Senin, 08 Agustus 2022

Production Monitor Display User's Manual

 




 

Production Monitor Display User's Manual


1445 Industrial Drive • Itasca, IL 60143-1849 • (630) 875-3600 • Telefax (630) 875-3609


Chapter 1 Setting Up Your Display For Operation . 1

1.1 Accessing Wiring Connections And Selection Switches 3

1.2 Operation    3

1.3 Setting The DIP Switches For Your Application 4

Run and Program Modes . 4

DIP Switch or VDP4 Selection . 4

Unit Type . 4

Input 2 Input Rate . 5

Input 1 Input Rate . 5

Active Level . 5

Counter Mode . 5

1.4 Connecting Power To The Display 7

1.5 Wiring and Specifications . 7

Reset . 7

Input 1 and Input 2 . 7

Output Voltage . 8

Wiring . 8

1.6 Basic Information About Serial Communication Ports 9

1.7 RS-232 Communication To A Single Display 9

Selecting RS-232 Communication . 9

RS-232 Connectors 10

Wiring Diagram For An RS-232 Host Device To One Display 10

Guidelines For Wiring RS-232 Devices 11

1.8 RS-422 Or RS-485 Communication To One Or More Displays 11

Chapter 2 Using The Simple Packet Protocol 12

2.1 Simple Packet Communication Format 12

2.2 Simple Packet Commands 13

Simulate An Input 14

Display Data 14

Flash Data 14

Change Color (For Tri-color Display's) 15

Activate Relay 15

2.3 Addressing Multiple Displays 16


87/805 Users Manual 1


Unit Address 16

2.4 Using Checksums And Command Acknowledgments 17

Chapter 3 Advanced Features Of the 87 Series Display 18

3.1 VDP4 Options 18

Display Justification 18

Leading Zeroes 18

Fixed Decimal Point After Digit 18

Number of Display Digits 18

Counter Mode 18

Input Active Level 19

Debounce Time 19

Counter Reload Value 19

Scale Factor 19

Save on Power Down 19

Count Below Zero 19

Trigger Value 19

Relay Setup 19

Baud Rate 19

Data Bits 20

Terminator 20

Unit Address 20

Member of Group(s) 20

Checksum 20

Command Acknowledgment 20

Output Transmission 20

Appendix A Operating Specifications 21

Appendix B Character Set Listing 22

Appendix C Display Dimensions 23

Notice of Disclaimer

While the information in this manual has been carefully reviewed for accuracy, Vorne Industries, Inc. assumes no liability for any errors, or omissions in the information. Vorne Industries reserves the right to make changes without further notice to any products described in this manual.


2 87/805 Users Manual


Chapter 1 Setting Up Your Display For Operation

This chapter describes how to set up the display hardware for operation, including setting the dip switches, connecting power, wiring the counter inputs, and wiring to the serial communication port. There are many references in this chapter to the term input device. The input device is whatever device will be providing a input signal to the 87/805 display. Some typical input devices are foot switches, relay contacts, 3 wire proximity sensors, PLC outputs and photoelectric eyes.

1.1 Accessing Wiring Connections And Selection Switches

All external power and signal connections to the display are made to printed circuit board mounted terminal strips. These terminal strips, as well as a 10 position DIP switch can be accessed by removing the back panel user access plate.

There are two 7/8" conduit openings on the back panel of the display, provided for bringing external wiring into the display enclosure. If these conduit openings will not be used for wiring, these openings can be filled with plastic plugs (Caplugs Part Number BP-7/8) which are provided with the display.

The left most conduit opening is provided for power wiring, the right most for signal wiring. It is not recommended to run power wiring and signal wiring in the same conduit!

1.2 Operation

The 87/805 production monitor displays a pacing count, or efficiency on a 2 to 8 digit display field. Efficiency can be based on a internal or external timer. The production monitor reload value is set to 1 at the factory. The production monitor reload value can be modified in the field by using 87 Express, a Windows based Setup Utility, or via Mini-T a handheld terminal available from Vorne. The production monitor reload value determines the timing interval of the display.

An RS232 serial port is provided standard with each counter. The serial port can be used for customizing the operation of the unit. See chapter 3 for additional information on customization. The serial port also allows remote user access to the following features:

Inputs can be simulated & an optional relay output can be controlled with serial commands. Data such as time can be sent to the display as a temporary message.

An optional RS-485 converter increases the communications distance up to 4000 feet.


87/805 Users Manual 3


1.3 Setting The DIP Switches For Your Application

DIP switch changes are only acknowledged at power up. Factory defaults are shown in gray.

Run and Program Modes


1

Mode

ON

Program

OFF

Run


For normal operation the Run/Program switch should be set to Run (off). Setting the unit to Program mode allows the unit to be customized using VDP4 and to run one of two diagnostic routines. If DIP switch 2 is off, the display cycles thru the following display diagnostic.

      a. Error status Should show E0. E1 or E2 indicates a memory error.

      b. Unit Address Default value is 00.

      c. Red segment test The unit will turn on 1 segment at a time A thru F and DP.

      d. Green segment test. For a single color display a blank screen will be displayed.

      e. All segments ON.

      f. Unit type. 0 = 87/805

      g. --. This is a separator between the Unit type and the Software version.

      h. Software version. This number is displayed on two consecutive screens (Ex: 1.1.3). If DIP switch 2 is on, the display runs a DIP switch diagnostic. This diagnostic displays the HEX value of DIP switches 3 thru 10. (switches 3 to 6 = MSD, switches 7 to 10 = LSD)

DIP Switch or VDP4 Selection

For normal operation the Settings DIP switch should be set to DIP switch (on).

In program mode, Switch 2 selects between Display test (off) and DIP switch test (on). For VDP4

customized units DIP switch 2 will be set to VDP4 (off) and switches 3-10 will be ignored.


2

Settings

ON

DIP Switch

OFF

VDP4


Unit Type

The unit type of your 87 series display determines how the unit will operate. There are four unit types available, Event Counter, Rate Monitor, Elapsed Timer and Production Monitor. The functionality of DIP switches 5 to 10 is determined by this selection.


3

4

Unit Type

OFF

OFF

87/256 Event Counter

OFF

ON

87/415 Rate Monitor

ON

OFF

87/705 Elapsed Timer

ON

ON

87/805 Production Monitor


4 87/805 Users Manual


Input 1 Input Rate

The input rate for Input 1 is field programmable to low or high speed by setting this DIP switch. When using a input device such as a switch or a relay contact, set the input rate to low speed. This will prevent false counts caused by contact bounce. For input devices such as proximity sensors and photoelectric eyes, set the input rate to high speed. Shielded wire for the input is recommended when the unit is set to high speed but not required for low speed.


5

Input 1 Rate

ON

High speed

OFF

Low speed


Input 2 Input Rate

The input rate for Input 2 is field programmable to low or high speed by setting this DIP switch. When using a input device such as a switch or a relay contact, set the input rate to low speed. This will prevent false counts caused by contact bounce. For input devices such as proximity sensors and photoelectric eyes, set the input rate to high speed. Shielded wire for the input is recommended when the unit is set to high speed but not required for low speed.


6

Input 2 Rate

ON

High speed

OFF

Low speed


Production Monitor Mode

The operation of the production monitor can be configured to meet your application. Input 2 can be set as an external time input, a hold input, or disabled. The Production Monitor reload value is entered in seconds. A setting of 5 will result in the display incrementing by 1 every 5 seconds.

Mode 0 will set the display to operate as a pacing display where the display value is incremented by 1 after each Production Monitor Reload Value interval. Input 1 and Input 2 are ignored.

Mode 1 sets the display to operate as a differential pacing display. The display value will increment by 1 each time a Input 1 signal is received. The display value will decrement by 1 each time a Input 2 signal is received. The display value will also automatically decrement by 1 after each Production Monitor Reload Value interval.

Mode 2 displays the efficiency of Input 1 inputs versus the pace value.

Total count = Input 1 - Input 2. Pace value = Time in seconds since reset / Production Monitor Reload value. Efficiency = Total count / Pace value x 100

Mode 3 will set the display to operate as a pacing display where the display value is incremented

       by 1 after each input received at Input 2. The pacing value, and Input 1 are ignored. Mode 4 will set the display to operate as a pacing display where the display value will

increment by 1 each time a Input 1 signal is received. The display value will decrement by 1 each time a Input 2 signal is received. The pacing value is ignored.


87/805 Users Manual 5


Mode 5 displays the efficiency of Input 1 inputs versus Input 2 inputs. The pacing value is ignored.

Efficiency = Input 1 / Input 2 x 100.

In Modes 6, 7, 8, 11, and 14 Input 2 operates as a hold input. If Input 2 is held in its active state,

the display value will hold on the current display value, and the Internal pacing value will be

suspended. When Input 2 is released, the display value will continue incrementing from its current

value. Note: Input 1 inputs will continue to be accumulated even when the hold input is active.

Mode 6 will set the display to operate as a pacing display where the display value is incremented

by 1 after each Production Monitor Reload Value interval. Input 2 operates as a hold

input. Input 1 is ignored.

Mode 7 sets the display to operate as a differential pacing display. The display value will

increment by 1 each time an Input 1 signal is received. The display value will decrement

by 1 after each Production Monitor Reload Value interval. Input 2 operates as a hold

input.

Mode 8 displays the efficiency of Input 1 inputs versus the pace value. Pace value = Time in

seconds since reset / Production Monitor Reload value.

Efficiency = Input 1 count / Pace value x 100 Input 2 operates as a hold input.

Mode 9 operates the same as Mode 2, but the display value is shown as XX.X.

Mode 10 operates the same as Mode 5, but the display value is shown as XX.X.

Mode 11 operates the same as Mode 8, but the display value is shown as XX.X.

Mode 12 operates the same as Mode 2, but the display value is shown as XX.XX.

Mode 13 operates the same as Mode 5, but the display value is shown as XX.XX.

Mode 14 operates the same as Mode 8, but the display value is shown as XX.XX.

Mode 15 operates the same as Mode 0.

7

8

9

10

Mode

Input 1

Input 2

Description

OFF

OFF

OFF

OFF

0

N/A

N/A

Pacing Internal Time

OFF

OFF

OFF

ON

1

Input +

Input -

Diff. Pacing Internal Time

OFF

OFF

ON

OFF

2

Input +

Input -

Efficiency Internal Time

OFF

OFF

ON

ON

3

N/A

Pace +

Pacing External Time

OFF

ON

OFF

OFF

4

Input +

Pace +

Diff. Pacing External Time

OFF

ON

OFF

ON

5

Input +

Pace +

Efficiency External Time

OFF

ON

ON

OFF

6

N/A

Hold

Pacing Internal Time

OFF

ON

ON

ON

7

Input +

Hold

Diff. Pacing Internal Time

ON

OFF

OFF

OFF

8

Input +

Hold

Efficiency Internal Time

ON

OFF

OFF

ON

9

Input +

Input -

Efficiency XX.X Internal Time

ON

OFF

ON

OFF

10

Input +

Pace +

Efficiency XX.X External Time

ON

OFF

ON

ON

11

Input +

Hold

Efficiency XX.X Internal Time

ON

ON

OFF

OFF

12

Input +

Input -

Efficiency XX.XX Internal Time

ON

ON

OFF

ON

13

Input +

Pace +

Efficiency XX.XX External Time

ON

ON

ON

OFF

14

Input +

Hold

Efficiency XX.XX Internal Time

ON

ON

ON

ON

15

N/A

N/A

Pacing


6 87/805 Users Manual


1.4 Connecting Power To The Display

Power connections are made to the three pin POWER terminal strip (marked P1). Connect power to this terminal strip as shown below.

3 Pin POWER Terminal Strip (P1)

Pin

120 VAC Powered Units

12 VDC Powered Units




A

B

C

120 VAC (Hot)

120 VAC (Neutral)

Earth Ground

+ 12 VDC

DC Ground

Earth Ground








A B C






Proper grounding is an important aspect of power wiring, both as a safety measure and for improved electrical noise immunity. Always connect Earth Ground to the 87/805 display.

The power requirements for all standard 87/805 display configurations are listed in Appendix A.

1.5 Wiring and Specifications

Reset

The reset input has an internal 10K pull-up resistor to +5 volts. Momentarily sinking this input to ground with a contact closure or open collector NPN transistor activates the reset function. The display value will be reset to 0 if a reset input is received. The Reset input is TTL or CMOS compatible with a minimum high of 3.5 VDC and a maximum low of 1.5 VDC. The reset line is active on the negative going edge.

Input 1 and Input 2

Input 1 and Input 2 have an internal 3.3K resistor to either +5 volts or signal ground depending on the selection of the SINK / SOURCE jumper. The SINK / SOURCE jumper (J2) is located to the lower left of the Input Terminal strip. Both inputs will be affected by the setting of this jumper. The factory default setting is SINK.


SINK

SOURCE

Active state of input

Connect input to ground with a contact closure or open collector NPN transistor.

Connect input to +VDC with a contact closure or open collector PNP transistor.

Normal state of input

Pulled to +5 VDC thru a 3.3K resistor.

Pulled to Signal ground thru a 3.3K resistor.


87/805 Users Manual 7


Input characteristics

High Level

Low Level

Input loading

Leakage current accepted

Low Speed

High Speed 


3.5 to 30 VDC

0 to 1.5 VDC

1.5mA to 10mA (5V-30V)

500 uA

50 Hz (10 millisecond on/off time)

4000 Hz (120 microsecond on/off

time)


Output Voltage

A regulated +12VDC output voltage rated at 100mA is provided for auxiliary use. Wiring

Input connections are made to the five pin INPUT terminal strip (marked P2). Connect inputs to this terminal strip as shown below.

5 Pin INPUT Terminal Strip (P2)

Pin

Function

Pins 1 to

5


Input Terminal

Strip

1

2

3

4

5

Reset (RST)

Input 1 (IN 1)

Input 2 (IN 2)

+ 12 VDC

Signal GROUND (0VDC)







1

2

3 4 5






RST IN1 IN2 12V 0V

1 2 3 4 5

RST IN1 IN2 12V 0V RST IN1 IN2 12V 0V

1 2 3 4 5 1 2 3 4 5



Input Device



SINK Input SOURCE Input



8 87/805 Users Manual


1.6 Basic Information About Serial Communication Ports

This section provides some basic background information regarding different types of serial communication ports. Each 87/805 display contains an RS-232 port. An RS-485 port (which is also compatible with RS-422 communication), is available via a plug in option board. Note: Only one of the two ports can be used at any given time to communicate with a host device.

RS-232 ports are the most common type of serial ports, although they are more common in an office environment than an industrial environment. This is because RS-232 can only be run for short distances (under 50 feet), and in environments where EMI (electromagnetic interference) is minimal. Also, one host RS-232 port is limited to directly communicating with one device.

RS-422 ports are very common in industrial environments. They are well suited for distances up to 4000 feet, and have substantially superior EMI immunity characteristics. Additionally, one host RS-422 port can communicate with a minimum of 10 devices without repeating the signal.

RS-485 ports are basically an improved version of RS-422, and in most cases are completely compatible with RS-422 devices (and vice versa). In fact, many newer products with built in RS-422 ports actually use driver circuits that meet the RS-485 specification (87 series displays fall into this class). RS-485 offers better EMI immunity characteristics, and improved drivers that have the ability to communicate with up to 32 devices without repeating the signal. There is sometimes confusion regarding RS-485 because it has an additional ability to communicate in both directions over one pair of wires, a feature not supported by RS-422 or by 87 series displays.

20 mA current loop was commonly used for industrial applications in the past but is less common today. To use a 20mA current loop serial port with an 87/805 display, all that is required is an external 20 mA current loop to RS-422 converter. Vorne can provide such a converter if your application requires it.

1.7 RS-232 Communication To A Single Display

This section provides the information necessary to successfully interface a host RS-232 port to one 87/805 display. If you would like to interface a host RS-232 port to multiple 87/805 displays, read this section as well as section 1.8.

Selecting RS-232 Communication

The RS-232 port is the standard communication port available in a 87/805.


87/805 Users Manual 9


RS-232 Connectors

The RS-232 port is available on pins 1 to 3 of the 3 pin communication port terminal strip (marked P3). The RS-232 terminal strip is shown below.

3 Pin COM PORT Terminal Strip (P3)

Pin

Function

Pins 1 to 3


RS-232

Port






1

RS-232 Transmit Data (TxD)




2

RS-232 Receive Data (RxD)




3

Communication GROUND


1

2 3











Many host devices use either DB25 or DB9 connectors for their RS-232 ports. For your reference, two common RS-232 DB interfaces are shown below. They are the standard male DB25 interface, and the standard male IBM/AT® style DB9 interface.

Standard Host Device RS-232 DB Connectors

DB25 MALE

Data Carrier Detect

DB9 MALE

Data Carrier Detect

(DCD)

Signal Ground



Data Set Ready

(DSR)




Clear To Send (CTS)










(DCD)

Request To Send

(RTS)














Receive Data (RxD) Transmit Data

Receive Data (RxD)


















(TxD)

Transmit Data

(TxD)























Data Transmit Ready (DTR) Signal Ground
















1

14

2

15

3

16

4

17

5

18

6

19

7

20

8 9

21 22

10 11 12 13

23 24 25

1

6

2

7

3

8

4

9

5

Data Terminal Ready (DTR)






Ring Indicator (RI)

Clear To Send

Ring Indicator (RI)









(CTS)

Request To Send (RTS)








Data Set Ready

(DSR)


Wiring Diagram For An RS-232 Host Device To One Display

The only connections necessary for two way communication between a host device and an 87/805 display are the ones shown in the diagram below. Please refer to the Guidelines For Wiring RS-232 Devices section below for important wiring recommendations. For one way communication from the host to the display, the transmit data (TxD) line from the display (pin 1) does not need to be connected to the host device.


10 87/805 Users Manual


HOST DEVICE


Receive Data (RxD)

Transmit Data (TxD)

Signal GROUND


Transmit Data (TxD)

Receive Data (RxD)

Isolated GROUND




Guidelines For Wiring RS-232 Devices

For best results when wiring RS-232 devices please follow these guidelines:

1. Use a 50 foot maximum cable length.

2. Use a baud rate of 19,200 or less.

3. Use a shielded cable with the shield connected to Earth Ground only at the 87/805 display. Belden 9842 is a recommended cable.

4. Carefully check your equipment and cable to ensure that Earth Ground is not connected at both ends of the cable. If there is a significant difference in Earth Ground potential between the two ends of the cable, it could cause data transmission errors, or even damage to the RS-232 communication ports.

5. Keep the cable length as short as possible, and do not run the RS-232 cable parallel to any power cables.

1.8 RS-422 Or RS-485 Communication To One Or More Displays

To successfully interface a host RS-422 or RS-485 port to one or more 87/805 displays, please refer to the Add On module Users Manual. Note that the 87/805 display requires an optional communications board for opt o-isolat ed RS-485 communications.


87/805 Users Manual 11


Chapter 2 Using The Simple Packet Protocol

This chapter describes the communication protocol of Simple Packet. This is for applications where you can control the data being transmitted to the display, but where you would like to access advanced features. These features include independently simulating inputs, addressing multiple displays, flashing the display, or controlling an optional relay in the display. The default communication settings of the 87/805 are 9600 Baud, 8 data bits, 1 stop bit, no parity, Unit address 0, Group address 0, and Carriage Return <CR> Line Terminator.

2.1 Simple Packet Communication Format

The format of Simple Packet communication is:

<SOH> Type Address : Command Data Terminator Checksum

<SOH> The symbol <SOH> represents the ASCII "Start Of Header" character

(01 hex/1 decimal), and must be the first character of every transmission. Since the purpose of the <SOH> character is to mark the beginning of a new packet, it cannot appear anywhere else within the transmission.

Type Can be one of two ASCII characters (S or s), and must be the second character of every transmission. This character lets the display know if the serial data is meant for an individual address or a group address.

S Serial data for an individual address.

s Serial data for a group address.

If your application does not require addressing individual displays or groups of displays, you should use the type s. This will allow data that you send to be acted upon by every display that receives it (as explained below).

Address Can range from 0 to 255, and is an optional part of the packet that specifies an actual unit or group address. If no address is included in the packet, the default address of 0 will be used.

Note that a transmitted group address of 0 is a broadcast to all units, regardless of what the internal address of each display is set to. Thus, when no addressing is required, you can skip the Address part of the packet, and rely on the fact that a default address of 0 will automatically be substituted. In this case, the complete header before the data would be <SOH>s: and the data will be acted on by all displays that receive it.

For more information about individual and group addressing see Section 2.3 Addressing Multiple Displays.


12 87/805 Users Manual


: The ASCII "Colon" character (3A hex/58 decimal) must be included in every transmission, and is used to separate the header part of the packet from the data.

Command Can contain one command string for the display. Command strings can be used to display data, simulate an input, flash data on the display, or control the optional relay. The available commands are fully described in Section 2.2 Simple Packet Commands.

Data Any ASCII characters you wish to display (refer to Appendix B for a full character set listing). The control characters <SOH>, <CR> and <LF> cannot be used in the Data part of the packet, as they are reserved for marking the beginning and end of packets.

Terminator A special ASCII character which marks the end of the data (and thus immediately follows it). Note that the symbol <CR> represents the ASCII "Carriage Return" character (0D hex/13 decimal), and the symbol <LF> represents the ASCII "Line Feed" character (0A hex/10 decimal). In cases where the host device transmits a <CR><LF> combination as the terminator, select <CR>.

Checksum This is an optional part of the packet that can be used to provide an extra level of data validation. If used, the checksum immediately follows the Terminator character. Please request the Advanced Applications Guide if you are interested in using a checksum.

2.2 Simple Packet Commands

The command portion of the packet can contain one (and only one) command string for the display. Command strings can be used to Simulate inputs, display data, flash data on the display, change display color on tri-color displays, or control the optional relay. Each of these commands is fully described below.

To accomplish more than one command (e.g. flash data on the display and turn the relay on), you must send a separate packet for each command.

Remember that the control characters <SOH>, <CR> and <LF> cannot be used anywhere in the data portion of the packet, as they are reserved for marking the beginning and end of packets.

The following examples assume that addressing is not being used, and that Terminator has been selected as <CR>. Also note that the header of the packet <SOH>s: has the effect of broadcasting to all displays, overriding any group or individual address a display might be set to.

87/805 Users Manual 13


Simulate An Input

The Input command string begins with the ASCII character I (49 hex/73 decimal). Note that the I must be upper case. The rest of the data consists of a ASCII character which represent the input to simulate. The available inputs are:

Input ASCII Character Hex/Decimal Representation

Input 1 1 31 hex/49 decimal

Input 2 2 32 hex/50 decimal

Reset R 52 hex/82 decimal

To Simulate...

Transmit

Input 1

<SOH>s:I1<CR>

Input 2

<SOH>s:I2<CR>

Reset

<SOH>s:IR<CR>


Display Data

Data to be displayed is preceded by the ASCII character D (44 hex/68 decimal). Note that the D must be upper case. The data will be displayed in a fixed (non-flashing) manner. Data sent to the unit using this command will remain on the display until an input is received or power loss.

To Show On The Display...

Transmit

1234

<SOH>s:D1234<CR>

888.8

<SOH>s:D888.8<CR>


Flash Data

Data to be displayed flashing is preceded by the ASCII character F (46 hex/70 decimal). Note that the F must be upper case. The data will be displayed flashing. Data sent to the unit using this command will remain on the display until an input is received or power loss.

To Flash On The Display ...

Transmit

1234

<SOH>s:F1234<CR>

888.8

<SOH>s:F888.8<CR>



14 87/805 Users Manual


Change Color (For Tri-color Display's)

Some 87 series displays are available with a tri-color display option. With the tri-color option, each digit color can be individually set to red, yellow or green.

The Color command string begins with the ASCII character C (43 hex/67 decimal). Note that the C must be upper case. The rest of the data consists of a string of upper case ASCII characters which represent the color each digit of the display should be set to, starting with the most significant (left most) digit. The available colors are:

Color ASCII Character Hex/Decimal Representation

Red R 52 hex/82 decimal

Yellow Y 59 hex/89 decimal

Green G 47 hex/71 decimal

If the C command is sent with only one color character (for example CR), the entire display will be set to that color. The Color command takes effect as soon as it is received.

To Set The Display Color To...

Transmit

All Yellow

<SOH>s:CY<CR>

2 Digits Red, 2 Digits Green

<SOH>s:CRRGG<CR>


Activate Relay

An optional relay output board can be added to the 87/805 display for additional annunciation.



WARNING

Use the relay for annunciator applications only. Do not use it for control.





The Relay command string begins with the ASCII character R (52 hex/82 decimal). Note that the R must be upper case, and must be followed by one character (which determines what relay action will occur). The available actions are:

Action ASCII Character Hex/Decimal Representation

Turn relay on 1 31 hex/49 decimal

Turn relay off 0 30 hex/48 decimal

Sequence A A 41 hex/65 decimal

Sequence A is a user definable relay sequence (e.g. cycle the relay 20 times with each cycle consisting of 1.0 second on and 2.0 seconds off), which can be triggered with one command. For more information about the user definable relay sequence, please refer to Chapter 3 Advanced Features Of The 87 Series Display.

87/805 Users Manual 15



To....

Transmit

Turn the relay on

<SOH>s:R1<CR>

Turn the relay off

<SOH>s:R0<CR>

Trigger Sequence A

<SOH>s:RA<CR>


2.3 Addressing Multiple Displays

Using an RS-422 or RS-485 network (described in the Add On Module Users Manual) together with addressing allows a host computer or PLC to communicate with specific individual displays or groups of displays in a network. Each display in the network may be assigned a unit address and a group address. If you do not need to address individual displays, or groups of displays, skip this section.

Unit Address

Individual unit addresses can range from 0 to 255, allowing up to 256 displays to be individually addressed in a network. The factory default unit address is 0.

If a packet is directed to a specific unit address, only units set to that address will respond to the data. More than one display may use the same unit address. Remember, if the data in the packet is meant for a specific unit address, the serial data type S must follow the <SOH> character in the transmission packet (as shown in the examples below).

The following examples assume that Unit Address is set to 10, checksums are not being used, and that Terminator has been selected as <CR>. Also note that an upper case S follows the <SOH> indicating that the serial data is intended for an individual display address, and the D command character is being used to display data.

To Show Only On Displays With A Unit Address Of 10...

Transmit

1234

<SOH>S10:D1234<CR>

888.8

<SOH>S10:D888.8<CR>



16 87/805 Users Manual


2.4 Using Checksums And Command Acknowledgments

Using checksums and command acknowledgments can improve the reliability of data transfer between the host device and the display. They are optional features of the simple packet protocol - either or both can be used.

Checksums allow the display to check if data has become corrupted during transmission from the host device to the display. Command acknowledgments are used to let the host device know if data received by the display can be acted upon (i.e. the data is valid for the command transmitted, and the command and data are appropriate for the particular display). If checksums are being used, command acknowledgments also provide a means of letting the host device know that the data was received with a proper checksum.

If you are interested in using checksums and/or command acknowledgment to improve data transfer reliability, please request the Advanced Applications Guide.


87/805 Users Manual 17


Chapter 3 Advanced Features Of the 87 Series Display

The 87/805 has been designed in such a way that it can be customized to meet a users specific requirements. The unit is shipped from the factory set to DIP switch settings. The DIP switch settings allow the user to select the Unit type, Input speed for input 1 and input 2, and the counter type. The DIP switch settings have been selected so that a majority of users can setup the display with minimal effort.

Additional settings such as right justified data, leading zeroes blanked, no fixed decimal point, and a factor of 1 are programmed at the factory and are not DIP switch selectable. Applications that do not fit the DIP switch settings can be accommodated by using VDP4 to customize the operation of the 87/805 display. VDP4 is a WindowsTM based utility that is available from Vorne. To bypass the DIP switch settings, DIP switch 2 should be set to VDP4 (off). Setting the unit to VDP4 settings allows the unit to operate with the settings that are stored in a EEPROM on the displays logic board.

For additional information on topics discussed in this chapter, request the Advanced Applications Guide.

3.1 VDP4 Options

The following is a list of 87/805 options that can be programmed using VDP4.

Display Justification

Available selections are Left or Right Justify.

Leading Zeroes

Available selections are Do Not Blank or Blank leading zeroes.

Fixed Decimal Point After Digit

Available selections are None, 1, 2, 3, 4, 5, 6, 7, or 8.

Number of Display Digits

Available selections are 2, 3, 4, 6, or 8.

Counter Mode

The function of Input 1, Input 2 and the reset input can be defined. Available options include count up, count down, reset, count / rate, quadrature X1 X2 and X4.


18 87/805 Users Manual


Input Active Level

The input active level for each input can be set to active high or active low. Debounce Time

The debounce time of each input can be individually set. The debounce time is used to filter out false inputs due to contact bounce from a relay or switch input.

Counter Reload Value

Counter Reload value is the value that the unit will display when a reset input is received. Scale Factor

A scale factor can be defined for each count input. The scale factor setting determines the amount that each input event will increment or decrement the display value.

Save on Power Down

Saving the current display value in memory upon loss of power can be enabled or disabled. Count Below Zero

Counter modes defined with count down inputs can be defined to count below zero (negative numbers) or stop at zero.

Trigger Value

Two trigger values are available. When the display value crosses a trigger value, a number of operations can be simultaneously triggered. Available operations are two different flash rates, Relay activation, Stop counting, Reset to reload value or change display color (tri-color displays only).

Relay Setup

Relay Sequence A is user definable as either a Delay On Relay or Cycle Relay. The Delay On Relay selection allows adjustment of the delay and duration time. These settings are adjustable from .1 to 25.5 seconds. The Cycle Relay selection allows specifying the ON time (.1 to 25.5 seconds), OFF time (.1 to 25.5 seconds), and number of cycles (adjustable from 1 to 255 times).

Baud Rate

Available selections are 300, 600, 1200, 2400, 4800, 9600, 19200, or 57600.

87/805 Users Manual 19


Data Bits

Available selections are 7 or 8.

Terminator

The Terminator selection specifies which character ends the transmission. Available selections are <CR> or <LF>.

Unit Address

Unit Address allows you to select an individual unit address. Individual unit addresses can range from 0 to 255, allowing up to 256 displays to be individually addressed in a network.

Member of Group(s)

Member of Group(s) allows you to select any combination of up to eight display groups that the display can belong to. A packet addressed to a specific group or combination of groups will only be acted on by displays belonging to the group(s). Available selections are 1 to 8.

Checksum

This is an optional part of the packet that can be used to provide an extra level of data validation. If used, the checksum immediately follows the Terminator character.

Command Acknowledgment

Command acknowledgments are used to let the host device know if data received by the display can be acted upon (i.e. the data is valid for the command transmitted, and the command and data are appropriate for the particular display). If checksums are being used, command acknowledgments also provide a means of letting the host device know that the data was received with a proper checksum.

Output Transmission

Output transmission data can be used to poll an auxiliary device for data, or send the display value to a remote computer. The format of the data to be transmitted and the transmit interval can be defined.


20 87/805 Users Manual


Appendix A Operating Specifications

LED Life 100,000 hours typical

Peak Wavelength

Red 660nm

Yellow 592nm

Green 568nm

Count Input characteristics

High Level

Low Level

Input loading

Leakage current accepted

Low Speed

High Speed

3.5 to 30 VDC

0 to 1.5 VDC

1.5mA to 10mA (5V-30V)

500 uA

50 Hz (10 millisecond on/off time)

4000 Hz (120 microsecond on/off time)


Memory 100,000 Read / Write cycles, 100 year retention

Serial Input RS-232, RS-485 Optional

Optional Relay Output Single Pole Double Throw Rated 120VAC @ 1A

Power Supply 120 VAC +/- 15% (50 - 60 Hz)

12 VDC +/- 5%

Power Requirements All power requirements in the following table are listed in VA (Volt Amps).

Digit Type

Red Or Yellow Display


 2 Digit

 3 Digit

 4 Digit

 6 Digit

  8 Digit

4" Discrete Segment

NA

6.62

8.3

11.65

15

4" Solid Segment

NA

13.25

16.6

23.3

30

6" Discrete Segment

9.9

13.25

16.6

23.3

30

8" Discrete Segment

14.84

19.87

24.9

34.95

45.01

12" Discrete Segment

19.79

26.49

33.2

46.6

60.01


For Green Displays, multiply the current value in the table by 1.25.

For Tri-Color Displays, multiply the current value in the table by 2.5.

Temperature Range Operating 32 to 122 degrees F (0 to 50 degrees C)

Humidity 5% to 95% non-condensing

87/805 Users Manual 21




Appendix C Display Dimensions

The 87 Series display was designed to be suspended from a pair of chains. Make sure that the supporting chain can support the weight of the display. Failure to follow this warning could result in damage to property, or personal injury.


A

B

C

D

4" Display 3 Digit

12.75

8.40

11.75

5.70

4" Display 4 Digit

16.30

8.40

15.30

5.70

4" Display 6 Digit

23.40

8.40

22.40

5.70

4" Display 8 Digit

30.50

8.40

29.50

5.70

4" Display 12 Digit

44.70

8.40

43.70

5.70

4" Display 16 Digit

58.90

8.40

57.90

5.70

4" Display 20 Digit

73.10

8.40

72.10

5.70

6" Display 2 Digit

12.90

10.40

11.90

7.70

6" Display 3 Digit

18.30

10.40

17.30

7.70

6" Display 4 Digit

23.70

10.40

22.70

7.70

6" Display 6 Digit

34.50

10.40

33.50

7.70

6" Display 8 Digit

45.30

10.40

44.30

7.70

8" Display 2 Digit

15.90

12.40

14.90

9.70

8" Display 3 Digit

22.80

12.40

21.80

9.70

8" Display 4 Digit

29.70

12.40

28.70

9.70

8" Display 6 Digit

43.50

12.40

42.50

9.70

8" Display 8 Digit

57.30

12.40

56.30

9.70

12" Display 2 Digit

22.80

16.40

21.80

13.70

12" Display 3 Digit

33.15

16.40

32.15

13.70

12" Display 4 Digit

43.50

16.40

42.50

13.70

12" Display 6 Digit

64.20

16.40

63.20

13.70

12" Display 8 Digit

84.90

16.40

83.90

13.70

All Dimensions in inches.

87/805 Users Manual 23


Human Resources Policy Manual (HRPM)

Volume 4: Employee Relations

ER-4.1

Standards of Conduct

This Chapter applies to: (1) Non-bargaining unit employees/positions (2) bargaining unit employees/positions, except those employees/positions where any bargaining obligation has not been met or where the applicable collective bargaining agreement contains conflicting provisions.

Chapter established: August 11, 2000

This version effective: September 28, 2015

Background information: A pen and ink change is made to this Chapter to remove reference to the Human Resource Operating Instruction (HROI) – Drugs and Alcohol in Paragraph 15 a.

1. Policy: All Federal Aviation Administration (FAA) employees are expected to comply fully with the letter and spirit of the Standards of Conduct set forth in this Human Resources Policy Manual (HRPM) and with those contained in FAA Order 3750.7, Ethical Conduct and Financial Disclosure. The agency's policy on employee conduct applies to all FAA employees and is designed to encourage employees to maintain a level of behavior and performance that will promote the efficiency of the Federal service and conform to accepted ethical principles.

An employee's conduct on the job has a direct bearing on the proper and effective accomplishment of official duties and responsibilities. Employees are expected to approach their duties in a professional and business like manner and maintain such an attitude throughout the workday. It is also expected that employees will maintain a professional decorum at all times while in a temporary duty travel status or otherwise away from their regularly assigned post of duty, such as telecommuting, whether at home or at a telecommuting site, or attending training. Employees who enter Government work space, even on their regular day off, must maintain a professional attitude and decorum. Those employees in direct contact with the public bear a heavy responsibility as their conduct and professionalism significantly impacts the image of the Federal service and the FAA.

Employees are also expected to conduct themselves off-duty in a manner which will not adversely reflect on the agency's ability to discharge its mission, cause embarrassment to the agency by the employee's activity or behave in a manner that will cause the public and/or managers to question their reliability, judgment and trustworthiness in carrying out their responsibilities as employees of the Federal Government.

2. Employee Responsibilities: All employees are responsible for conducting themselves in a manner, which will ensure that their activities do not discredit the Federal Government and the FAA. Employees must observe the following basic on-the-job rules:

a. Regular attendance, report for work on time and in a condition that will permit performance of assigned duties (i.e., in appropriate clothing and/or outfitted with required tools or equipment; free from any effects of alcohol and/or drugs that impair job performance or conduct; physically fit as needed by job requirements; and in a mentally alert condition to perform the duties of his/her position).

b. Render full and industrious service in the performance of assigned duties. Keep manager fully apprised of the status of assignments in an effort to ensure an efficient workflow.

c. Respond promptly to, and fully comply, with directions and instructions received from their manager or other management officials.

d. Exercise courtesy and tact at all times in dealing with fellow workers, managers, contract personnel and the public. Employees must treat everyone with dignity and respect and support and assist in creating a

Human Resource Policy Manual (HRPM) Effective 09/28/2015

ER-4.1 FAA Standards of Conduct Page 1 of 11


productive and hospitable work environment. Employees are obligated to avoid disrespectful, abusive or other inappropriate behavior toward other personnel, management officials and customers.

e. Maintain a clean and neat personal appearance to the maximum practicable extent during working hours. Employees are expected to dress appropriately in clothing that communicates professionalism appropriate to the position held. Individual decisions related to dress should reflect sound and professional judgment.

f. Safeguard and handle appropriately all classified information and unclassified information that should not be given general circulation as provided for in FAA Order 1600.2, Safeguarding Controls and Procedures for Classified National Security Information and Sensitive Unclassified Information.

g. Conserve, protect and assure appropriate use of Federal funds, time, property, equipment, materials, information and personnel (both Federal and contract).

h. Observe and abide by all laws, rules, regulations and other authoritative policies and guidance, written and unwritten. Employees will familiarize themselves with the Standards of Conduct contained in this Human Resources Policy Manual (HRPM), as well as, the Standards of Ethical Conduct for Executive Branch Employees, 5 CFR Part 2635, transmitted by FAA Order 3750.7, Ethical Conduct and Financial Disclosure.

i. Immediately report known or suspected violations of law, regulations or policy through appropriate channels and fully participate in inquiries. For instance, this includes immediately reporting an operational error or deviation or reporting any personal violation that has the possibility or appearance of impacting on the employee's position (e.g., employees occupying safety- or security-sensitive positions reporting an arrest for an alcohol or drug-related infraction before the start of their next scheduled work shift and, in addition, safety-sensitive employees must report such an infraction within 48 hours to the Regional Flight Surgeon).

j. Uphold with integrity the public trust involved in the position to which assigned.

k. Observe and abide by prohibitions against any violent, threatening, harassing and/or confrontational behaviors towards others, as well as prohibitions on discrimination and misconduct of a sexual nature.

l. Report any change in address and/or telephone number to their manager as soon as possible.

3. Managers’ Responsibilities: In addition to the responsibilities described above, managers, which includes agency management officials at all levels and team leaders, are also responsible for applying the FAA’s conduct and discipline program to employees under their supervision. Managers must:

a. Remind employees to review the Standards of Conduct addressed in this Human Resources Policy Manual (HRPM). Also, managers must ensure that employees have reviewed, at least once, the Standards of Ethical Conduct for Executive Branch Employees, 5 CFR Part 2635, transmitted by FAA Order 3750.7, Ethical Conduct and Financial Disclosure. In addition, managers shall ensure that those employees required to complete a financial disclosure are reminded of their obligation to do so and reminded of the need to attend the mandatory annual training.

b. Provide positive leadership and serve as a role model for their subordinates by demonstrating a commitment and sense of responsibility to their job and loyalty to the organization.

c. Treat their employees with dignity, respect and in a fair and equitable manner in conformance with the FAA Model EEO Program. In addition, managers will communicate to their staff that they will not tolerate or condone discrimination, or the appearance of discrimination, on the part of any employee.

d. Promptly notify their servicing security organization and their servicing Human Resources Management Division (HRMD) Labor/Employee Relations Staff, of known or suspected criminal activity on the part of employees; and in accordance with FAA Order 1600.1(series), Personnel Security Program, report any

Human Resource Policy Manual (HRPM) Effective 09/28/2015

ER-4.1 FAA Standards of Conduct Page 2 of 11


information that would raise doubts about an employee’s continued eligibility for access to classified information.

e. Embrace, fully support and comply with all DOT and FAA regulations, policies and programs. Take necessary corrective action when employees under their supervision commit offenses in violation of policies or programs.

4. Safeguarding and Use of Information, Documents and Records: Employees shall ensure the proper handling of Government records and shall not disclose or discuss any sensitive unclassified information (SUI). SUI includes any unclassified information, in any form (i.e., print, electronic, etc.) that must be protected from uncontrolled/unauthorized release to persons inside or outside the FAA. The FAA generally handles four types: "For Official Use Only (FOUO)"; Sensitive Security Information (SSI); Sensitive Homeland Security Information (SHSI); and Protected Critical Infrastructure Information (PCII). Such information may not be released unless specifically authorized to do so, or as required, on a "need-to-know" basis, in the proper discharge of official duties. Examples of such information include drug and alcohol testing information (e.g., random testing schedules), EEO matters (e.g., complaints, settlement/resolution agreements, etc.) or Personal Identifiable Information (PII) (Privacy Act information). Classified information shall not be disclosed to anyone who does not have the appropriate security clearance. See FAA Order 1600.2(series), Safeguarding Controls and Procedures for Classified National Security Information and Sensitive Information, for additional information. In addition, employees shall not:

a. Divulge any official information obtained through or in connection with their Government employment to any unauthorized person or organization.

b. Release any official information in advance of the time prescribed for its authorized issuance.

c. Use, or permit others to use, any official information for private purposes that is not available to the general public.

d. Remove official documents or records from files for personal or inappropriate reasons. Falsification, concealment, mutilation or unauthorized removal of official documents or records, either hard copy or automated, is prohibited by law. Any employee who knowingly provides inaccurate information strikes at the heart of the employee-employer relationship and impeaches the employee’s reliability, veracity, trustworthiness and ethical conduct. Employees occupying safety- or security-sensitive positions and/or testing designated positions (TDP), are held to a higher standard when completing official documents directly related to the safety of the national airspace system (NAS), such as FAA Form 8500-8, Application for Airman Medical Certificate or SF-86, Questionnaire for National Security Positions.

e. Disclose any Personal Identifiable Information (PII) information or information contained in Privacy Act records, except as provided in FAA Order 1280.1(series), Protecting Personally Identifiable Information, which implements the various laws, regulations and mandates as it related to Privacy within the FAA. Individuals who demonstrate egregious disregard or a pattern of error in safeguarding PII will have their authority to access information or systems removed.

5. Safeguarding Public Funds: All employees whose duties involve the expenditure of public funds must have knowledge of and observe all applicable legal requirements and restrictions. In addition, employees are expected to be prudent and exercise sound judgment in the expenditure of such funds.

a. Unauthorized Commitments: Only contracting officers and other designated employees, acting within the scope of their authority, may enter into contracts or other agreements and expend funds on behalf of the Government. An agreement that is entered into by an FAA employee who does not have the authority to enter into agreements on behalf of the FAA is an unauthorized commitment. Unauthorized commitments are a serious violation of fiscal law and statutes. Persons who enter into unauthorized commitments will be held accountable. Managers shall make every effort to prevent unauthorized commitments and must consider whether discipline is appropriate for an employee who enters into an unauthorized commitment regardless of whether the procurement action is later ratified. See Section 3.1.4, "Contracting Authority" of the Acquisition Management System or Section T3.1.4 of the FAA Procurement Toolbox Guidance for additional information.

b. Personal Services Contracts: An FAA employee shall not award or be involved in the award or administration of personal services contracts unless specifically authorized in accordance with the policy and guidelines contained in the FAA Acquisition Management System. Additionally, employees will

Human Resource Policy Manual (HRPM) Effective 09/28/2015

ER-4.1 FAA Standards of Conduct Page 3 of 11


avoid all appearances of improper association with contract personnel. A personal service contract is a contract that, by its expressed terms or as administered, establishes what is tantamount to an employer-employee relationship between the Government and the contractor’s personnel. Such a relationship is created when the Government exercises relatively continuous supervision and control over the contractor personnel performing the contract. See Section 3.8.2.3, “Personal Services Contracts” of the Acquisition Management System or Section T3.8.2 of the FAA Procurement Toolbox Guidance for additional information. If a legal determination is required, contact the Office of Chief Counsel.

c. Disclosure of Proprietary or Source Selection Information: No procurement official or other employee who is given authorized or unauthorized access to proprietary or source selection information regarding a procurement shall disclose such information directly or indirectly to any person other than a person authorized by the FAA Administrator or the contracting officer to receive such information. An employee, who does not know whether information is proprietary or source selection information or who does not know whether he or she may disclose or receive such information, has an affirmative obligation to inquire of the contracting officer or the Procurement Legal Division whether the information is proprietary or source selection sensitive. See Section 3.1.6, "Disclosure of Information" of the Acquisition Management System or Section T3.1.6 of the FAA Procurement Toolbox Guidance for additional information.

6. Use of Federal Equipment, Property, Time, Funds and Personnel: Employees may not use or permit others to use Federal equipment, property, time, funds/Governmental monies or personnel, including but not limited to stenographic and typing assistance, computer hardware, software, telecommunication capabilities, cellular communication devices and services, duplicating services, mail services (internal and external) or chauffeur services, for other than official business or officially approved or sponsored activities.

a. Government telephones, including facility interphones, are provided for use in conducting official business. Occasionally, employees are permitted to make authorized personal calls that are considered necessary in the interest of the Government. Refer to FAA Order 1830.8, Federal Telecommunications System, Calling Cards and General Government Telephone Usage, for examples of authorized

personal calls.

b. Employees may not have their personal mail directed to their place of employment. Exceptions to this policy may be granted by managers in unusual circumstances such as when an employee is on travel over 50 percent of the time or for employees in an overseas post of duty.

c. The use of U.S. Government-furnished postage, either metered or stamps, for personal benefit or advancement, including application for a Federal position, is prohibited by 18 USC 1719. The use of other mailing services for personal use and paid for by the FAA is also prohibited. Employee organizations and their members are also prohibited from using Government or FAA paid mailing services to distribute organizational information or conduct organizational business.

d. Employees are prohibited from using the Government contractor-issued travel credit card for personal use. Employees will seek reimbursement of legitimate official business expenses within five (5) working days after completion of a trip or period of travel, or every 30 days if the employee is on continuous travel status. Prompt payment of account balances is mandatory in order to avoid delinquency and embarrassment to the FAA. Misuse of the travel credit card includes, but is not limited to: failure to timely file a travel voucher resulting in delinquency; failure to pay account balance after reimbursement; obtaining travel advances that exceed expected expenditures; personal use to include ATM

withdrawals; delinquency in excess of 60 days; inappropriate purchases of wireless cell

devices/services and failure to report the loss of the travel card, safeguard the travel card or PIN resulting in unauthorized use. See FAA Travel Policy, Chapter 302, for further information.

e. Government Purchase Card: All cardholders are responsible for executing card transactions within assigned dollar thresholds and in accordance with applicable procedures. The cardholder must safeguard the purchase card and card number and assure that all transactions are supported by appropriate documentation. The cardholder and approving officials are responsible for assuring that the purchase card is not used for prohibited purchases. See FAST Procurement Toolbox T3.2.2.5., for in-depth information about the use of the purchase card.

f. Computers: All Internet and electronic media access accomplished by FAA users (utilizing Government supplied resources) shall be consistent with assigned duties and responsibilities or

Human Resource Policy Manual (HRPM) Effective 09/28/2015

ER-4.1 FAA Standards of Conduct Page 4 of 11


consistent with the official business interests of the FAA. Incidental, non-government use of the Internet and Government-owned computers is permissible as long as such use does not interfere with official business and involves minimal additional expense to the Government. Such incidental use must not violate any Federal or FAA rules, regulations or policies. All employees are subject to unannounced periodic monitoring to assure that the employee is not engaging in any activity that would discredit the FAA. Non-permissible use includes, but is not limited to: seeking, transmitting, collecting or storing defamatory, discriminatory, sexually oriented, harassing material; propagating chain letters or broadcasting inappropriate or unsolicited messages; concealing or misrepresenting user identity or affiliation; using FAA resources for commercial purposes, financial gain or in support of outside individuals or entities; engaging in unauthorized fundraising, lobbying or political activities; etc. See FAA Order 1370.79(series), Internet Use Policy, FAA Order 1370.81, Electronic Mail Policy, FAA Order 1370.82, Information Systems Security Program, and DOT H 1350.2, DOT Internet Policy, for further information.

g. Employees who willfully use or authorize the use of passenger carriers for other than official business shall be suspended for at least one month or longer as warranted, or summarily removed from the Service, as mandated by 31 USC 1349 (b). Passenger carrier includes motor vehicle, aircraft, boat, ship or other similar means of transportation owned or leased by the U. S. Government. Employees will also be held accountable for inadvertent misuse of a Government vehicle. In these instances, discipline will be applied in accordance with the Table of Penalties for misuse of Government property. Refer to FAA Order 4670.2, Motor Vehicle Management, for information pertaining to the authorized use of a motor vehicle.

7. Observing Safety Regulations: Employees must observe all rules, signs and instructions relating to personal safety in the workplace. See FAA Order 3900.19(series), Occupational Safety and Health for additional information. In addition to avoiding accidents, employees must report potentially unsafe or unhealthful working conditions and/or practices to their manager or the appropriate safety and health official, and cooperate fully with agency safety staff. Nonobservance of safety precautions, such as the acts described below, is prohibited:

a. Failure to report an accident involving injury to persons or damage to property or equipment.

b. Failure to use protective clothing or equipment (e.g., failure to use a safety climbing device when one is provided).

c. Endangering the safety of, or causing injury to, personnel or damaging property or equipment through negligence, dangerous horseplay and/or threatening or violent behavior.

d. Failure to wear a safety/seat belt while operating or occupying a motor vehicle while on official Government business. This includes operating a privately owned vehicle (POV), Government owned vehicle (GOV) and contract or leased vehicle. See DOT Order 3902.9(series) for additional information.

e. The District of Columbia and many States prohibit the use of a cell phone, unless it is hands-free, while operating a vehicle. In keeping with this safety precaution, employees are prohibited from using a cell phone, unless it is hands-free, while operating a government vehicle. Employees are also prohibited from any other unsafe activity while driving a government vehicle, such as text messaging.

f. Failure to report an operational error or deviation.

g. Failure to evacuate the premises during a fire alarm/drill or other order to vacate a work site. Failure to abide by the directions of a Floor Warden, safety, security or management official.

8. Absence and Leave:

a. All FAA personnel are expected to be dependable and reliable in attendance. Unplanned and frequent absences negatively impact the mission of the FAA and cause disruption to the workplace. Employees must schedule and use earned leave in accordance with established procedures. Employees must obtain prior approval of all absences from duty including leave without pay (LWOP). Employees are required to contact their manager, normally within one hour of the employee’s scheduled start time, to request and explain the need for unscheduled leave. Excessive unplanned absences negatively reflect on the employee's dependability and reliability.

Human Resource Policy Manual (HRPM) Effective 09/28/2015

ER-4.1 FAA Standards of Conduct Page 5 of 11


b. Sick leave cannot be granted for rest, minor inconvenience or in place of annual leave. Employees must provide sufficient information why sick leave is needed so the manager can determine whether the requested leave can be granted. Failure to provide adequate information will result in denial of the leave. Evidence of frequent unscheduled and/or questionable use of sick leave without medical documentation may result in the employee being placed under the terms of a leave restriction and/or charges of absence without leave (AWOL) and/or failure to follow leave requesting procedures. In accordance with the guidelines outlined in Human Resources Policy Manual (HRPM), Volume 8 Leave and Work Schedules, any absence that is not approved will be charged as AWOL.

c. Tardiness includes delay in reporting to work at the employee’s scheduled starting time, returning late from lunch or scheduled break periods and overdue return to the employee’s work site after leaving the work station on official business. Unexplained and unauthorized tardiness is prohibited and will be charged to AWOL, which can be recorded in one-minute increments. Also, employees will be charged AWOL for unauthorized early departures from the workplace.

9. Giving Statements and/or Testimony:

a. It is the duty and requirement of every employee to give oral and/or signed statements, as directed, to any manager, Special Agent or DOT official conducting an investigation, inquiry or hearing in the interest of the agency. Such statements must be complete and truthful.

b. When directed by the Administrator (or his/her authorized representative), an employee shall take an oath or make an affirmation about his/her testimony or written statement before an agent authorized by law to administer oaths, and the employee shall, if requested, sign his/her name to the transcript of testimony, affidavit or written statement which the employee provided. No employee may refuse to testify or provide complete and truthful information pertinent to matters under investigation or inquiry.

c. All employees must give complete and truthful information in response to requests received from Congress, the General Accounting Office, the Office of the Inspector General, the Office of Personnel Management or other duly authorized investigative bodies, regarding matters under their jurisdiction. It is FAA policy to fully cooperate with such bodies in the public interest. Employees must notify their manager, or their middle or senior-level manager if the inquiry concerns the front-line manager, of any such request.

d. Employees will produce any documentation held by the employee relative to any inquiry or investigation. Employees may not discuss their statements or testimony unless permitted by an authorized official.

10. Letters and Petitions to Congress: The use of appropriated funds to influence the consideration of legislation is prohibited by statute (18 USC 1913). However, the right of employees, either individually or collectively, to petition Congress or any member thereof or to furnish information to any committee or member of Congress is provided by law. While the FAA desires that employees seek to resolve any problem or grievance within the agency, any employee exercising the right to correspond with a member of Congress shall be free from restraint, reprisal or coercion. Employees may not use agency facilities, supplies, equipment, personnel and/or duty time when contacting, either orally, electronically and/or in writing, about personal business to anyone, including any committee or member of Congress.

