Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

System status

Fire Protection FIVE and FRANC support quantitative and qualitative fire risk, assessmeiil. FRANC also supports the analysis of alternative safe shutdown paths during an Appendix R review. System train availability is exhibited on a system status panel, Using this a strategy can be defined to upgrade Thcrnm 1. if identify risk significant areas. [Pg.145]

Seebold, J. G. 1992. Detonation Arresters for Marine Vapor Control Systems Status of Research and Uncertainties—Where from Here Paper presented at a Colloquium on Vapor Control Systems Detonation Arrester Research and Testing, July 23, 1992, Health and Safety Executive, Buxton, Derbyshire, England. [Pg.195]

TIME OP SYSTEM STATUS INFO AVAILABLE OPERATOR EXPECTA- TION PROEOURE (WRITTEN, MEMORIZED) DECISION/ COMMUNICATION ACT EQUIP- MENT/ LOCATION FEEDBACK SECONDARY DUTIES AND DISTRACTIONS COMMENTS 1... [Pg.343]

Additionally, while the author has sometimes observed such devices on large-diameter pipe cooling systems (status unknown), no similar observation has ever been made at any substantially sized boiler house. [Pg.338]

Self S.J., Reddy B.V., Rosen M.A. (2013). Geothermal heat pump systems status review and comparison with other heating options. Applied Energy, 101, 341-348. [Pg.240]

Jensen KF (1999) Microchemical systems status, challenges, and opportunities. AIChE J 45 2051-2054... [Pg.238]

Potential vulnerabilities in control systems are exacerbated by insecure connections. Organizations often leave access links—such as dial-up modems to equipment and control information—open for remote diagnostics, maintenance, and examination of system status. Such links may not be protected with authentication or encryption, which increases the risk that hackers could use these insecure connections to break into remotely controlled systems. Also, control systems often use wireless communications systems, which are especially vulnerable to attack, or leased lines that pass through commercial telecommunications facilities. Without encryption to protect data as it flows through these insecure connections or authentication mechanisms to limit access, there is limited protection for the integrity of the information being transmitted. [Pg.125]

Reviewing the system by establishing appropriate accountability systems within the organization to monitor and report quality data and system status to management and assure that appropriate corrective and preventive actions are taken in response to quality problems using effective change control procedures and documented... [Pg.208]

McGregor,D.B. (1979) Practical experience in testing unknowns in vitro. In Paget G.E., QA.,Muta-genesis in Sub-mammalian Systems, Status and Significance, Lancaster, MTP Press, pp. 53-71... [Pg.308]

The computer system must be powered up and checked to ensure it is functioning correctly. This may involve observing and recording system status lamps and/or rerunning diagnostic checks. [Pg.622]

Paget, G.E., Ed. Mutagenesis in Sub-Mammalian Systems Status and Significance. Baltimore Univ. [Pg.280]

In operation, chromatography requires three sets of information22 operating data (pressure, flow, temperature, etc.), system status data (valve positions, pump status, etc.), and product data for quality assessment. [Pg.663]

Monitoring and control of system status and operation has also been reported. [Pg.663]

HK1 system status - not realising that pan of the plant is inoperative because of maintenance... [Pg.45]

HR4 checks - not ensuring that system status is as expected... [Pg.45]

Direct access to electronic documentation and records should not be offered to the inspector/investigator. If direct access is requested by the inspector/investigator, the legal department should be informed. The inspector/investigator is not an employee of the company and would have to be properly approved, involving authorization, suitable training, and competency to have access. Such access could also violate the security (e.g., closed system status) of the company s computer systems. Similarly, inspectors/investigators should not be permitted to connect their own computer systems to pharmaceutical or healthcare companies systems. [Pg.400]

Some considerations that might help ensure closed system status include the following ... [Pg.862]

Figure 10.13 depicts the screen. The six variable display boxes are positioned at the top of the screen and reflect the current values only. The process control plot shows a time history of all six variables. The window bar is on the bottom of the time axis and shows the relationship of the current window to the total planned duration of the test. System status flags on the left light up when the control and error flags are on. The error status shows the error number if it is active. The other flags are for display only and indicate the status of the program. [Pg.571]

Should be predictive of underlying immune system status or capacity, sensitive, able to be performed with reliability, and well understood biologically... [Pg.291]


See other pages where System status is mentioned: [Pg.2329]    [Pg.200]    [Pg.371]    [Pg.59]    [Pg.238]    [Pg.272]    [Pg.27]    [Pg.91]    [Pg.50]    [Pg.220]    [Pg.44]    [Pg.45]    [Pg.104]    [Pg.105]    [Pg.105]    [Pg.2084]    [Pg.822]    [Pg.571]    [Pg.2099]    [Pg.367]    [Pg.30]    [Pg.52]    [Pg.694]    [Pg.216]    [Pg.541]    [Pg.330]    [Pg.319]    [Pg.405]   
See also in sourсe #XX -- [ Pg.185 ]




SEARCH



© 2024 chempedia.info