Explore chapters and articles related to this topic
Validation of Solid Dosage Finished Goods
Published in James Agalloco, Phil DeSantis, Anthony Grilli, Anthony Pavell, Handbook of Validation in Pharmaceutical Processes, 2021
The improvement in reproducibility and quality of film-coating operations coupled with product isolation within manufacturing areas has reduced or eliminated the need for manual visual inspection. However, the elimination of inspectors must be accompanied with procedures that ensure process isolation and minimize the risk of mix-up. Since empty hard dry filled capsules are often purchased or manufactured at a different facility, empty capsule inspection is still performed to ensure that no foreign capsules are present. For inspection operations, the so-called 200% inspection is employed. This is essentially two people watching the product go by on an inspection belt. The speed and density of the product are important parameters. The inspection belts with cavities to control the distribution of the product on the belt are best. Visual inspection is largely being replaced by computerized vision systems, which are reproducible and do not blink, become inattentive or fall asleep.
Non-Beam Hazards
Published in Ken Barat, Understanding Laser Accidents, 2018
In general, there are three preventive measures available: exhaust ventilation, respiratory protection, and isolation of the process. The priority of control requires that engineering controls be used as the primary control measure, with respiratory protection (and other forms of PPE) used as supplementary controls. Exhaust Ventilation. Whenever possible, recirculation of plume should be avoided. Exhaust ventilation, including use of fume hoods should be used to control airborne contaminants. Exhaust ventilation systems (including hoods, ducts, air cleaners, and fans) should be designed in accordance with recommendations in the latest revision of ACGIH Industrial Ventilation and ANSI Z9.2: Fundamentals Governing the Design and Operation of Local Exhaust Systems.Respiratory Protection. Respiratory protection may be used to control brief exposures, or as an interim control measure until other administrative or engineering controls are implemented. If respiratory protection is utilized, it should comply with the provisions specified in 29 CFR 1910.134.Process Isolation. The laser process may be isolated by physical barriers, master-slave manipulators, or remote-control apparatus. This is particularly useful for laser welding or cutting of targets such as plastics, biological material, coated metals, and composite substrates.
DREAMS Architectural Style
Published in Hamidreza Ahmadian, Roman Obermaisser, Jon Perez, Distributed Real-Time Architecture for Mixed-Criticality Systems, 2018
R. Obermaisser, M. Abuteir, H. Ahmadian, P. Balbastre, S. Barner, M. Coppola, J. Coronel, A. Crespo, P. Balbastre, G. Fohler, G. Gala, M. Grammatikakis, A. Larrucea Ortube, T. Koller, Z. Owda, D. Weber
In addition to IOMMU services, a virtualization-aware hardware NoC Firewall unit implemented at the on/off-chip network interface can support VM/process isolation services throughout the multicore SoC by tagging NoC transactions, establishing access rules for virtual components on physical address regions and ensuring that rules are obeyed at each network interface. An initial solution envisioned in DREAMS targeted fine grain rule-checking at memory page-level by invoking a rules table walk to an external memory which stores the rules defined with page-level granularity. However, due to the higher complexity of this architecture, an alternative segment-level of the NoC Firewall was implemented (see Chapter 11).
Optimal charging of electric vehicles for cost minimization in re-configurable active distribution network considering conservation voltage reduction
Published in Energy Sources, Part A: Recovery, Utilization, and Environmental Effects, 2022
Shailendra Singh, Akhilesh K. Barnwal, Mitresh K. Verma
To find the elements of 1st FL, an open tie-switch is closed, and the corresponding incidence matrix is generated. By adding the absolute values of every element of each column of matrix , the columns with a sum equal to unity are marked, and rows corresponding to the marked column are eliminated. The step is repeatedly exercised until the sum result is no more equal to 1. The resulting non-zero rows represent the elements of FL under analysis. Similarly, elements of all other FLs are obtained by closing the remaining tie-switches one at a time and following the same process followed for forming the first FL. In the binary coding system, a total of (31 branches and 5 tie-switches, open = 0, close = 1) combinations have to be checked (switch number s1 always remains closed as the opening will isolate all connected load in the system from the primary substation bus). On the other hand, the creation of the FL ensures a total of combinations, thus substantially reducing the search space. During the re-configuration process, isolation of any load bus must be avoided while maintaining the network radiality. At least one must be selected from each FL of Table 1 as a re-configuration variable.
A container-based approach for sharing environmental models as web services
Published in International Journal of Digital Earth, 2021
Xiaohui Qiao, Zhiyu Li, Fengyuan Zhang, Daniel P. Ames, Min Chen, E. James Nelson, Rohit Khattar
Process isolation, which refers to isolating each process and preventing the conflicts between them on the same platform, is seldomly considered in web service publishing tool development. Many process isolation technological methods have been developed in recent decades. For executing applications that require different operating systems on the same server, virtual machines (VMs) can capture the operating system and everything running on it, provide the functionality of a physical computer, and can be transferred and shared as files. For running isolated applications with conflicts in the same operating system, containers (e.g. Docker) can encapsulate an application and all the related dependencies in a virtual container that can run as lightweight, standalone, and executable software. Compared to VMs, containers are more lightweight, portable, and high-performing because they do not contain an operating system but share the operating system kernel with the host machine (Boettiger 2014). Indeed, Li (2020) used Docker to facilitate R Shiny web app deployment and support simultaneous access by multiple users.