11. Recording or Monitoring of Telephone Calls or Covert Recording, Video Taping or Monitoring of Conversations, Meetings, etc:

a. Telephone eavesdropping is prohibited. Advance notice must be given whenever another individual is placed on the line for any purpose whatsoever. An advance verbal warning must be given when an automatic recording device or a speaker telephone is used. The use of recording devices, portable or otherwise, on telephones shall be for official purposes and generally limited to areas involving air safety. This includes accident investigations, near-collision reporting, Command Communications Network and the Washington Tactical Switch. For further information, refer to FAA Order 1600.24(series), Listening-in to or Recording of Conversations on Telephones or Telecommunications Systems.

b. FAA employees, in the conduct of their official duties, may not use, aid in the use of, or ignore the improper use of, secret recording, video taping or monitoring equipment of any kind. Conversations shall be recorded for official purposes only, and only with the knowledge and consent of all those being recorded.

Human Resource Policy Manual (HRPM) Effective 09/28/2015

ER-4.1 FAA Standards of Conduct Page 6 of 11


c. Covert/secret taping, either audio or video, of any conversation or meeting occurring at the workplace or conversation or meetings off-site that deal with workplace issues and matters of official concern are prohibited. Examples of such meetings are promotion interviews, EEO meetings with a counselor or investigator, meetings between a manager and a subordinate, etc. This prohibition applies regardless of any State law which may permit covert/secret tape recording.

d. The prohibitions do not preclude the use of normal or standard types of recording equipment used openly in areas involving air safety or official investigations, or under circumstances wherein the prior concurrence of all parties is clearly and specifically indicated and understood.

e. In accordance with FAA Order 1600.69(series), Facility Security Management Program, Chapter 3, photography will not be permitted on or within an FAA facility. The Facility Manager must coordinate with the Regional Servicing Security Element (SSE) prior to allowing permission of any photography at an FAA facility.

12. Defamatory or Irresponsible Statements: While FAA encourages freedom of expression, employees are accountable for the statements they make and the views they express. Employees shall not make irresponsible, false, disparaging, disrespectful or defamatory statements which attack the integrity of individuals or organizations, or disrupt the orderly conduct of official business, nor may they make statements urging or encouraging other employees to act or speak irresponsibly, or to commit unlawful acts.

13. Workplace Violence: Violent, threatening, harassing and/or confrontational behaviors in any form are unacceptable and will not be tolerated. Threatening behavior may include harassment in the form of intimidation, or any oral and/or written remarks or gestures that communicate a direct or indirect threat of physical harm, or otherwise frightens, or causes an individual concern for their personal safety. Such inappropriate behavior may include pushing, poking, physically crowding, stalking, fist shaking, throwing objects regardless of the target of the object being thrown, name calling, obscene language or gestures, or any other intimidating or abusive action which creates a fearful environment and apprehension of harm. Employees and managers are responsible for enforcing the highest standards of personal safety and welfare at the workplace. Consequently, employees must immediately report threats of violence, violent incidents, dangerous horseplay, irrational or other inappropriate behavior to their managers.

14. Possession of Firearms: No employee, while in or on FAA/GSA-owned or leased property, to include Government and personal vehicles, shall carry or have in their possession, privately owned firearms or other weapons unless authorized by the FAA to do so in connection with his/her official duties, such as survival and emergency firearms in an operational area, such as the Alaskan Region. See FAA Order 1600.69(series), Facility Security Management Program, Appendix 12, for additional information. This prohibition applies regardless of any State law which may permit the carrying of firearms.

15. Drugs and Alcohol:

a. DOT Order 3910.1 (series) provides information on the drug and alcohol program and specifically identifies those FAA positions designated as TDP’s.

b. The FAA is concerned with the decision of any employee who inappropriately or illicitly uses illegal and legal substances. Illegal substances include, but are not limited to, cocaine, marijuana, opiates, amphetamines and phencyclidine. Legal substances include alcohol, prescription and over-the-counter (OTC) medications. These substances can affect the employee’s work performance and/or conduct and have an adverse impact on the employee’s credibility. For instance, a person’s credibility could be seriously impacted when an employee is in the workplace, and although not drunk, still smells of alcohol. Often others do not wish to work around a person smelling of alcohol or do not trust the judgment or decision making skills of the employee.

c. As an employer with responsibility for aviation safety, the FAA is especially concerned when an employee’s actions could affect the safety or security of the National Airspace System (NAS) and/or the flying public. The confidence of the flying public depends upon absolute trust in the integrity of the air transportation system. FAA must be sure that employees are operating without the constraint of drugs or alcohol, or the consequences of such abuse, such as a hangover. Alcoholic beverages are prohibited on any FAA owned or leased property. Employees occupying Testing Designated Positions (TDP), who inappropriately or illicitly use substances, on or off the job, place their jobs in jeopardy. This includes arrest for drug and alcohol related crimes, such as driving under the influence (DUI).

Human Resource Policy Manual (HRPM) Effective 09/28/2015

ER-4.1 FAA Standards of Conduct Page 7 of 11


Employees must avoid this kind of off-duty behavior since it indicates irresponsibility and lack of judgment and is incompatible conduct while occupying a TDP. As stated in employee responsibilities, employees occupying safety- or security-sensitive positions must report an arrest for an alcohol or drug-related infraction before the start of their next scheduled work shift and, in addition, safety-sensitive employees must report such an infraction within 48 hours to the Regional Flight Surgeon. In addition, employees occupying safety-sensitive duties must immediately report to their manager any use of prescription and OTC drugs. The FAA will not allow any employee known to inappropriately or illicitly use substances to perform any safety- or security-sensitive duties until the FAA has determined that such an employee is no longer a risk to public safety or national security.

16. Eliminating Discrimination and Creating a Model EEO Program:

a. The FAA Personnel Management System (PMS), paragraph VIII, Prohibited Personnel Practices, prohibits discrimination against anyone on the basis of race, color, national origin, religion, age, sex, disability, sexual orientation, political affiliation or marital status. In addition, the Administrator's Non-Discrimination Policy Statement states that the FAA has a zero tolerance policy with respect to any form of discrimination and that disciplinary action may be taken against any employee found to have engaged in discriminatory conduct.

(1) The FAA is committed to providing a work environment where unlawful discrimination is eliminated and where the contributions of all employees are supported and encouraged without regard to non-merit factors. To facilitate this effort, the FAA developed the Model EEO Program that directly supports the FAA Strategic Plan. The precepts outlined in the Model EEO Program are applicable to all employees. All conduct must be appropriate and supportive of a hospitable and productive work environment. For instance, discriminatory conduct, the making of disparaging remarks, expressing stereotypical views or displaying and/or distributing offensive material are prohibited in the workplace.

(2) Every level of management is required to provide positive leadership and support for the agency’s EEO policies and programs through ensuring that all agency programs, practices and activities are developed and administered in accordance with pertinent laws and agency policy prohibiting discrimination. Managers must not engage in unlawful discrimination or inappropriate behavior in carrying out their authority to take, direct others to take, recommend or approve any personnel action with respect to FAA employees and applicants. Managers are responsible for taking proactive steps to create and maintain a workplace that is hospitable and free of discrimination, intimidation and other offensive behaviors and materials. Managers will be held accountable if they fail to take appropriate action to correct intimidating and offensive activity in the workplace.

b. Coercion or Retaliation: It is a violation of FAA policy to coerce, threaten, retaliate against, or interfere with any person in the exercise of rights prescribed under Title VII of the Civil Rights Act of 1964, as amended or the FAA Personnel Management System (PMS) of 1996. No employee shall be subject to retaliation for making a charge of discrimination, giving testimony, assisting, or otherwise participating in a complaint of discrimination; nor shall an employee be retaliated against for filing an EEO complaint or grievance or participating in the grievance process, or addressing his/her concerns through the Accountability Board (See FAA Order 1110.125), Administrator’s Hotline, Inspector General complaint, etc..

17. Sexual Harassment and Misconduct of a Sexual Nature: As an employer, the FAA is committed to providing a workplace that is free of sexual harassment or misconduct of a sexual nature. All employees have a right to work in an environment where they are treated with dignity and respect.

a. Sexual Harassment, pursuant to 29 CFR §1604, exists when unwelcome sexual advances, requests for sexual favors and other verbal or physical conduct of a sexual nature occurs and:

(1) Submission to such conduct is made either explicitly or implicitly a term of an individual's employment,

(2) Submission to or rejection of such conduct by an individual is used as the basis for employment decisions, or

(3) Such conduct has the purpose or effect of unreasonably interfering with an individual's work performance or creating an intimidating, hostile or offensive working environment.

Human Resource Policy Manual (HRPM) Effective 09/28/2015

ER-4.1 FAA Standards of Conduct Page 8 of 11


b. Misconduct of a Sexual Nature: This is conduct that may not rise to the statutory definition of sexual harassment, but is nonetheless inappropriate for the workplace and will not be tolerated. For instance, viewing and/or printing material of a sexual nature from the Internet is inappropriate.

c. Misconduct in Violation of the Agency's Policy: All employees have a responsibility to behave in a proper manner and to take appropriate action to eliminate sexual harassment or other misconduct of a sexual nature in the workplace. The FAA established the Accountability Board which addresses sexual misconduct exhibited at the workplace. See FAA Order 1110.125, Accountability Board, for more information. Examples of actions which are considered in violation of the agency's policy include, but are not limited to:

(1) Sexual teasing, jokes, remarks or questions.

(2) Sexually suggestive/offensive looks, leering, ogling, staring at a person's body, or sexually suggestive/offensive gestures or actions.

(3) Unwelcome letters, cards, cc mail messages and/or telephone calls.

(4) Posting, distributing, showing, viewing, accessing through the Internet or other electronic media sources, materials of a sexual nature. Sexually explicit materials are prohibited at the worksite, regardless of whether or not a specific complaint is filed.

(5) Pressure for dates.

(6) Inappropriate physical touching.

(7) Promise of benefit in exchange for sexual favors.

(8) Threat or act of reprisal for refusal to provide sexual favors.

18. Political Activity: It is the right of all employees to vote as they choose and to express their opinions on all political subjects and candidates as specifically authorized in the Hatch Act (5 USC 7321). However, employees are responsible for acquainting themselves with restrictions on partisan political activity and for not engaging in prohibited actions. Any political activity that is prohibited in the case of an employee acting independently is also prohibited in the case of an employee acting in cooperation with others or through an agent. Employees are accountable for political activity by persons other than themselves, including wives or husbands, if the employees are thus accomplishing by collusion and indirection what they may not lawfully do directly and openly. This does not mean that an employee's spouse may not engage in politics independently upon his or her own initiative and in his or her own behalf. See Title 5, Chapter 73, or 5 CFR Part 733 and 734 for additional guidance. Employees are encouraged to contact the Office of Special Counsel (OSC) to seek an advisory opinion whether any activity could be construed as a violation of the Hatch Act.

19. Holding Office in State or Local Government: No employee shall run for the nomination or as a candidate for a local partisan political office, except as expressly provided in Title 5, Chapter 73. Because of the unique interrelationship between the FAA and local and state government, employees are urged to seek the advice of their Regional or Center Counsel to help determine if a particular office represents a real or apparent conflict of interest. Employees who hold local or state office must observe both the letter and spirit of the prohibition on active participation in partisan politics.

20. Subversive Activity: In accordance with Title 5, Chapter 73, no employee shall advocate or become a member of any organization which the employee knows advocates the overthrow of the constitutional form of Government of the United States, or which seeks by force or violence to deny other persons their rights under the Constitution of the United States.

21. Striking: No employee shall engage in or encourage another Federal employee to engage in a strike, work stoppage, work slowdown, or sickout involving the Federal Government. See Title 5, Chapter 73, for further information.

22. Canvassing, Soliciting or Selling: Employees shall not engage in private activities for personal or non-personal financial gain or any other unauthorized purpose while on Government owned or leased property, nor may Government time, personnel or equipment be utilized.

Human Resource Policy Manual (HRPM) Effective 09/28/2015

ER-4.1 FAA Standards of Conduct Page 9 of 11


a. This prohibition applies specifically, but is not limited to, such activities as:

(1) Canvassing, soliciting or selling, particularly for personal or private monetary gain. This prohibition also applies to such efforts for charities, schools, etc., except when directly linked to the agency-wide Combined Federal Campaign effort each year.

(2) Canvassing or soliciting membership, except as authorized in connection with organized, sanctioned employee groups.

(3) Soliciting contributions from other employees for a gift to anyone in a superior official position in contravention of FAA Order 3750.7. This prohibited activity applies on or off Government premises. However, this prohibition does not apply on occasions of special significance (e.g., retirement, marriage, etc.) as long as the contribution is voluntary and a nominal amount. See FAA Order 3750.7, Appendix 6, Subpart C, Gifts Between Employees.

b. This prohibition does not apply to:

(1) Activities that are specifically authorized by appropriate authority.

(2) Soliciting contributions for charitable, health, welfare and similar organizations as authorized by appropriate authority (e.g., Combined Federal Campaign).

(3) Those activities of voluntary groups of Federal employees commonly accepted as normal social, welfare or recreational functions of such groups.

(4) A spontaneous, voluntary collection for an employee in connection with marriage, birth of a child, illness, retirement or as an expression of condolence, or other significant life activity, when conducted by co-workers of approximately equal status to the employee.

23. Borrowing and Lending Money: Managers shall not borrow money from subordinates or have a subordinate act as an endorser or co-maker of a note given as security for a personal loan. Neither shall an employee lend money to any other employee, superior official or peer, for the purpose of monetary profit or other gain. These prohibitions do not apply to the operation of recognized credit unions or to employee welfare plans.

24. Accepting Notarial Fees: An employee who is a notary public shall not charge or receive fees for

performing notarial acts in connection with his or her official duties. The prohibition on acceptance of fees does not apply to notarial acts performed in an unofficial capacity during off-duty hours and off Government-controlled property.

25. Meeting Financial Obligations: All employees are expected to discharge their just financial obligations, especially those such as Federal, state or local taxes. Employees are also expected to honor all other valid debts, including personal commercial debts, Government contractor-issued credit card debts, claims based on court judgments, Federally insured student loans and tax delinquencies, and to make and adhere to arrangements for settlement of debts.

26. Accepting Gifts: With certain exceptions, FAA Order 3750.7, Ethical Conduct and Financial Disclosure, Appendix 6, Subpart B, prohibits employees from accepting any gifts, favors, gratuities, or any other thing of monetary value, including free transportation, from any person or company that is subject to FAA regulations, that has or is seeking to have contractual relations with FAA, or that has interests that might be affected by the performance or non-performance of the duties of the particular employee. See FAA Order 2700.20(series), Gifts and Bequests and FAA Order 3750.6(series), No-Charge Transportation Provided by State and Local Government Agencies for Official Travel by FAA Employees, for additional information.

27. Outside Employment and Financial Interests: Employees must comply fully with the letter and spirit of the guidance and information relating to outside employment and financial interests contained in FAA Order 3750.7, Ethical Conduct and Financial Disclosure, Appendix 6, Subparts D and H, and in DOT Supplemental Regulations, 5 CFR 6001.

28. Reporting Violations: As mandated under “Employee Responsibilities,” and FAA Order 1600.38 (series) it is the duty of every employee to report any known or suspected violation of law, regulation or policy to their

Human Resource Policy Manual (HRPM) Effective 09/28/2015

ER-4.1 FAA Standards of Conduct Page 10 of 11


manager, the servicing security organization, the Administrator’s Hotline, or the Inspector General, etc. Employees are obligated to preserve information and evidentiary items that may relate to the suspected violation and to release such information as directed. Failure to report a violation may result in discipline unless the failure to report is justified by applicable law. In rare instances, when reporting a violation of sexual harassment, misconduct of a sexual nature or other discriminatory behavior through the managerial chain is not feasible, the employee must notify the Accountability Board (FAA Order 1110.125).

Related Information

Policies

* FAA Order 1110.125, Accountability Board

Human Resources Operating Instructions

* Table of Penalties

* Addressing Findings of Discrimination

Reference Materials

* Douglas Factors In-Depth

Revision History Log

Date

Revision

August 11, 2000

HRPM ER-4.1 established

September 29, 2006

Paragraph 16 revised from Model Work Environment (MWE) to Model EEO Program in compliance with EEOC MD-715 requirements however effective date was maintained as 0811-2000.

July 1, 2008

Amended to enhance and clarify various policy statements and to add policy statements.



Human Resource Policy Manual (HRPM) Effective 09/28/2015

ER-4.1 FAA Standards of Conduct Page 11 of 11


ZKTeco License Activation Software User Manuel

ZKTeco License Activation Software is suitable for all ZKiVision software with face identification function.

Before using this software, please make sure that the USB dongle has been connected with PC.

ZKTeco USB dongle is suitable for all PC with USB interface. It can communicate with PC through USB.

This software is only for activating License. If want to use the complete function of face identification, please refer to ZKiVision software user manual.

Start the Activation Software

This activation software is in the form of ZIP file, which can be got from ZKTeco. Before use, please make sure WINRAR or WINZIP software have been installed in your PC.

After start-up, the software will detect automatically whether there is an USB dongle connected in PC as below picture:


If no USB dongle has been detected, wrong information will be displayed as below picture:



Here, you can click "Try" button to start re-detection, or click the close button in top right corner to close this software, and check whether the USB dongle is connecting well.

Run Activation

If an USB dongle is detected by the activation software, below notification will be displayed:


If you want to active the USB dongle, please click "Next". If not, please click "Back"

and withdraw the software.

If you choose activate the USB dongle, below information will be displayed:



After waiting for a while, activation result will be showed in the screen. If succeed, below information will be displayed:


?Notes:

1) Please close ZKiVision software then activate the license.

2) Please disable the face function in ZKiVision software before unplug the USB dongle.

3) If license activation is not successful, may the following two reasons:

a) The dongle service program is intercepted by security software -- Please shut down the security software.

b) Windows 2007 operating system access to the license activation software is not successful, Please right click the activation software and choose "Run as administrator".


COMSTAT

USER MANUAL

(REVISED 2/10-2000)

Written by

Arne Heydorn

aheydorn1@gmail.com


COMSTAT is a program for quantification of three-dimensional biofilm structures. It analyzes stacks of images acquired with confocal laser scanning microscopy (SCLM). It was written as a script in MATLAB 5.3 (The MathWorks Inc., Natick, Massachusetts), equipped with the Image Processing Toolbox. The program is menu controlled, user-friendly, and requires no prior knowledge in programming or image analysis. MATLAB 5.3 equipped with the Image Processing Toolbox must be available on your computer. Later versions of MATLAB will also work fine. Many universities have special campus licences for MATLAB. You can check out the MathWorks homepage at www.mathworks.com for details on how to obtain MATLAB.

1. Installing and using the programs

      The COMSTAT package (i.e. all the files you receive) contains five programs (COMSTAT, CHECKALL, LOOK, LOOKTIF and CONVERT000) and a number of functions used by the four programs. Place all the files in the folder MATLABR11/work. If this folder exists on your computer you don't have to do anything else. Alternatively, place the program files in any folder you desire and add this folder to the path in MATLAB (see the MATLAB help desk on how to add a folder to the MATLAB path). Each of the programs is started by typing the name of the program on the command line in MATLAB and pressing <ENTER>. However, the programs must be started in the folder containing the image stacks. Use the MATLAB commands dir, pwd, cd .., cd <folder> to change to the directory containing the images. Any of the programs can be stopped during execution by pressing <CTRL><C>.

2. Image formats

      COMSTAT analyzes image stacks acquired with SCLM. Unfortunately, different confocal microscopes (Leica, Zeiss, Olympus, Nikon, Biorad) usually store image data in different formats. COMSTAT was originally designed to analyze images from the Leica TCS4D confocal microscope. However, COMSTAT can also analyze images in other formats, which will be described below.

      At present, COMSTAT requires all images of a stack to be stored as individual ‘.tif’ images. The ‘.tif’ images can be of any sizes (e.g. 256?256, 512?512 and 1024?1024), and be 8-bit, 16-bit or 32 bit. However, all of the programs will convert the images into grey-scale 8-bit images. Using 8-bit 512?512 images is fine for the purpose of quantifying biofilm structures. COMSTAT requires an ‘.info’ file for each stack of images. An ‘.info’ file is a text file containing information about the image stack. COMSTAT uses informations from the ‘.info’ file when analysing the image stack, and it is therefore essential that the ‘.info’ file is present. The Leica TCS4D microscope automatically generates an ‘.info’ file when an image stack is saved. The Leica TCS4D ‘.info’ file contains image information such as the time and date of acquisition, pinhole size, pixel sizes, etc. COMSTAT reads informations about the image stack from the ‘.info’ file. However, if you do not have a Leica TCS4D microscope you can still write your own ‘.info’ files, which can be read by COMSTAT. By using a text editor (e.g. Notepad) you can write a text file with the extension ‘.info’. This ‘.info’ file must look like the following example:

Range

#11#

#13#

Pixelsize(x)

2


#0.49#

Pixelsize(y)

#0.49#

Pixelsize(z)

#1.52#

The range tells COMSTAT how many images this stack contains. The pixelsizes in the x, y and z directions are also necessary. The pixelsize is the distance between two neighbouring pixels and is given in micrometer. The most important thing about this type of ‘.info’ file is that it contains the data between the # signs. COMSTAT locates the data by looking for the # signs. Moreover, the images belonging to a certain ‘.info’ file must be named accordingly. If the ‘.info’ file above was called hello.info, the images belonging to this ‘.info’ file should be named:

hello11.tif hello12.tif hello13.tif

The range can start from any positive integer value (e.g. 1 to 10 or 232 to 245). In case there is only one image in a stack, the pixelsize(z) should be set to zero.

Image stacks named xxx001, xxx002 xxx003 etc.

      Some confocal microscopes generate image stacks numbered in the following way: xxx001, xxx002, xxx003, xxx004, xxx005, xxx006, xxx007, xxx008, xxx009, xxx010, xxx011, etc. This format is not recognized by COMSTAT. However, the program CONVERT000 can change the names of the images to xxx1, xxx2, xxx3, xxx4, xxx5, xxx6, xxx7, xxx8, xxx9, xxx10, xxx11, etc. which is recognized by COMSTAT. In order to rename your images you first have to write an ‘.info’ file named xxx.info as described above. Then you start the CONVERT000 program in the folder containing the images and the images will be renamed accordingly.

Other image formats than those described above

      If the images from your CSLM are named differently than those described above, you have to manually rename your images to a format compatible with COMSTAT. Since this can be very time consuming you might want to write a small MATLAB script similar to the CONVERT000 program in order to change the names of your images automatically. If this is a problem, you are welcome to contact the author, and I may be able to help you

3. Checking the image stacks by the CHECKALL program

      The CHECKALL program checks if all the image stacks are intact. CHECKALL checks each individual image stack for missing images or damaged images. It also checks for errors in any of the ‘.info’ files. It is a very good idea to run the CHECKALL program and correct any errors before doing any further analyses.

4. Determination of threshold values by LOOK and LOOKTIF

      In order for COMSTAT to analyse the image stacks, the threshold values must first be determined. The need to do thresholding is due to the fact that the images coming from the microscope are grey-scale images, and COMSTAT does not automatically know which pixel


3


values should be taken as biomass and which pixel values should be taken as background. Thresholding an image stack in COMSTAT results in a three-dimensional matrix with a value of ONE in positions where the pixel values in the original image are above or equal to the threshold value, and ZERO where the pixel values are below the threshold value. The value ONE represents positions containing biomass, while ZERO represents the background. The program LOOK can be used to determine the threshold value of each image stack. By doing simple thresholding with different values, the resulting images can be scrutinized and a suitable threshold value can be determined. Often the same threshold values can be used for images taken by the same person on the same day, whereas the threshold values frequently change from day to day or when another user is doing the image acquisition. When the program LOOK is used, it can sometimes be difficult to see the small details in the images because a large number of images are present on the screen at the same time. In that case, the program LOOKTIF may be used instead. LOOKTIF imports individual tif images and can do simple thresholding like the LOOK program. Write down the threshold values for the different image stacks, so they can by typed into COMSTAT later.

5. Using the COMSTAT program

      If you have run the CHECKALL program on your image stacks and they were okay and you have determined the threshold values by the LOOK and LOOKTIF programs, you are now ready to analyze the image stacks by COMSTAT. The COMSTAT program has been described in two papers (Heydorn et al., Microbiology 146(10):2395-2407; Heydorn et al., Microbiology 146(10):2409-2415). Most of the variables that can be calculated by COMSTAT are described in these papers.

      When COMSTAT is started it first lists all image stacks found in the present directory and the user is asked which of the image stacks should be analyzed. Then the threshold values (which were determined by using the LOOK and LOOKTIF programs) must be entered. When the threshold values have been entered, a menu appears containing all the choices available in COMSTAT. The first section of options (1-11) is the range of image analysis tools that can be used in analysing the image stacks. These image analysis tools are described in the two papers mentioned above. Note that the image analysis functions 1-5, 8, 10 and 11 are performed very fast whereas the functions 6, 7 and 9 are quite slow. Therefore, options 6, 7 and 9 should not be chosen if these variables are not really needed.

      Option 21. By choosing this option, the preprocessed images, i.e. the thresholded and connected volume filtered images are saved in a separate folder on the computer. In this way, the pre-processed images can be checked after the analyses.

      Option 22. By choosing this option, images that are used and calculated during the analyses will be displayed on the screen during program execution. This makes the COMSTAT program slightly slower.

      Option 23.  By choosing this option, the computer will correct for a non-flat first image. It is very important for many of the calculations in COMSTAT that the first image of the stack shows exactly the layer of biomass at the substratum. However, often the coverslip is not entirely plane or the coverslip is tilted. This means that the first image only contains some of the biomass at the substratum while the rest is in the second or even the third image of the stack. This problem can easily be seen with the LOOK or LOOKTIF programs. COMSTAT provides a solution to this problem. If option 23 is chosen, COMSTAT does the following. If the biomass coverage in the first image is smaller than in the second image, the first image will be replaced with a maximum image of the first couple of images. The user determines the number of images that are used to generate the maximum image. The result is that each pixel value in the first image is the maximum of the pixel values in the same


4


positions of the first couple of images in the stack. Note that COMSTAT will only change the first image if it suspects that there is a problem, i.e. if the biomass coverage in the first image is smaller than in the second image. Therefore choosing this option does not make any changes to the images, which do not have a non-flat image.

      Option 24. Choosing this option, turns off the connected volume filtration of the image stacks. By default, COMSTAT performs connected volume filtration on all image stacks, unless option 24 is chosen. Connected volume filtration is a smart way of removing noise from the images. It works by removing biomass that is not in some way connected to the substratum. This seems reasonable when working with continuous-flow flowcells, where biomass that is not connected to the substratum would be expected to be washed away. However, there may be conditions where connected volume filtration is not desired. If option 21 is selected, the thresholded and connected volume filtered images can be viewed after the analysis. For more details on connected volume filtration, see (Heydorn et al., Microbiology 146(10):2395-2407; Heydorn et al., Microbiology 146(10):2409-2415).

      Option 25. During execution, the COMSTAT program generates text files containing the results from the quantifications. The results are continuously written to the text files. The text files can be opened in any text reader or Excel for further processing of the results. The numbers in the textfiles are by default point separated. If your Excel program recognizes comma as a decimal symbol instead of point, the text files should be converted to comma format. By choosing this option, the text files are converted to comma format.

6. Getting the results from COMSTAT

      The results generated by COMSTAT are continuously written to text files during program execution. This means that if an error occurs which makes COMSTAT stop before having analyzed all image stacks, the text files will still contain the results calculated until that point. An important point is that if you have asked COMSTAT to save the text files in a folder, which already contains text files from another quantification, the new results will simply be appended to the end of the already existing text files. This is an advantage if the images are from the same session or biofilm, because only a single set of text files will be generated. For each of the 11 image analysis features selected, a text file containing the result of this particular feature will be generated. For some of the functions, more than one text file will be generated. Furthermore, a text file report.txt is generated containing information about all the images and results from all the selected image analysis features.

If you have questions or comments, check out the COMSTAT homepage at www.im.dtu.dk/comstat or send an e-mail to the address below. Information about errors and suggestions for improvements are very welcome.

Arne Heydorn

Center for Biomedical Microbiology

BioCentrum, Technical University of Denmark

Present address: 

St. Catherine’s College

Manor Road

OX1 3UJ Oxford

England

Email: aheydorn1@gmail.com

5


Graduate Student Guidelines


Immunology

Ph.D. Program



Revised August 1, 2016


Table of Contents

Program Leadership 1

Academic Calendar 1

Guidance 3

Formal Coursework 3

Required Courses 3-4

Electives 6

Minimum Number of Credits for Ph.D. Degree 6

Grade Requirements 6

Laboratory Rotations 6-7

Immunology Seminars 7

Teaching Requirements 7

Other Immunology Events 7

IDP Plan 7-8

Comprehensive Examination 9-12

Overview 9-10

Spring Comprehensive Exam Schedule 11-12

Autumn Comprehensive Exam Schedule 12

Dissertation Research 12-14

The Ph.D. Dissertation 14

Vacations 14-15


Revised August 1, 2016


IMMUNOLOGY GRADUATE PROGRAM STUDENT GUIDELINES

THE UNIVERSITY OF IOWA

In addition to the Graduate College Manual of Rules and Regulations, this handbook is for use by the Immunology Graduate Students to clarify Immunology Program-specific policies. The document lists the program leadership, course requirements, laboratory rotation policies, Immunology Journal club and seminar, Comprehensive exam format and schedule, and Dissertation committee guidelines.

I. 

PROGRAM LEADERSHIP:

Program Director:




Dr. Steven Varga

3-532 BSB

335-7784


Executive Committee Members:




Dr. Steven Varga

3-532 BSB

335-7784


Dr. Gail Bishop

2193 MERF

335-7945


Dr. John Colgan

3270 CBRB

335-9561


Dr. Lee-Ann Allen

D154 MTF

335-4258


Dr. Kevin Legge

1028 ML

335-6744


Dr. Jon Houtman

2210 MERF

335-7780


Graduate Studies Committee Chair:




Dr. Gail Bishop

2193 MERF

335-7945


Admissions Committee Chair:




Dr. Vladimir Badovinac

1069 ML

384-2930


Comprehensive Exam Committee Co-Chairs:



Dr. Vladimir Badovinac

1069 ML

384-2930


Dr. John Colgan

3270 CBRB

335-9561


Curriculum Committee Chair:




Dr. John Colgan

3270 CBRB

335-9561


Seminar Committee Chair:




Dr. Thomas Waldschmidt

1038 ML

335-8223


Program Administrator:




Paulette Villhauer

354 MRC

335-7748


Program Assistant:




Joshua Lobb

357 MRC

335-6512

II. 

2016 - 2017 ACADEMIC CALENDAR:




Fall semester 2016:

First day of classes August 22

Last day of classes December 9

Close of Finals week December 16

Spring semester 2017:

First day of classes January 17

Last day of classes May 5

Close of Finals week May 12


1


Summer Rotation June 13 – August 19, 2016

Fall Rotation August 22 – November 4, 2016

Winter Rotation November 7, 2016 – January 27, 2017

Spring Rotation January 30 – May 5, 2017

Registration for Fall, Spring, and Summer semesters are performed through the program office during the early registration period.


2


III. GUIDANCE:

The Graduate Studies Committee is charged with overseeing the progress of all graduate students at all stages of their training. Incoming first year students are assigned a primary advisor from the Graduate Studies Committee who will advise the student on courses, lab rotations, and all other aspects of their education. Soon after arriving on campus, the students will meet with either the chair of the Graduate Studies Committee or their assigned advisor to discuss their specific interests, course work, and laboratories for rotations. In addition, the Graduate Studies Committee may occasionally meet with students to discuss their academic progress. When a student completes rotations and enters a laboratory to perform dissertation work, the faculty member in charge of the laboratory will assume the role of advisor. The Graduate Studies Committee will however, continue to oversee the students' academic and research progress. The Graduate Studies Committee is also available to the student for advice should problems or questions arise.

IV. FORMAL COURSE WORK:

Immunology graduate courses are offered not only to teach students the current concepts and paradigms within the field, but to emphasize the scientific approaches and methods used to attain this understanding.

NOTE: It is expected that the great majority of graduate students will follow the prescribed curriculum. However, it is recognized that circumstances may arise that require a student's course of study to be altered. Therefore, a student may ask the Graduate Studies Committee for permission to amend the curriculum requirements.

A. Required Courses:

Graduate Immunology and Human Disease IMMU:6247 (4 sh – Fall year 1). This course provides an overview of the important principles and key concepts in immunology including the induction of the innate and adaptive immune systems, the molecular events that control immune cell activation and the function of the immune system in infection and pathophysiological events. Offered fall semester only. Required of all first year students.

Graduate Immunology IMMU:6201 (3 sh – Spring year 1). This course emphasizes the purpose and design of experiments, and how their interpretation has led to current concepts in immunology. Sessions take the form of background presentation by the lecturer followed by analysis of primary research papers. Participation by students in the form of discussion and responding to questions is a key goal. Required of all first year students.

Basic Biostatistics and Experimental Design PCOL:5204 (1 sh – Fall year 1). This course is designed to provide a brief overview of the theory of experimental design and data analysis in the biological sciences for graduate-level students. At the completion of this module, students will feel comfortable identifying the types of analyses that are available for common types of data generated in the biomedical sciences, and will be empowered to critically review the statistical methods used in published studies.


3


Principles of Molecular and Cellular Biology BMED:5207 (3 sh – Fall year 1).

The goals of this course are to familiarize new graduate students with important principles and key concepts in contemporary molecular and cellular biology; to help students develop the skills required to critically evaluate current research publications; and to familiarize students with the experimental techniques utilized to test specific hypotheses. These goals will be achieved through formal lectures on specific topics and discussions focus on evaluation of published research papers (recent or classical). Students are encouraged to ask questions for clarification and to seek out individual faculty members for additional assistance when needed.

Students will take 3 sh of elective credits. The following courses are suggested; others may be substituted with prior approval of the Graduate Studies Committee. These are either a 3 sh course or a 5-week 1-credit module on various areas of cellular and molecular biology, taught for graduate-level students. MSTP students are exempt from this requirement, but may elect to take any modules they wish. The MSTP students are not exempt from taking the 1 module of Biostatistics.

Introduction to Protein Structures BIOC:7251 (1 sh)

Transcription, RNA MCB:6215 (1 sh)

Mouse Models of Cancer MCB:6217 (1 sh)

Inflammatory Cell Signaling and Targeted Cancer Therapy MCB:6240 (1 sh)

Growth Factor Receptor Signaling MCB:6225 (1 sh)

Cell Cycle Control MCB:6226 (1 sh)

Cell Fate Decisions MCB:6227 (1 sh)

Mechanism of Cellular Organization MCB:6220 (3 sh)

Enzymes, Carbohydrates, Nucleic Acids, and Bioenergetics BIOC:7252 (1 sh)

Metabolism 1 BIOC:7253 (1 sh)

Metabolism 2 BIOC:7254 (1 sh)

Metabolism 3 and Biosignaling BIOC:7255 (1 sh)

Molecular Biology BIOC:7256 (1sh)

General Histology for Graduate Students; ACB:5205 (4 sh)

Microscopy for Biomedical Research; ACB:5218 (3 sh)

Graduate Pathogenic Bacteriology; MICR:6259 (3 sh)

Graduate Microbial Physiology; MICR:6260 (3 sh)

Graduate Viruses and Human Disease, MICR:6267 (4 sh)

Biology & Pathogenesis of Viruses; MICR:6268 (2 sh)

Ion Channel Phamacology; PCOL6207 (1 sh)

G-proteins and G-protein Coupled Receptors; PCOL6208 (1 sh)

Steroid Receptor Signaling; PCOL6209 (1 sh)

Graduate Microbial Genetics; MICR:6270 (3 sh)

Redox Biology & Medicine; FRRB:7000 (4 sh)

Human Molecular Genetics; GENE:7191 (3 sh)

Pathogenesis of Major Human Diseases; PATH:5270 (3 sh)

Translational Histopathology; PATH:5260 (3 sh)

Integrated Topics in Infectious Disease MICR:7217 (1 sh)

Introduction to Biostatistics BIOS:4120 (formerly BIOS:5110) (3 sh)

Materials in Drug and Gene Delivery PHAR:4740 (3 sh)

Advanced Topics in Immunology; IMMU:7221. (3 sh – Fall year 2). Graduate Immunology is a prerequisite, although MSTP students, who have taken MS1 Immunology, may elect to take Advanced Topics for credit in either year 1 or year 2. This course, taught during the Fall semester, is split into three sections with each

4


section proctored by a different faculty member. The goal is for each instructor is to present the seminal papers in one area of immunologic expertise. This is done through the use of primary research papers and student presentations. Second year students are required to take this course for credit. Subsequently, students are required to attend an additional two sections as exemplars for younger students, and to enhance their knowledge of a wider variety of immunologic topics. These two sections need not be taken during the same semester, but can be spread out during the ensuing years. This will enable students to choose two areas which are of particular interest to them. While participating in these additional modules, advanced students will be asked to lead discussions, and demonstrate proper presentation and critique of papers.

Immunology Graduate Student Seminar; IMMU:6211 (1 sh awarded during the fall semester and the spring semester each year). During both the Fall and Spring semesters, all graduate students will attend, and will present their research data under the supervision of the Immunology Program faculty. This exercise is designed to foster oral communication skills and collaboration among graduate students. Faculty evaluators will provide student presenters with useful written and oral feedback on their presentations.

BMED:7270 Scholarly Integrity/Responsible Conduct of Research 1 (0 sh)

BMED:7271 Scholarly Integrity/Responsible Conduct of Research 2 (0 sh)

Courses entitled Scholarly Integrity/Responsible Conduct of Research 1 and 2 are required for all graduate students in Immunology. These courses are designed to expand on and advance training in the principles of scholarly integrity and responsible conduct of research (SI/RCR). As a prerequisite, all individuals taking these courses will have completed basic SI/RCR training through completion of CITI online, web-based training. Following verification of successful completion of all required CITI module, graduate students must complete the 2-semester sequence (BMED:7270, BMED:7271) for meeting full SI/RCR training requirements per the CCOM Office of Graduate & Postdoctoral Studies and their respective departments and programs. Individuals may start the series in either the Fall or Spring semester and complete the series in the following semester (e.g., Fall > Spring; or Spring > Fall series). The workshops emphasize small group discussions and foster ongoing conversations that explore important aspects of the ethical and responsible conduct of scholarly research. Case studies are assigned that cover all core competency areas emphasized by NIH – data acquisition, management, sharing & ownership; conflict of interest & commitment; human subjects; animal welfare; research misconduct; publication practices & responsible authorship; mentor/trainee responsibilities; peer review; collaborative science; financial management; research safety; responsibility to society.

Writing a Scientific Proposal; IMMU:6241:0001 (1 sh – Fall year 2). The goal of this course is to teach the skills of scientific writing, using the highly relevant vehicle of scientific proposal preparation. This skill is crucial in many future scientific careers, not restricted to academic research. Students will practice skills of hypothesis and rationale formulation, experimental design, and the ability to present ideas clearly and convincingly in a concise format. During the course, each student will prepare a proposal that can subsequently be submitted to external funding agencies.

5


B. Elective Courses:

Students will take 3 sh of elective credits. Any student would have the option to take additional approved electives, on a case-by-case basis, in consultation with the student’s advisor and the Curriculum Committee. Course of study will be approved and supervised by the Graduate Studies Committee until a dissertation advisor and dissertation committee has been chosen.

C. Minimum Number of Credits for the Ph.D. degree – 72:

It is anticipated that most students will complete classroom work (except for Immunology Graduate Student Seminar and two additional modules in Advanced Topics) by the end of the 3rd semester. Other credits required by the Graduate College for the Ph.D. can be fulfilled by research laboratory course credits. The minimum number of credits required for the Ph.D. degree (coursework plus laboratory) is 72.

D. Academic Progress:

An Immunology Program Graduate Student shall be sent a written notification if, after completing 9 sh (at least 6 sh of which carries a letter grade other than S/U) of graduate coursework at The University of Iowa, the student’s cumulative grade-point average falls below 3.00. The student will then have one semester to raise their grade point average above 3.0. Two consecutive semesters of a cumulative grade point average of less than 3.0 will lead to a dismissal from the program due to a failure to make satisfactory academic progress. In addition, any Immunology Program Graduate student who earns a grade below a B minus in the core Immunology Program courses of: Graduate Immunology and Human Disease, Graduate Immunology, and/or Writing a Scientific Proposal will be required to retake the course(s) the next semester that it is offered. If the student again earns a grade of less than a B minus, the student will be dismissed from the program due to failure to make satisfactory academic progress. The student must also make satisfactory progress during laboratory rotations with at least 2 of the 3 rotation mentors indicating that the student had performed satisfactorily during the rotation as indicated on the rotation evaluation form. It should be noted that this policy is separate from the general Graduate College policy regarding academic probation (Section IV.B.), and will be enforced for Immunology Graduate Program students independently of the Graduate College policy.

V. LABORATORY ROTATIONS:

Prior to selecting a laboratory for dissertation work, students are expected to perform three laboratory rotations, with each rotation being approximately 12 weeks in duration. During the first semester, a student should become acquainted with the research interests of the faculty members in the Program. This learning process will be facilitated by faculty presentations in Immunology Graduate Student Seminar during the Fall semester. Students are also encouraged to meet with specific faculty to discuss their research programs. Students can then make an informed decision about their laboratory rotations, with the guidance and approval of their advisor and the Graduate Studies Committee. At the latest, students should begin their first rotation within the first week of graduate study). MSTP students and students with M.S.

6


degrees (which include a research-based dissertation), may be excused from one rotation. Students having difficulty choosing a laboratory for dissertation work may perform a fourth rotation. The rotations are graded as either "Satisfactory" or "Unsatisfactory". This grade is based upon a number of criteria including attendance and work habits. It is important to note that when not in classes or seminars, the students are expected to spend the remaining portion of the day in the laboratory. Without a strong commitment to the rotation project, it is difficult to fulfill the purpose and aims of the rotation. A "satisfactory" grade is required in each of the laboratory rotations. If a "satisfactory" grade is not obtained in one of the rotations, an additional rotation will be assigned. Failure to obtain a "satisfactory" grade in the extra rotation will result in the student being placed on academic probation. After each rotation, an evaluation by the faculty member of the student and by the student of the faculty member will be submitted to the Graduate Studies Committee.

VI. IMMUNOLOGY SEMINAR:

The Immunology program oversees a weekly seminar series. During the school year, the weekly Immunology seminar features a number of well-known Immunologists from around the country, as well as Immunology program faculty. Although seminar is not part of the formal curriculum, students are expected to attend.

VII. TEACHING REQUIREMENTS:

All incoming students will have a one-semester teaching requirement. A variety of courses are available in several Departments, and the Program leadership will place students in courses based upon interest, expertise, and scheduling.

VIII. OTHER IMMUNOLOGY EVENTS:

In addition to classes and seminar, a number of other events are available for graduate students. A Program highlight is informal dinners scheduled with most of the visiting scientists who present in the Immunology seminar series. Typically, this dinner is held at a faculty member's home, and is attended by only students, postdoctoral fellows, and the visiting speaker. These dinners are designed for the benefit of the students, and are an excellent opportunity to personally meet outstanding scientists, and "pick their brains" on contemporary issues. Aside from Immunology seminar, a number of other meetings are available. These include focused or topic-oriented journal clubs, seminars in other departments (e.g. - Microbiology or Physiology seminar series), and Ph.D. dissertation defense seminars. All graduate students are strongly encouraged to affiliate themselves with a journal club and to become a regular participant. Students are also strongly encouraged to join the Center for Immunology & Immune-Based Diseases at The University of Iowa (https://www.medicine.uiowa.edu/immunology/), which sponsors an annual Research Retreat each year in August, as well as a monthly Research In Progress series. Collectively, these events are not only key for one's education, but are important in getting to know all of the other immunologists on campus, and fostering scientific collaborations.

IX. Individual Development Plan (IDP):

The IDP is a tool to assist trainees with career and professional development. The IDP provides a platform for trainees to identify professional goals, assess competencies relevant to these goals, and develop a plan to achieve specific objectives related to

7


their career goals. The trainee-developed IDP becomes a platform for discussion with their Ph.D. mentor, to foster communication important for the trainee’s professional development. The process is interactive and reiterative to ensure training success and satisfaction. Several steps are involved in the development, implementation, and revision of the IDP. The trainee and mentor are active participants, working together to design a plan that helps the trainee meet goals identified in the IDP. The process involves identification of short-term objectives, with clear expectations and milestones that address long-term career goals.

Basic steps for Trainee

1. Conduct a self-assessment

a. Define your time commitment to various components of the graduate experience.

b. Assess your skills and interests.

c. Use outside resources to get feedback on your skills, strengths, and weaknesses. The following self-assessment tools provide a nice resource for this self-assessment.

http://myidp.sciencecareers.org 

www.apsarchive.org/download.cfm?submissionID=7365 

2. Survey opportunities with mentor

a. Identify career opportunities that interest you.

b. Define differences between your current skills and additional skills needed for your identified career objectives.

c. Prioritize areas for development and discuss strategies for addressing objectives with your mentor.

3. Write/update your IDP, share it with your mentor, and review together

a. Identify specific skills that you need to develop in the short-term (e.g. 1-2 years)

b. Define strategies to develop each skill. Use the “SMART” principle:

i. Specific - is it focused and unambiguous?

ii. Measureable - define metrics to know whether the objective is achieved.

iii. Action-oriented - identify concrete steps to achieve the objective.

iv. Realistic - is the strategy feasible?

v. Time bound - define a deadline.

c. Discuss draft with mentor

4. Implement the plan, and revise as needed (at least annually)

a. Review your plan with your mentor on a regular basis.

b. Revise as necessary.

Basic steps for Mentor

1. Be familiar with training requirements and opportunities.

2. Discuss opportunities with trainee.

3. Review your trainee’s IDP and help revise. Provide written comments at the end of this document.

4. Establish regular periods for IDP review and revision, as needed.


8


X. COMPREHENSIVE EXAMINATION:

A. Overview:

The purpose of the comprehensive exam is to evaluate whether students have successfully acquired the skills and competence to continue on to the research and dissertation phases of the Ph.D. program. Two essential skills that will be evaluated are:

1. The ability to learn and understand the state of knowledge in an area of inquiry, identify a significant knowledge gap in that area, formulate a hypothesis or hypotheses to test, and design an effective approach to testing the hypothesis(es).

2. The ability to communicate clearly with other scientists orally and in writing.

Each student taking the Comprehensive examination in a given cycle will prepare a single abstract of an original research proposal, to be submitted to the examining committee according to the schedule outlined below. The abstract must describe a proposal that does not overlap in major approach or topic with the student’s dissertation research, or any other ongoing projects in the dissertation lab. The abstract will have 0.5” margins and no smaller than 11 point Arial font type and is limited to 2 single-spaced pages (references not included in the 2 page limit). The student must not consult with his/her dissertation advisor during this process, except to ask an opinion about potential overlap of a topic. The Abstract will consist of a Rationale, explaining the context of the area of focus, and the significance of the question(s) to be addressed, and Specific Aims, which briefly outline the major experimental approaches (not the detailed Methods) to be taken in the project. Students are encouraged to review abstracts and Rationale/Aims pages of grants of their mentors or senior postdoctoral fellows as examples for what sort of information this should contain, while they prepare their own documents.

The examination committee for the student will then determine a) if the abstract topic is appropriate as non-overlapping and b) if the abstract is scientifically sound, and could potentially serve as the basis for a defensible research proposal. Three outcomes are possible.

1) The abstract is judged acceptable; the student may begin work on the written proposal.

2) The topic of the abstract is acceptable, and the committee believes that the abstract could potentially lead to a defensible proposal, but first requires  revision. If the needed revisions are substantial, part or all of the examining committee will convene a meeting with the student, to discuss the nature of the revision needed. The student will receive a written summary of the deficiencies in the abstract and the revisions required. A revised abstract will be due one week after this summary is sent to the student. The student will have one opportunity to revise the abstract so it forms a suitable basis for the written proposal.

9


3) The abstract is judged fatally flawed. The student will be informed in writing of the basis for the committee’s decision, and will be instructed to prepare a new abstract on a different research topic. The second abstract will be due 3 weeks after this notification. If the second abstract cannot be revised to a level of acceptability, the student will be considered to have failed the first attempt at the Comprehensive examination, and must wait a minimum of 4 months before a second attempt.

After the abstract is accepted, the student will be given 4 weeks to complete and submit the written comprehensive exam proposal. The oral defense will be scheduled 10-14 days after the exam is submitted, depending on availability of the committee members. The comprehensive exam will be written in the form of an NIH style pilot grant proposal based on the abstract and instructions from the Comprehensive Exam.

Committee. The proposal will be limited to 15 double-spaced pages or less, with 0.5 inch margins and 11 point Arial font type. No more than 3 pages of this total  can be devoted to specific methodological details. Rather than list all the details of specific protocols, students are urged to refer to published literature whenever possible, and instead focus on why a method was chosen, and its strengths and limitations that impact data interpretation. References and figures will not count in the 15 page limit, but together cannot constitute more than five pages.

Comprehensive exam abstracts and proposals should be the result of the student’s own ideas. Students may discuss their abstracts and proposals with other students and postdoctoral fellows. They are also allowed to consult faculty other than their dissertation advisers for questions regarding specific techniques, as well as general knowledge questions. However, they cannot ask faculty to review their rationale or Aims, or provide experimental design details. It should be emphasized that no matter who provides advice, the student is responsible for whatever is in his/her proposal, regardless of what any other scientist may offer as an opinion. “Dr. ____ said so” is NOT an excuse for incorrect information or flawed reasoning. The description of the exam as “comprehensive” means that the student should have a clear understanding of the state of knowledge that underlies the rationale upon which the proposal is built. When published papers are used as the basis for designing further experiments, be sure such papers are read thoroughly and carefully (not just the Abstract).

Primary advisors should excuse themselves from any administrative committee deliberations (other than the Dissertation Committee) which directly concern their students. Administrative committees will communicate directly with students. Advisors should not act as an intermediary in this process. If an Advisor feels compelled to raise a concern about a decision by an administrative committee, he/she should contact the Program Director.

The Comprehensive Exam Committee will hear the student's defense, which will be a brief oral presentation of the background, rationale, specific aims, and experimental approach. The student may use visual aids, such as PowerPoint slides or transparencies, which are specifically related to the presentation of the proposal. However, no additional reference material will be allowed in the room

10


during the defense. The student’s presentation will be followed by questions from the Comprehensive Exam Committee on the content of the oral defense and of the written proposal. All proposals submitted by the required deadline will be defended orally if they are readable. The Comprehensive Exam Committee, at its discretion, can direct a student to write a new proposal if the proposal submitted is significantly substandard.

The outcome of the comprehensive examination will fall into one of the three following categories:

1. The student passes and will be permitted to continue to work toward the Ph.D.

2. The student passes with reservation and will be given an opportunity to eliminate the reservation according to specific instructions from the examining committee. If the student is asked to make written revisions the student should provide a point-by-point response to the written critique provided by the committee and highlight the changes made in the revised document.

3. The student fails

It is anticipated that most students will take their comprehensive exam in the second semester of their second year. MSTP students who joined the dissertation laboratory at the beginning of the first year of graduate study may begin the Comprehensive Exam process in September of the second year of graduate study. If the first attempt is failed, a student may begin the examination process again no sooner than 4 months after the first exam is taken, according to the regulations of the Graduate College. If a student fails to pass after two attempts, the student will not be permitted to remain as a Ph.D. candidate.

Failure to take the Comprehensive Exam by the end of the fifth semester will, unless a specific exception is granted by the Graduate Studies Committee, result in a grade of "Incomplete" for the student's research for that semester. Exceptions must be fully explained and justified in a letter to the Chairperson of the Graduate Studies Committee. This letter will also be made part of the student's file. If the grade of "Incomplete" is not removed by the end of the next full semester, it will be changed automatically to an "F" and the student will be required to leave the program.

B. Spring Comprehensive Exam Schedule:

A typical Ph.D. student who spends Year 1 in the Program performing required coursework and 3 laboratory rotations will begin the Comprehensive Exam process in February of the second year of graduate study.

February 1: Deadline for abstract submission.


11


February 8: Deadline to notify students if the abstract is acceptable (with or without modification) by the Comprehensive Exam Committee, or whether an entirely new abstract is needed.

February 15: Deadline for submission of revised abstract, if appropriate.

February 29: Deadline for submission of new abstract, if first abstract was judged fatally flawed.

The remainder of the timeline will follow the same approximate schedule as for the first abstract, if a second is required. Note: As soon as an abstract has been accepted, the Program Office will contact the committee members to schedule a meeting. The student will be given 4 weeks to complete and submit the NIH style grant proposal following notification of acceptance of the abstract. The proposal must be turned into the Program Office for distribution to the committee. The oral defense will be scheduled within 2 weeks of proposal distribution, whenever possible.

C. Autumn Comprehensive Exam Schedule:

A MSTP student who joined the dissertation laboratory at the beginning of the first year of graduate study may begin the Comprehensive Exam process in September of the second year of graduate study.

September 15: Deadline for submitting an abstract.

The remainder of the timeline will be similar in intervals and decision points to

that outlined above for the Spring schedule.

Note: As soon as an abstract has been accepted, the Program Office will contact the committee members to schedule a meeting. The student will be given 4 weeks to complete and submit the NIH style grant proposal following notification of acceptance of the abstract. The proposal must be turned into the Program Office for distribution to the committee.

NOTE: The guidelines are written to promote uniform schedules and uniform treatment of graduate students. However, exceptions are to be made in the case of illness, family crisis, or other serious circumstances that may interfere with a student's ability to follow the schedule outlined above.

