begins in Chapter 1 by raising an interesting question, whether all these sensor data are required for making effective quality improvement decisions, and if not, is there any way to systematically reduce the number of sensors without affecting the performance of the predictive analytics? Chapter 2 attempts to address this question by reviewing the related research in the area of signal processing, namely, compressive sensing (CS), which is a novel sampling paradigm as opposed to the traditional sampling strategy following the Shannon Nyquist rate. By CS theory, a signal can be reconstructed from a reduced number of samples, hence, this motivates developing CS based approaches to facilitate predictive analytics using a reduced number of sensors. The proposed research methodology in this dissertation encompasses CS approaches developed to deliver the following two major contributions, (1) CS sensing to reduce the number of sensors while capturing the most relevant information, and (2) CS predictive analytics to conduct predictive analysis on the reduced number of sensor data.
The proposed methodology has a generic framework which can be utilized for numerous real-world applications. However, for the sake of brevity, the validity of the proposed methodology has been verified with real sensor data associated with multi-station assembly processes (Chapters 3 and 4), additive manufacturing (Chapter 5), and wearable sensing systems (Chapter 6). Chapter 7 summarizes the contribution of the research and expresses the potential future research directions with applications to big data analytics. / Ph. D.
|
368 |
Born Qualified Additive Manufacturing: In-situ Part Quality Assurance in Metal Additive ManufacturingBevans, Benjamin D. 23 July 2024 (has links)
Doctor of Philosophy / The long-term goal of this dissertation is to develop quality assurance methodologies for parts made using metal additive manufacturing (AM). Additive manufacturing is becoming a prominent manufacturing process due to its ability to generate complex structures that would otherwise be impossible to produce using traditional machining. This freedom of complexity enables engineers to make more efficient components and reduce part counts in assemblies.
However, the AM process tends to generate random flaws that require manufacturers to perform extensive testing on all manufactured samples to ensure part quality. Due to this extensive testing, manufacturers have been slow to adopt the AM process. Thus, the goal of this dissertation is to understand, monitor, and predict the quality of metal AM parts as they are being printed to remove the need for post-manufacturing testing – hence the phrase Born Qualified.
To enable Born Qualified manufacturing with AM, the objective of this dissertation was to use sensors installed on AM machines to monitor part quality during the process.
With this objective, this dissertation focused on: (1) using acoustic signal monitoring to determine the onset of process instabilities that would generate flaws; (2) monitoring the process with multiple sensors to determine the specific type of flaws formed; (3) developing novel methods to monitor the sub-surface effects; and (4) combining multiple streams of sensor data with thermal simulations to detect flaw formation along with mechanical and material properties of the manufactured parts.
|
369 |
Correlating nano-scale surface replication accuracy and cavity temperature in micro-injection moulding using in-line process control and high-speed thermal imagingBaruffi, F., Gülçür, Mert,, Calaon, M., Romano, J.-M., Penchev, P., Dimov, S., Whiteside, Benjamin R., Tosello, G. 22 October 2019 (has links)
Yes / Micro-injection moulding (μIM) stands out as preferable technology to enable the mass production of polymeric
components with micro- and nano-structured surfaces. One of the major challenges of these processes is related
to the quality assurance of the manufactured surfaces: the time needed to perform accurate 3D surface acquisitions
is typically much longer than a single moulding cycle, thus making impossible to integrate in-line
measurements in the process chain. In this work, the authors proposed a novel solution to this problem by
defining a process monitoring strategy aiming at linking sensitive in-line monitored process variables with the
replication quality. A nano-structured surface for antibacterial applications was manufactured on a metal insert
by laser structuring and replicated using two different polymers, polyoxymethylene (POM) and polycarbonate
(PC). The replication accuracy was determined using a laser scanning confocal microscope and its dependence
on the variation of the main μIM parameters was studied using a Design of Experiments (DoE) experimental
approach. During each process cycle, the temperature distribution of the polymer inside the cavity was measured
using a high-speed infrared camera by means of a sapphire window mounted in the movable plate of the mould.
The temperature measurements showed a high level of correlation with the replication performance of the μIM
process, thus providing a fast and effective way to control the quality of the moulded surfaces in-line. / MICROMAN project (“Process Fingerprint for Zero-defect Net-shape MICRO MANufacturing”, http://www.microman.mek.dtu.dk/) - H2020 (Project ID: 674801), H2020 agreement No. 766871 (HIMALAIA), H2020 ITN Laser4Fun (agreement No. 675063)
|
370 |
A Security-enabled Safety Assurance Framework for IoT-based Smart HomesKabir, Sohag, Gope, P., Mohanty, S.P. 22 May 2022 (has links)
Yes / The exponential growth of the Internet of Things (IoT) has paved the way for safety-critical cyber-physical systems to enter our everyday activities. While such systems have changed the way of our life, they brought new challenges that can adversely affect our life and the environment. Safety and security are two such challenges that can hamper the widespread adoption of new IoT applications. Due to a large number of connected devices and their ability to control critical physical assets, intended attacks on them and/or unintended failure events such as mechanical failure of devices, communication failure and unforeseen bad interactions between connected devices may cause an IoT-based system to enter into unsafe and dangerous physical states. By considering the importance of safety and security of IoT systems, in this article, we present a security-enabled safety monitoring framework for IoT-based systems. In the proposed framework, we utilise design-time system analysis to create an executable monitoring model that enables run-time safety assurance provision for a system via collecting and analysing operational data and evidence to determine the safety status of the system and then taking appropriate actions and securely communicating the safety status and recommended actions to the system users to minimise the risk of the system entering into an unsafe state.
|
Page generated in 0.0491 seconds