XI. DISSERTATION RESEARCH:

By or before the beginning of the third semester (usually the fall semester of the second year), the student should choose a laboratory in which to do research. The faculty member from that laboratory will serve as the student's research advisor. If the research advisor selected by the student has not mentored a student through successful completion of the Ph.D. degree, the student and advisor must additionally select a Mentor of Record. Any Immunology Program faculty member who has mentored a student who achieved the Ph.D. degree is eligible to serve as Mentor of Record. The research advisor must submit the name(s) of the suggested Mentor of

12


Record for final approval by the Graduate Studies Committee. The Mentor of Record should be selected as soon as possible after the student has chosen the research advisor. The Mentor of Record will serve as the chairperson of the student’s dissertation committee. Together the student and the student’s research advisor will select a Dissertation committee for the student prior to completion of the third semester of graduate study and submit these selections to the Graduate Studies Committee for approval. The Dissertation committee will consist of at least five members, including the student’s research advisor. At least four members of the committee will be members of the Immunology Graduate Program. The fifth faculty member may be from outside the Program, but must have an appointment in a Ph.D.-granting program/department. Unless the student has a Mentor of Record (who in that case will serve as Chair), the Dissertation Committee will elect a chairperson (who will not be the research advisor).

The Dissertation Committee will meet with the student at least once each year to review the plan of study and to receive a written report of research progress prepared by the student. The first of these meetings must be held within one year of passing the Comprehensive exam. All subsequent annual reports and Dissertation committee meetings must be completed within one month of the anniversary date of the student's passing the Comprehensive exam. The purpose of this yearly meeting is to determine whether the student's progress has been appropriate to allow for enrollment in the academic year beginning the following Fall semester. The written report will then be forwarded to the Graduate Studies Committee, and will be made part of the student's record. If the annual written report is not received within 60 days of this anniversary date, the student will receive an "incomplete" for that semester's research (148:231 Research in Immunology). If the student has not submitted a satisfactory report within the next 60 days, the grade will be changed automatically to an F and the student will be required to leave the program. Students with a Mentor of Record must hold meetings between the advisor, student, and Mentor of Record within 3 months of selecting a Mentor of Record and at least once between each annual Dissertation Committee meeting. The Mentor of Record will file a progress report following such meetings.

Each year which follows successful completion of the comprehensive examination, students will present their research to the members of the immunology community at the University of Iowa by giving a research seminar to be scheduled by the seminar committee in consultation with the dissertation committee.

The student or any member of the Dissertation Committee may, with reasonable notice, request a meeting, at other times of the year, in which the student and the Committee members would participate. This is especially encouraged during the latter stages of the student's dissertation work.

The Dissertation Committee will be responsible for administering the final examination, or dissertation defense.

Students are guaranteed stipend and tuition support for 6 years, provided they display satisfactory performance in fulfilling all academic requirements, as well as in the progress of their dissertation research. Support after 6 years is not guaranteed, but the student and mentor may petition the Program to continue support, if satisfactory progress is being made.


13


It is expected that the dissertation project be of sufficient breadth, depth, and novelty to result in first-author research publications in high quality peer-reviewed journals. A minimum of one peer-reviewed paper must be published or in press prior to the completion of the Ph.D. In addition, a second publication, in which the student is a coauthor on a peer-reviewed article, a review or book chapter must be published or in press prior to the completion of the Ph.D. The student will not be permitted to schedule a dissertation defense until it has been demonstrated that both of these requirements have been met.

XII. THE PH.D. DISSERTATION:

To be awarded the Ph.D. degree, a candidate must satisfactorily defend the Ph.D. dissertation.

The procedure to be followed by the student regarding the Ph.D. dissertation is as follows:

1. The student's completed or nearly completed research should be presented orally to members of the Dissertation committee for consideration. If the Dissertation committee considers progress to be adequate, the student will be advised to write the dissertation. The style of the dissertation will conform to that presented in the CBE Style Manual.

2. When a draft of the dissertation has been approved by the student's research advisor, a copy will be distributed to each member of the Dissertation committee at least two weeks before the date of the final defense.

3. This draft of the Dissertation must conform to the rules of the Graduate College office and must be presented to said office according to their schedule for that semester.

4. The student will present a public seminar on the dissertation work. All graduate students and faculty in the program will be encouraged to attend. The seminar will be followed by a defense of the dissertation before the student's Dissertation committee. A final draft of the Dissertation will then be prepared incorporating revisions suggested by the committee, and approved by the advisor and the committee.

5. Final corrected copies of the Dissertation must be submitted to the Graduate College office at least ten days before the graduation date.

6. Expenses for typing the dissertation, any illustrative material, and copies of the dissertation, are the responsibility of the student.

7. In addition to the copies required by the Graduate College, the student will present one final copy of the Dissertation to the Program for the permanent library file, and at least one copy to the advisor.

XIII. VACATIONS:

Successful graduate education in the sciences does not begin and end with the usual academic calendar, but rather is a full-time occupation. Reasonable vacation periods are certainly appropriate, but long or repeated absences are generally not permitted. Vacations or any other planned absences should be discussed in advance with the individual in whose laboratory a student is rotating or working.


14


The University policy on vacation and sick leave for graduate research assistants is negotiated with COGS, the graduate student union.

Graduate research assistants (50% appointment) may be absent for up to 15 work days per year without loss of pay. In addition, students shall receive the nine paid University holidays: New Year’s Day, Dr. Martin Luther King Jr.’s Birthday, Memorial Day, Independence Day, Labor Day, Thanksgiving Day, Friday after Thanksgiving Day, Christmas Day, and the day before/after Christmas (as identified by the University).

Graduate research assistants (50% appointment) may be absent due to illness for up to 18 work days per year without loss of pay.

Students must notify their advisor about absences (vacation, sick leave) from the lab. Vacations or any other planned absences should be discussed in advance with your mentor and reported to the Program Office. Absences in excess of the above allowances must be requested in writing and approved by your mentor and the Program Director.

The University of Iowa prohibits discrimination in employment, educational programs, and activities on the basis of race, creed, color, religion, national origin, age, sex, pregnancy, disability, genetic information, status as a U.S. veteran, service in the U.S. military, sexual orientation, gender identity, associational preferences, or any other classification that deprives the person of consideration as an individual. The university also affirms its commitment to providing equal opportunities and equal access to university facilities. For additional information on nondiscrimination policies, contact the Director, Office of Equal Opportunity and Diversity, the University of Iowa, 202 Jessup Hall, Iowa City, IA, 52242-1316, 319-335-0705 (voice), 319-335-0697 (TDD), diversity@uiowa.edu.


15


Controlled Substances Security Manual

An Informational Outline of the

Controlled Substances Act of 1970


United States Department Of Justice

Drug Enforcement Administration

A SECURITY OUTLINE OF THE

CONTROLLED SUBSTANCES ACT OF 1970

Robert C. Bonner

Administrator of Drug Enforcement

Gene R. Haislip

Director

Office of Diversion Control

This manual has been prepared by the Office of Diversion Control to assist drug handlers in their understanding of the Controlled Substances Act of 1970 and its implementing regulations pertaining to security.


1


United States Department of Justice Drug Enforcement Administration

DRUG SECURITY MANUAL

An Informational Outline of the Controlled Substances Act of 1970

Revised May 1991


A MESSAGE FROM THE ADMINISTRATOR

The safeguarding of controlled substances is a problem confronting all manufacturers,

distributors, pharmacies, and other drug handlers. Federal law limits the handling of these substances and by regulation requires that they be properly safeguarded at all times. The drug Enforcement Administration (DEA) is responsible for ensuring that effective security is maintained. The drug industry is responsible for establishing and maintaining effective controls and procedures to prevent diversion.

This manual outlines the steps needed to establish a competent security system which deters diversion and reduces accessibility for potential abusers. Further guidance may be obtained from one of DEA’s Field Diversion (listed at the end of this manual) or from the Office of Diversion Control located at our Headquarters in Washington, D.C.

Robert C. Bonner

Administrator of Drug Enforcement


CONTENTS

Page

Preface . 5

Application of State and Federal Law .. 6

Drug Enforcement Administration .. 7

Schedules of Controlled Substances . 8

General Security Requirements:

Substantial Compliance . 10

Request for Review 11

Waiver 11

Changes 11

Security Requirements for Non-Practitioners:.........................

Minimum Standards: Schedules I&II 12

Minimum Standards: Schedules III, IV &V . 13

Collocating Schedules I&II with III-V .. 14

Multiple Storage Areas .. 14

Accessibility to Storage Areas 15

Manufacturing and Compounding Areas 15

Public Warehouses . 15

Common or Contract Carriers 16

Theft or Loss .. 17

Other Security Controls:

Good Faith Inquiry .. 17

Suspicious Orders 17

Controlled Substance Samples 17

Distributing Through Agents .. 17

Employees:

Screening . 18

Responsibility to Report Diversion . 18

Illicit Activities . 19

Narcotics Treatment Programs 20

Security Requirement for Practitioners 21

Minimum standards 21

Other Security Controls . 22

Employee or Agent of Practitioner 22

Loss or Theft .. 22

Blank Prescriptions and DEA Order Forms .. 22

Additional Security Measures 23

DEA Diversion-Staffed Domestic Field Office 25


4


PREFACE


Over 770,000 manufactures, distributes, pharmacies, and other handlers of controlled substances are registered with DEA. The vast majority of this group complies with controlled substances laws and regulations in a responsible and law abiding manner, and has self-regulation programs consistent with the highest standards. DEA relies upon these programs and concentrates its resources on the more serious problems of both practitioner and non-practitioner diversion.

Handlers of controlled substances must be aware of the various diversion methods, which include illegal sale, falsified prescription orders, burglary, employee theft, loss in-transit, robbery, and customer/patient theft. However, willful and intentional diversion by manufacturers, distributors and dispensers is another source of diversion.

A critical first step in diversion prevention is employee screening; concern with personnel

security must start before and employee is hired. Pre-employment screening to identify potential security problems is important when choosing new employees to work in or around areas where controlled substances are handled. The screening program should include a careful evaluation of the applicant’s personal and previous employment references. Criminal background checks with local law enforcement authorities and with DEA are equally important. Similar precautionary measures should be taken before transferring established employees to new jobs in areas where controlled substances are manufactured, processed, stored, shipped, dispensed, or handled in any way.

The areas which must be protected against theft and diversion vary greatly depending on the type of business. Manufacturers must be alert for pilferage at every level of drug handling, from the receipt of raw material, through all phases of manufacturing and processing, to finished product storage and shipping. They must be watchful for pilferage of production rejects and of returned or damaged merchandise. They must be alert to the theft of dosage form drugs, bulk raw material, equipment, and even chemical precursors. They must be certain that all controlled substances are secure throughout the entire manufacturing and distribution process. Many of the concerns also apply to controlled substance distributors.

Security problems confronting a pharmacist are no less serious. The pharmacist must secure the controlled substances storage and prescription compounding areas. As in the case of larger drug handlers, a key factor in protecting against theft and diversion is limiting employee access. Access to all controlled substances should be restricted to the minimum number of employees needed to perform the tasks related to these drugs.


5


APPLICATION OF STATE AND FEDERAL LAWS


Nothing in this manual shall be construed as authorizing or permitting any person to do any act which is not authorized of permitted under other Federal or state laws. In addition, none of the policy and information in this manual may be construed as authorizing or permitting any person to do any act in violation of Title 21, Chapter II of the Code of Federal Regulations (21 CFR Part 1300 to End). Printed copies of the complete regulations implementing the Controlled Substances Act of 1970 may be obtained from the Superintendent of Documents, U.S. Government Printing Office, Washington, DC 20402. Proposed and finalized amendments to the regulations are published in the Federal Register.

In many cases state law is more stringent than Federal law and must be complied with in addition to Federal law. This manual is an informational outline of Federal law covering specific security situations as set forth in the Federal Regulations.


6


DRUG ENFORCEMENT ADMINISTRATION


DEA is the lead Federal law enforcement agency responsible for enforcing the Controlled Substances Act (CSA). Established in 1973, DEA was the product of a merger of the Bureau of Narcotics and Dangerous Drugs, the Office for Drug Abuse Law Enforcement, the Office of National Narcotic intelligence, elements of the Bureau of Customs, and those functions of the Office of Science and Technology which were drug enforcement-related. In carrying out its mission, DEA cooperates with other Federal agencies, state, local, and foreign governments, private industry, professional groups, and other organizations.

Between 1914 and 1970, Congress enacted more than 50 pieces of legislation relating to the control and diversion of drugs. Most of these diverse laws were gathered into one piece of legislation, the CSA, which became effective May 11, 1971. A key element of this law is to improve control over the manufacture, distribution, and dispensing of controlled substances by providing a "closed" system for legitimate handlers of these drugs. Such a closed system deters the diversion of these drugs out of legitimate channels into illicit markets.

The information presented here should acquaint drug handlers with security requirements set up under the CSA, the Diversion Control Amendments of the Comprehensive Crime Control Act 1984, and the Code of Federal Regulations.

The drugs and drug products, i.e. controlled substances, that come under the jurisdiction of the CSA are divided into five schedules. Some examples in each schedule are outline below. For a complete listing of controlled substances contact any DEA office listed at the end of this manual.


7


SCHEDULES OF CONTROLLED SUBSTANCES

The CSA places each controlled substance -- drug or other substance -- into one of five schedules based on the substance’s medical use, potential for abuse, and safety or dependence liability. The Act also allows substance to be added t or removed from a schedule to another, the basis upon whish substance are places into each of the five schedules is explained below, and examples of drugs’ or other substances within the schedules are listed.

Schedule I (CI) Substance

The controlled substances in this schedule are those that have no accepted medical use in the U.S., are not accepted as safe for use under medical supervision, and have a high abuse potential. Some examples are heroin, marijuana, LSD, peyote, mescaline, psilocybin, MDA, MDMA, ketobemidone, acetylmethadol, fenethylline, tilidine, methaqualone, and certain fentanyl and merperidine analogs.

Schedule II (CII) Substances

The controlled substances in this schedule have a high abuse potential with severe psychological or physical dependence liability, but have accepted medical use in the U.S. CII controlled substances consist of certain narcotic, stimulant, and depressant drugs. Some examples of CII narcotics are: opium, morphine, codeine, hydromorphone (Dilaudid)1, methadone, meperidine (Demerol), cocaine, oxycodone (Percodan), anileridine (Lertine), the immediate precursor phenylacetone (P-2-P), and oxymorphine (Numorphan). Also in CII are the stimulants amphetamine (Dexedrine), methamphetamine (Desoxyn), phenmetrazine (Preludine), and methylphenidate (Ritalin); the depressants amobarbital, pentobarbital, secobarbital; and fentanyl (Sublimaze), etorphine hydrochloride, and phencyclidine (PCP).

Schedule III (CIII) Substances

The controlled substances in this schedule have an abuse potential and dependence liability less than those in CI and CIII, and have an accepted medical use in the U.S. They include preparations containing limited quantities of certain narcotic drugs, and other nonnarcotic drugs such as: derivatives of barbituric acid, except those that are listed in another schedule, glutethimide (Doriden), methyprylon (Noludar), nalorphine, benzphetamine, chlorphentermine, clortermine, and phendimetrazine.

Schedule IV (CIV) Substances

The controlled substances in this schedule have an abuse potential and dependence liability less than those listed in CIII and have an accepted medical use in the U.S. They include such drugs as: barbital, phenobarbital, methylphenobarbital, chloral hydrate, ethchlorvynol (Placidyl),

1 Examples of trademark products appear in parentheses. Scheduling applies to all similar drug products of all other pharmaceutical manufactures within each generic drug classification.

8


ethinamate, (Valmid), paraldehyde, methohexital, fenfluramine, diethylproprion, phentermine, chlordiazepoxide (Librium), diazepam (Valium), oxazepam (Serax), clorazepate (Tranxene), flurazepam (Dalmane), lorazepam (Ativan), alprazolam (Xanax), temazepam (Restoril), triazolam (Halcion), mebutamate, detropropoxyphene (Darvon), and petazocine (Taiwin).

Schedule V (CV) Substances

The controlled substances in this schedule have an abuse potential and dependence liability less than those listed in CIV and have an accpeted medical use in the U.S. They are often available without prescription, and include preparations containing limited quantities of certain narcotic drugs generally for antitussive and antidiarrheal purpose. Buprenorphine is also a CV drug.


9


GENERAL SECURITY REQUIREMENTS

Substantial Compliance

The general security requirements set forth in the Code of Federal Regulations (CFR) require all registrants and applicants for registration to provide effective physical security controls and operating procedures to guard against theft and diversion of controlled substances. Substantial compliance with these requirements and standards set forth in Title 21 CFR Sections 1301.721301.76 may be deemed sufficient by DEA after evaluation of the overall security system and needs of the individual applicant or registrant considering the following factors:

1. Type of activity conducted (e.g., processing of bulk chemicals, preparing dosage forms, packaging, labelling, cooperative buying, etc.).

2. Type and form of controlled substances (e.g., bulk liquids or dosage units, usable powders or non-usable powders, etc.).

3. Quantity of controlled substances.

4. Location of premises/security needs (e.g., high vs. low crime areas, waterfront boundaries, adjacent/attached buildings, urban vs. suburban vs. rural areas, etc.).

5. Type of building construction/general characteristics (e.g., metal curtain, wood frame, masonry, number and type of doors, windows and other openings, etc.).

6. Types of safes/vaults/secure enclosures (e.g., automatic storage and retrieval, construction of vaults and cages, modular vaults, container weight and type, UL listing/GSA rating, etc.).

7. Type of closure (e.g., built-in combination locks, key locks, padlocks, self closing and locking day gates, vault doors and frames, etc.).

8. Key and lock control (e.g., adequacy, accountability, routine changing, issuance and control procedures, logging, central repository, combination security, etc.).

9. Alarm systems (e.g., adequacy of supervision, method of signal transmission, proprietary vs. central station vs. police connection, adequacy of standby power sources, maintenance and testing, signal and response time, etc.).

10. Public access/perimeter fencing (e.g., adequacy of gates and fencing, if any, control at entry/exit points, parking location and proximity to facility, extent of unsupervised public access to the facility, etc.).

11. Supervision of employees (e.g., access control to manufacturing and storage areas, identification media and systems, control of and accountability for identification, responsibilities of employees, etc.).

10


12. Guest/visitor procedures (e.g., access control, logging procedures, identification media, internal movement control, etc.).

13. Local police/security force (e.g., availability, legal obligation to respond, frequency of patrol, adequacy of training, alarm response time, size of force, etc.).

14. Adequacy of internal systems for monitoring controlled substances (e.g., storage security, common or contract carrier security, etc.).

Request for Review

Any applicant or registrant who wants to know whether or not a proposed security system substantially complies with DEA requirements as prescribed by the regulations may submit plans, blueprints or sketches of the proposed system to the appropriate DEA Field Office. Even with preliminary Field Office approval of the proposed system, final approval will only be given at the time the system is completed and can be inspected at the location where it is to be used.

Waiver

Physical security controls at locations registered and approved under the former Harrison Narcotic Act (HNA) or the former Narcotic Manufacturing Act (NMA) of 1960 as of April 30, 1971, are considered to be in compliance with present security regulations. However, new or modified facilities or work and storage areas which have not previously been approved by DEA (even if these facilities are similar to those previously approved by the Bureau of Narcotics and Dangerous Drugs) will not necessarily be deemed in compliance with the security regulations. Furthermore, any change in ownership or control after April 30, 1971 of locations registered and approved under the former HNA or the former NMA would negate this waiver.

Changes

It is important to note that physical security controls and procedures must be expanded and extended accordingly if existing systems become inadequate as a result of a controlled substance being transferred to a different schedule, being placed in a schedule, or if there is a significant increase in the quantity of controlled substances in the possession of a registrant during normal business operations.


11


SECURITY REQUIREMENTS FOR NON-PRACTITIONER

Non-practitioners include manufacturers, packagers, labelers, distributors, importers, exporters, narcotic treatment programs, and compounders for narcotic treatment programs.

Minimum Standards: Handlers of CI&II Controlled Substances

Small quantities of CI&II raw materials, bulk materials awaiting further processing, and

finishing products must be stored in an Underwriters Lab (UL) listed burglary-resistant safe with

a Group 1-R lock, or a GSA Class V rated security container, or the equivalent, which affords the

following security protection:

1. 30 man minutes against surreptitious entry,

2. 10 man minutes against forced entry,

3. 20 man hours against lock manipulation,

4. 20 man hours against radiological attack.

This safe or security container must be bolted, strapped, or otherwise securely fastened to the floor or wall in such a way that it cannot be readily removed if it weighs less than 750 pounds. Depending upon the quantities and types of controlled substances stored, this safe or security container must be equipped with an alarm system which upon attempted unauthorized entry transmits a signal directly to a central protection company, a local or state police agency which has a legal obligation to respond, a 24-hour proprietary central station operated by the registrant, or such other protection as DEA may approve.

Large quantities of such controlled substances which do not permit storage in a safe or security container may be stored in a vault meeting the following specifications or equivalent, if

constructed after September 1, 1971:

1. The walls, floor and ceiling are constructed of at least eight inches of reinforced concrete or other substantial masonry reinforced vertically and horizontally with #4 (half inch) steel rods tied six inches on center, or UL listed modular vault panels.

2. The door and frame unit are UL listed burglary-resistant, GSA Class V rated or equivalent, i.e., multiple position Group 1-R combination lock, relocking device, special metal alloy that resists carbide drilling, and in general affords the overall security protection set forth above for safes and security containers.

3. If operations require the vault/container to remain open to frequent access, the door is required to be equipped with a day gate which is self-closing and self-locking. If the

operation requires only that the vault be opened infrequently, such as to remove raw material in the morning and return it at night, and is always relocked immediately after use, a day gate is not required.

4. The walls or perimeter are equipped with an alarm system which upon attempted unauthorized entry must transmit an alarm directly to a central protection company, local or

12


state police agency which has a legal obligation to respond, a 24-hour proprietary central station operated by the registrant, or such other protection as DEA may approve. If necessary due to local condition or other problems, holdup buttons may be required to be placed at strategic points of entry or exit from the perimeter.

5. The door is equipped with a contact switch(es) and there is complete electrical lacing of the walls, floors and ceiling, sensitive ultrasonic or infrared sensors within, a sensitive sound accumulator system, or other such devices or equipment designed to detect unauthorized entry as may be approved by DEA.

Vaults constructed before or under construction on September 1, 1971 and approved by the Bureau of Narcotics and Dangerous Drugs or its predecessor agencies may be of substantial construction with a steel door, combination or key lock, and alarm system.

NOTE: DEA evaluates a registrant security system on an element-by-element and on and overall basis, measuring the system against the potential theft or diversion problem the registrant might encounter at the registered location. Thus, DEA may approve a security system although some of the specific standards are not met, e.g., a registrant who provides 24-hour guard surveillance may not need the full alarm protection as set forth in the regulations. A registrant who handles large quantities of in-process liquids running through a pipe system may not need to vaults this form of controlled substances because of the difficulties in containing or diverting the liquids and their possible non-restrictability. The minimum standards and general security requirements set forth above and below are used by DEA as a basis for making decisions on the specific security needs of each registrant.

Minimum Standards: Handlers of CIII-V Controlled

Small quantities of C III-V controlled substances may be stored in a UL listed burglary-resistant safe or a GSA Class V rated security container or equivalent which complies with the requirements for storing C I& II substances. Large quantities of such controlled substances which do not permit storage in a safe or security container may be stored in:

1) A building or area within a building having perimeter security which limits access during working hours, provides adequate security after working hours, and has the following security controls:

a) An electronic alarm system as described above for C I&II controlled substances;

b) Substantially constructed self-closing and self- locking doors employing either multiple-position combination or key lock type locking mechanisms (NOTE: in lieu of self Blocking/closing doors, a door which is kept closed and locked at all times when not in use, and when in use is kept under direct observation of a responsible employee of the registrant is permitted); and

c) Requisite key control, combination limitations, and change procedures.


13


2) A cage within a building on the premises meeting the following specifications:

a) Walls constructed of not less than ten gauge steel fabric mounted on steel posts which are:

i) At least one inch in diameter;

ii) Set in concrete or installed with lag bolts which are pinned or brazed; and

iii) Placed no more than ten feet apart with horizontal one and one half-inch reinforcement every 60 inches.

b) Mesh construction with openings not more than two ands one half inches across the square;

c) A ceiling constructed of the same material or walls extending to and firmly attached to the structural ceiling;

d) A door constructed of the same gauge steel fabric on a metal door frame in a metal door flange; and

e) An alarm system protecting the perimeter and interior as described above.

3) An enclosure of masonry or other such materials or secure storage area which has been approved by DEA.

Collocating CIII-V with CI&II Substances

Schedule III-V controlled substances may be stored with CI&II substances under the security measures required for those substances. CIII-V substances may be stored in the vault provided access to the area is not substantially increased and that permission for such storage is obtained in advance from the appropriate DEA Field Office.

Multiple Storage Areas

On occasion it may be necessary for non-practitioner registrants to handle several classes of controlled substances separately. Some examples of these special circumstances are damaged goods, returned goods, goods in processing, etc. In these circumstances, controlled substances may be stored apart from the main stock of controlled substances, provided that each storage area complies with the security requirement set forth in the previously described minimum standards.


14


Accessibility to Storage Areas

In order to minimize the possibility of diversion, the registrant must limit access to the storage areas for controlled substances to a minimum number of authorized employees. Although not specifically required, it may be necessary to institute some type of security pass system if the size, type, or other characteristics the firm dictate the need. Where it is necessary for employee or non-employee maintenance personnel, business guests, or other visitors to have access to or to pass through a controlled substances storage area, the registrant needs to provide authorization to those individuals. The authorization should be in writing, and the specially authorized

individuals should be held under adequate observation during the time they are in the storage area.

Manufacturing and Compounding Areas

Manufacturing activities (include processing, packaging, and labelling) involving controlled substances listed in any schedule, and all compounders, must implement the following security controls:

1. All in-process substances must be returned to the controlled substances storage area at the termination of the process. If the process is not completed at the end to the work day, the processing area or tanks, vessels, bins, or bulk containers holding controlled substances must be securely locked inside an area or building which affords adequate security.

2. Manufacturing activities with controlled substances must be conducted in an area(s) with limited access and must be kept under surveillance by and employee(s) designated in writing by management to be responsible for the area. The designated employee(s) must be able to provide continuous surveillance of the area in order that unauthorized persons may not enter or leave the area without the designated employee’s knowledge. Access may be limited by the use of physical dividers such as walls or partitions, by traffic control lines, or restricted space designations.

3. During controlled substances production, the manufacturing areas should be accessible only to those employees necessary for efficient operation. If it becomes necessary for employee or non-employee maintenance personnel, business guests, or visitors to be present or to pass through manufacturing areas during production, it is in the best interest of the registrant to have an employee designated in writing as being responsible for providing adequate surveillance of the area.

Public Warehouses

Registrants who store controlled substances in public warehouses are responsible for selecting a facility that will provide adequate security to guard against losses and thefts. Whenever possible, the registrant should select a storage warehouses or terminal which meets the physical security requirement and controls set forth above and below, with the knowledge that it is the registrant, not the warehouseman, who is responsible for the security of the controlled substances. Other aspects of warehouse or terminal security which the registrant might consider are:


15


1. Adequacy of fencing, lighting, electronic security, checkpoints, and other perimeter controls;

2. Type of order tracking or tracing system in use, if any;

3. Personnel screening, hiring, and control programs;

4. Hours of operation;

5. Use of contract or proprietary guards;

6. Procedures and systems in use to control inbound and outbound tractors, trailers, containers, etc.;

7. Yard control of drivers, tractors, trailers, containers, etc.

Common or Contract Carriers

Registrants are also responsible for selecting common or contract carriers that will provide adequate security against in-transit losses or thefts. If the registrant has substantial quantities of controlled substances lost or stolen in transit when using a particular common or contract carrier, steps should be taken to obtain another secure carrier or means of transport. When evaluating common or contract carriers, in addition to evaluating warehouses or terminal security, the registrant might consider the following:

1) Physical security of the vehicles, e.g.:

a) Adequate vehicle and trailer locks subject to proper key control, and locking of vehicles at all times when unattended;

b) Vehicular alarm systems in use at all times when vehicles and trailers are unattended;

c) Fuel lock alarm devices;

d) Page alert alarm system carried by drivers when away from vehicles and trailer to alert them to unauthorized opening of doors, hood, etc.

2) Route variations to avoid patterns

3) Vehicles equipped with CB’s or other radios to communicate with local law enforcement agencies or the company warehouse or terminal in the event of an emergency or other duress condition.

4) Special code numbers or symbols painted on or otherwise affixed to the roof.

5) Driver screening, hiring and control programs.

6) Overall priority and security afforded controlled substances shipments.

7) Use of subcontracted carriers.


16


These security aspects and procedures are also applicable when delivering and picking up controlled substances using company-owned or leased vehicles operated by company employees. Although not required, precautions such as securely wrapping and sealing packages containing controlled substances and using unmarked or coded boxes or shipping containers are strongly recommended for guarding against in-transit losses.

Theft or Loss

Registrants must notify the appropriate DEA field office of theft or significant loss of any controlled substance. Furthermore, the supplier is responsible for reporting in-transit losses of controlled substances by a common or contract carrier. The registrant must then promptly complete and submit the DEA Form 106 regarding such losses or thefts. Thefts must be reported whether or not the controlled substances are subsequently recovered and/or the responsible parties identified and action taken against them.

Other Security Controls

Good Faith Inquiry. Before distributing a controlled substance to any person whom the registrant does not know to be registered to possess the controlled substance, the registrant must make a good faith inquiry either to DEA or to the appropriate state controlled substances licensing or registration agency, if any, to determine that the person or company may lawfully possess the controlled substances.

Suspicious Orders. The registrant must design and operate a system to disclose suspicious orders of controlled substances. The registrant must inform the appropriate DEA Field Office of suspicious orders immediately upon discovery. Such orders include, but are not limited to, orders of unusual size, orders deviating substantially from a normal pattern, and orders of unusual frequency.

Controlled Substance Samples. Complimentary samples of any controlled substance may not be distributed unless the following conditions are met:

1. The distributor has a prior written request from the registrant which includes the customer’s name, address, registration number, and name and quantity of the specified controlled substance;

2. The controlled substance is to be used to meet the legitimate medical needs of patients; and

3. Reasonable quantities are requested.

Distributing Through Agents. When controlled substances are distributed by agents (i.e., detailmen), the registrant is responsible for providing adequate security to guard against theft or diversion while the controlled substances are being stored or handled by the agents.


17


Employees

Screening. In order to fairly assess the likelihood of an employee committing a drug security breach, it is essential that non-practitioner registrants carefully screen individuals before hiring them. Of the utmost importance is a determination of convictions for crimes and unauthorized use of controlled substances. To this end, DEA recommends that the following two questions become a part of and employer’s comprehensive screening program:

1. Within the past five years, have you been convicted of a felony, or within the past two years, of any misdemeanor, or are you presently charged (formally) with committing a criminal offence? Do not include any traffic violations, juvenile offences on military convictions, except by general court-martial. If the answer is yes, furnish details of conviction, offense location, date, and sentence.

2. In the past three years, have you ever knowingly used any narcotics, amphetamines, or barbiturates, Other than those prescribed to you by a physician? If the answer is yes, furnish details.

DEA also recommends that an authorization, in writing, be completed by a person who is allowed to or is considered for work in a controlled substances area. This authorization should permit inquiries to be made of courts and law enforcement agencies concerning pending charges or convictions. Information on employees? criminal records should then be used as follows:

1. Locally by name, date and place of birth, and other identifying information, inquire at local courts and law enforcement agencies for records of pending charges and convictions; and

2. Nationally by the same identifying information make and inquiry at the appropriate DEA Field Office.

In addition, pre-employment screening should be by written application which covers such areas as credit checks, residences, educational background, military history, character, reputation, and past employment. All applications should strongly warn that any falsification will result in dismissal and that data will be verified.

Post-employment screening is also very important. Events in employees lives can change their reliability and integrity. Employees and supervisors should be encouraged to be on the lookout for troubled employees. Payroll and personnel offices should advise security officers of inquiries by creditors or attempted garnishment of wages. When employees are considered for promotion to positions of greater responsibility, additional comprehensive screening may be appropriate.

Responsibility to Report Drug Diversion. A necessary part of an overall employee security program is the reporting of employee drug theft or diversion in the workplace. It is also in the public interest. Employees who have knowledge of drug theft of diversion from their employer have an obligation to report such information to a responsible security official of the employer. Employers have a responsibility to treat such information as confidential and to take all reasonable steps to protect the confidentiality of the information and the identity of employees


18


furnishing information. Failure to report drug theft or diversion information should be a critical factor in determining an employee’s continued employment in a drug security area.

Illicit Activities. Employees who posses, sell, use or divert controlled substances not only subject themselves to state or Federal prosecution for any illicit activity, but should also become the subject of independent action regarding their continued employment. Employers must assess the seriousness of the employee’s violation, the position of responsibility held by the employee, past record of employment, etc., in determining whether to take other action against the employee.


19


NARCOTIC TREATMENT PROGRAMS


Only a licensed practitioner employed at a Narcotic Treatment Program (NTP) or other authorized individual designated in writing may accept delivery of narcotic substances. Excluded from authorization to accept delivery are any persons currently or previously dependent on narcotics. At the time of delivery, the licensed practitioner or other authorized individual designated in writing must sign for the narcotics and place his or her specific title (if any) on the invoice. Copies of these signed invoices must be kept by the distributor.

Narcotics may only be dispensed or administered at an NTP directly to the patient by either:

1. The licensed practitioner;

2. A registered nurse or a licensed practical nurse under the direction of the licensed practitioner;

3. A pharmacist under the direction of the licensed practitioner.

Persons enrolled at an NTP must wait in an area which is physically separated from the narcotic storage and dispensing area.

DEA may exercise discretion regarding the degree of security required in NTP’s based upon such factors as the location of a program, the number of patients, the number of physicians, staff members and security guards, etc. These factors will be taken into consideration when evaluating existing security or requiring new security at an NTP.


20


SECURITY REQUIREMENTS FOR PRACTITIONERS

Practitioners include physicians, dentists, veterinarians, researchers, hospitals, pharmacies, or other persons registered to do research, to dispense, or to use in teaching or chemical analysis a controlled substance in the course of professional practice.

Minimum security standards for practitioners are set forth in the regulations (Title 21 CFR 1300-end) and are to be used in evaluating security. They may not necessarily be acceptable for providing effective controls and operating procedures to prevent diversion or theft of controlled substances. For example, a hospital that keeps large quantities of controlled substances on hand may need a safe or vault similar to the requirements for a distributor. The same reasoning also applies to other practitioners.

A practitioner’s overall security controls will be evaluated to determine if they meet the intent of the law and regulations to prevent theft or diversion.

Minimum Standards for Practitioners' Handling of Controlled Substances

Controlled substances must be stored in a securely locked cabinet of substantial construction. Pharmacies have the option of storing controlled substances as set forth above, or concealing them by dispersal throughout their stock of non-controlled substances.

Even though the Federal regulations do not specifically define locked cabinet construction, the intent of the law is that controlled substances must be adequately safeguarded. Therefore, depending on other security measures, a wooden cabinet may or may not be considered adequate. In an area with a high crime rate, a strong metal cabinet or safe may be required.

Some of the factors considered when evaluating a practitioner’s controlled substances security include:

1. The number of employees, customers and/or patients who have access to the controlled substances.

2. The location of the registrant (high or low crime area).

3. Use of an effective alarm system.

4. Quantity of controlled substances to be kept on hand.

5. Prior history of theft or diversion.

Again, an overall evaluation of the practitioner’s security will be made by DEA using the general and minimum security requirements as outlined in this manual to assure that the controlled substances are stored securely.

21


Other Security Controls for Practitioners

In order to minimize the opportunities for theft or diversion of controlled substances,

practitioners have an obligation not only to provide effective physical security, but also to initiate additional procedures to reduce access by unauthorized persons as well as to provide alarm system where necessary.

Employee or Agent. A practitioner must not employ an agent or individual who has had his application for registration with DEA denied or revoked at any time, and who, as a result of his employment, will have access to controlled substances.

Loss or Theft. A practitioner shall notify the nearest DEA Field Office of the theft or significant loss of any controlled substance upon discovery of such loss or theft. The practitioner shall promptly complete and submit DEA Form 106 regarding the theft or loss.

Blank prescriptions and DEA Order Forms. A practitioner should develop the practice of keeping blank prescription forms in locations which would preclude patients or casual visitors from stealing the forms for the purpose of falsification. Unused DEA Order Forms should also be kept in a secure location for the same reason.


22


Additional Security Measures

Although not specifically required by Federal law or regulation, the following additional security measures are recommended to enhance the overall security of non-practitioners as well as practitioners in some situations:

1. For large operations, designate a specific individual to act as a security manager or supervisor.

2. Routinely test alarm systems. At least annually, in the presence of the alarm contractor, conduct an on-site inspection and test of the entire alarm system to determine needed repairs and adjustments.

3. Ensure that all alarm systems have at least 24-hour battery or other standby power sources in the event of commercial power failure.

4. Use only balanced or biased magnetic contact switches and ensure motion detectors do not disclosed coverage by either by-pass or elimination of the walktest LEDs, if any.

5. In addition to balanced or biased contacts, install UL approved heat detectors on vault doors.

6. Ensure that all telephone junction boxes or rooms where alarm telephone circuits terminate are locked, tamper protected, and all labels or tags identifying these alarm circuits have been removed.

7. Do not permit vault, safe or premises openings other than at scheduled times. Instruct your alarm contractor that unscheduled or telephone request for openings other than by prior written request or other secure pre-arrangement should be treated as an alarm or duress condition.

8. Use UL approved locks and lock cylinders which are rated as Apick= or burglary resistant.

9. Change all lock combinations at least annually or upon termination of any employee with knowledge of the combination(s), regardless if the reason for the termination.

10. Use two supervisors to open all premises which are alarmed. One individual should remain a safe distance away from the premise entrance while the other enters and searches to be certain everything is alright, then signal by pre-arrangement to the other.

11. Meet periodically with local and state law enforcement officials to discuss alarm response, criminal activity statistics, patrol frequency, and other pertinent matters.

12. Develop robbery, hostage and kidnapping (extortion) contingency plans which are disseminated and made known to all employees from management on down.

23


13. Enclose shipping/receiving areas in steel or chain link fencing, install day gates on loading platform doors, and adequately harden and secure other doors and openings to isolate and restrict access to the warehouse or manufacturing areas by drivers and other unauthorized individuals.

14. Require that all shipping/receiving dock day gates are kept closed at all times when docks

are not in use.

15. Install local alarms or hard-wired day annunciation contact switches on all fire exits and other perimeter doors not authorized for employee or visitor use.

16. If utilizing company-owned or leased vehicles for the pickup and delivery of controlled substances, do not mark them with the company name or other identification which would indicate the nature of your business.

17. Isolate and secure office entry foyers or reception areas to prevent unauthorized entry. Entry from these areas should be remotely controlled by electronic locks or other automatic access devices after positive identification.

18. Locate receptionists behind bullet resistant barriers which are equipped with a package receiver and telephone or intercom system for communications.

19. Leave application forms for employment in the secured entry foyers or reception areas unless a secure pass through mechanism has been installed.

20. Secure doors from office areas to warehouse, research, and/or manufacturing areas with key/combination locks, machine-aided manual access devices, or other suitable mechanisms.

21. For larger operations, use a photo badge identification system for all employees and require other visitors such as tradesmen, contractors, vendors, etc. to wear special identification badges at all times when on the premises.

22. Install closed circuit TV cameras to monitor vaults, shipping/receiving areas, manufacturing area, cages, etc. These need not be continuously monitored if video recording systems are employed.

23. Issue and require the wearing of pocketless coverall type uniforms in the manufacturing areas vulnerable to pilferage of dosage form pharmaceuticals. The uniforms can be color coded to signify specific manufacturing areas.


24


 Drug Enforcement Administration Field Offices with Assigned Diversion Investigators Personnel

Location

Jurisdiction

Albuquerque District Office

Suite 100

4775 Indian School Road, N.E.

Albuquerque, New Mexico 87110

(505) 262-6283

New Mexico

Atlanta Division

75 Spring Street, SW,

Room 740

Atlanta, Georgia 30303

(404) 331-7328

Georgia

South Carolina

Baltimore District Office

200 St. Paul Plaza, Suite 2222

Baltimore, Maryland 21202

(410) 962-4800

Maryland

Boston Division

50 Staniford Street

Suite 200

Boston, Massachusetts 02114

(617) 565-2800

Maine

Massachusetts

New Hampshire

Rhode Island

Vermont

Buffalo Resident Office

28 Church Street

Suite 300

Buffalo, New York 14202

(716) 846-4421

Western and Central

New York

Camden Resident Office

1000 Crawford Place

Suite 200

Mt. Laurel, New Jersey 08054

(609) 757-5006

Southern New Jersey

Charleston Resident Office

2 Monogalia Street

Suite 202

Charleston, West Virginia 25302

(304) 347-5209

West Virginia

Chicago Division

500 Dirksen Federal Bldg.

219 South Dearborn Street

Suite 500

Chicago, Illinois 60604

(312) 353-7875

Central and Northern Illinois

Cleveland Division

Courthouse Square

310 Lakeside Avenue, Suite 395

Cleveland, Ohio 44113

(216) 522-3705

Northern Ohio

Columbus Resident Office

78 East Chestnut St.

Room 409

Central and Southern Ohio


25



Columbus, Ohio 43215

(614) 469-2595


Dallas Division

1880 Regal Row

Dallas, Texas 75235

(214) 767-7250

Northern Texas

Denver Division

115 Inverness Drive East

Englewood, Colorado 80112

(303) 784-6381

Colorado

Wyoming

Des Moines Resident Office

Room 937, Federal Building

210 Walnut Street

Des Moines, Iowa 50309

(515) 284-4700

Iowa

Detroit Division

357 Federal Building

231 W. Lafayette

Detroit Michigan 48226

(313) 226-7290

Michigan

Ft. Lauderdale Resident Office

1475 W. Cypress Creek Blvd.

Suite 301

Ft. Lauderdale, Florida 33309

(305) 527-7094

Southern Florida

Fresno Resident Office 1260 M Street, Room 200 Fresno, California 93721 (209) 487-5402

Central California

Greensboro Resident Office

2300 W. Meadowveiw Road

Suite 218

Greensboro, North Carolina 27407

(919) 333-5052

North Carolina

Harrisburg Resident Office

P.O. Box 557

Harrisburg, Pennsylvania 17108-0557

(717) 782-2270

Central Pennsylvania

Hartford Resident Office

450 Main Street

Room 628

Hartford, Connecticut 06103

(203) 240-3230

Connecticut

Honolulu Resident Office

Room 3129

300 Ala Moana Boulevard

P.O. Box 50163

Honolulu, Hawaii 96850

(808) 541-1930

Hawaii

Trust Territories

Houston Division

33 West Loop North

Suite 300

Houston, Texas 77024-7707

(713) 681-1771

Eastern and Southern Texas

Indianapolis District Office

Indiana



26



575 N. Pennsylvania

Room 290

Indianapolis, Indiana 46204

(317) 226-7977


Kansas City Resident Office

8600 Farley, Suite 200

Overland Park, Kansas 66212

(913) 236-3176

Kansas

Western Missouri

Little Rock Resident Office

10825 Financial Parkway

Suite 317

Little Rock, Arkansas 72211-3557

(501) 378-5981

Arkansas

Long Island District Office

1 Huntington Quadrangle

Suite IC-02

Melville, New York 11747

(516) 420-4532

Long Island, New York

Los Angeles Division

World Trade Center

Edward Roybal Federal Building

255 East Temple Street, 20th Floor

Los Angeles, California 90012

(213) 894-4016

South Central California

Nevada

Louisville Resident Office

1006 Federal Building

600 Martin Luther King, Jr. Place

Louisville, Kentucky 40202

(502) 582-5908

Kentucky

Miami Division

8400 N.W. 53rd St.

Miami, Florida 33166

(305) 591-4980

Southern Florida and

Eastern Coast of Florida

Milwaukee Resident Office

100 Water Street, Suite 1010

Milwaukee, Wisconsin 53202

(414) 297-3395

Wisconsin

Minneapolis Resident Office

402 Federal Building

110 S.4th Street

Minneapolis, Minnesota 55401

(612) 348-1729

Minnesota

North Dakota

Mobile Resident Office

1110 Mountlimar

Suite 270

Mobile, Alabama 36609

(205) 441-5831

Alabama

Nashville Resident Office

801 Broadway, Room A929

Nashville, Tennessee 37203

(615) 736-5988

Tennessee

Newark Division

Federal Office Building

970 Broad Street

Newark, New Jersey 07102

Central and Northern

New Jersey



27



(201) 645-3482


New Orleans Division

3838 N. Causeway Blvd., Suite 1800

Three Lake Center

New Orleans, Louisiana 70002

(504) 585-5665

Louisiana

Mississippi

New York Division

99 Tenth Avenue

New York, New York 10011

(212) 337-1575

Northern and Southern

New York

Oklahoma City Residents Office

Federal Building

200 N.W. Fifth Street

Suite 960

Oklahoma City, Oklahoma 73102

(405) 231-4141

Oklahoma

Omaha Resident Office

106 South 15th Street, Room 1003

Omaha, Nebraska 68102

(402) 221-4222

Nebraska

South Dakota

Philadelphia Division

William J. Green Federal Building

600 Arch Street

Room 10224

Philadelphia, Pennsylvania 19106

(215) 597-9540

Delaware

Eastern Pennsylvania

Phoenix Division

3010 N. 2nd Street

Suite 301

Phoenix, Arizona 85012

(602) 640-5700

Arizona

Pittsburgh Resident Office

Federal Building

1000 Liberty Avenue

Room 2306

Pittsburgh, Pennsylvania 15222

(412) 644-3390

Western Pennsylvania

Portland Resident Office

1220 S.W. 3rd Avenue

Room 1525

Portland, Oregon 97204

(503) 326-3371

Oregon

Richmond Resident Office

8600 Staples Mill Road

Suite B

Richmond, Virginia 23240

(804) 771-8163

Central, Southeastern and

Southwestern Virginia

Sacramento Resident Office

1860 Howe Avenue

Suite 250

Sacramento, California 95825

(916) 978-4425

North Central and

Northeastern California

Salt Lake City Resident Office

American Towers III

47 West 200 South, Room 401

Utah



28



Salt Lake City, Utah 84101

(801) 524-4156


San Antonio District Office

10127 Morocco

Suite 200

San Antonio, Texas 78216

(512) 525-2900

Central and Western Texas

San Diego Division

402 W. 35th Street

National City, California 90250

(619)585-4200

Southern California

St. Louis Division

United Missouri Bank Building

7911 Forsythe Boulevard

Suite 500

St. Louis, Missouri 63105

(314) 425-3241

Eastern Missouri

Southern Illinois

San Francisco Division

450 Golden Gate Avenue

P.O. Box 36035

San Francisco, California 94102

(415) 556-3325

Central and Northern Coast

California

San Juan District Office

Casa Lee Building

2432 Loiza Street

Santurce, Puerto Rico 00913

(809) 253-4234

Puerto Rico

Virgin Islands

Seattle Division

220 West Mercer Street

Suite 104

Seattle, Washington 98119

(206) 442-5443

Washington State

Montana

Alaska

Idaho

Tampa Resident Office

5426 Bay Center Drive

Tampa, Florida 33609

(813) 228-2486

Central, Northcentral and

Northwestern Florida

Washington, D.C Division

400 Sixth Street, S.W.

Room 2558

Washington, DC 20024

(202) 401-7834

District of Columbia

Northern Virginia

Southern Maryland



29



Manual Mutu Akademik

Universitas Diponegoro

MMA

UNDIP

BPM

2

1


Revisi ke

:

-

Tanggal

:

30 Januari 2006

Dikaji ulang oleh

:

Pembantu Rektor Bidang Akademik

Dikendalikan oleh

:

Badan Penjaminan Mutu

Disetujui oleh

:

Rektor


UNIVERSITAS

Manual Mutu

Disetujui

DIPONEGORO

Akademik

oleh

Revisi




ke

  30-01-Tanggal

MMA.UNDIP.BPM.2.1

Rektor


2006





1


KATA PENGANTAR

Untuk pelaksanaan Sistem Penjaminan Mutu Pendidikan Tinggi (SPMPT) di Universitas Diponegoro, maka disusun Manual Mutu Akademik Universitas Diponegoro. Dengan adanya Manual Mutu Akademik ini, diharapkan seluruh sivitas akademika dapat memahami dengan baik tentang Kebijakan Mutu Akademik, Sistem Penjamiman Mutu, dan Organisasi Penjaminan Mutu Akademik di Universitas Diponegoro. Dengan mengetahui semua hal tersebut, maka diharapkan komitmen dari seluruh sivitas akademika Universitas Diponegoro untuk pelaksanaan Sistem Penjaminan Mutu Pendidikan Tinggi.

Manual prosedur ini merupakan acuan bagi semua pihak yang terkait dengan pelaksanaan Sistem Penjaminan Mutu di Universitas Diponegoro.

Semarang, 17 Januari 2006 Rektor,

Prof. Ir. Eko Budihardjo, M.Sc NIP. 130 354 860


DAFTAR ISI


Judul················································································································· i

LembarPengesahan ·························································································· ii

Surat Keputusan Rektor Universitas Diponegoro ············································· iii

KataPengantar ································································································· iv

DaftarIsi··········································································································· v

BAB I Kebijakan Mutu Akademik Universitas Diponegoro ·······················

1.1. Kebijakan Umum ······································································ 1.2. Penjaminan Internal Mutu Akademik ·······································

BAB II Penjaminan Mutu Akademik Universitas Diponegoro ····················· Konsep····························································································· Penerapan·························································································

BAB III Organisasi Penjaminan Mutu Akademik Universitas Diponegoro ··· 3.1. Tingkat Universitas ··································································· 3.2. Tingkat Fakultas ······································································· 3.3. Tingkat Jurusan/ Bagian/ Program Studi ··································


3



KEPUTUSAN

REKTOR UNIVERSITAS DIPONEGORO

Nomor : 25/SK/J07/2006

Tentang

MANUAL MUTU UNIVERSITAS DIPONEGORO

REKTOR UNIVERSITAS DIPONEGORO

Menimbang :a. bahwa Universitas Diponegoro memiliki komitmen secara profesional untuk

meningkatkan mutu pendidikan melalui sistem Penjaminan Mutu Pendidikan Tinggi;

b. bahwa pelaksanaan Penjaminan Mutu merupakan tanggung jawab bersama seluruh komponen organisasi baik ditingkat universitas, fakultas serrta Jurusan/Bagian/Program Studi;

c. bahwa untuk kejelasan tugas dan tanggung jawab perlu ditetapkan Panduan Pelaksanaan dalam Manual Mutu Universitas Diponegoro dengan Keputusan Rektor.

Mengingat

: 1. Undang-Undang No. 20 tahun 2003 tentang Sistem Pendidikan Nasional;

2. Peraturan Pemerintah No. 7 tahun 1961 tentang Pendirian Universitas Diponegoro;

3. Peraturan Pemerintah No. 60 tahun 1999 tentang Pendidikan Tinggi;

4. Keputusan Presiden RI No. 99/M/2002 tentang Pengangkatan Rektor Universitas Diponegoro;

5. Keputusan Mendikbud No. 0202/0/1995 tentang Organisasi dan Tata Kerja Universitas Diponegoro;

6. Keputusan Mendikbud No. 0275/0/1996 tentang Penyempurnaan Organisasi dan Tata Kerja Universitas Diponegoro;

7. Keputusan Mendikbud No. 186/O/2002 tentang Statuta Universitas Diponegoro.


Memperhatikan :2. Rapat Badan Pekerja Senat Universitas Diponegoro tanggal 9 Desember 2005 3. Rapat Senat Universitas Diponegoro tanggal 23 Desember 2005

M E M U T U S K A N

Menetapkan :SURAT KEPUTUSAN REKTOR UNIVERSITAS DIPONEGORO TENTANG MANUAL MUTU UNIVERSITAS DIPONEGORO.

Pertama :Menetapkan Manual Mutu Universitas Diponegoro sebagamana tersebut terdapat pada Lampiran Keputusan ini.

4


Kedua :Manual Mutu Universitas Diponegoro merupakan pembagian tugas dan tanggung jawab organisasi Penjaminan Mutu Akademik Universitas Diponegoro

Ketiga :Hal-hal yang belum diatur dalam keputusan ini akan ditetapkan dalam keputusan tersendiri

Keempat :Surat Surat Keputusan ini berlaku mulai tanggal ditetapkan, dengan ketentuan segala sesuatunya akan ditinjau kembali dan akan diperbaiki atau ditambahkan sebagaimana mestinya apabila di kemudian hari ditemukan kekeliruan ataupun kekurangan.

Ditetapkan di Semarang

Pada Tanggal 30 Januari 2006

R e k t o r ,

Prof. Ir. EKO BUDIHARDJO, MSc NIP. 130 354 860

SALINAN disampaikan kepada :

1. Menteri Pendidikan Nasional di Jakarta;

2. Sekjen Depdiknas di Jakarta;

3. Irjen Depdiknas di Jakarta;

4. Dirjen Dikti Depdiknas di Jakarta;

5. Dirbinlitabmas Ditjen Dikti Depdiknas di Jakarta;

6. Dirbinsarak Ditjen Dikti Depdiknas di Jakarta;

7. Para Pembantu Rektor di Undip;

8. Para Dekan Fakultas di Undip

9. Direktur Program Pasca Sarjana di Undip

10. Para Ketua Lembaga di Undip

11. Para Kepala Biro di Undip

12. Para Kepala UPT di Undip


5


LAMPIRAN :

SURAT KEPUTUSAN REKTOR UNIVERSITAS DIPONEGORO

Nomor : 28/SK/J07/2006

Tentang

MANUAL MUTU UNIVERSITAS DIPONEGORO

BAB I

KEBIJAKAN MUTU AKADEMIK

UNIVERSITAS DIPONEGORO

A. Kebijakan Umum

1. Universitas Diponegoro menyelenggarakan proses pendidikan terbaik dan unggul dalam bidang ilmu pengetahuan, teknologi, dan seni.

2. Universitas Diponegoro menyelenggarakan evaluasi reguler untuk meningkatkan kualitas, otonomi, akuntabilitas, dan akreditasi.

3. Sesuai dengan perubahan-perubahan mendasar yang terjadi dalam tataran global, regional, nasional yang menyangkut berbagai aspek kehidupan masyarakat, Universitas Diponegoro dalam menyelenggarakan Tri Dharma Perguruan Tinggi berusaha memberikan kontribusi secara aktif dan signifikan menuju tercapainya masyarakat Indonesia yang cerdas, berbudaya, menguasai Ilmu Pengetahuan dan Teknologi yang berlandaskan ideologi Pancasila menuju tercapainya masyarakat madani.

4. Dalam menyelenggarakan Tri Dharma Perguruan Tinggi Universitas Diponegoro berpegang teguh pada prinsip adanya kebebasan akademik, mimbar akademik, dan otonomi keilmuan.

5. Untuk mencapai Tujuan dan Sasaran yang telah ditetapkan, Universitas Diponegoro harus mengembangkan Sumber Daya Manusia dan Bidang Penelitian sedemikian rupa untuk memenuhi persyaratan sebagai Universitas Pendidikan yang menuju ke Universitas Penelitian.

6. Universitas Diponegoro berpartisipasi aktif dalam memecahkan berbagai masalah yang menyangkut kehidupan masyarakat luas di bidang Politik, Ekonomi, Sosial di tingkat lokal, nasional, dan regional demi kesejahteraan umat manusia.

7. Universitas Diponegoro perlu mengembangkan program-program yang khas untuk mengatasi masalah-masalah laten maupun masalah-masalah baru yang timbul dalam masyarakat sebagai akibat perubahan-perubahan mendasar yang sedang terjadi di tingkat lokal, nasional, dan regional.

8. Untuk menjamin mutu Tri Dharma Perguruan Tinggi perlu ditetapkan Standar Mutu yang dapat diterima secara nasional maupun internasional.

B. Penjaminan Mutu Akademik Internal

1. Penjaminan mutu akademik internal di tingkat universitas, fakultas, progam studi dan unit-unit pelaksana lainnya dilakukan untuk menjamin :

a. Kepatuhan terhadap kebijakan akademik, standar akademik, peraturan akademik serta manual mutu akademik;

b. Kepastian bahwa lulusan memiliki kompetensi sesuai dengan yang ditetapkan disetiap progam studi;

c. Kepastian bahwa setiap mahasiswa memiliki pengalaman belajar sesuai dengan spesifikasi progam studi;

d. Relevansi progam pendidikan dan penelitian dengan tuntutan masyarakat dan stakeholders lainnya.

6


2. Penjaminan Mutu Akademik Internal merupakan bagian dari tanggung jawab pimpinan universitas, pengurus fakultas, pengurus jurusan/bagian, pengelola progam studi serta dosen. Sasaran penerapan sistem penjaminan mutu akademik harus ditetapkan dan dituangkan dalam Rencana Strategis dan Rencana Kegiatan dan Anggaran Tahunan masing-masing satuan kerja.

BAB II

SISTEM PENJAMINAN MUTU AKADEMIK

UNIVERSITAS DIPONEGORO

A. Konsep

1. Pengertian mutu secara umum adalah kesesuaian dengan standar, kesesuaian dengan harapan stakeholder, atau pemenuhan janji yang telah diberikan. Mutu pendidikan di Universitas Diponegoro dimengerti sebagai pencapaian tujuan pendidikan dan kompetensi lulusan yang telah ditetapkan sesuai rencana strategis dan standar akademik serta spesifikasi program studi masing-masing. Pencapaian tujuan ini menyangkut aspek masukan, proses, dan keluaran serta nilai dan derajat kebaikan, keutamaan, dan kesempurnaan (degree of excellence).

2. Mutu pendidikan di Universitas Diponegoro bersifat proaktif dalam arti bahwa lulusan Universitas Diponegoro mampu secara terus-menerus menyesuaikan diri dengan perkembangan ilmu dan teknologi serta realitas sosial budaya yang terus berkembang secara dinamis. Mutu pendidikan di Universitas Diponegoro juga mencakup aspek pelayanan administratif, sarana/prasarana, organisasi, dan manajemen yang dapat memenuhi harapan sivitas akademika dan masyarakat (baik orang tua mahasiswa, pengguna lulusan, maupun masyarakat luas).

3. Sistem penjaminan mutu akademik di Universitas Diponegoro dirancang dan dilaksanakan untuk dapat menjamin mutu gelar akademik yang diberikan. Hal ini berarti bahwa sistem penjaminan mutu harus dapat menjamin bahwa lulusan akan memiliki kompetensi yang ditetapkan dalam Spesifikasi Progam Studi. Dengan demikian universitas juga menjamin mahasiswa akan memperoleh pengalaman belajar seperti yang dijanjikan didalam spesifikasi progam studi.

B. Penerapan

1. Universitas Diponegoro menerapkan penjaminan mutu akademik yang berjenjang. Pada tingkat universitas dirumuskan kebijakan akademik dan standar akademik universitas dan dilakukan audit mutu akademik fakultas. Pada tingkat fakultas dirumuskan kebijakan akademik fakultas serta dilakukan audit mutu akademik jurusan/bagian/progam studi. Pada tingkat progam studi dirumuskan kompetensi lulusan dan spesifikasi progam studi serta dilakukan evaluasi diri berdasarkan pendekatan OBE (Outcome Based Education).

2. Dalam pengembangan dan penerapan sistem penjaminan mutu, Universitas Diponegoro memilih pendekatan FEE (Facilitating, Empowering dan Enabling, Pedoman Penjaminan Mutu Pendidikan Tinggi – Departemen Pendidikan Nasional, Direktorat Jendral Pendidikan Tinggi 2003) dan menugaskan Badan Jaminan Mutu (BPM) untuk melaksanakan peran universitas dalam pengembangan dan penerapan sistem penjaminan mutu disemua unit pelaksana kegiatan akademik.

Pelaksanaan penjaminan mutu akademik Universitas Diponegoro dijelaskan secara lebih rinci dalam Manual Prosedur Implementasi Penjaminan Mutu.


7


BAB III

ORGANISASI PENJAMINAN MUTU AKADEMIK

UNIVERSITAS DIPONEGORO

A. Tingkat Universitas

1. Pemegang kepentingan penjaminan mutu akademi di tingkat universitas terdiri atas Senat Universitas, Pimpinan Universitas, dan Badan Penjaminan Mutu (BPM).

2. Senat Universitas merupakan badan normatif dan perwakilan tertinggi di Universitas Diponegoro. Senat Universitas beranggotakan antara lain: Para Guru Besar, pimpinan Universitas Diponegoro, para Dekan, Direktur Program Pasca Sarjana, wakil dosen dan unsur lain yang ditetapkan oleh Senat Universitas. Tugas Senat Universitas antara lain :

a. Menyusun Kebijakan Akademik Universitas dan pengembangan Universitas Diponegoro

b. Merumuskan kebijakan penilaian prestasi akademik dan kecakapan serta kepribadian sivitas akademika;

c. Merumuskan norma dan tolok ukur penyelenggaraan Tridarma Perguruan Tinggi

d. Merumuskan peraturan pelaksanaan kebebasan akademik, kebebasan mimbar akademik, dan otonomi keilmuan pada Universitas Diponegoro;

e. Memberikan pertimbangan dan persetujuan terhadap perencanaan program kerja di bidang Tridharma perguruan tinggi serta Rencana Anggaran Pendapatan dan Belanja Universitas Diponegoro yang dibuat dan diajukan oleh pimpinan Universitas Diponegoro;

f. Memberikan pertimbangan kepada Menteri berkenaan dengan calon-calon yang diusulkan untuk diangkat menjadi rektor, dan dosen yang dicalonkan memangku jabatan akademik di atas lektor kepala;

g. Membahas dan menyetujui usulan struktur tarip dan tata cara pengelolaan dana yang berasal dari masyarakat yang disusun oleh pimpinan Universitas Diponegoro;

h. Menilai pertanggungjawaban pimpinan Universitas Diponegoro atas kebijakan yang telah ditetapkan;

i. Menegakkan norma-norma yang berlaku bagi civitas akademika;

j. Mengukuhkan pemberian gelar doktor kehormatan;

k. Menyelenggarakan ujian promosi doktor.

3. Pimpinan Universitas adalah Rektor yang dibantu oleh para Pembantu Rektor. Pimpinan Universitas bertanggung jawab atas penyelenggaraan pendidikan, penelitian, pengabdian kepada masyarakat. Rektor menetapkan peraturan, norma, dan tolok ukur penyelenggaraan pendidikan tinggi berdasarkan peraturan universitas. Rektor mengangkat pimpinan fakultas dan pimpinan unit-unit yang berada di bawahnya.

4. Pembantu Rektor Bidang Akademik atau disebut Pembantu Rektor I bertanggung jawab atas penyelenggaraan pendidikan, peningkatan mutu akademik, dan penyelenggaraan jaminan mutu akademik. PR I menyusun Kebijakan Rektor yang berhubungan dengan proses pembelajaran. PR I menformulasikan prosedur yang tepat dalam pemantauan dan penilaian terhadap efektifitas penyelenggaraan kegiatan akademik serta pelaksanaan sistem penjaminan mutu. Dalam melaksanakan penjaminan mutu akademik PR I didukung oleh Badan Penjaminan Mutu (BPM) yang dibentuk dengan Surat Keputusan Rektor.


8


5. Lingkup kerja BPM mencakup semua unsur pelaksana akademik: program studi, strata pendidikan (diploma, sarjana dan pascasarjana), serta pengelola program

studi (fakultas, jurusan/bagian), dan unsur penunjang. BPM bertugas untuk :

a. merencanakan dan melaksanakan sistem penjamin mutu akademik secara keseluruhan di Universitas Diponegoro;

b. membuat perangkat yang diperlukan dalam rangka pelaksanaan sistem penjaminan mutu akademik .

c. memonitor pelaksanaan sistem penjaminan mutu akademik;

d. melakukan audit dan evaluasi pelaksanaan sistem penjaminan mutu akademik;

e. melaporkan secara berkala pelaksanaan sistem penjaminan mutu akademik.

6. Badan Penjaminan Mutu melaksanakan fungsi pelayanan dalam bidang :

a. pelatihan, konsultasi, pendampingan dan kerjasama penjaminan mutu akademik;

b. pengembangan sistem informasi penjaminan mutu akademik;

c. pengembangan dan pelaksanaan sistem penjaminan mutu akademik yang sesuai dengan potensi dan kapasitas kampus;

d. pengembangan dan pelaksanaan audit mutu akademik internal .

7. Ketua BPM bertanggung jawab dalam menyiapkan dan menyusun manual mutu akademik dan manual prosedur yang sesuai dengan kebijakan akademik, standar akademik, peraturan yang berlaku, serta selaras dengan potensi dan kapasitas kampus.

8. Ketua Bidang Audit Internal Mutu Akademik (AIMA) sebagai organ BPM bertanggung jawab atas terlaksananya audit mutu akademik yang memeriksa kepatuhan pelaksanaan akademik dengan Standar Akademik, Manual Mutu Akademik dan Manual Prosedur.

9. Ketua Bidang Implementasi dan Pengembangan SPMPT.

10. Ketua Bidang Pelatihan dan Kerjasama.

B. Tingkat Fakultas/Pascasarjana/Lembaga

1. Pemegang kepentingan penjaminan mutu akademik di tingkat fakultas terdiri atas Senat Fakultas, Dekan, Pembantu Dekan Bidang Akademik, dan Tim Penjaminan Mutu Fakultas (TPMF).

2. Senat Fakultas merupakan badan normatif tertinggi di lingkungan fakultas yang memiliki wewenang untuk menjabarkan kebijakan dan peraturan universitas untuk fakultas. Senat Fakultas terdiri atas guru besar, pimpinan fakultas, dan wakil dosen. Tugas Senat Fakultas adalah :

a. Merumuskan kebijakan akademik fakultas;

b. Merumuskan kebijakan penilaian prestasi dan etika akademik, kecakapan, serta integrasi kepribadian dosen di lingkungan fakultas;

c. Merumuskan norma dan tolok ukur bagi pelaksanaan penyelenggaraan fakultas dan menilai pelaksanaan tugas Pimpinan Fakultas;

d. Menilai pertanggungjawaban pimpinan fakultas atas pelaksanaan kebijakan yang ditetapkan; dan

e. Memberikan petimbangan kepada pimpinan Universitas Diponegoro mengenai calon yang diusulkan untuk diangkat menjadi pimpinan fakultas.

3. Dekan bertanggung jawab atas penyelenggaraan pendidikan, penelitian, dan pengabdian kepada masyarakat, serta pembinaan tenaga akademik, tenaga administrasi, dan mahasiswa. Dekan bertanggung jawab atas terjaminnya mutu akademik di fakultas. Dalam mengemban tanggung jawab mutu akademik, Dekan dibantu oleh Pembantu Dekan Bidang Akademik dan Tim Penjaminan Mutu Fakultas (TPMF).

4. Pembantu Dekan Bidang Akademik, bertanggung jawab atas tersusunnya :

a. Standar Akademik Fakultas;

9


b. Manual Mutu Akademik Fakultas, dan

c. Manual Prosedur Mutu Akademik Fakultas yang selaras dengan Standar Akademik, Manual Mutu Akademik, dan Manual Prosedur di tingkat universitas.

5. Pembantu Dekan bidang akademik bersama Tim Penjaminan Mutu Fakultas (TPMF) bertugas untuk melaksanakan kegiatan penjaminan mutu akademik di tingkat fakultas. Dalam melaksanakan tugasnya TPMF dibantu oleh Gugus Penjaminan Mutu (GPM) pada tiap jurusan/program studi.

6. TPMF terdiri dari: Pembantu Dekan Bidang Akademik sebagai penanggung jawab dan ketua yang dipilih (oleh Senat Fakultas), dengan anggota perwakilan jurusan/bagian/ program studi.

Tugas rutin TPMF adalah :

a. membahas dan menindaklanjuti laporan dari GPM;

b. melakukan evaluasi terhadap jurusan/bagian/program studi;

c. memperbaiki dan mengembangkan sistem pembelajaran;

d. mengirim hasil evaluasi jurusan/bagian/program studi ke BPM.

7. TPMF pada tiap fakultas dibentuk dengan SK Dekan, dan dalam pengembangan sistem penjaminan mutu akademik bertugas membantu Pembantu Dekan Bidang Akademik, yang mencakup antara lain:

a. penjabaran Standar Akademik Universitas ke dalam Standar Akademik Fakultas;

b. penjabaran Manual Mutu Akademik Universitas ke dalam Manual Mutu Fakultas;

c. sosialisasi sistem penjaminan mutu ke semua sivitas akademika di fakultas yang bersangkutan;

d. pelatihan dan konsultansi kepada sivitas akademika fakultas tentang pelaksanaan penjaminan mutu.

8. Setiap tahun Ssenat Fakultas menerima laporan evaluasi serta laporan audit internal mutu akademik dari Dekan. Senat Fakultas akan mempelajari kedua laporan tersebut dan menentukan kebijakan dan peraturan baru di tingkat fakultas untuk peningkatan mutu akademik.

9. Organisasi penjaminan mutu akademik pada Program Pascasarjana, Program Diploma, dan Lembaga disusun secara khusus.

C. Tingkat Jurusan/Bagian/Program Studi

1. Ketua Jurusan/ Kepala Bagian/ Ketua Program Studi bertanggung jawab atas tersusunnya :

a. Spesifikasi ProgramStudi (SP)

b. Manual Prosedur (MP)

c. Instruksi Kerja (IK) yang sesuai dengan Standar Akademik, Manual Mutu, dan Manual Prosedur Tingkat Fakultas.

2. Ketua Jurusan/Kepala Bagian/Ketua Program Studi bertanggung jawab atas terlaksananya :

a. proses pembelajaran yang bermutu sesuai dengan SP, MP, IK;

b. evaluasi pelaksanaan proses pembelajaran;

c. evaluasi hasil proses pembelajaran;

d. tindakan perbaikan proses pembelajaran ;

e. penyempurnaan SP, MP, dan IK secara berkelanjutan.

3. Gugus Penjaminan Mutu (GPM) dibentuk pada tingkat jurusan/bagian/program studi dan terdiri dari :

a. Ketua yang dipilih oleh jurusan/bagian/program studi

b. Anggota-anggota: sekretaris program studi dan staf pengajar.

4. Gugus Penjaminan Mutu (GPM) bertugas untuk :

a. menyusun laporan hasil evaluasi proses pembelajaran;

10


b. melakukan evaluasi proses pembelajaran semester.

c. memantau pelaksanaan rencana tindakan perbaikan yang menjadi tanggung jawab ketua Jurusan/ Bagian/ Program Studi

d. GPM mengadakan rapat minimal sekali dalam satu semester (di akhir semester)

e. Laporan hasil evaluasi GPM dikirim oleh Ketua Jurusan/ Bagian/ Program Studi kepada Dekan untuk dibahas dalam TPMF.

Struktur Organisasi Penjaminan Mutu UNDIP 

Semarang, 30 Januari 2006 R e k t o r ,

Prof. Ir. EKO BUDIHARDJO, M.Sc NIP.130 354 860


MANUAL PROSED UR CUTI K ULIAH

STKIP PGRI JOMBANG



STKIP PGRI JOMBANG

2009

1



Manual Prosedur Cuti Kuliah

STKIP PGRI JOMBANG

M P.U PM.STKI P-JB.2009

Revisi

1

Tanggal

15 Januari 2009

Dikaji ulang

oleh

Tim U PM STKIP PGRI JOMBANG

Disetujui oleh

Ketua



Rev!s!

ke-1


Tanggal

15

Januar!

2009


Manual

Prosedur

Cut! Kul!ah


D!setuju!

Oleh


2


TIM PENYUSUN DOKUMEN


Ketua : Dr. Agus Prianto, M. Pd

Anggota : 1. Dr. Munawaroh, M.Kes

2. Drs. Kustomo, M. Pd

3. Drs. Adib Darmawan, MA

4. Susi Darihastining, S. Pd M. Pd

5. Wiwin Sri Hidayati, S. Pd M. Pd

6. Drs. M. Setyowahyu, M. Pd


3


KATA PENGANTAR

    Penjaminan mutu akademik merupakan tanggung jawab bersama seluruh warga STKI P PGRI JOMBANG. Untuk memperlancar pelaksanaan dan kegiatan Penjaminan Mutu Akademik maka Tim U PM STKI P PGRI JOMBANG menyusun pedoman pelaksanaan Akademik dalam bentuk buku PEDOMAN AKADEMIK. Salah satu buku PEDOMAN AKADEMIK di STKI P PGRI JOMBANG adalah Manual Prosedur Cuti Kuliah.

    Tujuan dibuatnya Manual Prosedur Cuti Kuliah adalah untuk meningkatkan efisiensi pelaksanaan perkuliahan dan memberikan kemudahan pada mahasiswa, dosen dan tenaga administrasi dalam pelaksanaan perkuliahan.

    Semoga Manual Prosedur Cuti Kuliah yang telah disusun oleh Tim Penjaminan Mutu STKI P PGRI Jombang dapat dipahami dan dilaksanakan dengan baik oleh dosen, tenaga administrasi dan mahasiswa sehingga dapat memperlancar proses belajar mengajar di lingkungan STKI P PGRI JOMBANG.

Jombang, 18 Januari 2009 Ketua,

WINARDI, S.H. M.Hum


I. T UJ UAN

1. Meningkatkan ketertiban pelaksanaan perkuliahan.

2. Mewujudkan tertib data mahasiswa.

3. Memberikan kemudahan pada mahasiswa, dosen dan tenaga administrasi/TU dalam mengurus cuti kuliah.

II. PIHAK TERKAIT

1. Mahasiswa

2. BAU

3. Ketua Program Studi

4. BAAK

III. LANGKAH-LANGKAH PELAKSANAAN C UTI K ULIAH

No

Kegiatan

Penanggung Jawab

1

Mahasiswa mengambil cuti pada saat

dilaksanakan heregistrasi.

Ketua Program Studi

2

Mahasiswa mengajukan cuti kuliah kepada ketua program studi setelah berkonsultasi dengan D PA.

Ketua Program Studi

3

Mahasiswa melengkapi berkas cuti kuliah

yang meliputi bukti lunas pembayaran

keuangan pada semester yang telah

berjalan, dan bebas pinjaman buku

perpustakaan.

Ketua Program Studi

4

Ketua program studi menerbitkan surat cuti kuliah rangkap 5 (untuk BAAK, Keuangan, Prodi, Perpustakaan, dan Arsip Mahasiswa).

Ketua Program Studi

5

Ketua program studi menyerahkan surat cuti kepada BAAK, Bagian Keuangan, dan Perpustakaan.

Ketua Program Studi


6

BAAK dan Bagian Data memproses cuti

(memblokir data mahasiswa menjadi tidak aktif selama cuti kuliah yang ditetapkan Prodi)

Kasubag Data


7

Bagian Keuangan memproses cuti

(memblokir data mahasiswa menjadi tidak aktif selama cuti kuliah yang ditetapkan Prodi)

Kasubag Keuangan

8

Perpustakaan memproses cuti (memblokir data mahasiswa menjadi tidak aktif selama cuti kuliah yang ditetapkan Prodi)

Kepala Perpustakaan

9

Mahasiswa melapor kembali kepada

Program Studi dan D PA setelah masa cuti

Ketua Program Studi

dan D PA


5




kuliah habis.


10

Program studi mengeluarkan surat aktif kuliah dengan tembusan kepada BRRK, Keuangan, dan Perpustakaan.

Ketua Program Studi

11

Mahasiswa kembali aktif kuliah dengan mengikuti prosedur heregistrasi pada awal semester.

Mahasiswa



6




Free PDF :Manual Do Usu Rio Nokia N97 Mini Microsoft Mafiadoc

Download ebook manual do usu rio nokia n97 mini microsoft mafiadoc com in pdf / kindle / epub format also available for any devices anywhere.


As recognized, adventure as without difficulty as experience practically


lesson, amusement, as capably as concord can be gotten by just checking out a books manual do usu rio nokia n97 mini microsoft mafiadoc com after that it is not directly done, you could recognize even more roughly speaking this life, not far off from the world.

We pay for you this proper as without difficulty as easy mannerism to acquire those all. We come up with the money for manual do usu rio nokia n97 mini microsoft mafiadoc com and numerous books collections from fictions to scientific research in any way. accompanied by them is this manual do usu rio nokia n97 mini microsoft mafiadoc com that can be your partner.

2009 Audi A3 Drive Belt Manual, 2006 Savana Owners Manual, Nissan  Cd20 Diesel Engine Manual, two nations live on the edge guided  reading answers, Manual De Tablet Samsung Galaxy 7, Bmw E91 Service  Manual, Manual De Ford Ranger 1997, Downcast Eyes The Denigration Of  Vision In Twentieth Century French Thought Martin Jay, Statics  Meriam 6th Edition Solution Manual, Mitsubishi 4d30 Engine Repair  And Manual, Honda Civic Ex Owners Manual, Mazda Tribute Repair  Manual Download, Fedora User Manual, Toro Electric Weed Eater Manual  , Chemistry Chemical Reactivity Kotz Solution Manual, 1990 

Mitsubishi Space Wagon Free Repair Manual, John Deere Xl178 Repair  Manuals, Huawei E5830 Manual Mac, Audi Navigation Plus 2005 Manual A3  , Fujitsu Scanner Manual, Owners Manual For 2006 Ford Everest, Craig Mp3 Player Instruction Manual, 2008 Acura Tsx Headlight Bulb  Manual, Xerox Colorqube 9201 Service Manual, Advanced Engineering  Mathematics Solution Manual Greenberg, Quantitative Analysis For  Management 11th Edition Solutions Manual Free, Dw10ated Engine Manual  , Johnson Evinrude Outboard Service Manual, Solutions Manual To  Accompany Elements Of Vibration Analysis Meirovitch, Solution Manual  Torrent Analysis Synthesis And Design Of Chemical Processes, Skoda  Fabia Combi Service Manual


NVivo for Windows

Glossary of Terms

Term

Definition

Advanced find

Advanced Find lets you search for project items that meet certain criteria. You can set the search criteria to suit your requirements. For example, you could search for items with certain properties or sources that are coded at specific nodes.

Aggregate

Gather the content of child nodes to the parent node. You can turn aggregation on or off at the parent node. For example, if you turn on aggregation at the node 'Attitude' when you open the node, you will see everything coded at its child nodes 'Negative' and 'Positive'.

Ancestor

An ancestor is any node in the sequence from the parent node to the top of the node hierarchy. A node may have more than one ancestor node (for example, a parent and parent's parent).

Annotation

Text that is linked to specific content in a source. Like scribbled notes in the margin, annotations can be used to record notes, comments and observations about the content of a source. You can annotate sources directly or annotate source content displayed in node Detail View.

Associated

view

A node which is displayed on the right (or below) a framework matrix. By default, the associated view displays content that is coded to the row (case) nodes in the framework matrix. You can change the content displayed or highlighted in the associated view.

Attribute

Attributes are used to describe a classified source or node. For example, a node may be classified as 'person' with attributes for 'age' and 'gender'.

Attribute value

The values of an attribute. For example, 'male' or 'female'.

Audio

Source materials such as recorded interviews, podcasts, sound effects, and other forms of audio that may be relevant to your research. Types of audio files that can be imported into NVivo include *.mp3, *.m4a, *.wma,*.wav. An audio source contains the audio file and optionally a transcript.

Auto coding

Automatic coding techniques which are a quick way to code large amounts of content. You can use auto coding to code datasets, transcripts, and structured documents.

Band

A band is a region on the Report Designer workspace that represents a part of the report. The main part of the report is called the Detail band. Page Header and Footer bands display on each page, while Report Header and Footer bands display at the beginning and end of the report. If your report includes grouping, you will also see Group Header and Group Footer bands.


Term

Definition

Boolean operator

The use of AND, OR or NOT to combine search terms.

Boolean

values

Value pairs such as True/False, Yes/No or 0/1.

Case

A case is a research subject, for example, a person, place or organization. You can create a node to gather all material related to a case. You can also classify the node to record demographic attributes. For example, classify a node as a 'person' and record attributes for 'age' and 'sex'.

Chart

A way of visualizing your data. You can use charts to show patterns in your data, such as the distribution of coding or attribute values.

Child node

A node below a parent node.

Classification sheets

Classification sheets list all the sources or nodes of a particular classification and display the attribute values for each source or node. You can update attribute values in a classification sheet.

Classifications

Classifications provide a way to record descriptive information about the sources, nodes and relationships in your project. Source classifications allow you to record information about your sources (for example, bibliographical data). Node classifications allow to you record information about people, places or other entities (for example, demographic data about people). Relationship types allow you to record the nature of a relationship which is defined by a relationship node.

Classify

The process of describing a source or node by setting the classification and attribute values. For example, classify a node as a 'person' of a particular 'age' or 'sex'. You can classify sources and nodes manually. You can also classify sources or nodes by importing classifying information. If you auto code social media datasets (for example, a Facebook, Twitter or LinkedIn dataset) by username, the username nodes are automatically classified. If your project has other datasets, the Classify from Dataset Wizard can use the values in classifying fields to set the attribute values on nodes.

Classifying

field

A dataset field (column) which is used to store values that describe your data (for example, the age and sex of survey respondents) or scaled responses (for example, strongly agree or agree). You can use classifying fields to sort and filter the dataset, but you cannot code or query content stored in these fields.

Cluster

analysis

A tool for grouping sources or nodes that share similar words, similar attribute values, or are coded similarly by nodes. Cluster analysis diagrams provide a graphical representation of sources or nodes to make it easy to see similarities and differences. Sources or nodes in the cluster analysis diagram that appear close together are more similar than those that are far apart.


Page 2


Term

Definition

Codable fields

A dataset field (column) which is used to store the text that you want to analyze, for example, responses to open-ended survey questions. You can analyze the content of these fields (code, annotate, link and query), but you cannot use values in these fields to sort and filter the dataset.

Coded at

When you select content and categorize it as belonging to a specific node (topic or research subject), the text is said to be 'coded at' the node.

Coding

Selecting source content and defining it as belonging to a specific node (topic or research subject). By creating nodes and coding at them, you can catalogue your ideas and gather material by topic or case.

Coding

context

The content that surrounds coded content in a source. When exploring a node, you can choose to spread coding to the context.

Coding

density

Areas in a source or node in which most coding occurs. The Coding Density bar is visible when you display Coding Stripes. The color graduations indicate the coding density from white (no coding), to light gray (minimal coding), to dark gray (maximum coding).

Coding

excerpt

All or part of a coding reference in a node. For text-based sources you can display the whole reference, the first paragraph or just the summary information.

Coding reference

An occurrence of coding. When you open a node, you can see all the references to source material that are gathered at the node.

Coding stripes

Colored stripes that enable you to see coding in a source or node.

Collections

Collections are views (or groupings) of project items that are stored elsewhere in your project. The Collections group contains your Search Folders, Sets, and folders showing all the memo links, annotations and 'See Also' links in your project.

Color

You can assign a color to users, sources, nodes, relationships and attribute values. Color can help you to visually identify items in models, visualizations and coding stripes.

Connector

A line that joins shapes in a model.

Control

Controls are rectangular objects on the Report Designer workspace that represent the information that will be displayed when the report is run. You can move and resize controls.

Coverage

The percentage of a source that is coded at a node.


Page 3


Term

Definition

Dataset

A type of source that contains structured data arranged in rows and columns. You can create a dataset by importing data from a spreadsheet, a tab or comma-separated text file or a database table. You can also create a dataset by importing NCapture files that contain data from Facebook, LinkedIn or Twitter.

Detail view

The bottom-right pane in NVivo. You explore project items such as sources, nodes, and models in this view. Query results and visualizations are also displayed in Detail View. You can 'undock' Detail View, if you prefer to work in a separate window.

Document

Source material such as field notes, transcripts, interviews or any other material that is relevant to your project. You can create new documents in NVivo or import files that are in .doc, .docx, .txt, or .rtf format.

Dynamic

model

A model that can be edited. Dynamic models may contain shapes that are linked to items in your project. If you change the properties of the project item, the changes will be reflected in your model.

Edit mode

When you are in edit mode, you can edit the content of sources and models. Sources and models open in read-only mode, you must switch to edit mode, if you want to change the content.

Event log

A log of changes to your project. If project logging is turned on, a project event is recorded whenever you change the project. For example, when you import a dataset, modify a document source, code source content at a node, or create and save a new query.

Expressions

Expressions are used in reports to define what data is displayed on the report. Fields are a simple form of an expression. Expressions can also combine fields and functions to perform calculations based on the data in your report. To add or modify an expression, use Report Designer.

External

A type of source used to represent source material that cannot be imported into NVivo. This might include items such as physical books, or 8mm film. You can use the external to represent the item and summarize or describe the source material. You can code your summary or description, in the same way that you code text in a document source.

Extract

A template for extracting data from NVivo to a data file. You can run a predefined extract supplied with NVivo, or create your own custom extract to select the data you want. The extracted data can be saved to a text file, spreadsheet or XML file.

Field

Fields are types of information displayed in datasets, transcripts, picture logs, report results or extract results. Different records contain different data for these fields. For example a survey dataset might contain fields (columns) for name, age and responses to survey questions, and records (rows) containing values for each field.


Page 4


Term

Definition

Framework matrix

A grid where the columns are theme nodes, the rows are case nodes, and the cells contain summaries. Each summary describes the content coded at the case node that is relevant to the theme.

Fuzzy search

Find words of similar spelling when you run a Text Search query by entering a tilde (~) after the word.

Graph

A visual representation of a project item showing how it is connected to other items in your project.

Hyperlink

A link from content in a source to a file or URL outside of your NVivo project.

Leaf node

In a node hierarchy, a node without children is a leaf node.

Links

In NVivo, links refer to memo links, annotations and 'See Also' links.

List view

The top-right pane in the NVivo window. You view the contents of your NVivo folders in List View.

Log entry

Comments, descriptions, notes, hyperlinks, or ideas entered against the whole or portion of the image in a picture source. A picture source may or may not contain log entries.

Media file

Refers to both audio and video files.

Memo

A type of source that you might use to record thoughts and observations. If a memo is related to a particular source or node you can create a 'memo link' and link the two together.

Memo link

The link between a source or node and a memo. A memo can be linked to one item only.

Model

A model can be a visual representation of your project. The shapes on the model are linked to the items in your project. You can also create models that are not linked to project items. For example, you could create a model to visually explore your initial ideas.

Model groups

Groups of model items that can be hidden or displayed as required. NVivo provides model groups based on the properties (color, classification, attribute values or relationship type) of project items in the model, and you can create custom groups of selected model items.

Model style

A set of formatting characteristics that you can apply to shapes or connectors in a model to quickly change its appearance.

Navigation

view

The panel on the left side of the NVivo window. It contains groups that enable you to access project items.


Page 5


Term

Definition

NCapture

A web browser extension that enables you to gather material from the web as NCapture files (.nvcx) which you can import into NVivo. You can use NCapture to gather web pages and online PDF documents to import into NVivo as PDF sources. You can also use NCapture to gather data from Facebook, Twitter or LinkedIn and import it into NVivo as dataset sources.

Nickname

A short name that you give to a node for the purpose of quick coding.

Node

A container that lets you gather source content relating to themes, people, places, organizations or

other areas of interest. For example, you can create a node called 'pollution' and code all pollution

related data at it. When you open the node you can see all the pollution-related data gathered in one place. You can organize nodes into hierarchies, moving from general topics at the top (the parent node) to more specific topics (child nodes). Relationships and Matrices are special types of nodes. Relationships are nodes that show a relationship, for example, a relationship between two people. A matrix is a collection of nodes created by running a matrix coding query.

Node matrix

A node matrix is a collection of nodes resulting from a Matrix Coding query.

Paragraph

Text between two carriage returns. You can apply a paragraph style to the text in a paragraph.

Paragraph number

Paragraphs in document sources are numbered, these numbers can be included when printing or exporting a source or node. In a node, paragraph numbers relate to a reference's position in the document source.

Paragraph

style

A set of formatting characteristics that you can apply to text to quickly change its appearance.

Parent node

A node that has child nodes below it in the node hierarchy.

PDF

Source material that is available in PDF file format - for example, newspaper articles, government reports, and journal articles. You can also bring web pages into NVivo as PDF sources, by capturing the content of the page using NCapture and then importing it into NVivo.

Picture

Source materials such as photographs and other types of images that may be relevant to your research. Types of image files that can be imported into NVivo include .bmp, .gif, .jpg, .jpeg, .tif, or .tiff formats. A picture source contains the picture and the option of log entries.

Query

A way of asking questions about your data. You can save a query and run it at regular intervals as your project progresses.

Range coding

An automatic coding technique that allows you to code multiple similarly structured sources. For example, range code paragraphs 1 to 3 in all your document sources at the node 'solar energy'. Range coding is also an easy way to get paper-based coding into NVivo.


Page 6


Term

Definition

Read-only

You cannot edit the content of sources and models in read-only mode. When you open a source or model it opens in read-only mode. If you want to edit the item, you must switch to edit mode.

Region

Selected area of a picture or PDF source.

Relationship

A node that defines the connection between two project items. Sources and/or nodes can be connected via a relationship. For example, the relationship between two nodes representing research subjects (Anne works with Bill) or between two theme nodes (Agricultural Runoff impacts Water Quality).

Relationship type

Defines the characteristics of a relationship. The relationship type includes a word or words that describe the relationship (for example, 'impacts', 'causes' or 'works with') and the direction of the relationship (for example, one-way or symmetrical).

Report

A template for generating a printable record of the data in your project. You can run a predefined report supplied with NVivo, or create your own custom report and select the data you want to include in the report.

Result

A node or list of project items resulting from a query. You can store a result node in the Queries Results folder or move it to the main node system.

Search folder

Search Folders display project items that meet previously defined search criteria. For example, a Search Folder might display all the nodes you created in the last week.

See also link

A link from selected content in a source to another item (or other selected content) in your project.

Server connection

A server connection contains the information that NVivo needs in order to connect to an NVivo Server. You need a server connection if you want to create or open a server project..

Server project

An NVivo project that is stored on an NVivo Server. When you work in a server project, multiple users can access the same project at the same time.

Set

A collection of project items that can include sources or nodes. The items in the set are references or 'shortcuts' to the original items that are stored elsewhere in your project.

Shadow

coding

Patterned coding stripes on audio, video and picture sources. When you code the picture or media timeline, the corresponding log or transcript entries are shadow-coded.

Sibling nodes

Nodes in a hierarchy that share the same parent node.

Source

In NVivo, 'sources' is the collective term for your research materials anything from hand-written diaries, video interviews, to survey responses. You store sources in the Internals, Externals or Memos folders.


Page 7


Term

Definition

Standalone project

An NVivo project that is saved to your computer, or to a network drive as a .nvp file.

Static model

A 'snapshot' of an existing model. You cannot edit static models and they are not linked to live data.

Stop words

Words that will be ignored by Text Search queries and Word Frequency queries. Default stop words are provided for English (UK), English (US), French, German, Portuguese and Spanish. You can customize the stop word list by adding or removing stop words.

Summary

A summary is a condensed version of the primary source materials and it is related to a particular case node and theme node. Summaries are created and viewed in framework matrices, but are stored independently in your project.

Summary link

A link from selected content in a summary (which can be viewed in a framework matrix) to selected content displayed in the associated view.

System-

defined

folders

Folders that are supplied with NVivo such as Internals, Memos and Externals. You cannot delete or rename system-defined folders.

Thumbnails

Miniature images or graphics. You can set your List View options to display source items as thumbnails. This is particularly useful when you are working with picture and video sources,

Timeline

Displays the duration of the audio or video file.

Timespan

A timespan is the duration of time for a transcript entry. For example, Jane spoke from the two minute point to the ten minute point

(00:02:00-00:10:00).

Transcript

Contains audio or video transcriptions against specific timespans. You can also include notes, hyperlinks or comments in the transcript.

Tree map

A tree map is a diagram that shows hierarchical data as nested rectangles of varying sizes.

User profile

A user profile contains information which identifies a project user, for example, their name and initials.

User-defined folders

Folders created by NVivo users. You can create user folders to organize your sources, nodes, queries, models, reports and extracts. You can rename and delete user-defined folders.


Page 8




Term

Definition

Video

Source materials such as focus group discussion videos, tv ads and other forms of video that may be relevant to your research. Types of video files that can be imported into NVivo include *.avi,

*.3gp, *.mov, *.mpg, *.mpeg, *.mpe, *.mp4, *.mts, *.m2ts, *.qt, and *.wmv. A video source contains

the video file and (optionally) a transcript.

View

In reports and extracts a 'view' is a virtual database table. There are five different views: node, node classification, source, source classification and project item. When you define a report or extract, select the view which contains the fields you want to include in your report or extract.

Wildcard

A keyboard character such as an asterisk (*) or a question mark (?) that is used to represent one or more characters when you are searching for project items such as sources, nodes or sets. For example: g*t will find get, great and gt.



Page 9


Short Version of Matlab Manual

This is an extract from the manual which was used in MA10126 in first year. Its purpose is to refamiliarise you with the matlab programming concepts.

1 Starting MATLAB

1.1.1. Starting a MATLAB session (from a BUCS PC).

* Log on to Windows.

* From the Desktop, click Start, then All programs, then Matlab.

* The MATLAB programming environment will start, and all files which you create will be in your “My Documents” folder which is also stored in the BUCS filespace on your H-drive as directory “dos”.

1.1.2. Running MATLAB. After you have typed matlab, a MATLAB logo will come up and then a MATLAB command window with a prompt >>. Now you are ready to use MATLAB. Typing “Edit” to the >> prompt will start the MATLAB editor for you.

1.1.3. Terminating your session. To finish a MATLAB session, type exit to the >> prompt. Then log off from your Windows session via the Start menu. It is essential that you log out completely after you have finished with any machine.

2 Do-it-Yourself Tutorial on Loops and Logical Branching

In many situations in MA20014 you will need to repeat the same command several times on different data, or perhaps under different conditions. Statements that tell the computer which command is to be executed next are fundamental building blocks for computer programs, and are called control-flow statements. In this tutorial you will revise the use of three control-flow statements for MATLAB programs:

* the for loop, for repeating a statement or group of statements a fixed number of times,

* the while loop, for repeating a statement or group of statements an indefinite number of times while a condition remains true, and

* the if-elseif-else statement, which tells the computer to perform different calculations in different situations.

  You will revise the writing of these loops by doing the following four exercises. In the exercises you should write script programs for each of the tasks, i.e. you should create files (using the MATLAB editor/debugger) which are saved (by clicking on Files --> Save As) in M-files (with the .m extension). These should contain the sequence of MATLAB commands necessary to do the tasks required. I suggest you start the exercises immediately. If you have forgotten something about the necessary MATLAB commands, please refer to the manual entries in the sections below.

1. Write and test a script program which reads in a positive integer n, and computes n!, using a for loop. (A convenient way to read in the data is via the input command – type help input if you have forgotten it.)

2. Using a simple while loop, write a script to sum the series 1 + 2 + 3 + ... such that the sum is as large as possible without exceeding 100. The program should display the sum and also how many terms are used in the sum.

3. Write a script that takes as input an integer n and creates the n × n matrix A with (i, j)th component given by A(i, j) = sin(1/(i + j ? 1)).

1


4. Write a script that takes as input three numbers a, b and c and prints out either the solutions of the quadratic equation axe + bx + c = 0, when these solutions are real, or a message indicating that the solutions are not real.

3 The manual pages

3.1 The for loop

A simple form of such a loop is

for index = 1:n

statements

end

The statements are executed n times with index = 1, 2, 3, ... , n. Here n is a number that must be fixed before we enter the loop. More generally, the loop may start with the line for index = j:m:k. Usually j,m and k are integers and k-j is divisible by m. The statements are executed repeatedly starting from index = j with index incremented by m each time and continuing until index = k (which is the last time round the loop). If m = 1, we can replace j:m:k in the first line of the loop by j:k. Even more generally, we can begin with the line

for index = v

where v is a vector. The statements inside the loop are repeatedly executed with index set to each of the

elements of v in turn. Type help for and read the manual page for the for loop.

As an example, consider the computation of the series

1 ? 1/2 + 1/3 ? 1/4 + 1/5 ? ... (3.1)

This is implemented in the script file tutorial3a.m:

% script tutorial3a.m

% computes the sum of the series

%

% 1 - 1/2 + 1/3 - 1/4 + ...

%

N = input(’type the number of terms to be added up: ’)

% asks the user to provide a value for N

sign = 1; % initialise the sign for the term

sum_series = 0; % initialise the sum of the series

for n = 1:N

sum_series = sum_series + sign/n;

sign = -sign; % changes sign for alternating series end

sum_series % prints out the sum of the series to N terms

   When you have worked with MATLAB for a while you will find that program speeds can be improved by using (if possible) vector or matrix operations instead of loops. For example, to sum the series (3.1) to an even number of terms N, we can use the following very short script.


2


% script tutorial3b.m

% computes the sum of the series

%

% 1 - 1/2 + 1/3 - 1/4 + ...

%

% to an even number of terms

% using vector operations

N = input(’type the number of terms N (with N even): ’)

sum_series = sum(1./(1:2:N-1) - 1./(2:2:N))

Exercise: Make sure you understand how the program above works. Use help sum.

   We have seen how to use a for loop to create a vector whose entries are given by a formula. If the entries of a matrix are given by a formula then we can use nested for loops to create it. For example the Hilbert matrix H is an n × n matrix whose entry in the ith row and jth column is 1/(i + j ? 1). If a value has been assigned to n, we can write

for i = 1:n

for j = 1:n

H(i,j) = 1/(i+j-1);

end % for j

end % for i

   I have added the comment after the end statements to show which loop is ended. This is useful when there are several nested loops.

   Note that this may not be the most efficient way of assembling the Hilbert matrix - see the full version of this manual for more detail. But our main purpose here is correctness rather than efficiency.

3.2 The while loop

The general form of the while statement is

while (condition)

statements

end

   The condition is a logical relation and the statements are executed repeatedly while the condition remains true. The condition is tested each time before the statements are repeated. It must eventually become false after a finite number of steps, or the program will never terminate.

Example. Suppose we have invested some money in a fund which pays 5% (compound) interest per year, and we would like to know how long it takes for the value of the investment to double. Indeed we would like to obtain a statement of the account for each year until the balance is doubled. We cannot use a for loop in this case, because we do not know beforehand how long this will take, so we cannot assign a value for the number of iterations on entering the loop. Instead, we must use a while loop.


3


%script tutorial3c.m

format bank % output with 2 dec places

invest = input(’type initial investment: ’)

r = 0.05; % rate of interest

bal = invest; % initial balance

year = 0; % initial year

disp(’ Year Balance’) % header for output

% (You can experiment with this)

while (bal < 2*invest) % repeat while balance is

% less than twice the investment,

% and stop when balance exceeds this

bal = bal + r*bal; % update bal

year = year + 1; % update year

disp([year,bal])

end

3.3 The if-elseif-else statement

A simple form of the if statement is

if (condition)

statements

end

Here condition and statements are the same as in the while loop, but in this case the statements are

executed only once if condition is true and are not executed at all if condition is false. For example the

following script divides 1 by i, provided i is non-zero; otherwise, j is not assigned a value.

if (i ~= 0)

j=1/i;

end

The symbol ~=is a relational operator and stands for is not equal to. Other relational operators include ==, <=, >=, etc. Type help ops to find out about these. Note the difference between the relational operator == and the usual use of the symbol =, which assigns a value to a variable.

   The if-else statement allows us to choose between two courses of action. For example the following script reads in a number and prints out a message to say if it is negative or non-negative.

x = input(’ Type x : ’)

if (x<0)

disp(’x is negative’)

else

disp(’x is non-negative’)

end

Note that indenting of statements inside loops and if statements helps make your program more readable. Going further, adding elseif allows us to choose between a number of possible courses of action.


4


x = input(’ Type x : ’)

if (x<0)

disp(’x is negative’)

elseif (x>0)

disp(’x is positive’)

else

disp(’x is zero’)

end

A more general form is

if (condition1)

statementsA

elseif (condition2)

statementsB

elseif (condition3)

   statementsC

...

else

   statementsE

end

This is sometimes called an elseif ladder. Its effect is the following.

* First condition1 is tested. If it is true then statementsA are executed and execution then skips to the next statement after end.

* If condition1 is false, then condition2 is tested. If it is true, then statementsB are executed and execution skips to the next statement after end.

* Continuing in this way, all the conditions appearing in elseif lines are tested until one is true. If none is true, then statementsE are executed.

There can be any number of elseifs but only one else.

Example. Suppose a bank offers annual interest of 3% on balances of less than £5,000, 3.25% on balances of £5,000 or more but less than £10,000, and 3.5% for balances of £10,000 or more. The following program calculates an investor’s new balance after one year.

% script tutorial3d.m

bal = input(’type balance: ’)

if (bal < 5000)

rate = 0.03;

elseif (bal < 10000)

rate = 0.0325;

else

rate = 0.035;

end

disp([’new balance is : ’,num2str((1+rate)*bal)])


5


  The logical relations that make up the condition in a while or if statement can quite complicated. Simple relations can be converted into more complex ones using the three logical operators & (and), | (or) and ~ (not). For example the quadratic equation ax2 + bx + c = 0 has two equal roots,?b/(2a), provided that b2 ? 4ac = 0 and a = 0. This can be programmed as:

if((b^2 - 4*a*c == 0)&(a~=0))

x = - b/(2*a);

end

4 Appendix: Some useful MATLAB commands

On-line help

help lists topics on which help is available

helpwin opens the interactive help window

helpdesk opens the web-browser-based help facility

help topic provides help on topic

lookfor string lists help topics containing string

demo runs the demo program

Workspace information and control

who lists variables currently in the workspace

whos as above, giving their size

what lists M-files on the disk

clear clears the workspace, removing all variables

clear all clears all variables and functions from the workspace

Command window control

clc clears command window, command history is lost

home same as clc

? recall previous command

Graphics

plot plots a graph

xlabel(’x’) labels x axis x

ylabel(’y’) labels y axis y

title(’title’) gives a figure a title title

axis fixes figure axes

clf clears figure from figure window

cla clears figure from figure window, leaving axes

Controlling program execution

break terminates execution of a for or while loop

error(’message’) aborts execution, displays message on screen

return exit from function, return to invoking program

Input from and output to terminal

x=input(’type x:’) asks user to give a value to be assigned to x

disp(’string’) outputs string to terminal

String-number conversion

num2str converts a number to a string (so it can be output e.g. as part of a message)

Logical functions

isempty true (=1) if a matrix is empty

find finds indices of non-zero elements of a matrix

Arithmetic functions

sum(x) calculates the sum of the elements of the vector x

prod(x) calculates the product of the elements of the vector x

Termination

^c (Control-c) local abort, kills the current command execution

quit quits MATLAB

exit same as quit



REPAIR STATION FORMS MANUAL


HARCO AVIATION, LLC

11701 NORTH BRANTLY, BLG 594

HOUSTON, TEXAS 77034

CRS NO. 9HCR378B

CAPABILITIES LIST

GANSAONSOPERATIONALLIMITEDMAKE/MODELTRITLTIIMIMANUFACTURER


Airframe

Hawker/Beechcraft

gSeriesAir

90inK

p,Itecsionsnp,RaireperformRemoval/Installationstoinmanufacturer’saccordance,tteralionsAwithAuthorized

yna,anualsm,anualsm,anualsmorlettersother structuredatarepairservicemaintenance approvedbulletins/overhaul

Revised).Administrator.(Asoracceptabletothe

Airframe

Hawker/Beechcraft


gSeriesAir00Kni1

p,p,,performItecsionsnInstallationstoRairemanufacturer’sinaccordancetteralionsARemoval/withAuthorized

yna,anualsm ,anualsm,anualsmorlettersotherstructure datarepairservicemaintenance approvedbulletins/overhaul

Administrator.Revised).(Asthe oracceptableto

Airframe

Hawker/Beechcraft


gSeriesAir00Kni2

p,p,,performItecsionsnInstallationstoRairemanufacturer’sinaccordancetteralionsARemoval/withAuthorized

yna,anualsm,anualsm,anualsmorlettersother structuredatarepairservicemaintenance approvedbulletins/overhaul

Revised). (Asthe tt.inisAradormtoacceptableor



gSeriesAir300Kni

Airframe Hawker/Beechcraft p,p,,performRaireInstallationstoItecsionsnaccordancemanufacturer’sintteralionsARemoval/withAuthorized yna,anualsm,anualsm ,anualsmorlettersotherstructuredatarepairservicemaintenance approvedbulletins/overhaul

Revised).(Asthe tt.inisAradormto acceptableor



Series700

Airframe Hawker/Beechcraft p,p,,performIticseonsnInstallationstoinRiarerAzeoaccordancemanufacturer’swithuthidRemoval/lttiaeronsA yna,anualsm,anualsm,anualsmorlettersother structuredatarepairservicemaintenance approvedbulletins/overhaul

Revised).(Asthe diitt.sAranormtoacceptableor



Series800

Airframe Hawker/Beechcraft p,p,,performsIectionsnInstallationstoinaccordancemanufacturer’sRairelterationsARemoval/withAuthorized yna,anualsm,anualsm,anualsmorlettersother structuredatarepairservicemaintenance approvedbulletins/overhaul

Revised).(Asthe diitt.sAranormtoacceptableor



Series800XP

Airframe Hawker/Beechcraft p,p,,performsIectionsnInstallationstoinaccordancemanufacturer’sRairelterationsARemoval/withAuthorized yna,anualsm,anualsm,anualsmorlettersotherstructuredatarepairservicemaintenance approvedbulletins/overhaul

Revised).(Asthe diitt.sAranormtoacceptableor


Airframe


Cessna SeriesCitation005 p,p,,performRaireinInstallationsaccordancemanufacturer’stosIectionsnlterationsARemoval/Authorizedwith ynappvdoaer,ulaansm,ulaansm,ulaansmvhuloaer lettersdataotherstructurerepairorservicemaintenance bulletins/

Revised).(Asthe diitt.sAranormtoacceptableor




Airframe Cessna SeriesCitation525 p,p,,performtotIecsionsntteraInstallationsaccordancemanufacturer’sinRairelionsARemoval/Authorizedwith

ynappvdoaer,ulaansm,ulaansm,ulaansmvhuloaerlettersdataother structurerepairorservicemaintenancebulletins/

Revised).(Asthe diitt.sAranormto acceptableor




Airframe Cessna SeriesCitation055B p,p,,performtIecsionsntoinInstallationsaccordancemanufacturer’sRairetteralionsARemoval/withAuthorized

ynappvdoaer,ulaansm ,ulaansm,ulaansmvhuloaerlettersdataotherstructurerepairorservicemaintenance bulletins/

Administrator.Revised).(Astheto acceptableor




Airframe Cessna SeriesCitation550/551 p,p,,performtotIecsionsnInstallationsaccordancemanufacturer’sinRairetteralionsARemoval/Authorizedwith

yna ppvdoaer,ulaansm,ulaansm,ulaansmvh uloaerlettersdataotherstructurerepairorservicemaintenance bulletins/

Administrator.Revised).(Asthetoacceptableor




Airframe Cessna SeriesCitation560 p,p,,performRiareInstallationsintoIticseonsnrAzeomanufacturer’saccordanceRemoval/uthidlttiaeronsAwith

ynappvdoaer,ulaansm,ulaansm,ulaansmvhuloaerlettersdataotherstructurerepairorservicemaintenance bulletins/

Administrator.Revised).(Asthetoacceptableor

Form HA-029 Title: Capabilities List

Revision Number :4

Page 1 of 3 Revision Date: 12/07/2011



REPAIR STATION FORMS MANUAL


HARCO AVIATION, LLC

11701 NORTH BRANTLY, BLG 594

HOUSTON, TEXAS 77034

CRS NO. 9HCR378B

CAPABILITIES LIST

GANSAONSOPERATIONALMAKE/MODELLIMITEDTRITLTIIMIMANUFACTURER


Airframe

Cessna


SeriesCitation650

p,p,,performRaireIntoItecsionsnaccordanceinmanufacturer’sstallationstteralionsARemoval/withAuthorized

yna,anualsm,anualsm,anualsmorlettersotherstructuredatarepairservicemaintenance approvedbulletins/overhaul

Administrator.Revised).(Asthe oracceptableto

Airframe

Cessna


Series421

p,p,,performRaireInstallationstoItecsionsnaccordancemanufacturer’sintteralionsARemoval/withAuthorized

yna,anualsm,anualsm,anualsmorlettersotherstructure data repairservicemaintenance approvedbulletins/overhaul

Administrator.Revised).(Astheoracceptableto

Airframe

Cessna


Series414

p,p,,performRaireInstallationstoItecsionsnaccordancemanufacturer’sintteralionsARemoval/withAuthorized

yna , anualsm,anualsm,anualsmorlettersotherstructuredatarepairservicemaintenance approvedbulletins/overhaul

Revised).(Asthe tt.inisAradormtoacceptableor

Airframe


SeriesPA32-300

Piper

p,p,,performRaireInstallationstoItecsionsnaccordancemanufacturer’sintteralionsARemoval/withAuthorized

yna,anualsm,anualsm,anualsmorlettersotherstructuredatarepairservicemaintenanceapprovedbulletins/overhaul

Revised).(Asthe tt.inisAradormtoacceptableor



FalconSeries50

Airframe DassaultAviation p,p,,performRiareIticseonsnInstallationsintorAzeoaccordancemanufacturer’sRemoval/lttiaeronsAuthidwith yna ,anualsm,anualsm,anualsmorlettersotherstructuredatarepairservicemaintenance approvedbulletins/overhaul

Revised).(Asthe diitt.sAranormtoacceptableor



Challenger

Series600

Airframe Bombardier p,p,,performsIectionsnInstallationsintoaccordancemanufacturer’sRairelterationsARemoval/Authorizedwith yna, anualsm,anualsm,anualsmor lettersotherstructuredatarepairservicemaintenance approvedbulletins/overhaul

Revised).(Asthe diitt.sAranormtoacceptableor


y,neHwello

E7T1F

Powerplant

Inc

Series33

p,sIectionsngcludinEx)verhaulop,RairseperforminaccordanceRemoval/Installationstoy(,assembldsiAuthorized

y na,anualsm,anualsmormaintenancelettersothermanufacturer’sdata service withapprovedoverhaulbulletins/

(As )vidRees the to diitt.sAranormoracceptable


y,Hwlleneo


Powerplant

Inc

SeriesTFE731-5

p,sIectionsngcludinEx)verhaulop,RairseperforminaccordanceRemoval/Installationstoy(,assembldsiAuthorized

ynappvdoaer ,ulaansm,ulaansmvhuloaerdataletters othermanufacturer’sservicemaintenanceorwith bulletins/

(As)vidRees diitt.sAranormtheto acceptableor


y,Hwlleneo


Powerplant

Inc

SeriesTFE731-5BR

p,tIecsionsngcludinEx)verhaulop,RairseperformtoinaccordanceRemoval/Installationsy(,assembldsiAuthorized

y nappvdoaer ,ulaansm,ulaansmvhuloaerdata lettersother manufacturer’sservice maintenance orwith bulletins/

(As)vidRees diitt.sAranormthetoacceptableor


y,Hwlleneo


Powerplant

Inc

SeriesTFE731-4

p,tIecsionsngcludinEx)verhaulop,RairseperformtoinaccordanceRemoval/Installationsy(,assembldsiAuthorized

y nappvdoaer,ulaansm,ulaansmvhuloaerdataletters othermanufacturer’sservicemaintenanceorwithbulletins/

Administrator.(As to the acceptable)evisedRor




Powerplant

yhitWenPratt&

ThruSeriesB0PT6A-62

p,tIecsionsngcludinEx)verhaulop,RairseperformtoinaccordanceRemoval/Installationsy(,assembldsiAuthorized

y nappvdoaer ,ulaansm,ulaansmvhuloaerdata lettersothermanufacturer’sservice maintenanceor with bulletins/

Administrator.(Asto the acceptable )evisedRor




Powerplant

yhitWenPratt&

ThruSeriesPT6A-2182

y(,bldimasssegludiEcnx)vhulareop,Iticseonsnp,RiarseperforminuthidrAzeoRemoval/Installationstoaccordance

y nappvdoaer ,ulaansm,ulaansmvhuloaerdata letters othermanufacturer’sservicemaintenanceorwithbulletins/

Administrator.(Asto theacceptable )evisedRor

FORM NO. HA-029 Title: Capabilities List

Revision Number: 5 Revision Date: 05/26/2012

Page 2 of 3



REPAIR STATION FORMS MANUAL


HARCO AVIATION, LLC

11701 NORTH BRANTLY, BLG 594

HOUSTON, TEXAS 77034

CRS NO. 9HCR378B

CAPABILITIES LIST

LIMITED

MANUFACTURERRATINGS

MAKE/MO

OPERATIONAL LIMITATIONS


Powerplant

yPratt&tWhnei

ThruSeriesPT6A-3842

p,sIectionsngcludinEx)verhaulop,RairseperforminaccordanceRemoval/Installationstoy(,assembldsiAuthorized

yna,unaalsm,unaalsmormaintenance lettersothermanufacturer’sdataservicewithapprovedoverhaulbulletins/

(As)vRisedett.inisAradormthetoacceptableor

Powerplant

ytWhneiPratt&

SeriesJT15D

p,sIectionsngcludinEx)verhaulop,Rairseperform inaccordanceRemoval/Installationstoy(,assembldsiAuthorized

y na,unaalsm,unaalsmormaintenance lettersothermanufacturer’sdata service with approvedoverhaulbulletins/

Administrator.(Asto acceptablethe)evisedRor

Powerplant

ytWhneiPratt&

Series530A

Authorized to perform Inspections, Repairs, Removal/Installations disassembly,( Excluding overhaul) in accordance with manufacturer’s maintenance manuals, overhaul manuals, service bulletins/ letters or any other data approved or acceptable to the Administrator. (As Revised)



SeriesIO-540

Powerplant

ygiLmcno

y(,bldimasssegludiEcnx)vhulareop,Iticseonsnp,RiarseperforminuthidrAzeoRemoval/Installationstoaccordance

y nappvdoaer ,ulaansm,ulaansmvhuloaer dataletters othermanufacturer’sservicemaintenanceorwithbulletins/

Administrator.(Astoacceptablethe)evisedRor

FORM NO. HA-029 Title: Capabilities List

Revision Number: 5 Revision Date: 05/26/2012

INSPECTOR: Les Berkheiser DATE: 05/26/2012

Page 3 of 3



DEPARTMENT: Hospital Administration

MANUAL: Policy & Procedure

REVISED:

3/13

REVIEWED:

3/13

ORIGINAL:

4/99

Code of Business Conduct / Ethical Business Practices

Affected Departments:

? All Departments

I. PURPOSE:

Founded on the St. Joseph Health System Values and Value Standards, the Code of Business Conduct/Ethical Business Practices promotes the highest ethical business practices by requiring adherence to standards of business conduct and through examples of appropriate and inappropriate behavior as defined by relevant compliance standards.

II. POINTS TO EMPHASIZE:

SCOPE:

St. Jude Medical Center has established a Code of Business Conduct/Ethical Business Practices policy and procedure as part of the Corporate Responsibility Program to provide employees with the essential guidelines needed to understand their responsibilities in connection with the Corporate Responsibility Program. The policy and procedure shall guide employees in their business interactions with suppliers, vendors, physicians, donors, politicians, and other interested parties. Such parties are a natural extension of St. Joseph Health System's own resources.

III. POLICY:

Standards of Business Conduct/Corporate Compliance With Laws

A. BUSINESS CONDUCT AND PRACTICES

Value Standard: Business is conducted ethically, with integrity, honesty, and confidentiality and in accordance with applicable laws and regulations.

1. Records Management

Business records must be prepared and maintained consistent with all applicable SJHS policies including those within the Corporate Responsibility Program related to ensuring compliance with federal and state fraud and abuse laws, and those policies relating to general operations relating to records management, transaction approval processes, and accuracy and timeliness in the completion of such records. This includes accurate reporting of time worked, business expenses incurred, research test results, billing and all other business-related activities. The law requires that all books, records, and accounts accurately reflect all transactions and disposition of assets. All

101 E. Valencia Mesa Dr. • Fullerton, CA 92835

T: (714) 871-3280



transactions must be conducted in accordance with management's authorization. Errors or potential errors involving claims already submitted to the government or other payers, must be reported to the local Compliance Officer at ext. 2580 or the SJHS Compliance Officer at 347-7577.

2. Confidentiality of Information obtained, developed or produced by St. Jude Medical Center and its employees, information supplied by outside consultant or vendors For the benefit of St. Jude Medical Center, and information about St. Jude Medical Center patients is confidential. Confidential information includes, for example: financial data, patient information, proprietary reports, salary, and position information, marketing and sales programs. Confidential information should not be disclosed to anyone outside of SJHS unless they legitimately need the information and have been properly authorized by management to receive such information. Confidential information should not be shared with other SJHS employees except on a "need to know" basis and with the agreement of the recipient to treat the information as confidential. Information shall be protected in a manner that is consistent with all SJHS policies including those related to compliance with the HIPAA Privacy and Security rules and the Ethical and Religious Directives for Catholic Health Care Services.

3. Use of Resources

Employees must respect and protect company property. St. Jude Medical Center assets, such as office supplies, production equipment, and products must not be used for personal reasons. These assets should not be taken out of St. Jude Medical Center facilities unless necessary to perform company work. All employees should actively help to control costs through identification of practices that create redundancy and waste.

B. EMPLOYMENT PRACTICES

Value Standard: Each ministry develops a work environment that promotes mutual respect, participation, equitable compensation, growth, and effective use of talents.

1. Fair Treatment of Employees

St. Jude Medical Center has created and strives to maintain a work environment in which employees are treated with respect, diversity is valued and opportunities are provided for development. St. Jude Medical Center is committed to providing a work environment that is free from discrimination based on policies relating to equal opportunity employment, conflict resolution, recruitment and selection. Harassment or abuse of any kind is prohibited in the workplace. Discrimination in any work-related decision on the basis of race, creed, gender, sexual orientation, age, disability status, national origin, or any other illegal basis is also prohibited.

2. Workplace Health and Safety

St. Jude Medical Center provides each of its employees with a safe and healthy workplace in which applicable health and safety laws and regulations are observed. Employees are expected to abide by all safety rules and practices and assume responsibility for taking necessary precautions to protect themselves and their coworkers. Employees are also responsible for immediately reporting accidents and unsafe practices or conditions consistent with all applicable policies relating to workplace injury reporting.

3. Illegal Drugs and Alcohol

St. Jude Medical Center expects employees to report to work in condition to perform

101 E. Valencia Mesa Dr. • Fullerton, CA 92835

T: (714) 871-3280



their duties, free from the influence of illicit drugs or alcohol pursuant to policies relating to fitness for duty. Reporting to work under the influence of illegal drugs or alcohol, using, possessing or selling illegal drugs while on the job or on St. Jude Medical Center property is forbidden.

C. PATIENT CARE

1. Value Standard: Each ministry develops programs and processes to measure and continually improve quality.

2. St. Jude Medical Center is committed to the compassionate delivery of appropriate, effective and quality care to its patients. Patients must always be treated with sensitivity, respect and professionalism. Employees are expected to observe all applicable standards of professional practice in all St. Jude Medical Center facilities and programs.

D. CONFLICTS OF INTEREST

1. Value Standard: SJHS values and their key role in shaping organizational life are clear and explicit.

2. Employees may not participate in any activities that could conflict with their responsibilities at St. Jude Medical Center without satisfying the requirements of the conflict of interest policy and other policies relating to the acceptance of distribution of gifts and gratuities. A conflict of interest arises when the personal interests or

3. activities of an employee appear to or may influence that employee's ability to act in the best interests of St. Jude Medical Center.

E. SPECIAL LEGAL RESPONSIBILITIES

Value Standard: Business is conducted ethically, honestly and in accordance with applicable

laws and regulations.

1. Marketing Practices and Antitrust

St. Jude Medical Center products and services must be marketed, appraised and sold fairly and honestly solely on the basis of quality, capability, price, service level, and other legitimate attributes. St. Jude Medical Center and its employees are expected to compete fairly and in compliance with all antitrust laws. Employees should seek advice from their managers before taking any action which may compromise fair competition or compliance with antitrust laws or violate existing Corporate Responsibility Program policies applicable to marketing practices.

2. Not for Profit Status

St. Jude Medical Center and many of its affiliates are not-for-profit, tax-exempt entities. As such, the requirements for organizations not taxed under Section 501(c)(3) of the Internal Revenue Code and similar provisions of state law must be followed. Employees shall not use St. Jude Medical Center resources or property for private use or benefit. Transactions must be in the best interest of St. Jude Medical Center and negotiated at arms length for fair market value. Employees faced with sensitive situations should consult with management for guidance.

3. Government Investigations

Employees shall cooperate with legitimate government investigations. If an employee is approached by any person who identifies himself or herself as a government investigator or receives a subpoena or other written request for information, the employee should contact the SJHS Chief Compliance Officer at 347-7577.



Procedures/Implementation of the Code

A. Disciplinary Actions

Employees shall conduct themselves in a manner that upholds SJHS Values and complies with the Code of Business Conduct/Ethical Business Practices. Candidates for employment shall be subject to inquiry about past compliance violations and status relative to participation in federal health care programs. Continued employment shall be conditioned upon compliance with the Corporate Responsibility Program. Violations of the Code of Business Conduct/Ethical Business Practices (the "Code") and/or failures to adhere to requirements of the Corporate Responsibility Program and related policies will result in disciplinary action, up to and including termination.

B. Reporting

Concerns regarding compliance with the Corporate Responsibility Program and related policies and possible violations of the Code or related policies and procedures are to be promptly reported to the SJHS Vice President, Ministry Integrity/Compliance Officer. A special resource line that permits anonymous reports of non-compliance or possible violations has been established for this purpose, (877-808-8133). Employees are expected to fully cooperate in any investigation of business conduct which may violate the Code. Making a false report intentionally for personal gain is a violation of the Code and will result in appropriate disciplinary action.

C. No Retaliation for Good Faith Reporting

The success of the Corporate Responsibility Program depends on prompt, accurate reporting of violations and suspected violations without fear of retaliation. Consistent with the St. Jude Medical Center Non-retaliation policy, employees will not be subject to reprisals for reporting, in good faith, actions which they believe violate the law or do not comply with the Corporate Responsibility Program or conform to the Code of Business Conduct/Ethical Business Practices.

D. Role of the Manager/Supervisor

Managers and supervisors have a special responsibility to act and communicate consistently with the Code of Business Conduct/Ethical Business Practices and to comply with the requirements of the Corporate Responsibility Program. Managers and supervisors shall create and maintain a work environment that encourages ethical behavior and promotes adherence to the elements of the Corporate Responsibility Program. As part of the SJHS Human Resources Management Systems program, managers and supervisors will be evaluated based on their ability to meet the above expectations.

E. Questions Regarding the Code of Business conduct

Questions regarding the Code of Business Conduct/Ethical Business Practices or the Corporate Responsibility Program should be directed to your manager. The Compliance Officer at ext 2580 or the SJHS Vice President Ministry Integrity/Chief Compliance Officer at 347-7577. Continuing education regarding the Corporate Compliance Program and the Code will be provided to employees.

F. Dynamic Document

This Code of Business Conduct/Ethical Business Practices will be changed as needed to better

accomplish St. Jude Medical Center mission, vision and values.



* Access. Denial, Inspection, Copying of Protected Health Information

* Accounting For Disclosure of Protected Health Information

* Advance Health Care Directives: Patient Self-Determination in Medical Decision Making Affirmative Action

* Alternative Communication of Protected Health Information

* Amendment of Protected Health Information

* Authorized Approval Levels

* Charity Care

* Competency Process

* Communications Requiring Corporate Counsel Review

* Community Benefit Documentation Physician Arrangement

* Compensation Policy

* Compliance Monitoring and Audit

* Cost Report Preparation and Check List

* Cost Report Preparation, Adequate Cost Reporting support documentation

* Credit Balance

* Confidentiality

* Conflict of Interest & Disclosure of Certain Interests

* Conflict Of Interest, Employees

* Conflict Of Interest, Medical Directors

* Conflict Of Interest, Trustees

* Conflict Of Interest, Resolution Of

* Consents

* Contracts, Leases and Rental Agreements

* Corporate Responsibility Program

* Decision to Withhold or Withdraw Life Sustaining Treatment

* Disciplinary Process Compliance Violations

* Disclosure of De-Identified Protected Health Information

* Disclosure of Protected Health Information

* Employee Relations Statement

* Employment of Relatives

* Equal Employment Opportunity

* False Claims Act

* Faxing of Patient Information

* Fitness for Duty

* Foregoing Artificially Supplied Nutrition or Hydration for Seriously Ill Patients Foregoing Treatment

* Gifts, Honoraria and Gratuities

* Governmental Agency Billing Practices

* Guidelines For Loans To Officers

* Guidelines For Responding To Investigatory Questions

* Guidelines for Bloodless Medicine and Surgery Program and Jehovah's Witness Patients Grounds for Dismissal

* Harassment

* Healthcare Ethics Consultation

* Health System Transfer

101 E. Valencia Mesa Dr. • Fullerton, CA 92835

T: (714) 871-3280



* HIPAA Procurement Compliance Provision and Waiver of SJHS Standard HIPAA Compliance Provision

* HIPAA Training

* Information Physical Security

* Internal Investigations

* Interpreter Services

* Leasing Of Property Or Equipment To Or From Physicians

* Marketing & Public Relations Practices

* Meal Reimbursement for Travels & Seminars

* Medicare Credit Balances

* Non Discrimination

* Non-Emergency Treatment of a Non-Abandoned Minor Whose Parents are Unavailable Non Retaliation

* Notice of Privacy Practice

* Organizational Ethics

* Patient/Family Complaint Procedures

* Patient Requests For CDM Review (AB1627)

* Patient Rights and Responsibilities

* Pediatric Patient Rights

* Personal Representative

* Philanthropy Compliance

* Physician Transactions

* Prisoner Patients, Management of

* Privacy Complaints

* Promotion

* Provision Of Benefits To Certain Qualified Employees

* Provision of Certain Benefits To Trustees/Director

* Rebilling Third Party Claims

* Records Management

* References

* Removal of Medical Records From Facility

* Request for Restrictions on the Use and Disclosure of Protected Health Information

* Restraint/Seclusion

* Safety Education and Training

* Security, Accuracy and Integrity of Data

* Security, Accuracy and Integrity of Data Collections

* Services Provided Prior to Admission

* Smoking

* St. Joseph Health System Corporate Responsibility Program

* Standards of Behavior

* Transactions Requiring Corporate Counsel Approval

* Transfer – Internal

* Values Analysis Committee

* Work-Related Injury or Illness



Dissertation Manual


© 2004 International University of Professional Studies

ALL RIGHTS RESERVED

(Revised 1-25-04)


WHAT IS A DISSERTATION PROJECT?

The writing of a dissertation provides an opportunity for the doctoral candidates to demonstrate their ability to:

* determine an important project to be studied

* develop an effective plan for completing such a project

* investigate the literature relating to the study

* present the results clearly

* draw conclusions based on the project

* make recommendations for further research.

The dissertation project is a formal, scholarly document that is part of the dues that one plays for the privilege of becoming a professional member of the community. The essential requirement for the dissertation is that it provide a creative and valuable contribution to the field.

A partial list of acceptable types of dissertations that can be completed, includes:

* experimental studies ? case studies

* historical studies ? heuristic studies

* surveys/questionnaires ? biographical studies

* phenomenological studies

* “Works of Excellence” such as books, videos, manuals, computer software, etc.

Important Note: The majority of IUPS students elect to submit a major project, referred to as a “Work of Excellence” dissertation, in lieu of a traditional research dissertation. This may take the form of writing a book, writing and producing a video, a manual, computer software programs, or other creative projects. An explanation of “Works of Excellence”, as well as “phenomenological” and “heuristic” studies can be found beginning on page 18 of this manual. It is, however, highly recommended that you read this manual from start to finish as all dissertations will utilize much of what is detailed.

The typical dissertation project at most other graduate schools is experimental in format and IUPS does not favor one research format over another. The experimental format will be used as the primary model in this manual.

In an experimental dissertation, the student starts from an established background of knowledge. A hypothesis is created based on observations by the student. The experimental method is utilized in assessing the hypothesis. Commentary is then offered relating the research findings to the existing literature.

2


SOME OF THE MOST FREQUENTLY ASKED QUESTIONS ABOUT WRITING DISSERTATIONS:

Q. When Should You Start To Think About Your Dissertation?

A. The moment you begin your program at IUPS, if not sooner. Let’s say that early in your educational career, you develop an acute interest in the healing and restorative capabilities of visual imagery. Start reading everything you can get your hands on. When a paper is assigned in your graduate classes, try to relate the assignment to visual imagery. Get feedback from as many of your colleagues and faculty members as possible. Write to the leading authors in the field asking for their feedback, guidance and opinions on specific issues in the field.

Q. What If I Haven’t Yet Read Much On The Subject I’m Interested In?

A. Get thee to the library. Move your bed and belongings, because you have reading to do. It’s much harder to decide about a dissertation idea when you haven’t read what leading thinkers have said about it. Many students have difficulty narrowing their topic down to a specific research idea because they really aren’t comfortable with the field of inquiry.

Q. Let’s Say That I Don’t Even Have An Idea Yet?

A. Welcome to the club. Most students enter into their final graduate year without a specific idea for their dissertation. Here is a short list of suggestions for finding a dissertation topic:

* Go to the library and read several first chapters of dissertations.

* Ask everyone you know to brainstorm with you. You never know from whose mouth your dissertation will spring. This includes unsuspecting faculty, colleagues, other Ph.D.‘s, and fellow students. In fact, almost everyone you know that is bright, breathing and willing may be of help in either stimulating your own thoughts or just getting the creative juices flowing.

* Examine your own professional work for areas of particular interest. If you are going to delve deeply into a subject, it is best if it is personally interesting to you.

* Read current journals in your areas of interest.


Q. What Are Other Typical Problems Faced In The Primary Stages Of Dissertation Design?

* Picking a topic that is unwieldy or poorly defined

Try to identify a research hypothesis / question to investigate. Choosing a field of inquiry is only the first step toward developing a research hypothesis / question. For example, studying math anxiety is not acceptable. However, measuring a change in anxiety as a result of a workshop utilizing the Manifest Anxiety Inventory would be acceptable, if the results were compared to an equivalent control group.

* Picking a topic that is designed to significantly change the world

Whereas it is not impossible that your dissertation will change the rotation of the earth, most dissertations are not necessarily of that great impact. Remember that Einstein proposed a paper on the general theory of relativity for his doctoral dissertation and it was considered unacceptable to the faculty! Current national estimates suggest that one of every two hundred dissertations significantly impacts on the area of inquiry. Don’t get attached to changing the world with your dissertation.

* Picking a topic that is not feasible in terms of experimental subjects

Remember that not everyone in the world necessarily wants to be a subject for your dissertation. Some people don’t care, are not available, are not accessible, are not amenable or just don’t want to participate in such endeavors. Think in advance of a way to entice / invite subjects to take part in your study. Studying the developmental background of transsexuals may be an interesting topic, but unless you have access to an adequate population, it may be difficult to pursue.

* Picking a topic that is not feasible in terms of time

There are realistic time constraints that must be considered when designing a dissertation. Certain treatments / effects take considerable time before full impact can be assessed.

Studying the impact of the elementary school education system may be rewarding, but waiting for a child to complete the sixth grade may take several years. Most graduate students prefer to design experiments where data can be completely collected within several months to one year.

4


* Picking a topic that is not feasible in terms of cost

Equipment, tests, facilities all cost money. Most students pay for their dissertations on their own and it is not unusual for students to spend $600 in order to complete their dissertation. The following partial list of expenses should be anticipated by students:

o Typing expenses

o Photocopying expenses

o Equipment expenses

o Computerized literature reviews

o Statistical expenses, ( e.g. computer time)

o Postage expenses

o Telephone expenses

o Test scoring fees

* Picking a topic that is not feasible in terms of equipment

Equipment costs a great deal of money. It must also be learned, maintained, serviced, warehoused, etc. It is important to bear theses constraints in mind when evaluating potential equipment.

Measuring the presence of alpha waves using an EEG Biofeedback machine may yield more accurate results than using an EMG Biofeedback instrument. However, the EEG machine may cost several hundred dollars, while the EMG instrument may cost under fifty dollars. Research is oftentimes a function of the caliber of the equipment chosen to assess changes. The choice is up to you, as is the cost.

* Picking the methodology prior to designing the study

Many students prefer to use methods other than parametric and nonparametric statistics. Consequently, they choose to work with a more “phenomenological” design. This perspective can involve a focus on what people experience and how they interpret the world and/or a methodological approach that involves experiencing the phenomenon being investigated.

Other students have chosen a heuristic inquiry, which is a form of phenomenological inquiry that brings to the fore the subjective, personal experience and insights of the researcher. Both approaches are examined in Appendix B.


5


GUIDELINES FOR PREPARATION

OF THE DISSERTATION PROPOSAL

In response to numerous student and faculty questions and comments concerning “guidelines” for the preparation of dissertation proposals, the following “suggested” format for Chapters 1 and 3 (the equivalent of a dissertation proposal) is presented. While IUPS is not insisting that you follow this outline, it will provide the structure and guidelines for most dissertations. Justification must be provided for any deviation from this format.

CHAPTER 1: PROBLEM FORMULATION

* Introduction

* Background of the Study

* Statement Of the Problem

* Purpose of the Study

* Research Hypothesis / Questions

* Importance of the Study

* Scope of the Study

* Limitations of the Study

* Definitions

CHAPTER 3: RESEARCH METHODS

* Research Approach

* Research Design

* Subjects

* Instrumentation

* Data Collection Procedures

* Data Analysis Procedures

The following pages provide a narrative description of the chapter subheadings.


The dissertation proposal should consist of Chapters 1 and 3 of the dissertation. A brief description of each section follows to offer guidance in preparation of the proposal and it is generally necessary to include each of these sections in the dissertation proposal. Variances may be taken, provided that a reasonable rationale is presented.

CHAPTER 1: PROBLEM FORMULATION

INTRODUCTION 

This section is about your field of inquiry. Common notions about the field are presented. In essence, the introduction provides the reader with an idea as to what line of reasoning will follow. It prepares the reader for the more technical “state of the art” discussion that follows in the next section.

BACKGROUND OF THE STUDY 

This section presents a brief review of the literature relevant to understanding the problem statement. The key theoretical positions in the field should be discussed. The student must also discuss what other current leading thinkers in the field have stated. If there is little directly relevant literature, then related research must be cited that supports the premises of the study. It is the student’s responsibility to illustrate / explain the development of the research premise by citing other scholars.

Students are advised to include a brief (usually limited to one paragraph) discussion of each study cited. The essence of this section is justification.

Assume that you were a trial lawyer pleading your case to judge and jury. Assume that you would have to convince them through logical, creative and sequential argument to accept the premise of your study. What is going on in the world to justify the study, e.g., marriages are failing, health issues need to be addressed. This is typically the longest section of the first chapter. (Usual page length is three to eight pages.)

STATEMENT OF THE PROBLEM 

This section represents a conclusion to the previous section. Whereas the Background of the Study section attempted to justify the research project, this section provides a concluding argument, summarizing the essential issues and premises that have been raised. At this point, focus is placed specifically upon the need for further research.

This may be established in a variety of ways. The need for further research may be a reflection of a lack of research in the field or an attempt to resolve an existing dilemma currently in the field. You may attempt to support either side of an existing conflict or opt to pursue a new and entirely unique direction, or attempt to provide relevant, necessary data. Save the best quote that is found in the literature that “demands new research” for this section of the proposal. Using the credible words of others always helps to substantiate a student’s own claim regarding the need for more research. (Usual page length is one to two pages.)


7


PURPOSE OF THE STUDY 

This section contains a concise, specific statement of the particulars of the study. There should be a statement of the major area of specific interest. This section also states what will be done to provide data to evaluate the research premise. The following paradigm represents the type of information necessary for completing this section:

* What issue(s) will be investigated?

* How will this be accomplished?

Who (subjects) will be assessed / evaluated / observed (method) concerning what characteristics (topic of inquiry) using what assessment / evaluation / observation procedures (instrument) as evaluated by what statistical / nonstatistical procedures (data analysis).

A reader who reviews this section should know beyond a shadow of a doubt exactly what the research premise is and how it will be evaluated. (Usual page length is one page.)

HYPOTHESIS / QUESTIONS 

The specific issues discussed provide the essence of the research hypotheses and/or questions. Most dissertations in the field of psychology — and this would apply to the burgeoning field of coaching — contain research hypotheses. These are specific predictions of a single research outcome. A typical hypothesis might be:

There will be a significant difference / correlation between (pretest and posttest scores) OR (Group A and Group B) for variable / characteristic C as measured by instrument D.

* Hypothesis

While there is no such thing as a generic hypothesis that fits all dissertations, the above model is often applicable. The hypotheses are basically guesses concerning the outcome of the research. They should be measurable and should allow a definite judgment to be made once the data have been collected.

Hypotheses should be listed in directional form in Chapter 1. When evaluating hypotheses, the null form of the hypothesis is typically used. This occurs most frequently in discussions in Chapters 3 and 4. Here is an example of a directional hypothesis and a hypothesis written in the null form:

Directional Hypothesis: 

There will be a significant difference between Group A and Group B scores of

depression as measured by the Zung Self-Rating Depression Scale.

Null Form: 

There will be no significant difference between Group A and Group B scores of

depression as measured by the Zung Self-Rating Depression Scale.

8


* Questions

Research questions are appropriate when the dissertation is more of an information gathering effort rather than an attempt to test a particular hypothesis. In areas of inquiry with minimal previous research, the purpose of the dissertation might be to illuminate the field, rather than assess and evaluate differences. For instance, an investigation of faith healers might utilize some of the following research questions to provide a focus for the study:

* What is the definition of “healing” used by faith healers?

* According to the faith healers’ own description, how does the “healing” occur?

* What events precede and follow “healing” experiences?

The field of inquiry must be refined so that only one or two specific issues are investigated in the dissertation. This provides focus for the researcher so that sights can be clearly set on the data necessary to answer the research question.

IMPORTANCE OF THE STUDY 

This section explains what is significant about the proposed study. It consists of a statement concerning the “gap of information” to be filled by the dissertation. This gap may have been created by a lack of literature in the field or by conflicting research. In either case, the typical dissertation doesn’t necessarily prove or disprove any existing theory. It may support or oppose existing theoretical positions.

Additionally, a statement should be made concerning the potential value of the results of the dissertation. Specifically:

* Which groups will likely benefit from the research?

* In what specific way will this research assist practitioners in the field?

This should not be a global statement about the need for research in the field, it should be a specific statement about the merits of this dissertation. (Usual page length is one to two pages.)

SCOPE OF THE STUDY 

This section provides a clear statement of the boundaries or parameters for the dissertation. Each study, since it is specific in focus, can only answer certain questions. Other equally interesting and reasonable issues may not be addressed in the study. Therefore, an explanation of the subject population, the instrumentation utilized and the variables assessed is usually included in this section. These are not the limitations of the study (that will discussed next). It is simply a clear description of what will be included in the study. (Usual page length is one page.)


9


LIMITATIONS OF THE STUDY

This section provides a clear statement of how the results of the study are limited. Each research method has inherent strengths and weaknesses. Each methodology has its own inherent limitations. Consequently, there are limits that must be imposed upon interpretation of the results of the study.

Listed below are some typical limitations of studies:

* Geographical Differences

Would people in San Diego react in the same way as people in New York City?

* Subject Bias

Did the subject respond the way he/she honestly felt or as he/she thought the

researcher expected?

* Lack of Corroborating Evidence

If only one test or indicator was used, was another independent check made to ascertain whether the test measured what it claimed to measure (validity)? Is it possible that the results were a function of the test utilized and not a function of the treatment that was administered?

It is the author’s responsibility to alert the reader to possible unavoidable (or avoidable) factors that may have influenced the research outcomes. Since most research is not perfect, this section summarizes the most glaring of the imperfections. (Usual page length is one to two pages.)

DEFINITIONS 

The dissertation is written for the intelligent reader who does not possess much content knowledge in the field. Hence, all new and pertinent vocabulary must be defined and referenced. This is accomplished by citing experts in the field. Webster’s (and other non-psychological) dictionaries should be avoided, if at all possible, since they offer non-technical definitions. A single definition must be offered for each term to facilitate communication. Authors may NOT coin their own definitions of terms.


10


CHAPTER 3: RESEARCH METHODS

This section provides a justification for the methodology of the dissertation. Whereas one dissertation might utilize a questionnaire, another might utilize an in-depth interview. The rationale for the research design used should be described. Questions to consider include:

* Which research approaches have been used in previous research?

* Which approaches were considered for this dissertation?

* What methodological problems were overcome by using this approach?

* What methodological problems were NOT overcome by using this approach?

In essence, the crucial question is: Why was this approach adopted? Quotes from other authors and texts to provide support for the choice are often desirable to indicate that authors are not alone in their belief in the appropriateness of the chosen design. (Usual page length is one to two pages.)

RESEARCH DESIGN 

In this section, a brief explanation of the research design is presented. A discussion of how and when the data will be gathered is included. Often a diagram illustrating the design is helpful. One example of a design would be as follows:

Randomized Control Group Pretest – Posttest Design

Group Pretest Treatment Posttest

Experimental Group (R)* T1 X T2

Control Group (R) T1 T2

* R = Random Assignment

In this type of study, each group would be pretested on Variable A. The experimental group would then receive Treatment X (designed to impact on Variable A). They would then be retested to assess any changes that may have occurred in Variable A. The control group would also receive the pretest and posttest, but would not receive the treatment.

Significant differences between the two groups would then be compared and contrasted.

This section of the proposal is typically a more technical section. It is often filled with references from other authors corroborating the choice of design. It is good practice to try to reference other experts in attempts at justifying the research methodology. (Usual page length is one to two pages.)


11


RESEARCH HYPOTHESES I QUESTIONS 

The research hypotheses / questions that were stated in Chapter 1 should be restated here in the context of the research methodology. If hypotheses were used, they should appear in the NULL FORM, as they will be statistically evaluated in the null form. If research questions were used, they should be repeated in exactly the same form as they appeared in Chapter 1.

SUBJECTS 

This section contains a brief description of the individuals that participated in the study. The relevant demographic characteristics of the population are described. Other specific factors that describe this population are also identified. A pressing question among dissertation writers is: “How many subjects should I use?” Whereas the specific answer for each dissertation should be decided by the student, the dissertation committee and the Director of Dissertation Research, the following guideline may be of help. In most statistical dissertations, 30 subjects or more are typically required for most conventional parametric statistics (Chi-Square analysis, Analysis of Variance, etc.). However, there are advantages to using more or less subjects in any study, so this number should not be automatically chosen, unless it can be specifically justified for the study. (Usual page length is one to two pages.)

INSTRUMENTATION 

In this section, all tests, questionnaires, interviews or other assessment techniques must be identified. Each assessment measure must be identified and described (e.g., number of items, nature of items, relevant subscales, etc.). References should be offered to substantiate the validity and reliability of each instrument, if such data exist. Other studies that utilized these instruments may be cited to support usage in the dissertation.

If there is no existing instrument that directly pertains to the primary area of inquiry, then a questionnaire or scale may be created by the student. In this case, the student should explain in great detail the creation of the questionnaire. The theoretical underpinning of the questions should be referenced. The experts that participated in the creation of the tests should be cited and acknowledged. Pilot tests that were conducted should be described. If the student has created his or her own instrument, a more detailed justification for the instrument should be offered.

It is easier to use an existing reliable and valid test. However, in many areas of student interest, there are no existing reliable and valid tests. Hence, a new test must be occasionally created. (Usual page length is three to five pages.)

NOTE: If the instrument has a copyright and you intend to publish it in an appendix to your dissertation, you must first have the author’s permission.


12


DATA COLLECTION PROCEDURES 

This section describes the methodology that was utilized in accumulating data for the dissertation. The exact procedure of interview or test administration (including a description of the facilities, instructions, etc.) must be offered. All significant tools, instruments or laboratory conditions must be fully explained. Follow-up procedures for data collection should also be identified (if appropriate).

When nonstatistical dissertations are attempted, the methodology section usually identifies the alternative methods for data collection. For instance, when describing a field study, the dependent variable(s) and environmental conditions should be described in great detail. When describing a biographical study, pertinent details concerning the subject, secondary and tertiary sources that were consulted are described. The essential idea is that whatever methodology was utilized in the dissertation must be fully and completely explained. The standard for completion of this section is that after reading, another researcher should be able to replicate the study. (Usual page length is one to three pages.)

DATA ANALYSIS PROCEDURES 

This section describes the statistics that will be used to evaluate the research hypotheses. In the case of research questions, the methods for comparing and contrasting the data should be discussed. Whereas the specific formula utilized need not be listed in the text (it is often listed in the Appendix), a description of the statistic and chosen levels of confidence should be presented.

Frequency tables, or other groupings of data may be more appropriate for nonstatistical dissertations. The interesting rule of thumb is that statistical dissertations are often shorter than nonstatistical dissertations. Many students feel that a nonstatistical dissertation is somewhat easier to complete. This may not necessarily be true because data will have to be analyzed using one method or another.

Many students choose to hire a statistical consultant to facilitate this process. This individual will assist the student in selecting the most appropriate statistic and will then have access to a computer that can perform the required calculations. Most social science software packages will be suitable for most simple statistical dissertations. It should be remembered, however, that the student must understand the statistical procedures used, be able to discuss them in the oral defenses, and is ultimately responsible for the appropriate choice. (Usual page length is one to two pages.)


13


GUIDELINES FOR DISSERTATION CHAPTERS

The following “guidelines” for the preparation of the dissertation are provided in support of our students. While IUPS does not insist that you follow this outline, it will provide structure and consistency for the dissertation.

There are usually five chapters in the dissertation. The following concise summary identifies the titles and general contents of each chapter.

CHAPTER 1: PROBLEM FORMULATION

Guidelines for this chapter are covered in detail in the dissertation proposal section. The essential difference between the dissertation proposal and the dissertation itself is the extent of detail required. In the proposal, a skeleton version of Chapter 1 is created. In the dissertation, depth and detail is offered to clarify the research premise. The more extensive the depth and detail provided in the proposal, the less additional material will be necessary for the dissertation. Usually, the process involves expanding the existing nine sections of the proposal by adding more support and reference material.

CHAPTER 2: REVIEW OF THE LITERATURE

The importance of this section has to do providing your dissertation with a contextual and historical perspective. Indicate those studies, books, etc. that are relevant to your area of inquiry, and detail how they are relevant to your hypothesis. Assess and detail what has, and what has not been done in relationship to your hypothesis. In addition, demonstrate that you can discern between relatively objective references cited and relatively subjective references cited. This chapter brings clarity to the field you are exploring and positions your particular area of study. A full chapter summary should conclude the chapter highlighting the significant sources cited.

CHAPTER 3: RESEARCH METHODS

Guidelines for this chapter are identical with the guidelines offered in the dissertation proposal. As in Chapter 1, the essential difference is the extent to which detail is required. Basically, each of the seven sections of the proposal are expanded as described above in the section on Chapter 1.

CHAPTER 4: RESULTS AND ANALYSIS

This chapter begins with an opening paragraph describing what will be covered in the chapter. This is followed by a detailed description of the subjects. Results are presented according to Research Hypotheses / Questions. The hypotheses / questions are restated and the results of the investigation are presented. Tables (when necessary) should accompany the narrative account of the results. Additionally, a preliminary analysis of the data should be presented. A brief paragraph in this chapter will set the stage for the more complete presentation of the research findings in Chapter 5. Each hypothesis I research question should be addressed individually. If the results are significant, more narrative should be offered than if the results are nonsignificant. If the


14


results are nonsignificant, potential reasons explaining the findings may also be briefly offered. Any additional findings of the study, i.e. anecdotal comments or observations, should be presented following the research hypotheses / questions. The chapter should begin with the most important results and should conclude with less important results. A summary is not necessary at the end of the chapter.

CHAPTER 5: SUMMARY, DISCUSSION AND RECOMMENDATIONS

There are three sections in Chapter 5, as the title indicates.

SUMMARY SECTION 

The first section of the chapter contains a summary of the dissertation. This summary is

comprised of three parts:

?

PROBLEM:

An overview of the research issue investigated

?

METHOD:

How the study was conducted

?

RESULTS:

A review of the findings


In essence, this is a summary of the dissertation in journal form. The APA publication manual is of great help in preparing the summary. The length of the summary should be about 2000-3000 words.

DISCUSSION SECTION 

The next section of the chapter includes a discussion of both the significant and nonsignificant findings, each covered independently of the other. An in-depth discussion of each of the findings is presented. The material presented in Chapter 4 should not be repeated here. Rather, a more complete assessment of the findings should be presented. The relationship between the research findings and the current literature (cited in Chapter 2) is discussed. A discussion of issues that were discovered during the course of the dissertation is also presented.

Nonsignificant findings or findings indicating trends should also be discussed, but in considerably less detail. Explanations for all results should be offered. There are circumstances where nonsignificant findings can afford as much rich commentary as more significant data. It is the responsibility of the student, along with the guiding mentor, to determine to what extent discussion should be offered.

RECOMMENDATIONS SECTION 

The final section includes recommendations for further research. Students often suffer DB (Dissertation Burnout) by this point and neglect to end their dissertation with this look to future research. So remember that it is important to remember that each piece of research potentially extends the field into new directions. Each dissertation plays its own unique role in this process. With the completion of this research, what improvements could be made in the current design to further investigate the research premise? Should the same issue be reinvestigated? What further research should spring from the findings? What are the implications of this research for the field of inquiry and for psychology (if applicable)?


15


COMPLETION OF THE DISSERTATION

Once the five chapters of the dissertation are completed, the balance of the dissertation must be compiled. The dissertation should be sequenced in the following order:

* TITLE PAGE (same as the “Sample Proposal Title Page”; substitute the word Dissertation for the word Proposal)

* COPYRIGHT PAGE

* SIGNATURE APPROVAL PAGE

* DEDICATION PAGE (optional)

* ACKNOWLEDGMENTS PAGE (optional)

* TABLE OF CONTENTS

* ABSTRACT

* LIST OF TABLES (optional, as required)

* LIST OF FIGURES (optional, as required)

* TABLE OF CONTENTS

* BODY OF DISSERTATION

* REFERENCES

* APPENDIX (APPENDICES) (optional)

A few samples of required pages are found on the following pages. Other dissertations should be viewed for further examples. To assist our students, the IUPS Web site has a number of sample pages available for download in Microsoft Word format.


16


FORMATTING THE DISSERTATION

Sample template pages of almost every aspect of a dissertation are available for download on our website at www.iups.edu/dissertation.htm. What follows below is a general overview of the dissertation format.

The text typeface should be a 12 point serif font such as Times New Roman. The body of the dissertation should be double-spaced, with longer quotes single-spaced and indented. The page numbers of the preliminary material are printed in lower case Roman numerals, centered at the bottom of the page (see below). The left margin should be 1'/ inches, whereas the right, top and bottom margins should be 1 inch each.

For purposes of counting, the Title Page is the first page that is counted in lower case Roman numerals, the Copyright Page is second, the Signature Approval Page is third, and so forth. Though these pages (and the optional Dedication Page) are counted, the Roman numeral page number does not appear on those pages. Page numbers begin to be shown with the optional Acknowledgments Page, and such page numbers are centered at the bottom of the page, '/ inch from the bottom, in the footer.

The body of Chapter 1 of the dissertation text is considered page 1 (the start of using Arabic numbers, i.e., 1, 2, 3). Center the page numbers at the beginning of each chapter '/ inch from the bottom of the page, with subsequent chapter pages placed at the top right side of the page, '/ inch from the top.

?

Title Page

i

(Roman page # not shown)

?

Copyright Page

ii

(page # not shown)

?

Signature Approval Page

iii

(page # not shown)

?

Dedication Page (Optional)


(page # not shown)

?

Acknowledgments Page (Optional)


(begin showing page #s)

?

Table of Contents


(page # shown)

?

List of Tables (Optional, As Necessary)


(page # shown)

?

List of Figures (Optional, As Necessary)


(page # shown)

?

Abstract


(page # shown)

?

Body of Dissertation

1

(begin showing “Arabic” page #s)

?

References


(page # shown)

?

Appendix (Appendices) (Optional)


(page # shown)


When you feel that the manuscript is in good shape, provide draft copies for committee members to comment on. Rewrite as necessary, taking into account the committee’s suggestions. Drafts provided to IUPS should be printed on basic 20 lb. paper.

IUPS requires one bound copy of the final, approved dissertation, as well as a copy on a labeled CD, as well as any resulting projects (e.g., books). The bound copy must be printed single-sided on 20 lb., 100% rag content paper for the archives, hard bound with a royal blue cover with the title, author, year, and IUPS in gold on the spine. IUPS uses College Book Bindery, located at 5549 El Cajon Blvd. in San Diego (619-583-7951).


17


WORKS OF EXCELLENCE

Most IUPS students elect to submit a major project, referred to as a “Work of Excellence”, in lieu of a traditional research dissertation. This may take the form of writing a book, writing and producing a video, a manual, computer software programs, or other creative projects.

In such cases, the Work of Excellence becomes a core aspect of the dissertation, but some traditional aspects of dissertations covered in the main section of this manual are essential and required.

How might one integrate writing a book into one’s dissertation? Many IUPS dissertations have been inspired by the "book" idea and it is certainly a worthwhile endeavor. In going down that path, there are key issues that need to be considered.

1) The key issue is the target audience. Whereas the book may be written for the general public, the dissertation targets the academic community. This means that in addition to the book, students must address the university community in general and academicians or leading thinkers in their field, in the dissertation.

2) The Ph.D. degree is essentially a research degree. Students therefore must demonstrate that they can:

a. Research the literature, referring to the research and/or opinions of key people in their field, e.g., Carl Jung, Ken Wilbur, Eckhart Tolle, Thomas Leonard, Jack Kornfield, Dave Ellis, Abraham Maslow, or others.

b. Effectively position their hypothesis or basic concepts in a historical perspective. For instance, what have other scholars stated regarding the chosen hypothesis? What research is there to support or contradict the hypothesis? And another important aspect is to articulate whether the existing evidence is relatively objective, subjective, or erroneous.

3) In reference to the audience to which the book material is applicable, consider the limitations of the work in terms of socio-economic status, education, nationality, religious factors, etc.

4) Since the dissertation, of which the book is an aspect, is considered to be a contribution to the student’s particular academic field, it is important to note what is considered to be the contributions that are being made by way of this project, and how others could benefit from and further the project undertaken.

Students who want to submit a project are required to prepare a formal write-up that provides the justification for the project, prior to beginning the project. This presentation should clarify the project structure, the processes through which it is developed, and identify the student’s role in the project. When the Mentor and the Academic Dean approve the proposal, the project can be undertaken. The following outline should be helpful when proposing a work of excellence type of dissertation.


18


Introduction: In the introductory chapter, describe the academic area being addressed. When appropriate, draw upon demographic statistics, statements from the literature and popular media. Discuss the project’s contribution to society and its importance within the academic discipline. Clarify the specific problem being addressed in the project and explain the issues involved. The introduction should progress from a statement of the problem and justification of the project toward a statement of the main objectives of the project. (See pages 7-10 for in-depth information on this chapter.)

Review of Literature: Moving beyond the introduction, the student begins an exploration of what the literature states about the main areas of focus within the project. You should identify the major relevant positions within the literature, both pro and con. Explore where your work rests in relationship to all other studies undertaken in the field. It is important to note that a doctorate is considered a research degree and the work of excellence needs to demonstrate an ability to research the literature. (See page 14.)

Procedures: This chapter describes what has been done to address the problem. It should clarify the planning process and the activities related to completion of the project. The student’s role in the process, and the role of significant colleagues and contributors should be pointed out. (See pages 11-13 for relevant points.)

Project Results/Findings/Summary: Here the project output or finished product is described. If books or manuals are produced, describe the content of each section or chapter. Explain what effects or potential effects the completion of the project has, or will have, on the academic discipline, workplace, community, and on society. Address the issue regarding the possible limitations of the project, taking into account cultural, socio-economic, racial, and other demographic issues. (See pages 14-15.)

Project Conclusions and Recommendations: Students should use this chapter to clarify what lessons can be learned from their projects and how that will further the knowledge in their field, benefit their professional development, and bring about change in the culture or the occupation. (See page 15.)

Appendices: The Appendices should contain a recreation of any written material, information, and literature related to their projects, or reverences to any supplemental materials, not appropriate for inclusion in the body of the dissertation. (See the downloadable “Appendices” document template for more information.)

References: Students are to submit proper references of all sources cited in the review of literature and elsewhere in their formal write-up. (See the downloadable “References” document template for more information.)


19


PHENOMENOLOGICAL APPROACHES & HEURISTIC INQUIRY

Phenomenological Approaches: A phenomenological perspective can mean either or both:

1) a focus on what people experience and how they interpret the world (in which case one can use interviews without actually experiencing the phenomenon oneself); or

2) a methodological mandate to actually experience the phenomenon being investigated (in which case participant observation would be unnecessary).

There is one additional dimension that differentiates a phenomenological approach, and that is the assumption that there is an essence or essences to shared experience. These essences are the core meanings mutually understood through a phenomenon commonly experienced.

The experiences of different people are bracketed (put in the same category or group), analyzed, and compared to identify the essences of the phenomenon. For example, the essence of loneliness, the essence of being a mother, or the essence of being a participant in a particular program. The assumption of essence, like the ethnographer’s assumption that culture exists and is important, becomes the defining characteristic of a purely phenomenological study.

Phenomenologists are rigorous in their analysis of the experience so that basic elements of the experience that are common to members of a specific society, or all human beings, can be identified. This is essential to understanding the philosophical basis of phenomenology.

On the other hand, each person has a unique set of experiences which they treat as “truth” and which determine that individual’s behavior. In this sense, truth (and associate behavior) is totally unique to each individual.

A phenomenologist assumes a commonality in human experiences and must rigorously use the method of bracketing to search for those commonalities. Results obtained from a phenomenological study can then be related to and integrated with, those of other phenomenologists studying the same experience or phenomenon.

In short, a phenomenological study (i.e., getting at the essence of the experience of some phenomenon) is one that focuses on descriptions of what people experience and how it is that they experience what they experience.


20


Heuristic Inquiry: Heuristics is a form of phenomenological inquiry that brings to the fore the personal experience and insights of the researcher. Heuristic inquiry asks; “What is my experience of this phenomenon and the essential experience of others who also experience this phenomenon intensely?”

There are two focusing or narrowing elements of heuristic inquiry within the larger framework of phenomenology. The researcher must have personal experience with and intense interest in the phenomenon.

Heuristics is not inquiry into casual experience. Heuristic inquiry focuses on intense human experiences, intense from the point of view of the investigator and co-researchers. It is the combination of personal experience and intensity that yield an understanding of the essence of the phenomenon. Heuristics is concerned with meanings, not measurements; with essence not appearance; with quality, not quantity; with experience, not behavior.

The focus in a heuristic quest is on recreating the lived experience, fully and completely from the frame of reference of the experiencing person. Examples, narrative descriptions, dialogues, stories, poems, works of art, journals and diaries, can all be utilized in the depiction of that which one has subjectively experienced.


21



Manual Mutu Akademik

Universitas Diponegoro

MMA UNDIP BPM 2 1

Revisi ke

:

-

Tanggal

:

17 Januari 2006

Dikaji ulang oleh

:

Pembantu Rektor Bidang Akademik

Dikendalikan oleh

:

Badan Penjaminan Mutu

Disetujui oleh

:

Rektor


UNIVERSITAS

Manual Mutu

Disetujui

DIPONEGORO

Akademik

oleh

Revisi




ke

  17-01-Tanggal

MMA.UNDIP.BPM.2.1

Rektor


2006





KEPUTUSAN

REKTOR UNIVERSITAS DIPONEGORO

Nomor : 25/SK/J07/2006

Tentang

MANUAL MUTU UNIVERSITAS DIPONEGORO

REKTOR UNIVERSITAS DIPONEGORO

Menimbang :a. bahwa Universitas Diponegoro memiliki komitmen secara profesional untuk meningkatkan mutu pendidikan melalui sistem Penjaminan Mutu Pendidikan Tinggi;

b. bahwa pelaksanaan Penjaminan Mutu merupakan tanggung jawab bersama seluruh komponen organisasi baik ditingkat universitas, fakultas serrta Jurusan/Bagian/Program Studi;

c. bahwa untuk kejelasan tugas dan tanggung jawab perlu ditetapkan Panduan Pelaksanaan dalam Manual Mutu Universitas Diponegoro dengan Keputusan Rektor.

Mengingat

: 1. Undang-Undang No. 20 tahun 2003 tentang Sistem Pendidikan Nasional;

2. Peraturan Pemerintah No. 7 tahun 1961 tentang Pendirian Universitas Diponegoro;

3. Peraturan Pemerintah No. 60 tahun 1999 tentang Pendidikan Tinggi;

4. Keputusan Presiden RI No. 99/M/2002 tentang Pengangkatan Rektor Universitas Diponegoro;

5. Keputusan Mendikbud No. 0202/0/1995 tentang Organisasi dan Tata Kerja Universitas Diponegoro;

6. Keputusan Mendikbud No. 0275/0/1996 tentang Penyempurnaan Organisasi dan Tata Kerja Universitas Diponegoro;

7. Keputusan Mendikbud No. 186/O/2002 tentang Statuta Universitas Diponegoro.


Memperhatikan :1. Rapat Badan Pekerja Senat Universitas Diponegoro tanggal 9 Desember 2005

2. Rapat Senat Universitas Diponegoro tanggal 23 Desember 2005

M E M U T U S K A N

Menetapkan :SURAT KEPUTUSAN REKTOR UNIVERSITAS DIPONEGORO TENTANG MANUAL MUTU UNIVERSITAS DIPONEGORO.

Pertama :Menetapkan Manual Mutu Universitas Diponegoro sebagamana tersebut terdapat pada Lampiran Keputusan ini.

Kedua :Manual Mutu Universitas Diponegoro merupakan pembagian tugas dan tanggung jawab organisasi Penjaminan Mutu Akademik Universitas Diponegoro

Ketiga :Hal-hal yang belum diatur dalam keputusan ini akan ditetapkan dalam keputusan tersendiri


Keempat :Surat Surat Keputusan ini berlaku mulai tanggal ditetapkan, dengan ketentuan segala sesuatunya akan ditinjau kembali dan akan diperbaiki atau ditambahkan sebagaimana mestinya apabila di kemudian hari ditemukan kekeliruan ataupun kekurangan.

Ditetapkan di Semarang

Pada Tanggal 30 Januari 2006

R e k t o r ,

Prof. Ir. EKO BUDIHARDJO, MSc NIP. 130 354 860

SALINAN disampaikan kepada :

1. Menteri Pendidikan Nasional di Jakarta;

2. Sekjen Depdiknas di Jakarta;

3. Irjen Depdiknas di Jakarta;

4. Dirjen Dikti Depdiknas di Jakarta;

5. Dirbinlitabmas Ditjen Dikti Depdiknas di Jakarta;

6. Dirbinsarak Ditjen Dikti Depdiknas di Jakarta;

7. Para Pembantu Rektor di Undip;

8. Para Dekan Fakultas di Undip

9. Direktur Program Pasca Sarjana di Undip

10. Para Ketua Lembaga di Undip

11. Para Kepala Biro di Undip

12. Para Kepala UPT di Undip


LAMPIRAN : SURAT KEPUTUSAN REKTOR UNIVERSITAS DIPONEGORO

Nomor : 28/SK/J07/2006

Tentang :


KATA PENGANTAR

Untuk pelaksanaan Sistem Penjaminan Mutu Pendidikan Tinggi (SPMPT) di Universitas Diponegoro, maka disusun Manual Mutu Akademik Universitas Diponegoro. Dengan adanya Manual Mutu Akademik ini, diharapkan seluruh sivitas akademika dapat memahami dengan baik tentang Kebijakan Mutu Akademik, Sistem Penjamiman Mutu, dan Organisasi Penjaminan Mutu Akademik di Universitas Diponegoro. Dengan mengetahui semua hal tersebut, maka diharapkan komitmen dari seluruh sivitas akademika Universitas Diponegoro untuk pelaksanaan Sistem Penjaminan Mutu Pendidikan Tinggi.

Manual prosedur ini merupakan acuan bagi semua pihak yang terkait dengan pelaksanaan Sistem Penjaminan Mutu di Universitas Diponegoro.

Semarang, 17 Januari 2006 Rektor,

Prof. Ir. Eko Budihardjo, M.Sc NIP. 130 354 860


MANUAL MUTU UNIVERSITAS DIPONEGORO

BAB I

KEBIJAKAN MUTU AKADEMIK

UNIVERSITAS DIPONEGORO

A. Kebijakan Umum

1. Universitas Diponegoro menyelenggarakan proses pendidikan terbaik dan unggul dalam bidang ilmu pengetahuan, teknologi, dan seni.

2. Universitas Diponegoro menyelenggarakan evaluasi reguler untuk meningkatkan kualitas, otonomi, akuntabilitas, dan akreditasi.

3. Sesuai dengan perubahan-perubahan mendasar yang terjadi dalam tataran global, regional, nasional yang menyangkut berbagai aspek kehidupan masyarakat, Universitas Diponegoro dalam menyelenggarakan Tri Dharma Perguruan Tinggi berusaha memberikan kontribusi secara aktif dan signifikan menuju tercapainya masyarakat Indonesia yang cerdas, berbudaya, menguasai Ilmu Pengetahuan dan Teknologi yang berlandaskan ideologi Pancasila menuju tercapainya masyarakat madani.

4. Dalam menyelenggarakan Tri Dharma Perguruan Tinggi Universitas Diponegoro berpegang teguh pada prinsip adanya kebebasan akademik, mimbar akademik, dan otonomi keilmuan.

5. Untuk mencapai Tujuan dan Sasaran yang telah ditetapkan, Universitas Diponegoro harus mengembangkan Sumber Daya Manusia dan Bidang Penelitian sedemikian rupa untuk memenuhi persyaratan sebagai Universitas Pendidikan yang menuju ke Universitas Penelitian.

6. Universitas Diponegoro berpartisipasi aktif dalam memecahkan berbagai masalah yang menyangkut kehidupan masyarakat luas di bidang Politik, Ekonomi, Sosial di tingkat lokal, nasional, dan regional demi kesejahteraan umat manusia.

7. Universitas Diponegoro perlu mengembangkan program-program yang khas untuk mengatasi masalah-masalah laten maupun masalah-masalah baru yang timbul dalam masyarakat sebagai akibat perubahan-perubahan mendasar yang sedang terjadi di tingkat lokal, nasional, dan regional.

8. Untuk menjamin mutu Tri Dharma Perguruan Tinggi perlu ditetapkan Standar Mutu yang dapat

diterima secara nasional maupun internasional.

B. Penjaminan Mutu Akademik Internal

Penjaminan mutu akademik internal di tingkat universitas, fakultas, progam studi dan unit-unit

pelaksana lainnya dilakukan untuk menjamin :

1. Kepatuhan terhadap kebijakan akademik, standar akademik, peraturan akademik serta manual mutu akademik;

2. Kepastian bahwa lulusan memiliki kompetensi sesuai dengan yang ditetapkan disetiap progam studi;

3. Kepastian bahwa setiap mahasiswa memiliki pengalaman belajar sesuai dengan spesifikasi progam studi;

4. Relevansi progam pendidikan dan penelitian dengan tuntutan masyarakat dan stakeholders lainnya.

Penjaminan Mutu Akademik Internal merupakan bagian dari tanggung jawab pimpinan universitas, pengurus fakultas, pengurus jurusan/bagian, pengelola progam studi serta dosen. Sasaran penerapan sistem penjaminan mutu akademik harus ditetapkan dan dituangkan dalam Rencana Strategis dan Rencana Kegiatan dan Anggaran Tahunan masing-masing satuan kerja.

BAB II

SISTEM PENJAMINAN MUTU AKADEMIK

UNIVERSITAS DIPONEGORO


A. Konsep

1. Pengertian mutu secara umum adalah kesesuaian dengan standar, kesesuaian dengan harapan stakeholder, atau pemenuhan janji yang telah diberikan. Mutu pendidikan di Universitas Diponegoro dimengerti sebagai pencapaian tujuan pendidikan dan kompetensi lulusan yang telah ditetapkan sesuai rencana strategis dan standar akademik serta spesifikasi program studi masing-masing. Pencapaian tujuan ini menyangkut aspek masukan, proses, dan keluaran serta nilai dan derajat kebaikan, keutamaan, dan kesempurnaan (degree of excellence).

2. Mutu pendidikan di Universitas Diponegoro bersifat proaktif dalam arti bahwa lulusan Universitas Diponegoro mampu secara terus-menerus menyesuaikan diri dengan perkembangan ilmu dan teknologi serta realitas sosial budaya yang terus berkembang secara dinamis. Mutu pendidikan di Universitas Diponegoro juga mencakup aspek pelayanan administratif, sarana/prasarana, organisasi, dan manajemen yang dapat memenuhi harapan sivitas akademika dan masyarakat (baik orang tua mahasiswa, pengguna lulusan, maupun masyarakat luas).

3. Sistem penjaminan mutu akademik di Universitas Diponegoro dirancang dan dilaksanakan untuk dapat menjamin mutu gelar akademik yang diberikan. Hal ini berarti bahwa sistem penjaminan mutu harus dapat menjamin bahwa lulusan akan memiliki kompetensi yang ditetapkan dalam Spesifikasi Progam Studi. Dengan demikian universitas juga menjamin mahasiswa akan memperoleh pengalaman belajar seperti yang dijanjikan didalam spesifikasi progam studi.

B. Penerapan

1. Universitas Diponegoro menerapkan penjaminan mutu akademik yang berjenjang. Pada tingkat universitas dirumuskan kebijakan akademik dan standar akademik universitas dan dilakukan audit mutu akademik fakultas. Pada tingkat fakultas dirumuskan kebijakan akademik fakultas serta dilakukan audit mutu akademik jurusan/bagian/progam studi. Pada tingkat progam studi dirumuskan kompetensi lulusan dan spesifikasi progam studi serta dilakukan evaluasi diri berdasarkan pendekatan OBE (Outcome Based Education).

2. Dalam pengembangan dan penerapan sistem penjaminan mutu, Universitas Diponegoro memilih pendekatan FEE (Facilitating, Empowering dan Enabling, Pedoman Penjaminan Mutu Pendidikan Tinggi – Departemen Pendidikan Nasional, Direktorat Jendral Pendidikan Tinggi 2003) dan menugaskan Badan Jaminan Mutu (BPM) untuk melaksanakan peran universitas dalam pengembangan dan penerapan sistem penjaminan mutu disemua unit pelaksana kegiatan akademik.

Pelaksanaan penjaminan mutu akademik Universitas Diponegoro dijelaskan secara lebih rinci dalam Manual Prosedur Implementasi Penjaminan Mutu.

BAB III

ORGANISASI PENJAMINAN MUTU AKADEMIK

UNIVERSITAS DIPONEGORO

A. Tingkat Universitas

1. Pemegang kepentingan penjaminan mutu akademi di tingkat universitas terdiri atas Senat Universitas, Pimpinan Universitas, dan Badan Penjaminan Mutu (BPM).

2. Senat Universitas merupakan badan normatif dan perwakilan tertinggi di Universitas Diponegoro. Senat Universitas beranggotakan antara lain: Para Guru Besar, pimpinan Universitas Diponegoro, para Dekan, Direktur Program Pasca Sarjana, wakil dosen dan unsur lain yang ditetapkan oleh Senat Universitas. Tugas Senat Universitas antara lain :

a. Menyusun Kebijakan Akademik Universitas dan pengembangan Universitas Diponegoro

b. Merumuskan kebijakan penilaian prestasi akademik dan kecakapan serta kepribadian sivitas akademika;

c. Merumuskan norma dan tolok ukur penyelenggaraan Tridarma Perguruan Tinggi


d. Merumuskan peraturan pelaksanaan kebebasan akademik, kebebasan mimbar akademik, dan otonomi keilmuan pada Universitas Diponegoro;

e. Memberikan pertimbangan dan persetujuan terhadap perencanaan program kerja di bidang Tridharma perguruan tinggi serta Rencana Anggaran Pendapatan dan Belanja Universitas Diponegoro yang dibuat dan diajukan oleh pimpinan Universitas Diponegoro;

f. Memberikan pertimbangan kepada Menteri berkenaan dengan calon-calon yang diusulkan untuk diangkat menjadi rektor, dan dosen yang dicalonkan memangku jabatan akademik di atas lektor kepala;

g. Membahas dan menyetujui usulan struktur tarip dan tata cara pengelolaan dana yang berasal dari masyarakat yang disusun oleh pimpinan Universitas Diponegoro;

h. Menilai pertanggungjawaban pimpinan Universitas Diponegoro atas kebijakan yang telah ditetapkan;

i. Menegakkan norma-norma yang berlaku bagi civitas akademika;

j. Mengukuhkan pemberian gelar doktor kehormatan;

k. Menyelenggarakan ujian promosi doktor.

3. Pimpinan Universitas adalah Rektor yang dibantu oleh para Pembantu Rektor. Pimpinan Universitas bertanggung jawab atas penyelenggaraan pendidikan, penelitian, pengabdian kepada masyarakat. Rektor menetapkan peraturan, norma, dan tolok ukur penyelenggaraan pendidikan tinggi berdasarkan peraturan universitas. Rektor mengangkat pimpinan fakultas dan pimpinan unit-unit yang berada di bawahnya.

4. Pembantu Rektor Bidang Akademik atau disebut Pembantu Rektor I bertanggung jawab atas penyelenggaraan pendidikan, peningkatan mutu akademik, dan penyelenggaraan jaminan mutu akademik. PR I menyusun Kebijakan Rektor yang berhubungan dengan proses pembelajaran. PR I menformulasikan prosedur yang tepat dalam pemantauan dan penilaian terhadap efektifitas penyelenggaraan kegiatan akademik serta pelaksanaan sistem penjaminan mutu. Dalam melaksanakan penjaminan mutu akademik PR I didukung oleh Badan Penjaminan Mutu (BPM) yang dibentuk dengan Surat Keputusan Rektor.

5. Lingkup kerja BPM mencakup semua unsur pelaksana akademik: program studi, strata pendidikan (diploma, sarjana dan pascasarjana), serta pengelola program studi (fakultas, jurusan/bagian), dan unsur penunjang. BPM bertugas untuk :

a. merencanakan dan melaksanakan sistem penjamin mutu akademik secara keseluruhan di Universitas Diponegoro;

b. membuat perangkat yang diperlukan dalam rangka pelaksanaan sistem penjaminan mutu akademik .

c. memonitor pelaksanaan sistem penjaminan mutu akademik;

d. melakukan audit dan evaluasi pelaksanaan sistem penjaminan mutu akademik;

e. melaporkan secara berkala pelaksanaan sistem penjaminan mutu akademik.

6. Badan Penjaminan Mutu melaksanakan fungsi pelayanan dalam bidang :

a. pelatihan, konsultasi, pendampingan dan kerjasama penjaminan mutu akademik;

b. pengembangan sistem informasi penjaminan mutu akademik;

c. pengembangan dan pelaksanaan sistem penjaminan mutu akademik yang sesuai dengan potensi dan kapasitas kampus;

d. pengembangan dan pelaksanaan audit mutu akademik internal .

7. Ketua BPM bertanggung jawab dalam menyiapkan dan menyusun manual mutu akademik dan

manual prosedur yang sesuai dengan kebijakan akademik, standar akademik, peraturan yang berlaku, serta selaras dengan potensi dan kapasitas kampus.

8. Ketua Bidang Audit Internal Mutu Akademik (AIMA) sebagai organ BPM bertanggung jawab

atas terlaksananya audit mutu akademik yang memeriksa kepatuhan pelaksanaan akademik dengan Standar Akademik, Manual Mutu Akademik dan Manual Prosedur.

9. Ketua Bidang Implementasi dan Pengembangan SPMPT.

10. Ketua Bidang Pelatihan dan Kerjasama.

B. Tingkat Fakultas/Pascasarjana/Lembaga

1. Pemegang kepentingan penjaminan mutu akademik di tingkat fakultas terdiri atas Senat Fakultas,

Dekan, Pembantu Dekan Bidang Akademik, dan Tim Penjaminan Mutu Fakultas (TPMF).


2. Senat Fakultas merupakan badan normatif tertinggi di lingkungan fakultas yang memiliki wewenang untuk menjabarkan kebijakan dan peraturan universitas untuk fakultas. Senat Fakultas terdiri atas guru besar, pimpinan fakultas, dan wakil dosen.

Tugas Senat Fakultas adalah :

a. Merumuskan kebijakan akademik fakultas;

b. Merumuskan kebijakan penilaian prestasi dan etika akademik, kecakapan, serta integrasi kepribadian dosen di lingkungan fakultas;

c. Merumuskan norma dan tolok ukur bagi pelaksanaan penyelenggaraan fakultas dan menilai pelaksanaan tugas Pimpinan Fakultas;

d. Menilai pertanggungjawaban pimpinan fakultas atas pelaksanaan kebijakan yang ditetapkan; dan

e. Memberikan petimbangan kepada pimpinan Universitas Diponegoro mengenai calon yang diusulkan untuk diangkat menjadi pimpinan fakultas.

3. Dekan bertanggung jawab atas penyelenggaraan pendidikan, penelitian, dan pengabdian kepada masyarakat, serta pembinaan tenaga akademik, tenaga administrasi, dan mahasiswa. Dekan bertanggung jawab atas terjaminnya mutu akademik di fakultas. Dalam mengemban tanggung jawab mutu akademik, Dekan dibantu oleh Pembantu Dekan Bidang Akademik dan Tim Penjaminan Mutu Fakultas (TPMF).

4. Pembantu Dekan Bidang Akademik, bertanggung jawab atas tersusunnya :

a. Standar Akademik Fakultas;

b. Manual Mutu Akademik Fakultas, dan

c. Manual Prosedur Mutu Akademik Fakultas yang selaras dengan Standar Akademik, Manual Mutu Akademik, dan Manual Prosedur di tingkat universitas.

5. Pembantu Dekan bidang akademik bersama Tim Penjaminan Mutu Fakultas (TPMF) bertugas untuk melaksanakan kegiatan penjaminan mutu akademik di tingkat fakultas. Dalam melaksanakan tugasnya TPMF dibantu oleh Gugus Penjaminan Mutu (GPM) pada tiap jurusan/program studi.

6. TPMF terdiri dari: Pembantu Dekan Bidang Akademik sebagai penanggung jawab dan ketua yang dipilih (oleh Senat Fakultas), dengan anggota perwakilan jurusan/bagian/ program studi. Tugas rutin TPMF adalah :

a. membahas dan menindaklanjuti laporan dari GPM;

b. melakukan evaluasi terhadap jurusan/bagian/program studi;

c. memperbaiki dan mengembangkan sistem pembelajaran;

d. mengirim hasil evaluasi jurusan/bagian/program studi ke BPM.

7. TPMF pada tiap fakultas dibentuk dengan SK Dekan, dan dalam pengembangan sistem penjaminan mutu akademik bertugas membantu Pembantu Dekan Bidang Akademik, yang mencakup antara lain:

a. penjabaran Standar Akademik Universitas ke dalam Standar Akademik Fakultas;

b. penjabaran Manual Mutu Akademik Universitas ke dalam Manual Mutu Fakultas;

c. sosialisasi sistem penjaminan mutu ke semua sivitas akademika di fakultas yang bersangkutan;

d. pelatihan dan konsultansi kepada sivitas akademika fakultas tentang pelaksanaan penjaminan mutu.

8. Setiap tahun Ssenat Fakultas menerima laporan evaluasi serta laporan audit internal mutu akademik dari Dekan. Senat Fakultas akan mempelajari kedua laporan tersebut dan menentukan kebijakan dan peraturan baru di tingkat fakultas untuk peningkatan mutu akademik.

9. Organisasi penjaminan mutu akademik pada Program Pascasarjana, Program Diploma, dan Lembaga disusun secara khusus.

C. Tingkat Jurusan/Bagian/Program Studi

1. Ketua Jurusan/Kepala Bagian/Ketua Program Studi bertanggung jawab atas tersusunnya :

a. Spesifikasi ProgramStudi (SP)


b. Manual Prosedur (MP)

c. Instruksi Kerja (IK) yang sesuai dengan Standar Akademik, Manual Mutu, dan Manual Prosedur Tingkat Fakultas.

2. Ketua Jurusan/Kepala Bagian/Ketua Program Studi bertanggung jawab atas terlaksananya :

a. proses pembelajaran yang bermutu sesuai dengan SP, MP, IK;

b. evaluasi pelaksanaan proses pembelajaran;

c. evaluasi hasil proses pembelajaran;

d. tindakan perbaikan proses pembelajaran ;

e. penyempurnaan SP, MP, dan IK secara berkelanjutan.

3. Gugus Penjaminan Mutu (GPM) dibentuk pada tingkat jurusan/bagian/program studi dan terdiri dari :

a. Ketua yang dipilih oleh jurusan/bagian/program studi

b. Anggota-anggota: sekretaris program studi dan staf pengajar.

4. Gugus Penjaminan Mutu (GPM) bertugas untuk :

a. menyusun laporan hasil evaluasi proses pembelajaran;

b. melakukan evaluasi proses pembelajaran semester.

Gugus Penjaminan Mutu (GPM) mengadakan rapat minimal sekali dalam satu semester (di akhir semester). Laporan hasil evaluasi dikirim oleh Ketua Jurusan/Kepala Bagian/Ketua Program Studi kepada Dekan untuk dibahas dalam TPMF.

Semarang, 30 Januari 2006 R e k t o r .

Prof.Ir. EKO BUDIHARDJO, M.Sc NIP. 130 354 860


Struktur Organisasi Penjaminan Mutu UNDIP 

Semarang, 30 Januari 2006 R e k t o r ,

Prof. Ir. EKO BUDIHARDJO, M.Sc NIP.130 354 860


1

Knowledge Utilisation Manual

Innovational research Incentives Scheme 2017


2

General introduction knowledge

utilisation

Since 2009, NWO has pursued a concrete policy that aims to stimulate the transfer of knowledge generated with the help of funding from NWO. This transfer can take place to other scientific disciplines as well as to users outside of science (industry/society). The knowledge utilisation policy is mainly targeted at increasing researchers’ awareness of knowledge utilisation. NWO therefore requests all researchers applying for funding to provide an explanation regarding the possible knowledge utilisation of their project by means of answering several questions (for example: how will knowledge utilisation be implemented and how does the researcher intend to facilitate knowledge utilisation?). This explanation is one of the assessment criteria.

During the assessment, attention is paid to:

- a realistic representation of the knowledge utilisation possibilities (or the lack of possibilities);

- the extent to which the action plan is made tangible with respect to knowledge utilisation.

NWO realises that the possibilities for knowledge utilisation differ per discipline and that some research projects have few if any opportunities for (direct) knowledge utilisation. In this case, an applicant should explain why no knowledge utilisation can be expected for his or her project. The selection committee members will still be asked to assess this explanation: if they are convinced that the research project indeed has no knowledge utilisation possibilities and that the applicant has satisfactorily explained this, then this should not negatively influence the overall assessment score.

Examples of knowledge utilisation can be found at

www.nwo.nl/en/policies/knowledge+utilisation.

The Dutch National Research Agenda can serve as a source of inspiration when you are thinking through the potential for knowledge utilisation. The routes within the Agenda can inspire Talent Scheme researchers and help them to pinpoint the potential importance of their research for other scientific disciplines as well as for society and to make this tangible.

A browseable online Dutch National Research Agenda book as well as the Portfolio for research and innovation with further information about the current routes in the Agenda (both in Dutch and English) are available at http://www.wetenschapsagenda.nl/publicaties. The digital version of the Agenda that contains all of the questions can be consulted, in Dutch, at vragen.wetenschapsagenda.nl

Examples from specific research fields

In addition to the general introduction, please find below some notes on knowledge utilization in specific researchfields. Most of the explanations contain a few examples

that might give you an impression of the possibilities for knowledge utilisation.


3

Content

General introduction knowledge utilisation

2

1

Humanities

4

2

Social Sciences

5

3

Health Research and Development

7

4

Earth and Life Sciences

10

5

Mathmetics, ICT and Astronomy

11

6

Chemical Sciences

13

7

Physics

14

8

Technical and Engineering Sciences

15


4

1 Humanities

Contributions to solutions for problems such as integration, the ageing population, healthcare and security can be made by humanities researchers, as their research clearly concerns people and reflection on human actions. In that sense it is hardly surprising that knowledge and skills from the humanities are in increasing demand within politics, education and the public domain. To strengthen this trend humanities researchers should not only comment upon social or cultural developments but also help to shape the debate right from the start. This is in the interests of society as equally the humanities and individual researchers. The NWO Division for the Humanities therefore wants to encourage and support the interaction between science and society.

Opportunities for potential knowledge utilisation from your research are best expressed if attention is paid to the following three subjects:

1. Relevance and objectives: what is the relevance of your research outside of academia and what is the objective that emerges from this?

2. Target group: who are interested in your research outside of academia?

3. Activity: which resources will be used to get the target group involved in your research?

A detailed manual on knowledge utilisation for the humanities can be found at www.nwo.nl\kennisbenutting-gw. This guide contains suggestions that you can use to determine what the relevance of your humanities research is outside of academia, which objective and target group emerge from this relevancy and which activity you can use to involve interested parties in your research. It is important that all of these aspects are closely correlated with each other: knowledge utilisation must be tailored to each specific situation.

The website www.nwo.nl\kennisbenutting-gw also details examples of knowledge utilisation from Innovational Research Incentives Scheme projects such as:

- Dr A. Geurds, Fixing history: Ancient cultural practices of stone sculpture in central Nicaragua (Leiden University) – Veni, awarded in 2010.

- Dr S. Roeser, Moral Emotions and Risk Politics (Delft University of Technology) – Vidi, awarded in 2009.


5

2 Social Sciences

Not all research within the social sciences is equally suitable for knowledge utilisation. You should therefore describe the knowledge utilisation that is appropriate for the type of research you are doing. Furthermore, the researcher is free to delegate various aspects of the knowledge utilisation process to other parties and/or individuals but the researcher is expected to take the initiative.

Three examples of projects from the Social Sciences awarded funding are now presented that received outstanding scores for knowledge utilisation. A brief summary of the knowledge utilisation section is given in everyday language. In the proposal, this section should of course be aimed at a public of committee members and subject specialists from one’s own discipline.

1. Veni: Tanzanian entrepreneurship assured - Dr W. (Wendy) Janssens VU Amsterdam

Microcredit for small entrepreneurs is becoming increasingly popular in developing countries. However, high medical costs are a frequent source of problems for many of these entrepreneurs who are often uninsured. This research will investigate whether the combination of health insurance and microcredit in Tanzania has boosted the effectiveness of both programmes.

Knowledge utilisation:

This project could increase the effectiveness of two relatively new instruments that are increasingly being used to alleviate economic and health problems in one of the poorest parts of the world.

The research forms part of a large study into the impact of private health insurance in sub-Saharan Africa which is being developed by a Dutch non-profit organisation. By means of regular exchange, the results from the Veni research project will be directly fed back to and incorporated in the design and implementation of this programme. In addition to this, the result will be disseminated within the wider microfinance community by means of presentations and policy reports.

This research will therefore directly impact policy and practice in three ways:

- Provide figures to compare the advantages and disadvantages of private insurance versus state-funded healthcare.

- Provide knowledge about the influence of health insurance on the effectiveness of microcredit.

- Provide experience with the potential effects of group processes in microcredit groups on the demand for health insurance. This knowledge can be used to improve the financial sustainability of health insurances.

2. Vici: Simplifying the group-forming process - Prof. J.K. (Jeroen) Vermunt - Tilburg University

Researchers often want to divide people into groups, such as groups of young offenders who commit other crimes, groups of consumers with different preferences or groups of patients suffering from depression who need different treatments. This project will simplify the existing statistical techniques used to form such groups.

Knowledge utilisation:

The research results are relevant for various areas of research such as marketing, health and criminology. The target group consists of market research agencies and non-profit institutions for applied research in the areas of health, transport, the environment etcetera.


6

Researchers from this project will facilitate the utilisation of their results by publishing a handbook and by developing a free online course. Furthermore, the new tools developed in the project will be included in a software package that is frequently used throughout the world. We will therefore collaborate with the company that produces the software; they will be responsible for the necessary programming.

3. Veni: Measuring the motivation to help society– Dr W.V. (Wouter) Vandenabeele - Utrecht University

Public sector employees derive a significant part of their work motivation from the contribution that they make to society. This study will investigate how this can be measured and compared in an objective manner between different sectors and different countries.

Knowledge utilisation:

This research is particularly relevant at the moment, as the current economic crisis and the domination of right-wing parties in politics are both giving rise to an increasingly negative attitude of the public towards the public sector. Moreover, it is important as a motivational factor in a period of spending cuts when it is hard for the public sector to compete with the private sector on the employment market in terms of salary. Also the role of motivation among HRM professionals in the sectors to be investigated in this study, namely healthcare, the police and social work, is relatively unknown. Target groups are HRM professionals, future managers, policy makers in this area and the general public in both the Netherlands and other countries where data for this project will be collected. These target groups will be reached through various channels. The researcher will give guest lectures at various institutes where future HR and other managers are trained. Furthermore, he will participate as much as possible in the public debate to increase the general public’s knowledge of this subject. An instrument to measure motivation will also be developed. The outcomes of this could be used as a starting point for job interviews, for example. A short training course on the use of this instrument will be given for professionals. Finally, the researchers will provide feedback to the organisations that participate in the study so that they can benefit from the insights it provides.


7

3 Health Research and Development

The results which emerge from the research funded by ZonMw cover the entire knowledge chain from fundamental research to implementation. ZonMw therefore wants researchers to consider possible pathways to knowledge utilisation in a manner appropriate to the nature of the proposed research. An example is involving partners and/or users in your research or collaborating with them. When there is a clear link to the proposed research, ZonMw expects you to describe the relationship with the most important partner(s) as a way of strengthening the contribution of the research to economy and/or society.

Appropriate activities and project-specific knowledge exchange varies between projects dependent on the target groups and context. Below we provide several examples of parties who could be important for the realisation of knowledge utilisation based on our experience with the knowledge utilisation within the research funded by ZonMw:

- In the case of medical scientific research patients are the end users of your research results. (Representatives of) patient organisations can make a contribution at various levels and stages of the research. For instance, they can help to attune the results to the need of the patient, they can play an important role in informing their supporters about the (expected) results of the research, and they can bring together patients and body material in patient registers or biobanks. It is important that you as a researcher describe in what way you are planning to enter into dialogue with patients and how you mean to cooperate. Please clearly state whether you have contacted patient organisations and mention contacts by name. It is important that you have contact with them at an early stage, although the outcome may be that more intensive cooperation is only to be expected at a later stage. The feasibility will partly be assessed on the basis of (your) past experiences. Inspiring examples on the additional value of cooperation with patient organisations in research projects and on how to involve end users in your project can be found in the booklet (in Dutch) ‘Fundamenteel onderzoek en patiëntenorganisaties: een verrassende combinatie!’.

- Medical specialists work according to guidelines and protocols; new knowledge can usually only be applied if it is included in a guideline or protocol. Dependent on the subject a researcher needs to come into contact with the right parties to realise this. One example in this context is the modification to the Dutch College of General Practitioners Practice Guideline following research into antibiotic use for acute coughing within general practice medicine.

Besides being an important partner for fellow physicians, specialists are often an important partner for translating results into an application but also for identifying problems from clinical practice. Therefore it is not enough to merely state that you plan to cooperate in the realisation of a guideline or protocol but you also need to indicate how you will approach the professional association concerned. Once again your past experiences are a useful illustration.

- Companies can market knowledge in the form of products, but that can only be done if the knowledge concerned is sufficiently protected. Results published or presented without patent protection are very difficult to protect in retrospect. However, publication is always possible as long as the patent protection is arranged in advance. Patenting a discovery opens up possibilities for using this knowledge in the pharmaceutical industry, for example, which could ultimately lead to a treatment for patients that might


8

not have been realised otherwise. Information about this can be found at: http://www.octrooibureau.nl/nl/productenendiensten/patents. Other forms of collaboration with companies are also possible such as the direct collaboration between radiologists and Philips Medical Systems. For example a new MRI method was developed at a UMC. However, this could only be used more widely after new software had been developed for the MRI and that was done in close collaboration with the company. You should therefore state as clearly as possible how you will deal with commercialisable results and indicate as tangibly as possible which potential companies/commercial sectors you view as potential ‘buyers’ and how long it will take before the research can actually be applied.

- Most research institutes have Technology Transfer Offices (TTO) or similar advisory departments. The TTOs are important partners to consult regarding patent protection or the elaboration of collaboration agreements with commercial parties. In some cases research results are further developed in a spin-off company. For advice in such cases, you should also preferably consult the TTO. You should inform the TTO of your plans or obtain advice from them at an early stage. Existing contacts you have with the TTO can be given as an example of a successful transfer in the project under consideration.

- Statutory bodies play an important role in medical research and the field of healthcare. Fundamental research is followed by the translation to clinical practice and the Central Committee on Research involving Human Subjects sets conditions for research on humans. If you are doing research with the ultimate objective of an application in humans then due consideration should be given to the requirements statutory bodies will make in later phases of the research. For example, in which medium are cells cultured and is this in accordance with use in humans? In such cases adhering to GLP and GMP conditions will enable an application to be realised sooner at a later stage. Therefore make sure that you are aware of the requirements that will apply in a later stage of the research and make this explicit in the application.

- Outside of your own network, other parties that you could consider involving in the knowledge utilisation of your project are health funds, the Health Care Insurance Board, health insurers, other knowledge institutions, other healthcare professionals and international partnerships. Make sure you state such partnerships! In all of these cases, the aim is to describe in concrete terms how the application is relevant to the research project in question and therefore what exactly you will do during the project to facilitate the application. In doing this, be aware that ZonMw will expect you to state the progress made when you write the interim and final reports.

In summary

The assessment of the knowledge utilisation section concerns researchers thinking about the possible impact of the research, when this impact could be realised, who the target group is and which parties or partners could be interested in the research results. Next, it is important that you clearly state the steps which you must take to realise the application of the research results and how you are going to contact or conclude agreements with users and/or target groups.

Applicants who are of the opinion that knowledge utilisation as described above and in the Innovational Research Incentives Scheme brochure 2014 is not applicable to their research will have to provide reasoned arguments for this. These will be


9

assessed in relation to the proposal. It should, however, be noted that virtually all clinical research and research involving human subjects should by definition be applicable within the foreseeable future.


10

4 Earth and Life Sciences

Highly relevant research can take place in all fields within the Earth and Life Sciences: examples are ecological research for nature management, earth sciences research on natural resources, microbiological research with medical implications but also fundamental research with a significant impact on other scientific disciplines. The applicant should clearly indicate the relevance and address the potential external use; vaguely stating unsupported possibilities is not enough in this case.

The description of the knowledge utilisation must address how the knowledge acquired will actually be disseminated outside the field of research. How this happens will of course differ per project, but scientific reporting for one’s own discipline is not what is required here. Aspects that can make a positive contribution include: a plan for the dissemination of a fundamental research result to educational institutions or the media, formal contacts with potential users, and a good plan for how intellectual property will be made available. Here the applicant should realistically state his/her own possible contribution in terms of time and the overall process.


11

5 Mathmetics, ICT and Astronomy

In the field of ICT knowledge utilisation is mainly expressed in the creation of possibilities for innovation and applications, whereas in astronomy it is more concerned with creating value for the benefit of society. Mathematics forms the basis for possible applications in a variety of fields.

In the Innovational Research Incentives Scheme knowledge utilisation focuses on the following aspects:

1. Potential

- Possible examples are technology development (e.g. software, product and process design) or scientific knowledge development that is usable in other disciplines.

- Another example is the development of scientific knowledge that is expected to have an impact on other disciplines, for example results that could lead to the development of an instrument that can be used for research within another discipline.

- Scientific research can also have an economic impact, for example the substitution of costly experiments with simulations. After research has been carries out, the innovative applications can be translated into user-friendly tools for everyday use with the aim of increasing efficiency.

- Societal impact is more than just an economic interpretation. Besides a contribution to solving societal problems (such as the ageing population, healthcare, the environment, etc.) it also means the dissemination and translation of research results to a wider public, for example.

2. Implementation

- The knowledge utilisation section will be stronger if consideration is given to the benefiting parties in the proposal. When doing this, you should state the current or future need of the benefiting parties (research groups, public sector, industry, etc.) in relation to the proposed research.

- You should clearly state how the end users/stakeholders will be reached and how they will be involved in the research. If relevant, you should detail how the applications to be developed will be shared with potential users in a realistic environment so as to realise the application of the research results in practice.

You should state applications that are specifically related to the research presented in the proposal. Examples from previous years have revealed that stating applications from general research within astronomy, mathematics or ICT does not strengthen the proposal. The review committee will critically examine the

possibilities for knowledge utilisation and, if relevant, the approach described in the proposal.

The following list is neither exhaustive nor discipline specific but provides some pointers as examples of knowledge utilisation:

1. The methods and techniques that arise from ICT research can be applied in many different ways. The areas of application range from medical to economic to cultural. The rapid development of technology contributes to increasingly advanced techniques that produce complex data such as MRI images of the brain or CT scans of the lungs. Research into fundamental aspects of the brain, for example, requires advanced hardware and software to image the brain functions. The application of innovative methods and techniques to support medical research requires the active


12

involvement of end users such as radiologists, clinical researchers and possibly patients. A clinical research environment for the purpose of testing and implementation can be an important success factor in this case.

2. In everyday practice we are faced with obvious situations such as public transport timetables, energy companies, financial operations, etcetera. The realisation of these situations usually requires the correct matching to optimise efficiency, for example. Scientific research into mathematical models that describe the real-life situation can make a vital contribution to this. The models are systematically analysed to predict behavioural changes or disruptions. Using specially developed software this information can be processed and used for industrial applications. In the longer term the research will yield economic value for the industry concerned. Moreover the research results offer a tangible solution to the needs that prevail in everyday life.

3. Knowledge and innovation are important aspects for an economically and socially prosperous nation. The key conditions for this are education, research and innovative entrepreneurship. The professionalisation of scientific fields by investing in education can contribute to this. Although astronomy draws considerable interest from the general public when it comes to the discovery of new planets or new life on existing planets, the scientific discipline astronomy continues to face problems in recruiting new young talent. The same is true for other natural sciences. A recent analysis has revealed that natural sciences do not have a positive image among high school students (12 to 18 years). This is partly due to the lack of a clear career perspective. The same study has also shown that representative role models can make a positive contribution to the study choices of high school students. Knowledge dissemination in the form of lectures and interviews with students is a good way of presenting research and its results in a highly accessible manner. These outreach activities make a considerable contribution to raising young people’s awareness of astronomy as a science, with the most important objectives being knowledge dissemination, expertise development and education.


13

6 Chemical Sciences

What is knowledge utilisation?

There are many examples of chemical research which sooner or later have had a considerable impact on society. Applicants should bear in mind that this section of the application will be assessed against the following two criteria (see Innovational Research Incentives Scheme brochure as well).

1) Potential

Research in physics and chemistry has an economic relevance if it creates products that contribute to wealth creation, technological relevance if it contributes to developing or improving tools and instruments in another field of research or in other sectors of society, societal relevance if it contributes to solving problems that society considers to be important and cultural relevance if it culturally enriches members of society by giving them a better understanding of humans in their physical constellation.

You are encouraged to explore various possibilities for knowledge utilisation that are appropriate to the nature of the proposed research, for example through the involvement of potential partners or collaboration with them. Academic impact within one’s own field of research is not an aspect of knowledge utilisation but falls under scientific relevance/impact of the proposal. Relevance is a very broad concept and it is expected that all applicants will be able to describe this for their research. However, if you are of the opinion that you cannot do this, then you should provide a reasoned explanation for this.

2) Implementation

Aspects 1) and 2) should form a clearly coherent case. Examples include patent applications, spin-off companies, partnerships with public bodies and industry, collaboration with potential partners, participation in networks, workshops to provide training or information, dissemination lectures for the general public, etcetera.


14

7 Physics

Purpose of the Knowledge Utilisation section

"It is generally accepted that our society will face unprecedented challenges over the next century. The most important of these with respect to climate, energy, sustainability, health and safety directly affect the future of our existence. It is clear that these problems cannot be solved without radical new concepts and

technologies, and physics and physicists will play a crucial role in the development of these." (Strategic Plan FOM/N 2010-2015).

Two aspects of Research Impact

1) Potential

Physics research can have:

- societal relevance if it contributes to the solution of problems that society considers to be important;

- technological relevance if it contributes to developing or improving tools and instruments in another field of research or in other sectors of society;

- economic relevance if it creates products that contribute to wealth creation.

Relevance, here, is very broadly defined, and everyone is expected to address this topic for his/her research. Neither applicants nor peer reviewers are expected to be able to fully predict the non-academic impact that the described research will have at the application stage.

The extent to which the applicants realistically assess whether or not the proposed research is relevant for the development (in the longer term) of future applications in science, technology, industry or society, will be reviewed together with the proposal.

2) Implementation

Examples include patent applications, spin-off companies, partnerships with public bodies and industry, collaboration with potential partners, participation in networks, workshops to provide training or information, dissemination lectures for the general public, etcetera. Applicants who feel that describing activities aimed at enhancing impact is not applicable to their research, must state their reasons for this.


15

8 Technical and Engineering

Sciences

Valuable knowledge is generated from the groundbreaking technical sciences research funded by TTW. Besides funding excellent science, TTW wants to facilitate the application of knowledge. This also applies to projects within the Innovational Research Incentives Scheme. At TTW, knowledge utilisation means the sum of activities that have the aim of maximising the use of research results by third parties. Users of research are defined as the parties outside of the applicant’s field of research who can apply the results in the medium to long term.

Facilitating knowledge utilisation

TTW expects applicants to actively cooperate in facilitating knowledge utilisation and to contribute to TTW’s objective of transferring knowledge to users. To facilitate the utilisation, a users’ committee is appointed for each project which will be involved from the start to the end of the project. At a committee meeting the researchers report on the research, and the users provide input for the research and insight into the questions they face as they seek to apply the knowledge as well as the problems they would like to see solved.

Tips

When writing your TTW proposal please bear the following points in mind:

1. Which societal or industrial problem with a strong scientific-technical component can be tackled? (Which clear deliverables do you foresee?)

2. How will you as the applicant contribute towards solving this?

3. State what is innovative and challenging in the scientific-technical research. (Is the possibility created to realise new technologies or is it more a matter of applying existing technology in a new domain?

4. Which users could potentially apply the knowledge and have already expressed an interest?

Examples

TTW projects in which the knowledge generated will lead to important applications.

Molecular materials and nanosystems (Veni 2010), Dr Jan Anton Kosher, Eindhoven University of Technology

Plastic solar cells are a highly promising new type of solar cell. A clear picture of how they work is needed in order to develop them further. This research will investigate how the complex and chaotic internal structure of these solar cells influences their efficiency.

Controlling dry and wet (Vidi 2010), Dr Jacco Snoeijer, University of Twente – Physics of Fluids

Drops do not usually move in straight lines but in random streams. This study will investigate how such streams can be controlled in modern techniques for printing and the chip industry that require a perfect control between ‘wet’ and ‘dry’.

Wireless control (Vici 2010), Prof. W.P.M.H. (Maurice) Heemels, Eindhoven University of Technology - Mechanical Engineering

Nowadays wireless communication has many applications in our homes, at work and when we are on the move. Yet wireless communication also offers unparalleled possibilities for the computer-based control of high-tech machines, industrial processes and robots. How such wireless control systems could become a reality will be investigated.


NVivo User Guide for Windows and Macs

Version



System Requirements




* Capture and work with web pages and online PDF's

* Import Facebook posts, LinkedIn discussions and tweets from Twitter

* Automatically code social media data quickly and easily visualize results

* Work with content like memos, photos and web clips from Evernote

* Also, NVivo 10 handles 150% more data and performs 50 % faster than NVivo 9

* Powerful search tools

* Text results or matrix output by nodes or documents

* Qualitative matrices or network relationships

Import for analyzing *.txt, *.doc and *.rtf files, *.pdf files, pictures and video, and excel tables

* Create nodes to manage ideas, concepts, people, categories or just things about the text

* External data pieces may be text, pictures, audio or video clips

* Very easy ways to code the text

* Documents can be put in any number of intergrated sets

* Create, edit and investigate any number of attributes of documents or nodes

* Linking to web pages, documents, nodes, memos or text pages




What level of support is offered for this software?


Consultation: NVivo is a fully supported product. For more information, contact the IT Research Team at appinst@ucalgary.ca 


Page | 1 Last updated: Feb 10, 2015




Universal StationX

User Guide

UX09-400




Universal StationX


Universal StationX

User Guide

UX09-400

6/93


Copyright, Notices, and Trademarks

Printed in U.S.A. – © Copyright 1993 by Honeywell Inc.

Revision 01 – June 15, 1993

While this information is presented in good faith and believed to be accurate, Honeywell disclaims the implied warranties of merchantability and fitness for a particular purpose and makes no express warranties except as may be stated in its written agreement with and for its customer.

In no event is Honeywell liable to anyone for any indirect, special or consequential

damages. The information and specifications in this document are subject to change without notice.

This document was prepared using Information Mapping® methodologies and formatting principles.

TDC 3000 is a trademark of Honeywell Inc.

Information Mapping is a trademark of Information Mapping Inc.

OSF, OSF/Motif, and Motif are trademarks of the Open Software Foundation, Inc.

TotalPlant is a trademark of Honeywell Inc.

Universal StationX is trademark of Honeywell Inc.

UNIX is a trademark of AT&T Technologies Inc.

Windows is a trademark of Microsoft Corporation.

Honeywell

Industrial Automation and Control

Automation College

2820 West Kelton Lane

Phoenix, AZ 85023

(602) 789-5669

ii UXS User Guide 6/93


About This Publication

This publication is provided to aid operation of Universal StationX hardware/software.

Use this publication to operate the Universal StationX. If you are unfamiliar with the specific LAN configuration to which the station is attached, your Local Area Network Administrator will be needed to assist in initial operation.


6/93 UXS User Guide iii


iv UXS User Guide 6/93


Table of Contents


SECTION 1 – UXS USER DOCUMENTATION 1

1.1 Overview 1

SECTION 2 – UXS CONCEPTS 3

2.1 What is UxS 3

2.2 UXS Hardware 5

SECTION 3 – WINDOW OPERATIONS 7

3.1 Window Manager 7

3.2 Cursor Usage 8

3.3 Altering Window Size 9

3.4 Minimizing/Maximizing Windows 10

3.5 Using the Window Menu 11

3.6 Repositioning Windows 12

3.7 Workspace Menu Access 13

3.8 Operator Workspace Menu 14

3.9 Supervisor Workspace Menu 15

3.10 Engineer Workspace Menu 16

3.11 View-Only Workspace Menu 18

3.12 Using the Touchscreen 19

SECTION 4 – UXS OPERATIONS 21

4.1 Power-On (Procedure) 21

4.2 Accessing UXS Co-Processor Functions 22

4.3 Loading a Personality to the LCN Processor 23

4.4 Printing from the UXS 25

4.5 Failsafe Operation 26

4.6 X Window Operation 27

4.7 System Security 28

4.8 Backup the Co-Processor Hard Drive 30

4.9 Shut Down the UXS 32

4.10 UXS Restrictions 33

4.11 Problem Reporting 34

5.1 User Configuration Overview 35

5.2 X Host Authorization 36

5.3 Configure Native Window Behavior 39

5.4 Configure Keyboard Focus Policy 40

5.5 Change User Password 41


6/93 UXS User Guide v


Acronyms


AIA Application Integration Architecture

CIM Computer Integrated Manufacturing

IWSM Industrial Work Space Manager

LCN Local Control Network

LAN Local Area Network

OSF Open Systems Foundation

OSI Open Systems Interconnection

TDC Total Distributed Control

TPDG Turbo Peripheral Display Generator

UCN Universal Control Network

UNPX Universal Personality X

UXS Universal Station with Extensions

WSI Workstation Interface


vi UXS User Guide 6/93


References



Publication

Title

Publication

Number

Binder

Title

Binder

Number

UxS User Guide

UX09-400

UxS

2093

UxS System Administration Manual

UX11-400

UxS

2093

A Beginners Guide to the X Window

98594-90002



System




Using the X11 Window System

98794-90001



HP-UX System Security

92453-90029



A Beginners Guide to HP-UX

98594-90006



HP-UX Concepts and Tutorials: Text

97089-90022



Editors and Processors




A Beginner’s Guide to Text Editing

98594-90010



Quick Reference Card for vi Editor

98597-90000



HP-UX Concepts and Tutorials: Shells and Miscellaneous Tools

97089-90062



A Beginner’s Guide to Using Shells

98594-90008



Laserjet III Printer User’s Manual




LaserJet 4 and 4M Printers User Manual

C2001-90912





6/93 UXS User Guide vii


viii UXS User Guide 6/93


Section 1 – UxS User Documentation

1.1 Overview


Available

documentation

The user documentation for the Universal StationX product, is comprised of the following manuals published by Honeywell and Hewlett Packard:

* UXS User Guide, UX09-400

* UXS System Administration Manual, UX11-400

* HP-UX System Security, 9253-90029

* Using the X11 Window System, 98794-90001




Procedures This publication covers specific procedures to perform many tasks which include:

* Configuration of LCN window display behavior

* Adding/Deleting X host display access authorization

* Configuration of X Windows keyboard focus policy

* Performing routine backup

* Changing user passwords

6/93 UXS User Guide 1


2 UXS User Guide 6/93


Section 2 – UXS Concepts

2.1 What is UxS

Long term plan In today’s competitive environment, maintaining control of costs and quality is paramount. Many process industry companies are formulating long-range plans to meet these objectives. The broad direction is to achieve low cost operations through the integration of process control and information system technologies. Honeywell’s TDC (Total Distributed Control) system will be the foundation of the future CIM (Computer Integrated Manufacturing) system. This Honeywell system is called TotalPlant.

To meet these challenges, it is important to provide an evolutionary path of products, that preserve customer investments in hardware and training. The UXS platform is the first step in implementing this long term strategy.

Definition of UXS An embedded open system environment provides support for display/import of data generated on non-LCN platforms. This TDC 3000X/X Windows integrated platform enables software connections between the LAN (Local Area Network) and the LCN (Local Control Network). UXS is the linking of open systems, X Windows, and Motif to produce a visually integrated display of TotalPlant information.

The initial introduction/release of the UXS product provides visual integration of plant information. Visual Integration provides the following features/benefits:

Features

Benefits

Dual Operating System Support

Power of TDC - flexibility of open systems

Window Management

Management of multiple displays

Single LCN window - Motif Environment

Ability to resize or move LCN window

Client/Server X Windows

Communication with non-TDC computer systems

Multiple LAN windows

Simultaneous access to multiple non-TDC computer systems

Fail Safe Fall Back

Ensures the “view to the valve”

System Security

Limits access to authorized users

TDC system isolated from open system


Continued on next page

6/93 UXS User Guide 3


2.1 What is UXS, Continued

UXS example The support for the open system, allows connection to a wide variety of hardware platforms.

Currently, information on the LAN can be displayed or updated at the UXS. This allows operators to view lab analysis data on the same screen as the process data. By integrating this data, the operator has less distractions and requires less training (only one computer system). A typical control room operator may have two or three computers to monitor (each holding some essential data). The potential for process upset increases when the operator’s attention is diverted from the TDC display.

4 UXS User Guide 6/93


2.2 UXS Hardware

US - UXS migration The UXS is available in two basic forms: upgrade kits (for a standard Universal Station), or as a complete station (with furniture). The upgrades are available in several versions to match your specific hardware configuration.

Initial hardware The initial pre-release UXS deliveries are in a standard/current TDC 3000 Universal Station furniture.

Components The UXS consists of a tightly integrated TDC 3000X Universal Station and an open system processor environment in a co-processor architecture. The UXS contains the following components:

* Standard US furniture cabinet

* Standard 5 slot module

* New electronics package

* New monitor

* Hard drive and DAT (Digital Audio Tape) drive


New electronics

package

The electronics package consists of:

* Standard K2LCN-8 board

* Workstation Interface board (WSI board)

* Turbo Peripheral Display Generator (TPDG board)

* I/O boards for each of the boards above

* 8 ampere power supply




New monitor A 1280 x 1024 monitor provides high resolution display.


New co-processor

media

A hard drive and a DAT (Digital Audio Tape) drive have been added to contain these UXS files:

* Open system filesystem

* X Window files

* TPDG download code

* UXS (UNPX) personality download code

This media is connected to the Open system co-processor and is not accessible by the LCN filesystem.




Specific details For more specific hardware information, refer to UXS Service Manual.

6/93 UXS User Guide 5


6 UXS User Guide 6/93


Section 3 – Window Operations

3.1 Window Manager

X Window system The X Window system provides standards by which computers of dissimilar types can exchange window displays. This allows computer systems to execute an application and send the display of that application to other computer systems which support the X Window graphical standard. This standard integrated the concept of a window manager. The window manager allows manipulation of the X Window displays.

Consistent look The UXS utilizes Motif Window Manager to provide a consistent look to all applications displayed on the UXS. This software provides functions for opening, closing, moving, resizing, and indicating the active window. If you have used Microsoft Windows you will immediately recognize the similarities.

The Window Manager attributes are preset, and cannot be changed. Later versions will allow custom configuration of window attributes.

Functions provided The Motif Window Manager applies the window interface attributes independent of the application running within a window. The window interface effects only the manner in which that window is displayed. It will provide such elements as: title bars, scroll bars, resizing, control of overlapping windows, and the ability to iconify a window. These elements allow manipulation of multiple windows, independent of their application or the underlying computer platform/operating system executing the application. This allows one window interface to display all windows appearing on the UXS screen.

6/93 UXS User Guide 7


3.2 Cursor Usage

Cursor types The Window Manager uses various cursor types to depict the type of operation being performed. The types are:

* pointing or or

* working

* moving

* resizing or or or or or or or

8 UXS User Guide 6/93


3.3 Altering Window Size

Changing window size Where you grab the window’s frame determines how the window will be resized. The dimensions (width x height) of the window being resized is displayed in the center of the screen. The measurement is in characters (across) and lines (down) for terminal windows; other types are measured in pixels (dots on the screen).

NOTE: When resizing the LCN Native Window, it is necessary to click the bottom right corner of the window border to cause the LCN display to resize. The LCN processing continues without problem, but the display may be only partially visible.

Use the following to change the window size:

If you want to stretch or shrink the

window . . .

Point to . . .

vertically from the . . .

top

top of the frame, above the title bar

bottom

bottom of the frame

horizontally from the . . .

right

right side of the frame

left

left side of the frame

diagonally from the . . .

bottom left corner

frame’s lower left corner

top left

frame’s upper left corner

top right

frame’s upper right corner

bottom right

frame’s lower right corner


6/93 UXS User Guide 9


3.4 Minimizing/Maximizing Windows

Minimize a window To reduce workspace clutter, you may change a window to an icon. An icon is a graphical representation of the application executing in that window. This reduction to an icon is called “minimizing” a window. Applications executing in a minimized window continue to execute until the task is completed, or until they require user input.

There are several methods to minimize a window:

* Use the Minimize button on the windows title bar

* Use the Minimize selection from the Window Menu

A window which has been minimized (iconified) may be returned to the window form using several methods.

* Double-Click (click twice in rapid succession) the icon.

* Use the Maximize selection from the Window Menu

MINIMIZE Telnet BUTTON

12584

Maximize a window Clicking on the Maximize button will enlarge the window to cover the entire

monitor. Clicking on the button a second time will return the window size to the original dimensions.

NOTE: When resizing the LCN Native Window, it is necessary to click on the bottom right corner of the window border to cause the LCN display to resize. The LCN processing continues without

problem, but the display may be only partially visible.

MAXIMIZE

BUTTON

12585

10 UXS User Guide 6/93


3.5 Using the Window Menu

Window menu Each window has a window menu containing functions for controlling the window. To access the window menu, point to the menu target and then press and hold the select button. The menu is displayed as long as the select button is held down. To select a menu item, drag the cursor down the list and release the select button when the appropriate item is highlighted.

 MENU

BUTTON

12586

To perform the following, select the appropriate menu item:

To do this . . .

Select . . .

Restore a window from an icon or after maximizing.

Restore

Change the location of a window.

Move

Change the size of a window.

Size

Shrink the window to its icon representation.

Minimize

Enlarge the window to cover the entire root window.

Maximize

Send a window to the back or bottom of the window stack, the position closest to the root window.

Lower

Immediately close the window and make it disappear.

Close


6/93 UXS User Guide 11


3.6 Repositioning Windows

Moving windows Windows can be positioned anywhere on the screen, with one exception. The Native LCN window is configured (for all users except engineer group members) to inhibit its ability to be partially obscured or overlapped by other windows. This attribute can be configured and is covered in subsection 5.3, Configure Native Window Behavior.

To move a window, click and drag on the window’s title bar. While moving, an outline of the window is shown for positioning purposes. The window will move to this new location if the select button is released at the current position.

TITLE BAR

12587

12 UXS User Guide 6/93


3.7 Workspace Menu Access

Workspace menu To reduce the user interaction with the open system environment, a workspace menu (sometimes called the root menu) is included. This menu is accessed by holding down the select button within the workspace (outside all windows). You can select a menu item by dragging the pointer down the menu list and releasing the select button when that item is highlighted.

Operator Menu

Engineer Menu


X Menu >

X Menu >

Application >

System Menu >


Application Menu >





12588


Hierarchical menus The menu uses hierarchical (nested) menu items indicated by an arrow to the right of the item which has another level of menu. To access these nested menus, hold the select button and scroll to the appropriate menu; the nested menu item will appear. Moving the cursor onto this new menu will allow selections to be made from this newly visible list of items.

Operator Menu

X Menu >



Application Menu >

Applications



Calculator

Datebook

Telnet

DECnet

Change Password

12589

Access levels The menu is preconfigured according to the access level, which is assigned

by the system administrator. When a user is added to the co-processor, their user login name is associated to a group of users. This association provides security restrictions by displaying menus specific to that group’s access authorization.

The access levels are:

* Operator

* Supervisor

* Engineer

* View Only

6/93 UXS User Guide 13


3.8 Operator Workspace Menu

Operator Menu items The Operator Menu contains the following:

* X Menu - a nested menu

* Application - a nested menu

Operator Menu

X Menu >

Application Menu >

X Menu items The operator’s X Menu contains the following:

* Shuffle - Shuffles the position (Up/Down) of the active window.

* Native Window - Changes the Native LCN Window attribute to (Allow/Disallow) the window to be Partially Obscured by other windows.

* Keyboard Focus Policy - Configures the X Windows attribute (Explicit/Pointer) to identify the active window. Either a mouse click (Explicit) or cursor within the window (Pointer) is required to identify the active window.

* X Host Authorization - Authorizes remote computing resources to display X applications on this station. Configured for each individual user.

* Window Print - Prints the contents of the selected window.

* Refresh - Performs a redraw of the X application windows.

* Restart - Restarts the Motif Window Manager; used to force a reset of Motif Window Manager.

* Logout - Sends a kill message to all X hosts to close open applications, logs the user out, and idles the co-processor.

Application Menu The operator’s Application Menu contains the following:

* Calculator - a full function calculator application

* Datebook - a calendar/datebook application

* Telnet - accesses the TELNET TCP/IP protocol

* Decnet - accesses the DECnet protocol

* Change Password - allows the user to change their login password

14 UXS User Guide 6/93


3.9 Supervisor Workspace Menu

Supervisor Menu items The Supervisor Menu contains the following:

* X Menu - a nested menu

* Application - a nested menu

Supervisor Menu

X Menu >

Application Menu >

X Menu items The supervisor’s X Menu contains the following:

* Shuffle - Shuffles the position (Up/Down) of the active window.

* Native Window - Changes the Native LCN Window attribute to (Allow/Disallow) the window to be Partially Obscured by other windows.

* Keyboard Focus Policy - Configures the X Windows attribute (Explicit/Pointer) to identify the active window. Either a mouse click (Explicit) or cursor within the window (Pointer) is required to identify the active window.

* X Host Authorization - Authorizes remote computing resources to display X applications on this station. Configured for each individual user.

* Window Print - Prints the contents of the selected window.

* Refresh - Performs a redraw of the X application windows.

* Restart - Restarts the Motif Window Manager; used to force a reset of Motif Window Manager.

* Logout - Sends a kill message to all X hosts to close open applications, logs the user out, and idles the co-processor.

Application Menu items The supervisor’s Application Menu contains the following:

* Calculator - a full function calculator application

* Datebook - a calendar/datebook application

* Telnet - accesses the TELNET TCP/IP protocol

* Decnet - accesses the DECnet protocol

* Change Password - allows the user to change their login password

6/93 UXS User Guide 15


3.10 Engineer Workspace Menu

Engineer Menu items The Engineer Menu contains the following:

* X Menu - a nested menu

* Application - a nested menu

* System Menu - a nested menu

Engineer Menu

X Menu >

Application >

System Menu > 12592

X Menu items The engineer’s X Menu contains the following:

* Shuffle - Shuffles the position (Up/Down) of the active window.

* Native Window - Changes the Native LCN Window attribute to (Allow/Disallow) the window to be Partially Obscured by other windows.

* Keyboard Focus Policy - Configures the X Windows attribute (Explicit/Pointer) to identify the active window. Either a mouse click (Explicit) or cursor within the window (Pointer) is required to identify the active window.

* X Host Authorization - Authorizes remote computing resources to display X applications on this station. Configured for each individual user.

* Window Print - Prints the contents of the selected window.

* Refresh - Performs a redraw of the X application windows.

* Restart - Restarts the Motif Window Manager; used to force a reset of Motif Window Manager.

* Logout - Sends a kill message to all X hosts to close open applications, logs the user out, and idles the co-processor.

Application Menu items The engineer’s Application Menu contains the following:

* UNIX Load - a bar chart display of UNIX processor loading

* Calculator - a full function calculator application

* Datebook - a calendar/datebook application

Continued on next page

16 UXS User Guide 6/93


3.10 Engineer Workspace Menu, Continued

Application Menu items,

continued

* Telnet - accesses the TELNET TCP/IP protocol

* Decnet - accesses the DECnet protocol

* Change Password - allows the user to change their login password

System Menu items The engineer’s System Commands menu contains the following:

* Configuration - a nested menu of configuration items

* Update Software - used to update co-processor software

* Add/Remove Users - a co-processor user registration application

* Backup/Restore - used to backup/restore the co-processor software

Configuration Menu items

The engineer’s Configuration Menu contains the following:

* IWSM Configuration - shutdown WSI and Native Mode access

* System Configuration - used to configure the co-processor LAN environment

* Set Time/Timezone - sets the co-processor time, date, and timezone

* Gated Daemon - Turns ON/OFF dynamic LAN routing


6/93 UXS User Guide 17


3.11 View-Only Workspace Menu

X Menu items The View-Only X Menu contains the following:

* Shuffle - Shuffles the position (Up/Down) of the active window.

* Native Window - Changes the Native LCN Window attribute to (Allow/Disallow) the window to be Partially Obscured by other windows.

* Keyboard Focus Policy - Configures the X Windows attribute (Explicit/Pointer) to identify the active window. Either a mouse click (Explicit) or cursor within the window (Pointer) is required to identify the active window.

* X Host Authorization - Authorizes remote computing resources to display X applications on this station. Configured for each individual user.

* Window Print - Prints the contents of the selected window.

* Refresh - Performs a redraw of the X application windows.

* Restart - Restarts the Motif Window Manager; used to force a reset of Motif Window Manager.

* Logout - Sends a kill message to all X hosts to close open applications, logs the user out, and idles the co-processor.

18 UXS User Guide 6/93


3.12 Using the Touchscreen

Display resolution The high resolution display required a change to touchscreen operation. Software is provided to zoom the screen display at 2 times original size. This zoom touchscreen aids in the selection of small targets.

Zoom touchscreen The touchscreen on the UXS is supplemented by software to aid in selecting

small targets in high resolution display. On the initial touch a boundary is created approximately 3 inchs around the target area. This will show a zoomed-in view of the screen around your finger. As you move your finger, the image moves one half the distance.

Zoom feature availability The zoom feature is only available when a user is logged into the coprocessor environment. The software action is performed as part of the X Window environment and does not effect operation of the application within the window.

Using zoom touch The proper method of using the zoom touchscreen is to place your finger on

(or as close to) the desired target as possible. This is to reduce the amount of finger movement necessary allowing selection of targets close to the screen border. It is important to watch the zoomed view, as the 2:1 ratio of finger to image movement is confusing at first.


Selecting with the touchscreen

The touchscreen may be used to select targets in the LCN window by simply touching the appropriate target.

All other X Window menu or target selections are made using the space bar in conjunction with the touchscreen. To select a workspace menu item; touch the background (outside any windows) and press the space bar while moving your finger to select a menu item.




Sticky menus When using the touchscreen and space bar to select workspace menu items,

you will notice they function as sticky menus (staying visible without holding down the mouse button) and allow use of the arrow keys to navigate, return key to select, and ESCape key to cancel.

6/93 UXS User Guide 19


20 UXS User Guide 6/93


Section 4 – UXS Operations

4.1 Power-On (Procedure)

Apply power Apply power using the following steps:

Step

Action

1

Open front access door to gain access to the circuit breaker.

2

Place the circuit breaker in the ON position.

3

Open the rear access door to gain access to the 5-slot module.

4

Apply power to the station, using the power switch on the 5-slot module face plate.

5

Observe the K2LCN board LEDs during the power on self-test. If no errors are detected, the appropriate LCN node address is displayed.

6

If the appropriate LCN node address is displayed:


Proceed with Step 7.

If another number is displayed:


Record the error number for maintenance personnel to assist in correcting the fault. Proceed with Step 9.

7

The Login banner should appear within 5 minutes.

8

If the Login banner does appear:


Proceed to subsection 4.2, Accessing Co-Processor Functions. If the Login banner has not appeared:


Proceed with Step 14.

9

The Login banner should appear within 5 minutes.

10

If the banner does appear:


Proceed to Step 11 to shut down the co-processor.

If the Login banner has not appeared:


Proceed with Step 14.

11

Position the cursor in the Login box and type

username <RETURN>

Note: The user must be authorized to shut down the WSI.

12

Position the cursor in the Password box and type

password <RETURN>

Note: Replace password with your password.

13

Click the Shutdown WSI target.

14

Using the power switch located on the 5-slot module faceplate, remove power from the 5-slot module. Set the station circuit breaker to the OFF position. Contact maintenance to correct the error.


6/93 UXS User Guide 21


4.2 Accessing UXS Co-Processor Functions


After power ON (3 to 5 minutes) the UXS will display a banner on the lower portion of the screen.

This banner allows access to:

* X Windows environment (co-processor access)

* Shut down of the co-processor

* Universal Station Native Mode operation.

These items are user and password restricted to maintain security and restrict access to the co-processor or LAN environment.

Using the touchscreen:

Step

Action

1

Touch the Login field.

2

Type your username <RETURN>

3

Type your password

4

To Login:


Press <RETURN>

To Shut down the Co-processor:


Touch the Shutdown WSI target and select it with the space bar. To revert to Standard Universal Station Operation:


Touch the Native Mode target and select it with the space bar.



Using the mouse or trackball:

Step

Action

1

Select the Login field by placing the cursor over the field.

2

Type your username <RETURN>

3

Type your password

4

To Login:


Press <RETURN>

To Shut down the Co-processor:


Select the Shutdown WSI target.

To revert to Standard Universal Station Operation:


Select the Native Mode target.


22 UXS User Guide 6/93


4.3 Loading a Personality to the LCN Processor

Capabilities The Universal Personality has been encapsulated in a “Windows environment” to form the UNPX Personality stored on the co-processor hard drive. This integration enables the UXS to function as either a UXS or a standard TDC 3000 Universal Station.

The X Window capabilities are available only when functioning as a UXS. As a UXS, the presentation of all displays will be controlled by the X Windows/Motif Window Manager to provide the addition of such items as: title bar, zoom box, and scroll bars.

Hardware tests A fully operational UXS system can use the UNPX personality. When power is applied, the system performs a series of internal self-tests. These tests check the presence and condition of both the TDC and co-processor hardware. The results determine the loading action available, when <Load> is pressed.

If test result is ...

then loading action available is ...

TDC and co-processor hardware OK

UNPX personality from hard drive or UNP, ENG, or OPR from History Module

TDC hardware OK/co-processor test failure

UNP, ENG, or OPR from History Module or Removable Media

TDC and co-processor hardware failure

No loading performed


Loading the personality The UXS may be loaded from several sources:

* History Module

* Removable Media (cartridge or floppy)

* Internal co-processor hard drive

The UXS may be loaded from other consoles (UXS or US) on the LCN. However, the hardware tests will control the appropriate prompt. For example, failure of the co-processor will inhibit the load prompt from displaying the appropriate choice (W).

The actual loading is achieved through the standard TDC loading procedures. However, when loading from the co-processor (W), only the Universal Personality is available. NOTE: For UXS functionality the LCN processor must be loaded from the co-processor. The following personality types are available from the History Module or Removable Media:

* OPR

* ENG

* UNP

Continued on next page

6/93 UXS User Guide 23


4.3 Loading a Personality to the LCN Processor, Continued


Using the following, load the LCN processor:

Step

Action

1

If the access banner is on the screen:


Press <Load> on the operator keyboard.

If you are already logged in:


Select the Native LCN Window, press <Load> on the operator keyboard.

2

At the prompt W, N, 1, 2, 3, 4, X type W <ENTER>

3

The load modules will be displayed as the LCN processor is loaded.

4

At the prompt NCF? type N <ENTER>

5

The station will complete the load process in 1 to 2 minutes.



24 UXS User Guide 6/93


4.4 Printing from the UXS

Two printers The UXS has two printer connections.

The standard LCN printer connection provided to print LCN displays and reports is configured as a standard Universal Station printer. This printer is functional whenever the station is in operation. The LCN printer can be connected directly to a UXS or assigned from another station in the console (US or UXS). Standard Universal Station operating procedures apply to the printing of reports, alarm summaries, configuration data, print displays, etc.

The co-processor has a printer connection provided to print window dumps of X Window applications. This printer is available only when the user is logged into the co-processor, however printing will still continue after logging out. This printer will not print the various Universal Station Printer functions of alarm summaries, reports, etc. The co-processor printer can be directly attached to this UXS or shared across the LAN from another UXS.


The LCN processor must be active to print. The user can be logged into the co-processor but it is not required to print LCN data.

To print the LCN window on the LCN printer, use the following:

Step

Action

1

If logged into the co-processor:


Select the LCN window.

2

Press the Print Display key.



Printing X Windows When the user is logged into the co-processor, the co-processor printer can be used to print any window contents. To print to a shared printer, the coprocessor of the UXS sharing the printer must be active (login banner displayed or a user logged in).

To print any X Window on the co-processor printer, use the following:

Step

Action

1

Select Window Print from the workspace menu.

Note: The cursor will change to a cross-hair pointer.

2

Position the cursor in the appropriate window to print.

3

Click the select button.

4

The printing of the display can take 5 to 10 minutes.


6/93 UXS User Guide 25


4.5 Failsafe Operation

Failsafe fall back The UXS is designed to be failsafe. Should an error occur in the coprocessor, the UXS reverts to a standard TDC Universal Station hardware/software configuration. If this should occur, the LCN display will revert to full screen and the message Co-processor has failed to start, Call maintenance will be displayed in place of the Login banner.

When functioning as a standard Universal Station, you will be unable to access LAN (Local Area Network) resident applications.

Native mode The UXS may be configured as a standard Universal Station by selecting Native Mode from the Login banner. To enter Native Mode the user must be authorized using the procedures covered in IWSM Configuration, UXS System Administration Manual..

Manual shutdown The co-processor can be shut down after power-on using the

Shutdown WSI target located on the login prompt. This action can also be performed by logging out of the open system session and waiting for the login prompt to appear.

To invoke the failsafe condition:

* At the login prompt, enter your login name/password and select the Shutdown WSI target.

Shutdown restriction To shut down the WSI, the user must be authorized using the procedures covered in IWSM Configuration, UXS System Administration Manual.


Restarting after shutdown

After the co-processor has been shutdown, a status message will appear in the Login banner area. The message is:

The co-processor is idle, select the box to reset.

There is a red box to the right of the status message. Using the mouse, click on the box to reset the co-processor.


26 UXS User Guide 6/93


4.6 X Window Operation

Background The UXS is configured to launch the X Windows environment upon login. Once the system has initialized, the primary LCN display window appears. At this time you can start an X Windows session with LAN resident computing resources.

Pre-requisites The LAN computing resources must be configured to allow access from the

UXS. In general terms, the following information is required by the LAN hardware and/or application software:

* UXS internet address

* System name

* User name/password for its login

LAN access protocols To access LAN resident applications you will use one of these communication protocols:

Protocol

Accessed by . . .

Access Level Required

DECNET

DECNET from root menu

Operator, Supervisor, Engineer

TELNET TCP/IP

TELNET from root menu

Operator, Supervisor, Engineer


Procedure LAN resident applications may not be Honeywell supplied; therefore, these

access procedures are general in nature.

Step

Action

1

Login with the appropriate access capabilities.

2

Select the appropriate communication protocol from the X Menu.

NOTE: If you cannot determine the appropriate protocol, consult your LAN administrator.

3

Place the cursor in the new communication window.

4

Type the commands provided by your LAN administrator.

5

The application is launched in this window.

NOTE: Follow the LAN administrators instructions on closing the application.


Keyboard mapping The operator and engineer keyboards are both active and can be used for text entry.

When using xterm, the engineers keyboard mapping is altered to utilize the PF1 through PF17 keys. This alteration occurs only when the pointer is in a

vt340 window and enhances DEC VAX emulation.

6/93 UXS User Guide 27


4.7 System Security

TDC isolated The TDC operating system is isolated and inaccessible to the co-processor. This eliminates the possibility of misuse/tampering with the process control system by unauthorized personnel who may gain access to the Local Area Network.

System security is controlled through the configuration and login utilities.

Login A password controlled login utility protects against unauthorized UXS co-processor usage. This utility configures access dependent on the user login identification. The system customizes the workspace menu as appropriate to the access level of the user.


Access keylock versus co-processor login

This login utility performs a function similar to the Access Level Keylock on the standard Universal Station; however, the co-processor login is entirely independent from the keylock mechanism. System security may be compromised if the user leaves the immediate area without logging out of the co-processor environment.

It is suggested to remove the key and logout to ensure security. This will eliminate unauthorized access to the LCN system and the co-processor.




Security emphasis Users should be advised of the potential for security problems. A periodic review of the system security, security procedures, and system users will help to raise awareness. Remind users that the password is their computer signature. Emphasize the importance of periodically changing this password.

Continued on next page

28 UXS User Guide 6/93


4.7 System Security, Continued

Co-processor access by group

The restrictions placed upon access levels are:

* Operator - able to configure their own environment, use telnet, and the optional VT340 DECnet communications

* Supervisor - able to configure their own environment, use telnet, and the optional VT340 DECnet communications

* Engineer - able to configure their own environment, use telnet, the optional VT340 S/W, co-processor configuration (requires co-processor password), and perform periodic backups of the co-processor file system

* View Only - able to configure their own environment.

Note: User configurable items are: X Hosts, allowPartiallyObscured Native Window, and Keyboard Focus Policy.


6/93 UXS User Guide 29


4.8 Backup the Co-Processor Hard Drive

Required access level The procedures must be performed while logged in as “engineer,” and the co-processor password is not required.


Menu appearance

Engineer Menu


X Menu

>

Application

>

System Menu

>


System Commands

Configuration >

Update Software > Add/Remove Users... Backup/Restore... 


Backup co-processor Use the following procedure to backup the co-processor hard drive.

NOTE: This procedure currently performs only full backups. The contents of the DAT tape will be overwritten.

Step

Action

1

Remove the appropriate tape from its protective case and gently insert it into the tape drive. Press gently on the edge of the tape cartridge while inserting it into the unit until you feel the unit pull on the tape. The unit will then load and position the tape. While positioning is being performed, both indicator lamps on the front of the unit will flash. When the right lamp shows a solid green, positioning is complete and the tape unit is ready to use.

If you are unable to successfully insert the tape, gently remove the cartridge and reinsert it again. If you are still unsuccessful, contact your Honeywell service representative for assistance.

1

Select Backup/Restore... from the workspace menu.

2

Select the BACKUP target.

3

To perform a backup of the entire UXS filesystem:


Select the System Backup: target.

To perform a backup of UXS user files only:


Select the User Backup: target.


Continued on next page

30 UXS User Guide 6/93


4.8 Backup the Co-Processor Hard Drive, Continued

Backup co-processor,

continued

4

To perform a FULL backup of all files within the scope:


Select the FULL BACKUP target.

To perform an INCREMENTAL backup of all files within the scope:


This feature is not available at this time.

5

Select the START BACKUP target.

Note: The backup operation will take 3 to 20 minutes to complete. If

any errors occur, your response to the prompts must be typed into the Input Commands field.

6

Upon completion, the following message is displayed:

fbackup: runtime: #### Seconds

End of Execution

7

Select the Close target.

8

Select the Exit Xsam target.

Click OK at the message Do you really want to exit?


6/93 UXS User Guide 31


4.9 Shut Down the UXS

Background To prevent possible damage to the UNIX filesystem, the station must be shut down using a special sequence. The shutdown procedure must be

followed before power is removed from the station.

Failure to perform the proper shutdown procedure could result in damage to the co-processor filesystem. The next time the station is powered up, it may take up to 5 minutes to perform automatic repairs of the co-processor filesystem. Use caution in cycling power on and off. If this is done while a repair is being made, the filesystem may be left in an unrepairable state. This would require reloading the filesystem backup from tape and possibly require reformatting or replacement of the hard drive.

Procedure If you are currently logged into the UXS, use the following procedure:

Step

Action

1

Select Logout from the root menu.

2

At the prompt Quit Mwm?, select the OK target.

3

When the login menu appears, enter your username and password.

4

Select SHUTDOWN WSI target.

5

Press the CONSOLE STATUS key.

6

Select the node number of the appropriate UXS.

7

Select the SHUTDOWN target.

8

Press ENTER to confirm the shutdown request.

Note: The message Co-processor is idle, select box to

reset. will appear. Reset the co-processor by selecting the box.


If no user is logged into the UXS, use the following procedure:

Step

Action

1

When login menu appears, enter your username and password.

2

Select the SHUTDOWN WSI target from the login menu.

3

Press the CONSOLE STATUS key.

4

Select the node number of the appropriate UXS.

5

Select the SHUTDOWN target.

6

Press ENTER to confirm the shutdown request.

Note: The message Co-processor is idle, select box to

reset. will appear. Reset the co-processor by selecting the box.


32 UXS User Guide 6/93


4.10 UXS Restrictions

Shutdown procedure Because to the co-processor operating system is incorporated into the UXS, the station must be turned off using a special sequence. The shutdown procedure must be followed any time power is to be removed from the station.

Failure to perform the proper shutdown procedure could result in damage to the co-processor filesystem. The next time the station is powered up it may take 5 minutes to perform automatic repairs to the co-processor filesystem. Use caution in cycling power on and off. If this is done while a repair is being made, the filesystem may be left in a unrepairable state. This would require reloading the filesystem backup from tape, and possibly require reformatting or replacement of the hard drive.

6/93 UXS User Guide 33


4.11 Problem Reporting

Service contacts If you encounter any problems please contact:

Honeywell IAC - Technical Assistance Center

16404 North Black Canyon Highway

Phoenix, AZ 85023

Phone (602) 863-5558

Phone (800) 822-7672

34 UXS User Guide 6/93


Section 5 – Co-Processor User Environment Configuration

5.1 User Configuration Overview

Co-processor configuration

The major difference, when compared to a Universal Station, is the UXSs ability to display non-TDC 3000 applications, generated by LAN (Local Area Network - Ethernet) computing resources.

There are several attributes new to the UXS display, which are necessitated by viewing in the X Windows environment:

* X Host Authorization—Controls remote access to the UXS display

* Native Window Behavior—Controls dominance of the LCN display

* Keyboard Focus Policy—Controls keyboard/mouse pointer interaction




Required information The following information is required for configuration:

* The hostnames of any remote computing resources which will open an X display on this station. This access is granted on a user by user basis using subsection 5.2, X Host Authorization.

6/93 UXS User Guide 35


5.2 X Host Authorization

What is it? The X host authorization application grants X display permission to remote systems on an individual-user basis. This allows other computer systems to open a window on the users UXS display.

Required access level The procedures can be performed by any authorized user. This authorization is granted/recorded on an individual-user basis.


Menu appearance

Engineer Menu

X Menu

>

X Menu


Application

>





Shuffle

>

System Menu

>

Native Window

>



Keyboard Focus

Policy >


X Host Authorization

Refresh

Restart...

Logout

12598




X host addresses To authorize remote systems to display X Window applications on the UXS,

the hostname and TCP/IP address must be entered prior to this step, using the LAN information entry procedure.

Continued on next page

36 UXS User Guide 6/93


5.2 X Host Authorization, Continued


The user can choose from two methods of granting access permission:

* Explicit host authorization—user must enter the hostnames of all systems requiring access

* Grant access to all hosts—user selects Any host is allowed access

Use the following to authorize specific X hosts access:

Step

Action

1

Select X Host Authorization from the workspace menu.

2

Type the co-processor password and <RETURN> at the prompt.

3

Select Only the listed hosts are allowed access target.

4

Click on the text entry area of the IWSM Configuration Tool.

5

Type information using this syntax:

hostname

hostname

hostname

hostname

hostname = replace with a valid hostname

Use of spaces is not allowed. The tool does nothing if there are invalid characters in the text entry field.

6

Click on the Add target to authorize the remote host to display locally.

7

Repeat Steps 4 through 6 for each host requiring X host access.

8

To delete a host’s X display authorization privileges, click on the hostname to be deleted.

9

Click on the Delete target.

10

Repeat Steps 8 and 9 for all hosts to be Deleted.

11

Select the Close target.


Continued on next page


6/93 UXS User Guide 37


5.2 X Host Authorization, Continued


All LAN computing resources listed in the hosts file can be authorized to display X Window applications on this station using the following procedure.

Step

Action

1

Select X Host Authorization from the workspace menu.

2

Type the co-processor password and <RETURN> at the prompt.

3

Select the Any host is allowed access target.

4

Select the Close target.








X Host Authorization



Only the listed hosts are allowed access Any host is allowed access

hostname

hostname DISPLAY AREA

hostname LISTS HOSTNAMES AUTHORIZED TO SEND

AN X-WINDOW DISPLAY TO THIS STATION.

TEXT ENTRY AREA



Add


Delete


Close





38 UXS User Guide 6/93


5.3 Configure Native Window Behavior

Window dominance The dominance of the Native LCN Window is configurable on a user-by-user basis. The attribute allows the Native LCN Window to be partially obscured by another window.

The Native LCN Window behavior is initially configured to allow only engineering group members to partially obscure the LCN display.

However, the individual users (all access levels) can set this attribute at their discretion.

Menu appearance







Operator Menu






X Menu >

X Menu





Application Menu >








Shuffle

>






Native Window

>

Native Window











Keyboard Focus Policy

>







Partially Obscured

>

Allow








X Host Authorization




Disallow


Refresh






Restart...





Logout




12601

Allow partial obscured Follow these steps to allow the LCN display to be partially obscured:

Step

Action


1

Select Native Window - Partially Obscured - from the workspace menu.

Note: The change will not take effect until the next login.

Allow



Follow these steps to prevent obscuring the LCN display:

Step

Action


1

Select Native Window - Partially Obscured - from the workspace menu.

Note: The change will not take effect until the next login.

Disallow



6/93 UXS User Guide 39


5.4 Configure Keyboard Focus Policy

Required access level The procedures must be performed while logged in as the user.


Menu appearance

Operator Menu

X Menu >

X Menu



Application Menu >





Shuffle

>



Native Window

>



Keyboard Focus Policy

>

Explicit


X Host Authorization


Pointer


Refresh




Restart...




Logout



12602

Explicit vs. Pointer The keyboard focus policy allows two choices:

* Explicit focus—user must click on a window to make it active

* Pointer focus—user must point at the window to make it active

Note: Even small mouse movements may inactivate the window when using pointer focus. This may cause keyboard entries to be lost or directed to the wrong window.

Explicit focus Use the following to set the focus policy to explicit:

Step


Action


1

Select Keyboard Focus Policy - Explicit from the workspace menu.

Note: The change will not take effect until the next login.


Pointer focus Use the following to set the focus policy to pointer:

Step


Action


1

Select Keyboard Focus Policy - Pointer from the workspace menu.

Note: The change will not take effect until the next login.


40 UXS User Guide 6/93


5.5 Change User Password

Required access level The procedures must be performed while logged in as the user. The current password is required.


Menu appearance

Operator Menu

X Menu >

Application > System Menu >





Applications

Unix Load

Calculator

Datebook

Telnet

DECnet

Change Password





12603



Change the user password frequently to ensure security.

Step

Action

1

Select Change Password from the workspace menu.

2

Type the old password and <RETURN> at the prompt.

Note: The new password must be at least 6 characters, containing at least two alpha characters and one numeric character.

3

Type a new password and <RETURN>.

4

Retype the new password and <RETURN> to confirm the entry.



6/93 UXS User Guide 41


42 UXS User Guide 6/93


Index


A

Access authorization 13

B

Backup co-processor 30

C, D

Changing window size 9

Co-processor access banner 22

Configuring LAN Computing Resources 27

E, F, G

Explicit focus 40


R

Resizing the LCN Native Window 9 Restarting after shutdown 26

S

Selecting with the touchscreen 19

Shutdown procedure 32

System security 28

T

TotalPlant 3

U


H, I, J

Hierarchical (nested) menu 13

K, L

Keyboard Focus Policy 35 Keyboard mapping 27

M

Manual shutdown 26 Minimized window 10 Motif Window Manager 7

N, O

Native LCN Window 39

Native mode 26

Native Window Behavior 35

P, Q

Pointer focus 40

Printing the LCN window 25

Printing X Windows 25 


UNPX Personality 23

V

Visual integration 3

W

Window manager 7

Window menu 11

Workspace menu 13

X, Y

X Host Authorization 35, 36

X Window 7

xterm 27

Z

Zoom touchscreen 19


6/93 UXS User Guide 43


Index


44 UXS User Guide 6/93


READER COMMENTS

Honeywell IAC Automation College welcomes your comments and suggestions to improve future editions of this and other publications.

You can communicate your thoughts to us by fax, mail, or toll-free telephone call. We would like to acknowledge your comments; please include your complet name and address

BY FAX: Use this form; and fax to us at (602) 313-4108

BY TELEPHONE: In the U.S.A. use our toll-free number 1*800-822-7673 (available in the 48 contiguous states except Arizona; in Arizona dial 1-602-313-5558).

BY MAIL: Use this form; detach, fold, tape closed, and mail to us.

Title of Publication: UxS User Guide Issue Date: 6/93

Publication Number: UX09-400

Writer: R. Evans

COMMENTS:

RECOMMENDATIONS:

NAME DATE

TITLE

COMPANY

ADDRESS

CITY STATE ZIP

TELEPHONE FAX

(If returning by mail, please tape closed; Postal regulations prohibit use of staples.)


Honeywell

Industrial Automation and Control

2820 West Kelton Lane

Phoenix, Arizona 85023-3028


Attention: Manager, Quality

FOLD FOLD



Honeywell

Industrial Automation and Control Helping You Control Your World

Honeywell Inc.

16404 North Black Canyon Highway

Phoenix, Arizona 85023-3028


Comparison Calibration

For highest accuracy and for measurements on samples < 0.8 ?S/cm, perform the buffer calibration as described previously and place the pHure sensorTM back online measuring the sample. For power plant samples with calculated pH available from specific and cation conductivity measurements, use this calculated value for a one-point trim calibration of the pHure Sensor. Alternatively, measure the sample with a calibrated, sealed, portable flow through system using a flowing junction reference electrode. Perform a one-point calibration on the pHure sensorTM instrument to make it agree with the portable system.

IMPORTANT: Use extra care with a portable pH measurement and do not use an open grab sample because air/CO2 contamination can rapidly lower the pH of a low conductivity sample. Do not use the comparison calibration method unless all of the requirements can be met, including use of a flowing junction reference electrode.

Maintenance

pH electrodes in clean water require little maintenance. However, if corrosion products or other solids accumulate, clean the electrode tip with dilute (5%) hydrochloric acid or other cleaning agent to restore rapid response. After cleaning, install the electrode in the housing and run sample for at least 10 minutes to allow the electrode to recover from the strong cleaner before attempting calibration or measurement.

WARNING: USE GOOD LABORATORY PRACTICE, SAFETY EQUIPMENT AND PROCEDURES WHEN HANDLING AGGRESIVE CLEANING AGENTS.

Layup/Storage

For less than one month shutdown the assembly can be left as in operation if the housing remains full of sample. For longer storage or if the housing will drain and dry out, the electrode should be removed and the original electrode cap should be refilled with 3 M potassium chloride (223.5 g/L KCl) solution and replaced on the electrode tip. See electrode instructions for further information.

Specifications

pH Range: 1-11

Conductivity Range: > 0.8 ?S/cm using direct buffer calibration; < 0.8 ?S/cm using

comparison calibration with calculated pH value or portable

flowing junction reference

Sample Flowrate: 50-150 mL/min

Temperature: 0-80 °C (32-176 °F); short term to 100 °C (212 °F)

Pressure: atmospheric pressure for maximum stability; operational 0-35 psig (0-2.5 bar); can safely withstand 100 psig (7 bar)

Inlet/Outlet: 1/4" NPTF

Wetted Materials: 316 stainless steel, glass, silicone rubber

Temp Comp: Pt1000 ohm RTD integral to electrode

Mettler-Toledo Thornton, Inc.

36 Middlesex Turnpike, Bedford, MA 01730 USA

Tel. +1-781-301-8600, Fax +1-781-271-0214

Toll Free +1-800-510-PURE ( US and Canada only)

thornton.info@mt.com

© Mettler-Toledo Thornton, Inc. 2010

OM84436 Rev.C 02/10 www.mt.com/thornton



OPERATING INSTRUCTIONS

58032X0X (3X3-21X), 5803223X and 5803240X pHure Sensor?

High Purity pH Sensors

Introduction

Thornton pHure Sensor? Assemblies, used with Thornton 770MAX, M300, M300 ISM, 200pH and 2000 instruments, are designed to allow pH measurement in flowing high purity water samples. Applications include measurement of sample streams in power plant, pharmaceutical, semiconductor and other waters in the range of 0.5 to 50 ?S/cm or higher. The assembly provides on-line measurement in a sealed flow housing to prevent carbon dioxide (carbonic acid) contamination from the air. The stainless steel construction shields the electrode and eliminates flow sensitivity due to streaming potentials. A dual high impedance shielded and isolated measuring circuit works with a solution ground connection to further stabilize the measurement. Construction and operation are consistent with the requirements of ASTM Test Method D5128.

The assembly includes a combination pH sensor with fast-responding temperature compensator and pre-pressurized gel reference electrode which yields performance similar to a flowing junction. This provides high accuracy by ensuring consistent electrolyte conditions in the reference junction both in low conductivity samples and in buffer solutions during calibration. No electrolyte filling is required; the electrode is replaceable. pHure Sensors are available in the following models and with replacement components identified:

Cable

Length

pHure

Sensor for

770MAX1,2

Repl.

Preamp for

770MAX

pHure

Sensor for

M3002

pHure

Sensor for

M300 ISM3

pHure Sensor

for 200pH,

20001,2

Repl. Preamp for 200pH,

2000

3 ft (1 m)

58 032 006

58 085 001

58 032 236

58 032 406

58 032 206

58 085 211


(333-211)

(1200-21)



(363-211)

(1200-01)

(3m)01ft

58 032 007

58 085 002

03285

58 032 407

237

58 032 207

58 085 212


(333-212)

(1200-22)



(363-212)

(1200-02)

(5m)61ft

58 032 008

58 085 003

85

032

58 032 408

382

58 032 208

58 085 213


(333-213)

(1200-23)



(363-213)

(1200-03)


58 032 009

58 085 004

85

032

(10m)33ft

58 032 409

392

58 032 209

58 085 214


(333-214)

(1200-24)



(363-214)

(1200-04)


1 Requires a patch cord ordered separately.

2 Replacement pH Electrode 3201-UPW-120-PT1000

52

002

447


3 Replacement ISM pH Electrode 3201i-UPW-120

52

003

821


Replacement 316 SS Flow Housing (all models)

58

084

000

(02385)


Installation

Exercise care in unpacking and installing the pHure Sensor? assembly. It has both a heavy stainless steel flow housing and a fragile glass membrane tip on the pH electrode.

Provide the sample line with pressure reduction/regulation and rotameter upstream to control flow to 50-150 mL/min through the flow housing. Install with the outlet connected to an open drain. For best stability there should be no valve or other restriction downstream of the flow housing. Best performance will be obtained with sample temperature within 10-50°C (50-122°F) although it can withstand a much wider range. Mount the stainless steel flow housing with suitable screws through the holes in its rectangular plate. Connect sample and drain tubing using suitable 1/4” NPT adapter fittings.

If included, locate the preamplifier in an area away from potential dripping water and calibrating solutions. Various lengths of VP sensor cables and patch cords are available to provide flexibility in preamplifier location when used. Orient the preamplifier with the sensor cable upwards and mount it using suitable screws through the mounting feet supplied. IMPORTANT: Confirm that the W1 jumper on the preamp circuit board is in the “solution ground” position “2-3” as identified on the preamp inside cover label.

Connect a user-supplied solution ground wire between the thumb screw terminal on the flow housing and the thumb screw on the preamplifier box (terminal 4 on the M300). Also connect a second length of solution ground wire to the housing terminal with its loose end insulation stripped 1 inch (25 mm) but not connected. This will be used for the solution ground during calibration outside the flow housing. A solution ground is not used with a M300 ISM installation.

M300 and M300 ISM instruments do not include the preamplifier box shown below. The cable connects directly to the instrument.


Review the instructions packed with the pH electrode. Carefully remove the storage watering cap from the end of the pH electrode, exposing the fragile glass membrane. There is a drop of white silicone sealant covering the reference junction of the electrode to prolong its shelf life. Using the blade supplied, cut and scrape away all of the sealant to expose the white ceramic beneath. Connect the preamp (or direct) cable connector to the electrode, making sure the connector threads are fully engaged.

On a new installation, before installing the electrode, be sure all construction debris and corrosion products have been flushed out of the sample system and flow housing. Then install the electrode in the flow housing, tightening the red compression nut. Before calibration, allow the sample to run through the electrode/housing assembly for at least half an hour to allow the electrode to become acclimated to the sample.

Buffer Calibration

Before buffer calibration, activate the HOLD function in the instrument as described in its instruction manual. This holds the relays and output signals constant to prevent unwanted alarm or control action.

Remove the electrode from the housing and carefully immerse the tip in buffer solution, preferably in a plastic beaker to prevent breakage or scratching.

IMPORTANT: Immerse the loose solution ground wire (if used) from the housing terminal into the buffer solutions along with the electrode.

Perform a two point calibration in two buffer solutions according to the instrument instructions, always immersing the solution ground wire (if used) with the electrode and rinsing between buffer solutions. When complete and the electrode is back in the flow housing, deactivate the HOLD function on the instrument and coil up the loose solution ground wire next to the housing for future use.






Health and Safety Executive


Supplying new machinery

A short guide to the law and your responsibilities when

supplying machinery for use at work

Introduction

This leaflet can help you if you are supplying machinery for use at work. It explains the main health and safety requirements of the law and what you can do in practice to meet them. You may already know about CE marking but there are other legal requirements which are also important.

The information in this leaflet is arranged in four sections:

* The requirements of the law

* What the manufacturer has to do

* What the supplier has to do in practice

* Further information

HSE has provided this information primarily for the benefit of importers, agents or others who supply machinery for use at work which has been manufactured by someone else.

If you are a machinery manufacturer, you should refer to other more detailed sources of information, some of which are given at the end of this leaflet. If you are buying machinery for use at work, you will need to refer to other sources of information, such as HSE’s Buying new machinery1 leaflet.

The term ‘manufacturer’ is used here to describe the machinery manufacturer when they:

* are based in the EU;

* are based outside the EU but claim their machine fully complies with the Machinery Directive and has been CE marked; or

* build or assemble machinery for their own use.

However, the first importer into the EU of machinery which is not claimed to comply with the Machinery Directive and is not CE marked must also take on the duties of the manufacturer. They should therefore read this leaflet as if they were the machinery manufacturer.

Page 1 of 10


Health and Safety Executive

The requirements of the law

What is the law on supplying new machinery?

There are several relevant pieces of law, including:

* The Supply of Machinery (Safety) Regulations 2008 (as amended), which implement the European Machinery Directive 2006/42/EC and contain detailed requirements for manufacturing safe new machinery.

* The Health and Safety at Work etc Act 1974, which contains general requirements for the manufacture and supply of safe workplace machinery (including second-hand machinery).

* There are also other UK regulations which implement other European Directives, such as those on the supply of electrical equipment or on gas appliances, which are important for many suppliers of machinery.

This leaflet concentrates on the first of these legal requirements.

What do the Supply of Machinery (Safety) Regulations 2008 apply to?

These Regulations apply to all new machinery placed on the UK market or put into service in the UK, wherever it is to be used in Europe. The term ‘machinery’ is broadly defined in the Regulations and, in addition to what is generally understood by the term, includes products such as:

* safety components (eg guards), independently placed on the market;

* a complex production line made up of individual machines and equipment;

* interchangeable equipment that only works when attached to a tractor or machine, such as a plough or lifting attachment;

* lifting equipment and lifting accessories;

* chains, ropes and webbing for use in or with machinery.

Partly completed machinery is also covered by these Regulations. Partly completed machinery is equipment for a specific function, which cannot operate and be fully protected (eg needing guarding at the fitting interface), until it is combined with other machinery or equipment to form a complete machine.

However, there are some types of machinery which are not covered; see ‘Machinery not covered by the Supply of Machinery (Safety) Regulations’ on page 9.

In brief, what are the requirements of these Regulations?

The most important requirement of the Regulations is that manufacturers (or their authorised representative in the EU) must ensure that all new machinery they place on the market or put into service is safe. This includes second-hand machinery which is new to the European market (imported from outside the EEA and put into service in Europe for the first time).

The Regulations also require manufacturers/their authorised representative to ensure that:

* Machinery meets all relevant essential health and safety requirements (EHSRs). These are listed in detail in the Regulations and include the provision of sufficient instructions in the language of the end user.

* A technical file for the machinery has been drawn up and, in certain cases, the machinery has been type-examined by a notified/conformity assessment body.

* The machinery is issued with a Declaration of Conformity (or, in the case of partly completed machinery, a Declaration of Incorporation).


Supplying new machinery Page 2 of 10


Health and Safety Executive

* There is CE marking affixed to the machinery (unless it is partly completed and comes with a Declaration of Incorporation).

Further details about the requirements of the Regulations are given in: Machinery: Guidance Notes on the UK Regulations.2

Does the same law apply in other European countries?

The Machinery Directive has now been implemented as national law in all countries in the European Economic Area (EEA) – which comprises all EU and EFTA countries – and in Switzerland. This means that the same legal requirements now apply to all new machinery wherever it is supplied within the EEA and in Switzerland.

So, if I am importing a machine from a manufacturer based in another country in the EEA, what do I have to do?

You need to make sure that the machinery is safe before you supply it to others (or put it into service). To do this you will first need to make certain checks (see ‘Checklist for safe supply and use of machinery’ on page 9).

What if I am directly importing machinery manufactured outside the EEA?

You need to make sure that either the manufacturer (or their authorised representative) has met the relevant requirements, or that you meet them yourself. The machinery must still meet the Supply of Machinery (Safety) Regulations 2008 and be safe before it is placed on the market or put into service. You should still make certain checks yourself, even if the machinery is supplied with a manufacturer’s Declaration of Conformity and is CE marked (see the ‘Checklist for safe supply and use of machinery’ on page 9 for more information).

What if I export machinery to countries outside the EEA?

You will need to find out the national requirements of the country to which you are exporting the machinery.

What law applies to the sale of second-hand machinery?

You will need to meet the requirements of section 6 of the Health and Safety at Work etc Act 1974, as this applies to the resale (in Britain) of all second-hand workplace machinery, regardless of its age.

Please note, the Supply of Machinery (Safety) Regulations 2008 (and the previous 1992 Regulations) only apply the first time machinery is placed on the market or put into service in the EEA – and only if this took place after 1 January 1993. These Regulations apply to new and any second-hand equipment which is new to the EEA (ie imported from outside the EEA).

However, the supply of second-hand machinery, first put into use in the EEA before 1993 – which has not been substantially refurbished – does not need to comply with the Supply of Machinery (Safety) Regulations 2008. The resupply of used CE-marked machinery also does not come under these Regulations.

Supplying new machinery Page 3 of 10


Health and Safety Executive

What if the old machinery I am supplying is substantially refurbished?

You will need to comply with the Supply of Machinery (Safety) Regulations 2008 if machinery has been transformed or rebuilt so substantially that it can be considered as new, or a substantial new attribute has been added that was not assessed previously. For example, these Regulations apply when CNC controls are retrofitted to an older manual lathe; or a lifting machine is modified to lift a significantly greater load. However, if old machinery is simply given new guards, has like for like parts replaced or is just repainted, this would not make it ‘new’, so the Regulations will not apply when it is resold. However, you will still need to meet the requirements in section 6 of the Health and Safety at Work etc Act 1974.

What are the relevant requirements of the Health and Safety at Work etc Act 1974 (HSW Act)?

Section 6 of the HSW Act places a duty on ‘...any person who designs, manufactures, imports or supplies any article for use at work...to ensure, so far as is reasonably practicable, that the article is so designed and constructed that it will be safe and without risks to health...’ . Adequate information, usually in the form of user instructions, is also required about what uses the article is designed for. Suppliers must meet these requirements for all types of workplace machinery, whether it is new or second-hand.

However, the creation of a technical file, type-examination, issuing of a Declaration of Conformity and CE marking are not required under the HSW Act.

What other laws might be relevant to the supply of machinery?

The Electromagnetic Compatibility Regulations 1992 apply to electrically powered machinery or machinery with electrical control systems. They cover all equipment likely to cause electromagnetic disturbance, or whose performance is likely to be affected by electromagnetic disturbance.

In some cases, other law may apply in addition to the Supply of Machinery (Safety) Regulations 2008, or on their own, such as the:

* Electrical Equipment (Safety) Regulations 1994;

* Pressure Equipment Regulations 1999;

* Simple Pressure Vessels (Safety) Regulations 1991 (as amended);

* Equipment and Protective Systems Intended for Use in Potentially Explosive Atmospheres Regulations 1996 (as amended);

* Lifts Regulations 1997;

* Medical Devices Regulations 1994 (as amended);

* Gas Appliances (Safety) Regulations 1995.

All these Regulations implement European Directives and contain various requirements. By affixing the CE mark, manufacturers are declaring that the product meets all of the requirements relevant to the Directives for that product, and this must be shown on the Declaration(s) of Conformity.

Supplying new machinery Page 4 of 10


Health and Safety Executive

What the manufacturer has to do

Manufacturers should design and construct new machinery so it can be used safely. They must meet specific practical issues as well as certain administrative and other requirements, some of which are as follows:

How does the manufacturer make sure that machinery can be used safely? Manufacturers should:

* Carry out a detailed risk assessment by:

– identifying the health and safety hazards (trapping, crushing, electrical shock, dust or fumes, noise, vibration, etc) that are likely to be present when the machinery is used. The essential health and safety requirements listed in the Regulations should be used by manufacturers as a guide to ensure all possible hazards have been considered, and that they have identified those relevant to the machine;

– assessing the likely level of risks involved;

* eliminate significant risks or, if that is not possible;

* provide safeguards (eg guarding dangerous parts of the machinery, providing noise enclosures, etc) or, if that is not possible;

* provide information about any residual risks and place signs on the machinery to warn of risks that cannot be reduced in other ways (eg ‘noisy machine’ signs).

Manufacturers may wish to refer to standards – eg national (BS), European (EN) and international (ISO) – or other specifications when designing machinery.

Does new machinery have to be made to any particular standards?

No. Machinery must satisfy the essential health and safety requirements (EHSRs) of the UK’s Supply of Machinery (Safety) Regulations 2008 (Note: the EHSRs in the UK Regulations are identical to the EHSRs of Annex I of the Machinery Directive). However, there are an increasing number of harmonised European standards that will help manufacturers do this because they carry a legal presumption of conformity to the Directive – and hence to the UK Regulations.

A harmonised European standard is identified by an EN before the number (eg EN 474-1) and will be published as a British standard (eg BS EN 474-1:1995). Some are also international standards, referred to as BS EN ISO (eg BS EN ISO 13857:2008). The full presumption of conformity to the Directive is only valid if the standard is listed without qualification in the Official Journal of the EU. Manufacturers should also check Annex Z of any European standard to be sure which parts of the EHSRs of the Directive are covered. The use of these standards is voluntary, and manufacturers can design and manufacture their machinery in accordance with other national or international standards if they wish. However, the EHSRs must still be met, with information on how this was done explained in detail in the technical file.

What the supplier has to do in practice

What do I need to do as a supplier before providing machinery to others? If machinery is manufactured in the EEA, you should do all you can to ensure it is safe. This can be done through several practical checks (see the ‘Checklist for the safe supply and use of machinery’ on page 9 for more information).

If you are importing machinery from outside the EEA and it is CE marked with a Declaration of Conformity, you still need to follow the same checks as for


Supplying new machinery Page 5 of 10


Health and Safety Executive

machinery built inside the EEA. If it is not CE-marked with a Declaration of Conformity, you will need to make sure the machinery meets the requirements of the law in full as if you were the manufacturer. This means ensuring the machinery:

* meets the essential health and safety requirements;

* has (in certain cases) undergone conformity assessment by a notified body;

* has a technical file and Declaration of Conformity; and

* is CE marked.

If you are importing partly completed machinery, you should ensure it is supplied with instructions for its final incorporation with other machinery/equipment and a Declaration of Incorporation. Partly completed machinery should not be CE marked. The manufacturer of partly completed machinery should hold technical documentation in one of the European Community languages, and must be able to produce it upon request to any relevant enforcing authority.

There may be information available about machinery safety from your trade association, HSE or other sources, which will help you decide whether the machinery you are supplying is safe. You may also find relevant British or other standards helpful.

Can I regard CE marking as a guarantee of safety?

The CE mark is not a quality mark and is only one of several requirements that the manufacturer (or their authorised representative) has to meet. By affixing the CE mark, the manufacturer/their authorised representative is claiming that all relevant legal requirements have been met, but you must still take reasonable steps to make sure the machinery is safe. For more information, see the ‘Checklist for the safe supply and use of machinery’ on page 9.

What if the machinery is manufactured by someone else, either in the UK or elsewhere in the EEA, and I – as a supplier – consider the safeguards or other protective devices are inadequate?

This could happen for several reasons. For example, the harmonised European standard for that machinery may not yet have been agreed – so different interpretations of the level of protection required may exist in different countries.

Alternatively, it may be that the machinery does not meet agreed levels of protection and the law is clearly not being met. If you are not satisfied with the levels of protection for the machinery you are supplying, discuss the matter with the manufacturer/their authorised representative or your UK trade association. If you cannot resolve the matter, you should consider temporarily ceasing supply and contacting HSE.

What is contained in technical files? Should their contents be made available to suppliers and users?

Manufacturers are required to draw up technical files for the machinery they make. These must include:

* drawings of the machinery and its control circuits;

* the specifications and standards used in the design; and

* information about relevant test results and other data.

Technical reports and certificates from other organisations may also be

included as well as the Declaration of Conformity or Declaration of Incorporation (for the individual items of machinery that make up an assembly). Technical

Supplying new machinery Page 6 of 10


Health and Safety Executive

files demonstrate how machinery meets relevant essential health and safety requirements and, as such, are useful for both manufacturers and national enforcing authorities.

However, manufacturers are not obliged to make the contents of technical files available to other suppliers or the eventual users of the machinery; they are only required to make them available to any EEA market surveillance authority, as required by the relevant Directive. Such authorities have a legal duty to keep any commercially-sensitive information secure.

When is machinery issued with a Declaration of Conformity?

This is made available when the machinery is finished and ready for installation and use. The Declaration of Conformity must then accompany the machine through the supply chain to the end user.

What should a Declaration of Conformity have on it?

A Declaration of Conformity must:

* state the name and address of the manufacturer and, where appropriate, the name and address of their authorised representative;

* contain a description of the machinery, its make, type and serial number;

* indicate all European laws (Directives) with which the machinery complies;

* state details of any notified body that has been involved;

* specify which standards have been used in the manufacture (if any);

* state the place and date of the Declaration, and;

* be signed by a person with authority to do so.

For machinery supplied in the UK, the Declaration must be in English or accompanied by a translation into English. For machinery exported to other countries in the EEA, the Declaration and instructions must be in either the recognised language of the country where it is to be used, or have a translation into that language.

When is a Declaration of Incorporation appropriate rather than a Declaration of Conformity?

A Declaration of Conformity is issued for complete machinery, whereas a Declaration of Incorporation is issued by manufacturers where machinery is only partly completed. A drive system or an assembly which is almost machinery but cannot in itself perform a specific application – and is only intended to be incorporated or assembled with other equipment to form machinery – would therefore require a Declaration of Incorporation.

The Declaration of Incorporation should contain similar information to that contained in the Declaration of Conformity. However, one important difference is that it must state that the machinery should not be used until the machinery, equipment or assembly into which it will be added has been declared to conform fully with legal requirements.

In practice, this means that such partly completed machinery should not be used until the final, completed product has been manufactured – with all relevant essential health and safety requirements met and a Declaration of Conformity issued for the full assembly. This should be issued by the final installer or assembler.


Supplying new machinery Page 7 of 10


Health and Safety Executive

The machinery should not be CE marked if it has a Declaration of Incorporation. CE marking should only take place at the end of incorporation or assembly, when the Declaration of Conformity is also issued.

Further information

Machinery not covered by the Supply of Machinery (Safety) Regulations 2008

* Machinery intended for use outside the EEA.

* Second-hand machinery – except when imported from outside the EEA (and so new to the EEA) or when refurbished/modified to such an extent as to be considered ‘new’ and therefore coming within scope of the Regulations.

* Machinery whose only power source is directly applied manual effort, unless it is a machine used for lifting or lowering loads.

* Electrical and electronic products where covered by Directive 2006/95/EC (Low Voltage Directive) in the following areas: household appliances intended for domestic use, audio, video and information technology equipment, ordinary office machinery, low-voltage switch and control gear, electric motors, high-voltage switch and control gear, and transformers.

* Safety components intended to be used as spare parts to replace identical components, supplied by the manufacturer of the original equipment.

* Machinery for medical use.

* Special equipment for use in fairgrounds and/or amusement parks.

* Steam boilers, tanks and pressure vessels.

* Machinery specially designed or put into service for nuclear purposes which, in the event of failure, may result in an emission of radioactivity.

* Radioactive sources forming part of a machine.

* Weapons, including firearms.

* Storage tanks and pipelines for petrol, diesel fuel, flammable liquids and dangerous substances.

* Passenger transport vehicles and their trailers (air, road, rail or water). However, vehicles used in the mineral extraction industry are not excluded.

* Sea-going vessels and mobile offshore units, together with equipment on board such vessels or units.

* Cableways, including funicular railways, for the public or private transportation of people.

* Agriculture and forestry tractors, in respect of risks covered by Directive 2003/37/EC (risks not covered by that Directive are subject to these Regulations).

* Machines specially designed and constructed for military or police purposes.

* Certain goods and passenger lifts.

* Means of transport of people using rack and pinion rail-mounted vehicles.

* Mine winding gear.

* Machinery intended to move performers during artistic performances.

* Motor vehicles exclusively intended for competition.


Supplying new machinery Page 8 of 10


Health and Safety Executive

Checklist for safe supply and use of machinery

You don’t have to check the whole design of a machine against the essential health and safety requirements of the Regulations before supplying it. However, you are required to carry out some basic checks if you are installing it or having it built up ready to supply. The key checks are:

* Look for obvious defects, such as missing or damaged guards/other safety devices or inadequately protected electric wiring.

* Check that known risks (including risks from fumes or dust, noise or vibration) from the machinery appear to be properly controlled or that there is information on how they can be controlled.

* Make sure the manufacturer has provided instructions for safe installation, use, adjustment and maintenance. These must be in English if the machinery is for use in the UK. In some cases, the maintenance instructions may be in another language, where the manufacturer’s own staff are to carry out specialised maintenance themselves.

* Check that data about noise and vibration emissions has been provided, where appropriate.

* Make sure that any warning signs are visible and easy to understand. If in writing, these must be in English.

* If a complete machine, check it is accompanied by a properly completed Declaration of Conformity. For partly completed machinery (which does not itself form a working machine), you must be provided with a Declaration of Incorporation and instructions for its safe incorporation.

* Check for CE marking (not required for partly completed machinery).

* If you have concerns about any of the above, contact the manufacturer.

If the machine is packaged and you intend to pass it on in the same packaging, you are not expected to open it up to check the machine. However, you should check from the package and any supplied information that the item is CE marked, has an appropriate Declaration of Conformity and instructions in English (if being supplied to the UK).

Remember: Never assume that machinery ready to be used is safe just because it has a CE marking. Always check for obvious defects and damage.


Supplying new machinery Page 9 of 10


Health and Safety Executive

References

1 Buying new machinery: A short guide to the law and your responsibilities when buying new machinery for use at work Leaflet INDG271 HSE Books 2011 www.hse.gov.uk/pubns/indg271.pdf

2 The Machinery Directive 2006/42/EC and the Guide to the application of the Directive 2006/42/EC are available from the European Commission.

See: http://eur-lex.europa.eu/en/index.htm and http://europa.eu/index_en.htm respectively.

Further reading

Using work equipment safely Leaflet INDG229(rev1) HSE Books 2002 (priced packs of 10 ISBN 978 0 7176 2389 1) www.hse.gov.uk/pubns/indg229.pdf

Legislation

For full details of The Health and Safety at Work etc Act 1974 and The Supply of Machinery (Safety) Regulations 2008 (as amended 2011), visit: www.legislation.gov.uk

Machinery: Guidance Notes on the UK Regulations and general guidance on the Machinery Directive is available from the Department for Business, Innovation and Skills (BIS). See: www.bis.gov.uk

Further information

For information about health and safety, or to report inconsistencies or inaccuracies in this guidance, visit www.hse.gov.uk/. You can view HSE guidance online and order priced publications from the website. HSE priced publications are also available from bookshops.

This document contains notes on good practice which are not compulsory but which you may find helpful in considering what you need to do.

This document is available at: www.hse.gov.uk/pubns/indg270.pdf.

British Standards can be obtained in PDF or hard copy formats from BSI: http:// shop.bsigroup.com or by contacting BSI Customer Services for hard copies only Tel: 020 8996 9001 email: cservices@bsigroup.com.

© Crown copyright If you wish to reuse this information visit www.hse.gov.uk/ copyright.htm for details. First published 09/11.


Published by the Health and Safety Executive 09/11 INDG270(rev1) Page 10 of 10


Materials Science and Engineering Graduate Student Manual*

Virginia Polytechnic Institute and State University

Blacksburg, VA

1 Graduate Program Description 1

2 Degrees 1

2.1 Master of Engineering 1

2.2 Master of Science 1

2.3 Doctor of Philosophy 1

3 Curriculum 2

4 Administration 3

4.1 Admission 3

4.1.1 Types of Admission 3

4.1.2 Financial Support 5

5 Degree Requirements 6

5.1 Student Responsibilities 6

5.2 Credit Requirements and Typical Course Schedules 7

5.3 Advisory Committee 10

5.4 Plan of Study 10

5.5 Doctoral Residency Requirement 11

5.6 Registration 11

5.7 Time Limit 11

5.8 Final Examinations 12

5.9 Academic Eligibility 12

5.10 Progress Toward Degree 12

6 Forms and Checklists 13

6.1 Thesis/Dissertation, Project Report Document 14

6.2 Graduation 14

*Revised: April 2012


1 Graduate Program Description

The Materials Science and Engineering (MSE) Department consists of faculty members working in ceramic engineering, metallurgy, polymer engineering, bioengineering, and related areas of mechanics, chemistry, physics and electrical engineering. The mix of available courses provide a balance between engineering and science, and research programs range from traditional to contemporary topics. Graduate degrees offered by the Department include the Master’s of Engineering (M.Eng.), Master’s of Science (M.S.), and Doctor of Philosophy (Ph.D.)

2 Degrees

2.1 Master of Engineering

The M.Eng. is a non-thesis degree obtained through course work and a project that focuses on an industrial problem or critical literature review. Students with a baccalaureate degree who desire a professional-oriented master’s degree and advanced undergraduate students who wish to supplement their background with additional course work are encouraged to consider the M.Eng. degree. A total of 30 credit hours are required for this degree; between 3 and 6 of these hours are project work (MSE 5904), the remainder are course credits. Students typically complete this degree in 12 to 18 months.

2.2 Master of Science

The M.S. degree requires a thesis. Students with an interest in applied research and development should consider this degree option. Like the M.Eng. degree, the M.S. requires the completion of 30 credit hours of work. Between 6 and 10 of these credit hours are on thesis research (MSE 5994). Most students spend two academic years completing the M.S. program of study.

2.3 Doctor of Philosophy

The Ph.D. degree is intended for exceptional students who have a strong interest in scholarship and a desire to do independent research. This degree program is designed to be flexible to meet the broad interests of students and faculty. General requirements for the degree are those of the College of Engineering. A master’s degree is neither a prerequisite nor a requirement. However, many Ph.D. students complete the requirements for a master’s degree while working toward the Ph.D. degree.

Qualifying Examination To become formal candidates for the Ph.D. degree, students must pass the Qualifying Examination for the Degree of Doctor of Philosophy. This examination is typically taken after the first year of graduate study. The student must have a minimum QCA of 3.0 to be eligible to take the Qualifying Exam. Please see the Graduate Coordinator for Student Guidelines for the Qualifiying Examination.

1 | Page


The examination is based upon a student’s defense of an original research proposal developed to solve a problem chosen by the student’s advisory committee. Approximately 3 weeks are provided to prepare a written proposal the student then defends in an oral presentation to his or her committee. The student is expected to demonstrate proficiency in the general field of materials science as well as an advanced understanding of the fundamentals related to their individual proposal. The examination may draw heavily from the core curriculum. It is recommended that students entering without a Materials Science B.S. degree familiarize themselves with the materials field by taking MSE 2034 or by reading an introductory textbook such as W. Callister’s, “Materials Science and Engineering.”

Students are evaluated on their ability to formulate a rational approach to solving the assigned problem as well as on their grasp of fundamental principles. Students who fail the qualifying examination on their first try are permitted one additional attempt.

Preliminary Examination Upon satisfactory completion of the Qualifying Examination, students devote a major portion of their time to thesis research. When they have identified a potential dissertation topic (typically within 12 months of the Qualifying examination) they prepare a written proposal that is distributed to their advisory committee and defended in an oral examination (the Preliminary Examination). The Preliminary Examination should establish the basis and goals for the student’s proposed thesis research, and the student should demonstrate a firm understanding of the relevant literature.

Final Public Oral Examination The final step in earning the Ph.D. is the satisfactory defense of the dissertation at the Final Public Oral Examination for the Degree of Doctor of Philosophy. This final examination typically occurs in the fourth or fifth year of graduate study and should be at least 6 months after completing the preliminary examination.

3 Curriculum

All full-time graduate students must enroll (pass/fail) and participate satisfactorily in the graduate seminar course, MSE 5015-16, each semester they are resident at the Blacksburg campus. M.S. and M.Eng. students must present one seminar during the course of their studies; Ph.D. students must present two seminars during their tenure. Seminar presentations at other schools/departments and/or conference talks may not be substituted for presentations in the MSE graduate seminar course. MSE graduate students are expected to take at least four 5000 level MSE courses. These four courses will form the core of their work for their Plan of Study. Typical course schedules for master’s and doctoral students are shown in section 5.2.

A list of the graduate courses and the undergraduate courses approved for graduate credit that are offered by the Department is available in the Gradate Catalog. The current version of the catalog

is maintained on the Graduate School’s website at:

http://graduateschool.vt.edu/graduate_catalog/

2 | P a g e


4 Administration

The graduate program in the Materials Science and Engineering Department is administered by a Graduate Committee headed by a Graduate Chair, and a Graduate Coordinator. Student records and various approval forms are maintained by the Graduate Coordinator. The MSE Department Graduate Committee is responsible for selecting students for admission, for reviewing the curriculum, and for setting program standards. The department head appoints members of the Graduate Committee. Current personnel are:

Department Head D.E. Clark

Graduate Committee Chair Gary Pickrell

Associate Department Head Robert W. Hendricks Graduate Coordinator Kim Grandstaff

4.1 Admission

The application procedure and forms are available from the Virginia Tech Graduate School, Graduate Life Center at Donaldson Brown mail code 0325, Blacksburg, VA 24061 or through the Research and Graduate Studies home page: http://graduateschool.vt.edu/. MSE’s specific application instructions are available on our website: http://www.mse.vt.edu. The Graduate Record Exam (GRE) is required for all foreign national applicants and U.S. applicants. International students whose first language is not English or who do not hold a baccalaureate degree from an English language university are also required to submit the results of the Test of English as a Foreign language (TOEFL) or the International English Language Testing System exam (IELTS). International students are required to undergo a process of certification of competence in English. Students who are native English speakers are exempt. Students who did not graduate from an English language university are required to take an English Placement Test administered by the Graduate School. This test must be taken at the beginning of a student’s first semester of enrollment. Students who pass the test are certified as proficient. Students who demonstrate a need for remedial instruction will be required to enroll in a special English course immediately. This course is counted as a regular part of a student’s course load, and successful completion constitutes certification. International students currently enrolled for advanced degrees at other American universities are not usually admitted to the University until they have completed their degree requirements. No international student will be permitted to register for classes prior to receiving a Certificate of Eligibility (I-20 AB or IAP-66) and approval from the Immigration Service to attend Virginia Tech.

4.1.1 Types of Admission

Admission to graduate study at Virginia Tech is granted by the Graduate School on the recommendation of the Department Graduate Committee. The student may be admitted into one of the following categories:

3 | P a g e


Regular Student A student with a cumulative quality credit average (QCA) of 3.00 or

higher (on an A = 4.00 basis) and whose academic background is adequate and current may be admitted with regular status. An entering student must have demonstrated competence by completing a Bachelor’s degree program in a field of engineering or science at a recognized university. Students not having adequate background in fundamental subjects, such as chemistry, mechanics, materials, mathematics, and physics will be expected to take make-up courses in the areas of their deficiencies.

Provisional Student for an applicant whose QCA is below the requirement and/or whose academic background is deficient or not current, provisional student status is allowed for no more than the equivalent of two semesters (12 credit hours of course work is equivalent to one semester) during which time the provisional student must earn a QCA of at least 3.00. Provisional students with a QCA of 2.75-2.99 will be eligible for financial assistance with departmental approval. Upon completion of no fewer than 12 credit hours of course work, the student’s graduate advisory committee may recommend that the student be admitted to regular status. International students are not eligible for consideration for admission as provisional students.

Commonwealth Campus Student Commonwealth Campus status is open to an applicant who holds an earned bachelors or higher degree from a regionally accredited U.S. university. Examples of students who seek admission into the Commonwealth Campus program include those who (a) may qualify for regular admission but do not currently wish to work for a graduate degree; (b) do not qualify for admission because of a poor undergraduate record and wish to improve their credentials; (c) need to update their academic credentials after several years of professional experience or (d) require graduate courses for professional certification. International students in F1 or J1 visa status are not eligible for Commonwealth Campus status. However, some other types of visa status may allow non-degree enrollment (note that TOEFL score requirements do apply). Students in Commonwealth Campus status are not eligible for graduate assistantships. Commonwealth Campus students are limited to 12 credits of course work while in this status. Students may not earn a graduate degree while enrolled in Commonwealth Campus status. Students enrolled as Commonwealth Campus students who later decide to pursue a graduate degree at Virginia Tech must formally apply for admission to the Graduate School. The MSE Department has the discretion to determine whether courses taken as a Commonwealth Campus student can be applied toward a degree after subsequent admission to the Department’s graduate degree program.

Non-Degree Status A student with a Bachelor’s or higher degree who fully qualifies for admission to Graduate School (on a regular or provisional basis) but who:

1. does not currently desire to work toward a graduate degree, or

2. desires to transfer the credits for use toward a graduate degree at another institution

may be admitted with the non-degree status. Upon recommendation of the Department Graduate Committee, subject to the approval of the Dean of the Graduate School, credits earned as a “non

4|P a g e


degree” graduate student may subsequently be used toward meeting graduate degree requirements. “Non-degree” graduate students are not eligible for financial assistance.

Undergraduate Students

    Dual Students (Virginia Tech Undergraduates) Seniors at Virginia Tech who intend to receive a bachelor’s degree, are within the last semester of graduation, and have a QCA of 3.0 or better, may take graduate level course work to satisfy and advanced degree program as dual registrants. Such work may only be used to satisfy graduate degree requirements when it is not used for the bachelor’s degree.

    Accelerated UG/GR Degree Undergraduate students with a 3.3 or above QCA may apply for admission to the Graduate School upon the completion of 75 hours of undergraduate study.

    The student submits the Application for Graduate Study online with the $65 application fee. Upon approval of the application, the Graduate Committee Chair will generate a letter that (i) affirms the Department’s acceptance of the student, and (ii) lists 12 credits of course work to be double counted (toward the bachelor degree and toward the master’s degree). The documents will then be sent to the Graduate School.

    During the two semesters following admission to graduate school, the student may complete the 12 hours of graduate work, jointly enrolled as a graduate and an undergraduate student. Successful completion of the specified 12 hours of graduate work with no less than a “B” average will be considered completion of the last 12 hours of the undergraduate degree. These 12 credit hours of course work will be counted toward both the B.S. degree and the master’s degree.

    Students admitted to the Accelerated UG/GR program in MSE will be treated as non-thesis masters (M.Eng.) students supported on their own funds. If they wish to pursue a thesis master’s degree (M.S.), they must find a faculty advisor willing to support their research, and upon completion of the B.S. degree, they can be considered along with the pool of entering graduate students for graduate assistantships.

4.1.2 Financial Support

Assistantships Graduate appointments with financial support are referred to as Graduate Assistantships. Graduate Assistantships are generally provided for M.S. and Ph.D. candidates but not usually for M.Eng. students. Assistantship offers are based upon the availability of funds and upon the academic qualifications and interests described in a student’s application materials.

    Upon accepting financial aid as a Graduate Assistant, a student is expected to perform assigned duties (a research project, grading for an instructor, assisting in a lab, etc.). Students on an assistantship are required to work a maximum of 20 hours per week. Each student will be evaluated continuously by the faculty member supervising his or her work. If the student’s work performance is not satisfactory, upon due notice, his or her financial support may be discontinued. In addition, the student must maintain a QCA of 3.00 or better on all courses taken as a graduate student irrespective of whether or not the courses are listed on the plan of study. Financial support for summer school is handled on an individual basis. Financial support may be extended on a year to year basis, within the guidelines of the Graduate School upon mutual agreement of the student and project director or Department Head.

5 | P a g e


Fellowships/Scholarships The MSE Department encourages students to apply for externally-sponsored fellowships and scholarships to help defray their educational expenses. Funding for external fellowships can come from federal agencies or private foundations and they can confer some prestige to the recipient. Fellowships and scholarships sometimes target students from specific backgrounds or seek to encourage students to pursue particular research areas.

5 Degree Requirements

5.1 Student Responsibilities

Students are expected to be knowledgeable of and to comply with all University and Departmental graduate regulations as stated in this document and official publications such as the Graduate Catalog and the Graduate Student Manual.


6 | P a g e


5.2 Credit Requirements and Typical Course Schedules




         aStudents are required to register for MSE seminar each semester of residence; the seminar credits can be counted toward the minimum number required in courses numbered 5000 and higher

         bAdditional hours of 5974 and 5984 may be taken, but cannot be credited toward the minimum hours for the degree. All courses should be listed on the Plan of Study by title, not “Special/Independent” Study. Undergraduate Independent Study (4974) may not be used to satisfy minimum degree requirements.

Ph.D. in MSE

Courses

Credit Hours


Min.

Max.

5000 level or higher a

27


Seminar b

2

4

Special/Indep. Study c

(5974, 5984, 6984)

---

12 of either,

18 total

4000 level, not appr. Grad. credit d

---

6

Research and Dissertation (7994)

30


Minimum Total e

90

--


aCourses numbered 5000 or above may not be taken on a pass/fail basis except when offered P/F only.

         bStudents are required to register for MSE seminar each semester of residence; the seminar credits can be counted toward the minimum number required in courses numbered 5000 and higher

         c5974 and 5984 may be used in meeting minimum requirements for courses numbered 5000 or higher. All courses should be listed on the Plan of Study by title, not “Special/Independent” Study.

         dA maximum of 6 credit hours may be in 4000 level courses not approved for graduate credit if outside the student’s major field and if judged by the student’s committee to be on a level warranting graduate credit. Any number of 4000 level courses approved for graduate credit may be counted toward the 90 hour total.

         eUp to 50% of the graded credit hours may be transferred upon approval of the Advisory Committee. Research hours counted toward a master’s degree cannot be counted toward the Ph.D. All transfer courses must have been taken for credit with an earned grade of “B” or better. “Satisfactory” or “Pass” grades are unacceptable unless the course is only offered Pass/Fail.

7 | P a g e



Example M.Eng. Course Schedule a

1st Fall

3 cr

3 cr 3 cr

1 cr

2 cr

MSE 5xxx (Your choice)

MSE5xxx (Your choice)

5xxx (Your choice)

MSE 5015 Seminar

MSE 5904 Project & Report

1st Spring

3 cr 3 cr

3 cr

1 cr

2 cr

MSE 5xxx (Your choice) MSE 5xxx (Your choice) 4xxx/5xxx (Your Choice) MSE 5016 Seminar

MSE 5904 Project & Report

2nd Fall

5 cr

1 cr

2 cr

4 cr

4xxx/5xxx (Your Choice)

MSE 5015 Seminar

MSE 5904 Project & Report

MSE 5904 Project & Report b


Example M.S. Course Schedule a

1st Fall

3 cr 3 cr

3 cr

1 cr

2 cr

MSE 5xxx (Your choice)

MSE 5xxx (Your choice)

4xxx/5xxx (Your choice)

MSE 5015 Seminar

MSE 5994 Research & Thesis

1st Spring

3 cr 3 cr

3 cr

1 cr

2 cr

MSE 5xxx (Your choice) MSE 5xxx (Your choice) 4xxx/5xxx (Your Choice) MSE 5016 Seminar

MSE 5994 Research & Thesis

2nd Fall

1 cr 1 cr

6 cr

4 cr

4xxx/5xxx (Your Choice)

MSE 5015 Seminar

MSE 5994 Research & Thesis

MSE 5994 Research & Thesis b

2nd Spring

1 cr 11 cr

MSE 5016 Seminar

MSE 5994 Research & Thesis b


aboldface courses are required and apply toward minimum credit requirements for the degree.

         bthese additional research credits are not needed to reach the minimum credit requirements for the degree, but they may be necessary to maintain full-time student status (12 credits for students on assistantships, 9 credits for self-supported students). Students may take up to 18 total credits per semester.

8 | P a g e



Example Ph.D. Course Schedule a

1st Fall

3 cr 3 cr

3 cr

1 cr

2 cr

MSE 5xxx (Your choice)

MSE 5xxx (Your choice)

4xxx/5xxx (Your choice)

MSE 5015 Seminar

MSE 7994 Research & Dissertationb

1st Spring

3 cr

3 cr

3 cr

1 cr

8 cr

MSE 5xxx (Your choice)

MSE 5xxx (Your choice)

4xxx/5xxx (Your Choice)

MSE 5016 Seminar

MSE 7994 Research & Dissertationb

2nd Fall

9 cr 1 cr

8 cr

5xxx (Your Choice)

MSE 5015 Seminar

MSE 7994 Research & Dissertationb

2nd Spring

1 cr 17 cr

MSE 5016 Seminar

MSE 7994 Research & Dissertationb

3rd Fall

1 cr 11 cr

MSE5016 Seminar

MSE MSE 7994 Research & Dissertationb

3rd Spring

1 cr 11 cr

MSE 5016 Seminar

MSE 7994 Research & Dissertationb


aboldface courses are required and apply toward minimum credit requirements for the degree.

         bMSE 5904 or MSE 5994 research credits cannot be counted toward the Ph.D. degree. Students may take up to 18 total credits per semester. To be considered full-time, students on an assistantship must take at least 12 credits per semester; self-supported students must take 9 credits per semester.


9 | P a g e


5.3 Advisory Committee

As early as possible, and prior to completing 12 credit hours beyond the baccalaureate, each student must identify a faculty member who will serve as his or her major professor. The major professor will serve as the thesis/dissertation advisor and chairman of the student’s advisory committee. Students are encouraged to confer with as many faculty members as possible before making this choice.

   The function of the student’s advisory committee is to approve the plan of study, provide advice, and periodically assess whether the student is making satisfactory progress toward a degree. The advisory committee for M.Eng. and M.S. students will be composed of a chair (who must be a Virginia Tech faculty member or research professor) and a minimum of two other faculty members. One of the three committee members must be either member or adjunct members of the MSE Department. Additional committee members beyond the required faculty members may be drawn from industry. The advisory committee for students who have yet to select their own advisory committee is the Department Graduate Committee.

   The advisory committee for Ph.D. students will consist of a chair (who must be a fulltime faculty or research professor affiliated with a department) and three other faculty members. At least two committee members must be full-time, research, or adjunct faculty affiliated with the MSE Department, and the committee must include faculty from at least one department other than MSE.

5.4 Plan of Study

All graduate students must submit an approved Plan of Study. The Plan must meet the minimum requirements for the degree being sought and must be approved by the student’s advisory committee and the Graduate School. For master’s students, the plan should be submitted before completing 12 credit hours of study of Virginia Tech; for Ph.D. students, the plan of study should be submitted before completing 20 credit hours beyond the baccalaureate degree or 12 hours beyond the master’s. Students should obtain a Plan of Study Form (from the MSE Graduate Coordinator), fill it out after consulting with their advisor and advisory committee, obtain the signatures of their advisor and advisory committee members, and submit it to the MSE Graduate Program Chair. The Graduate Program Chair will check that degree requirements are satisfied and have the plan submitted electronically to the Graduate School for final approval.

   Transfer credits from other institutions are approved by including them on the Plan of Study; the must be accompanied by a catalog description of the course(s) and a transcript indicating the grades(s) received.

   A change in the Plan of Study is necessary whenever the student’s course of study deviates from the original plan approved by the advisory committee. Plan Change forms are available on the Graduate School’s web page: http://graduateschool.vt.edu/forms/index.html. A change in the plan of study is also required to change members of the student’s advisory committee. A form for this purpose is available on-line as well.

10 | P a g e


5.5 Doctoral Residency Requirement

At least 24 graduate-level credit hours, including no less than 15 hours of course work (not research 7994), must be completed while in residence at the Virginia Tech Blacksburg campus. Students may receive residence credits during the summer sessions, but not during any fall or spring semester in which they are enrolled for fewer than 6 credits or if they are employed externally more than 20 hours per week. The Graduate School may grant policy exception to individual degree programs and students.

   The Graduate School may permit individual degree programs to allow their students to satisfy the residency requirement at non-Blacksburg locations. Requests for such alternative location residency must be made in writing to the Graduate Dean (by letter for existing programs or as part of the program proposal for new programs). Such requests must provide a discussion of how the particular program at the alternate location will achieve the residency purposes (these purposes are described in University Policy memorandum No. 200). Where the proposed alternate residency location is a commercial entity or government laboratory, the request must include an agreement between the University and the commercial entity or government laboratory. Such agreement will specifically define the research environment that till be maintained to meet the residency requirement. The Graduate School will report annually to the Commission on Graduate Studies and Policies on the success level of the alternative residency. The Graduate School retains the right to withdraw the permission for such alternate forms of residency, if deemed necessary. Approved locations (other than the Blacksburg campus) which currently are approved for satisfying the Ph.D. residence requirement include the Virginia Consortium of Engineering and Science Universities (VCES) site located in Hampton Roads Virginia, and the National Institute for Aeronautics, also located in Hampton.

5.6 Registration

Registration for classes can be completed until the deadline specified on the University Calendar. Pre-registration, which takes place the preceding semester, is done by selecting the courses to be taken though Hokie Spa. It is important to pre-register. The MSE Department often cancels under-enrolled courses based upon pre-registration statistics.

   All graduate students who are fully supported on an assistantship, whether continuing or new, are required to register for no less than 12 and no more than 18 credits per semester. Graduate Assistants are not required to enroll during the summer. The required credits may consist of any combination of regular course credits and credits from variable credit courses (5904, 5974, 5984, 5994 or 7994).

5.7 Time Limit

Academic work, including transfer credits, taken more than five years before the date on which the master’s or Ph.D. degree is awarded may not be used to satisfy degree requirements. Requests to re-validate course work may be made by the student’s advisory committee to the Graduate School.

11 | P a g e


5.8 Final Examinations

   The student must be registered during the semester in which the final examination is administered and degree requirements are completed. If registration is for defense of thesis/dissertation only, the student may enroll with “Defending Student Status” for 3 credit hours (or 1 credit hour provided the final examination is held within the first 20 class days of the term). However, students supported on a full Graduate Assistantship must enroll for at least 12 credit hours.

   Each candidate for an M.S. degree must pass a final oral and/or a written examination. The examining committee will be composed of a minimum of three members. To pass the final examination, a candidate must have a favorable vote from a majority of the examining committee. If a student fails the final examination, there must be a lapse of one full semester (a minimum of 15 weeks) before rescheduling the examination. The student is allowed no more than two opportunities to pass the final examination.

   The final examination for the Ph.D. is an oral defense of the dissertation and is administered by the advisory committee (four members must be present).This exam must be scheduled no earlier than six months after successful completion of the Preliminary Examination.

5.9 Academic Eligibility

The University requires that candidates for graduate degrees must maintain a 3.00 quality credit average (QCA) computed over all courses taken at the University. In addition, the MSE Department requires that students maintain a 3.00 average for all courses numbered 4000 and above. A student who fails to maintain a 3.00 will be placed on departmental probation. The student must raise their average above 3.00 during the next academic semester to be removed from probation. Failure to regain regular status is grounds for dismissal. Failure to maintain a 2.0 average during any single semester is also grounds for dismissal. Transfer courses are not used to compute University or Departmental QCA.

5.10 Progress Towards Degree

Each student must consult with the Graduate Chair or the Associate Department Head and select an initial faculty advisor by the end of their first semester in the Department. The initial advisor is responsible for guiding the student to the appropriate academic resources during the period of time before the student has selected a regular faculty advisor (the chair of their Advisory Committee). The faculty advisor (initial or regular) is responsible for meeting with the student, typically at the beginning of the spring semester, to review the student’s progress toward a degree. The Graduate Coordinator will provide advisors with a form to guide the annual review of each student. Once a student’s progress has been reviewed with the student, the review form should be returned to the Graduate Coordinator and filed with the student’s academic records and the Graduate School.

12 | P a g e


  The following tables indicate typical times required to reach the important benchmarks of the three graduate degrees.

M.Eng. Degree

Time Since Admission

Progress

0-6 months

0-12 months

12-18 months

Select project advisor, advisory committee

Submit Program of Study

Submit Project Report


M.S. Degree

Time Since Admission

Progress

0-6 months

0-12 months

12-18 months

Select thesis advisor, advisory committee

Submit Program of Study

Defend thesis dissertation


Ph.D. Degree

Time Since Admission

Progress

0-6 months

0-12 months

12-18 months

18-24 months

36-48 months

Select thesis advisor, advisory committee

Submit Program of Study

Pass Qualifying Exam

Submit research proposal, pass Prelim Exam

Defend dissertation


6 Forms and Checklists

The following forms are important at various stages of the graduate student’s tenure. All of the Graduate School’s forms (with the exception of the Plan of Study Form, which may be obtained from the MSE Graduate Coordinator) are available on their web page: http://graduateschool.vt.edu/forms/index.html .

Plan of Study Form This form identifies the student’s graduate advisory committee and lists the courses the student has taken or plans to take to fulfill the requirements for their particular degree. It should be obtained from the MSE Graduate Coordinator (this particular form is not available from the Graduate School), filled out by the student, signed by the student’s advisory committee, and returned to the MSE Graduate Coordinator. It then will be entered electronically in the Graduate School’s database.

Independent Study Request Form Approval form required to enroll in an independent study course (available from the MSE Graduate Coordinator).

13 | P a g e


Request for Leave of Absence Used when studies are interrupted for a semester or more. Application for Graduate Readmission For returning following a leave of absence.

Program Change Form This form is used to make course changes on a student’s Program of Study.

Change of Committee/Advisor Form This form is used to change advisors or committee members on a student’s Plan of Study.

Request to Admit Candidate to Preliminary Examination Used by Ph.D. candidates to notify the Graduate School of the place and time of a student’s preliminary exam and to obtain a committee signature card for the exam.

Certification of Defending Student Status For use to avoid paying a semester of tuition when the thesis defense will be completed no later than 20 days after the first day of class.

Request to Admit Candidate to the Final Examination Used by M.Eng., M.S., and Ph.D. candidates to notify the Graduate School of the place and time of a student’s final examination and to obtain a committee signature card for the exam.

6.1 Thesis/Dissertation, Project Report Document

All M.Eng. project reports, M.S. theses, and Ph.D. dissertations advised by MSE Department faculty must be prepared according to the guidelines of the University’s Electronic Thesis and Dissertation Initiative. The current guidelines and information on Thesis/Dissertation format is available at http://etd.vt.edu/guidelines/ . In addition, students should ask their advisor if they want a hardcopy of the final version of the thesis or dissertation; the MSE Department does not require a hard copy.

   The final version of the electronic thesis or dissertation (ETD) must be submitted to the Graduate School no later than two weeks after the successful completion of the final examination. If this deadline cannot be met, the advisor must send an email request for an extension to the dean of the Graduate School.

6.2 Graduation

Schedule Final Exam or Final Defense All graduate students must schedule a final exam or final defense. A form to schedule the final examination can be found on the Graduate School’s web page. Once completed, it is to be returned to the Graduate School with a copy to the MSE Department no than two weeks prior to the date of the examination to permit a complete clerical review and to ensure that all degree requirements have been satisfied. The Department office will prepare and post a public announcement of the examination.

Application for Degree Card This can be done on-line through Hokie Spa. A one-time charge of $25 is required. This must be completed by the dates posted on the Graduate School’s website and distributed via email each semester. If you do not apply for your degree on time, your

14 | P a g e


name will not appear in the Commencement Bulletin and there will be a delay in receiving your diploma. If you expect to graduate within the next semester, please submit your application for degree as soon as possible.

Submission of Final Thesis/Dissertation Students have two weeks after the date of the exam to electronically submit their revised thesis or dissertation to the Graduate School (http://etd.vt.edu/guidelines/) for details, or for M.Eng. students, to submit their project report to the Department. Please check with your advisor to see if he/she wants a hard copy of the final version of the thesis, dissertation, or report. If additional time is needed, the advisor will need to submit a request in writing to the Dean of the Graduate School indicating the reason and when the copies will be submitted.

Statement of Completion If a statement is needed, the request should be made at the Graduate School office. Upon request, completion statements will be sent after all degree requirements have been met, including the submission of final copies of thesis, dissertation, or project report. Limit of two letters. At least one week notice is required.

Record Review You can always check your progress toward degree any time during your graduate studies by visiting your graduate checklist on Hokie Spa. It is strongly suggested that all students stop by the Programs and Clearances office at the Graduate School to verify that all records are complete before leaving campus. For more information on graduation procedures please contact Graduate School.


15 | P a g e


MSA07 MANUFACTURING

TRAINING PACKAGE

Version 8

WA NOMINAL HOURS

GUIDE


Western Australian Department of Training and Workforce Development

June 2012


CONTENTS


Introduction 2

Obtaining the Training Package 3

Version Modification History 4

Transition Arrangements 7

Nominal Hours 7

Qualifications and Nominal Hours 8

Units of Competency and Nominal Hours 9

Mapping Units of Competency 12

Mapping MSS11 Units of Competency 13

Traineeships 17


Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 1 of 18


Introduction

This Implementation Guide has been generated to enable the stakeholders in the Manufacturing Industry in Western Australia to participate in the managed implementation of the National MSA07 Manufacturing Training Package Version 8.

This Guide is designed to aid Registered Training Organisations (RTOs) to convert from existing Training Package qualifications to new Training Package qualifications within the scope of their training delivery.

The Guide should be read in conjunction with the endorsed components of the Training Package

The MSA07 Manufacturing Training Package Version 8 was released by Training.Gov.Au (TGA) on the 8 May 2012.



Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 2 of 18


Obtaining the Training Package

The MSA07 Manufacturing Training Package can be purchased from:


Office: Level 8, 80 Arthur Street

North Sydney NSW 2060

Postal: PO Box 289

North Sydney NSW 2059

T: 1800 358 458 | F: (02) 9955 8044

E: info@mskills.com.au 

W: www.mskills.com.au 

Information on National Training Packages is also available through Training.Gov (TGA), which can be located on the Internet at: www.training.gov.au 

All RTOs who have Training Package qualifications on their Scope of Delivery

must have access to the relevant Training Package.



Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 3 of 18


Version Modification History

The version details of this endorsed Training Package are in the table below. The latest information is at the top of the table.

Version

Release Date

Modification History

8.0

8 June 2012

Endorsed changes

Addition of two new units:

* MSABLIC001 License to operate a standard boiler

* MSABLIC002 License to operate and advanced boiler

ISC upgrades

* Inclusion of two boiler licensing Skill Sets

* Inclusion of 59 units imported from MSS11v2

* Competitive Manufacturing qualifications superseded by new Competitive Systems and Practices (endorsed in MSS11v2).

* Competitive Manufacturing units of competency in other MSA qualifications replaced by Competitive Systems and Practices units imported from MSS11v2.

7.0

November 2011

Addition of two new qualifications:

- MSA40311 Certificate IV in Process Manufacturing

    - MSA50311 Diploma of Production Management Inclusion of 51 additional; imported units.

(Refer to mapping for details.)

ISC upgrades include:

- Addition of a Leading Hand/Supervisor Skill Set

- Updating of imported units

- Minor editorial changes

- Imported units updated in relevant qualifications.

6.0

April 2011

Endorsed changes

Addition of eight new qualifications and six new units of competency for

recreational vehicle manufacture, retailing, service and repair.

Inclusion of an additional 82 imported units as electives for recreational vehicle qualifications.

Two new units of competency for water jetting included as electives in MSA30309.

One new unit of competency to replace a deleted imported unit.

ISC upgrades

11 qualifications adjusted for flexibility/sustainability requirements (refer

to mapping for details)

Minor edits to 5 MSAPM units (MSAPMOHS100A, OHS200A, OPS101A, OPS363A and SUP106A)

Imported units updated and minor typographical errors corrected in mapping.

Refer to Summary Mapping for details of changes to qualifications and units within the Training Package.

5.1

July 2010

ISC Update

Eight qualifications adjusted to comply with flexibility rules:

* MSA10107

* MSA10207

* MSA20107


Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 4 of 18



Version

Release Date

Modification History



* MSA21108

* MSA30107

* MSA30309

* MSA31108

* MSA41108

Confined Space Entry units updated to comply with revised Australian Standard AS2685-2009:

* MSAPMPER200C

* MSAPMPER205C

* MSAPMPER300C

Sustainability units (MSAENV272B, MSENV472B and MSAENV672B) updated to clarify terminology and to expand Range of Variables to better incorporate environmental sustainability

PML04 units of competency updated to MSL09 units in:

* MSA30208

* MSA40108

* MSA50108

* MSA60108

5

November 2009

* One new qualification – MSA30309 Certificate III in Surface Preparation and Coating Application

* Three new units of competency and an additional 35 imported

units for inclusion in MSA07 aligned to the new certificate

* Fourteen new units of competency and five Skill Sets for Trade

Measurement (not aligned to any qualifications).

Refer to History in the Training Package for details.

* In addition, minor corrections have been made tot the Overview of Assessment Requirements in the Evidence Guide for two sustainability units:

o MSAENV272A

o MSAENV472A

4

27 July 2009

Includes two new qualifications:

* MSA71109 Vocational Graduate Certificate in Competitive Manufacturing

* MSA81109 Vocational Graduate Diploma of Competitive Manufacturing

It also includes 21 new units of competency:

MSACMG700A MSACMG701A

MSACMG702A MSACMG703A

MSACMG704A MSACMG705A

MSACMG706A MSACMG707A

MSACMG708A MSACMG709A

MSACMG710A MSACMG711A

MSACMG712A MSACMG800A

MSACMG801A MSACMG802A

MSACMG803A MSACMG804A

MSACMG805A MSACMG806A MSACMG807A

3.1

12 March 2009

Includes six new units and the importation of an additional 10 MEM units for a new structural steel detailing stream in the following existing qualifications:


Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 5 of 18



Version

Release Date

Modification History



* MSA30208 Certificate III in Manufacturing Technology

* MSA50108 Diploma of Manufacturing Technology

Miscellaneous typographical errors have been corrected. Refer to the Training Package Modification History for details.

3

19 August 2008

MCM04 qualifications and units of competency recoded and placed in MSA07. Key Competencies have been replaced in Competitive Manufacturing units with Employability Skills.

Two new pathways for metallurgy and polymer technology have been added to the existing Technology Cadetship qualifications, now coded MSA30208 and MSA40108.

Two new Technology Cadetship qualifications:

* MSA50108

* MSA60108.

Category 1 changes to following MSAPM units resulting from review of PMA08:

* MSAPMPER200B

* MSAPMPER205B

* MSAPMPER300B

* MSAPMOHS210B

Two additional MSAPM units:

* MSAPMPER202A

* MSAPMPER400A.

Deletion of MSAPM302A.

Category 1 changes as a result of recoding of MCM units and changes to MSAPM units to:

* MSA10107

* MSA10207

* MSA20107

* MSA30107

Additional Category 1 changes to MSA10107 to include updated versions of LMT and LMF units.

2

16 November 2007

Addition of three production support certificates and other generic units for use across the three process manufacturing Training Packages (PMA, PMB and PMC). This included the three new sustainability units.

Units of Competency in MSA10107 Certificate I in Manufacturing (Pathways) updated with units from PMB07.

1

April 2007

Initial release


Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 6 of 18


Transition Arrangements

Registered Training Organisations (RTOs) are required to deliver Training Package

qualifications within 12 months of the release date of the Training Package on to Training.gov (TGA).

Students currently enrolled in an existing version of the Training Package qualification should be permitted to complete the program they enrolled in initially, unless the move to the related qualification from a Training Package can be made without disadvantage to a student.

Nominal Hours

The Commonwealth Department of Employment, Education and Workplace Relations’ definition of nominal hours states:

“The value assigned to a structured program of study that nominally represents the anticipated hours of supervised learning and/or training deemed necessary to conduct training/learning and assessment activities associated with the program of study”

Source: National Quality Council Training Package Glossary Version V2.1 17/03/2010 http://www.deewr.gov.au/Skills/Overview/Policy/TPDH/Downloads/Documents/Training PackGlossary.pdf

Nominal hours are identified for each Training Package qualification. Total nominal hours may vary within a qualification depending on the units of competency

In Western Australia, nominal hours are used as a mechanism for funding allocation.


Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 7 of 18


Qualifications and Nominal Hours

The following table provides a summary of the units of competency and nominal hours in the industry MSA07 Manufacturing Training Package Version 8.0

National Nominal

Training Package Unit Title

ID Hours

MSA10107

Certificate I in Manufacturing (Pathways)

270

MSA10207

Certificate I in Process Manufacturing

288

MSA20107

Certificate II in Process Manufacturing

427

MSA20208

Certificate II in Manufacturing Technology

356

MSA20510

Certificate II in Recreational Vehicle Service and Repair

331

MSA20610

Certificate II in Recreational Vehicle Manufacture

372

MSA30107

Certificate III in Process Manufacturing

558

MSA30208

Certificate III in Manufacturing Technology

390

MSA30309

Certificate III in Surface Preparation and Coating Application

731

MSA30510

Certificate III in Recreational Vehicle Service and Repair

447

MSA30610

Certificate III in Recreational Vehicle Manufacture

516

MSA30710

Certificate III in Recreational Vehicle and Accessories Retailing

520

MSA40108

Certificate IV in Manufacturing Technology

526

MSA40311

Certificate IV in Process Manufacturing

910

MSA40510

Certificate IV in Recreational Vehicles

744

MSA40710

Certificate IV in Recreational Vehicle and Accessories Retailing

823

MSA50108

Diploma of Manufacturing Technology

778

MSA50311

Diploma of Production Management

496

MSA50510

Diploma of Recreational Vehicles

286

MSA60108

Advanced Diploma of Manufacturing Technology

1320



Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 8 of 18


Units of Competency and Nominal Hours

The following table provides a summary of the units of competency and nominal hours in the industry MSA07 Manufacturing Training Package Version 8.

Please note: the new units for version 8 are in RED

National ID Training Package Unit Title Nominal

Hours

MSABLIC001

License to operate a standard boiler

40

MSABLIC002

License to operate and advanced boiler

60

MSAENV272B

Participate in environmentally sustainable work practices

20

MSAENV472B

Implement and monitor environmentally sustainable work practices

40

MSAENV672B

Develop workplace policy and procedures for environmental sustainability

50

MSAPCI101A

Adapt to work in industry

18

MSAPCI102A

Apply effective work practices

18

MSAPCI103A

Demonstrate care and apply safe practices at work

18

MSAPCII295A

Operate manufacturing equipment

40

MSAPCII296A

Make a small furniture item from timber

40

MSAPCII297A

Make an object from cloth using an existing pattern

40

MSAPCII298A

Make an object from metal

40

MSAPCII299A

Make an object from plastic

40

MSAPMOHS100A

Follow OHS procedures

26

MSAPMOHS110A

Follow emergency response procedures

26

MSAPMOHS200A

Work safely

26

MSAPMOHS205A

Control minor incidents

26

MSAPMOHS210B

Undertake first response to non-fire incidents

26

MSAPMOHS212A

Undertake first response to fire incidents

26

MSAPMOHS216A

Operate breathing apparatus

20

MSAPMOHS217A

Gas test atmospheres

30

MSAPMOHS220A

Provide initial First Aid response

30

MSAPMOHS300A

Facilitate the implementation of OHS for a work group

40

MSAPMOHS400A

Contribute to OHS management system

60

MSAPMOHS401A

Assess risk

60

MSAPMOHS503A

Maintain the workplace OHS management system

50

MSAPMOHS510A

Manage risk

50

MSAPMOHS601A

Establish workplace OHS management system

60

MSAPMOPS100A

Use equipment

30

MSAPMOPS101A

Make measurements

20

MSAPMOPS102A

Perform tasks to support production

30

MSAPMOPS200A

Operate equipment

40

MSAPMOPS201A

Cut polymer materials

20

MSAPMOPS202A

Fabricate polymer materials

40

MSAPMOPS212A

Use organisation computers or data systems

26

MSAPMOPS244A

Layout and cut materials

30

MSAPMOPS301A

Treat corrosion

20

MSAPMOPS363A

Organise on site work

30

MSAPMOPS400A

Optimise process-plant area

60

MSAPMOPS401A

Trial new process or product

26

MSAPMOPS404A

Co-ordinate maintenance

26

MSAPMOPS405A

Identify problems in fluid power system

40

MSAPMOPS406A

Identify problems in electronic control systems

40

MSAPMOPS601A

Design equipment and system modifications

70

MSAPMPER200C

Work in accordance with an issued permit

20

MSAPMPER201A

Monitor and control work permits

20

MSAPMPER202A

Observe permit work

20

MSAPMPER205B

Enter confined space

30

MSAPMPER205C

Enter confined space

30

MSAPMPER300C

Issue work permits

20

MSAPMPER302A

Issue work permits (hot work/confined space)

20


Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 9 of 18



National ID Training Package Unit Title Nominal

Hours

MSAPMPER400A

Coordinate permit process

30

MSAPMSUP100A

Apply workplace procedures

26

MSAPMSUP101A

Clean workplace or equipment

26

MSAPMSUP102A

Communicate in the workplace

26

MSAPMSUP106A

Work in a team

26

MSAPMSUP172A

Identify and minimise environmental hazards

20

MSAPMSUP200A

Achieve work outcomes

52

MSAPMSUP201A

Receive or despatch goods

26

MSAPMSUP204A

Pack products or materials

26

MSAPMSUP205A

Transfer loads

26

MSAPMSUP210A

Process and record information

13

MSAPMSUP230A

Monitor process operations

26

MSAPMSUP240A

Undertake minor maintenance

26

MSAPMSUP273A

Handle goods

30

MSAPMSUP280A

Manage conflict at work

20

MSAPMSUP291A

Participate in continuous improvement

26

MSAPMSUP292A

Sample and test materials and product

40

MSAPMSUP300A

Identify and implement opportunities to maximise production efficiencies

40

MSAPMSUP301A

Apply HACCP to the workplace

30

MSAPMSUP303A

Identify equipment faults

26

MSAPMSUP309A

Maintain and organise workplace records

26

MSAPMSUP310A

Contribute to the development of plant documentation

30

MSAPMSUP330A

Develop and adjust a production schedule

30

MSAPMSUP382A

Provide coaching/mentoring in the workplace

40

MSAPMSUP383A

Facilitate a team

20

MSAPMSUP390A

Use structured problem solving tools

40

MSAPMSUP400A

Develop and monitor quality systems

50

MSAPMWJ201A

Use high pressure water jetting equipment

55

MSAPMWJ301A

Operate a high pressure water jetting system

55

MSAPROD244A

Layout and cut materials

20

MSARVG201A

Tow a recreational vehicle safely

10

MSARVS201A

Install LP gas systems in a recreational vehicle

95

MSARVS202A

Repair/service LP gas systems in a recreational vehicle

25

MSARVS301A

Develop and update caravan industry knowledge

20

MSARVS401A

Assess and quote to service a recreational vehicle

35

MSARVT201A

Apply technical knowledge of recreational vehicle manufacturing to work activities

20

MSATCM301A

Test the mechanical properties of materials

30

MSATCM302A

Monitor ferrous melting and casting processes

30

MSATCM303A

Monitor non-ferrous melting and casting processes

20

MSATCM304A

Interpret basic binary phase diagrams

20

MSATCM305A

Demonstrate basic knowledge of casting operations

30

MSATCM401A

Prepare and examine metallographic samples

40

MSATCM402A

Monitor and test sands, cores and moulds

40

MSATCM403A

Evaluate mould design and gating

40

MSATCM404A

Undertake and interpret results of chemical analysis on metal samples

50

MSATCM405A

Determine and supervise heat treatment of metal

40

MSATCM406A

Apply basic chemical principles to metallurgy

60

MSATCM501A

Calculate and predict chemical outcomes in metallurgical situations

40

MSATCM502A

Identify and describe equipment for mineral and chemical processing plants

40

MSATCM503A

Recommend a refractory for an application

40

MSATCM504A

Select metal forming process

50

MSATCM505A

Select metal joining process

50

MSATCM506A

Monitor blast furnace operations

50

MSATCM507A

Monitor primary steel making process

50

MSATCM508A

Monitor secondary steelmaking operations

50

MSATCM509A

Recommend ferrous and non ferrous metals or alloys for an application

50


Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 10 of 18



National ID Training Package Unit Title Nominal

Hours

MSATCM510A

Apply metallurgical principles and techniques in welding and other thermal processes

60

MSATCM511A

Apply metallurgy principles and practice to determine metal forming and shaping processes

60

MSATCM512A

Apply metallurgy principles and practice to optimise furnace operation

60

MSATCM513A

Plan and complete metallurgical projects

40

MSATCM514A

Select surface treatment methods for metallic components or products

40

MSATCM515A

Analyse metallurgical failures of components and recommend preventative measures

60

MSATCM516A

Select non metallic materials for engineering applications

60

MSATCM517A

Determine corrosion prevention strategies for metal and alloys

60

MSATCM518A

Interpret complex binary phase diagrams

40

MSATCS301A

Interpret architectural and engineering design specifications for structural steel detailing

35

MSATCS302A

Detail bolts and welds for structural steelwork connections

15

MSATCS501A

Detail standardised structural connections

50



Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 11 of 18


Mapping Units of Competency

The following table provides an overview of the qualifications from the Version 8 which replace qualifications from the existing version of the MSA07 Manufacturing Training Package.

Version 7 Version 8

Nominal Nominal

Code Title hour Code Title hour

No previous equivalent MSABLIC001 License to operate a standard boiler 40

No previous equivalent MSABLIC002 License to operate and advanced boiler 60


Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 12 of 18


Mapping MSS11 Units of Competency

The following table provides an overview of the units of competency from the MSS11 Sustainability Training Package Version 2 which replace units of competency from the MSA07 Manufacturing Training Package.

Version7MSA07Version2MSS11

NominalNominal

Title hourCodeTitle hourCode

MSACMC210A

thechangeonManageownimpactworkof



40

MSS402010A

changeonManagetheownimpactworkof

40

MSACMC410A

gauactuifrnnmchangeinaenvironmentLead


MSS403010A

50

gpleetiimmnnFacilitatechangeinanorganisation

practicessystems competitive and

50

MSACMC411A

gaufactuirnnmteamcompetitiveaLead



40 MSS403011A Facilitateimplementationcompetitivesystemsofand practices

40

MSACMC413A

teamcultureimprovementLead



40

MSS403013A

cultureteamimprovementLead

40

MSACMC610A

pelatioshisrnManagenon-customerexternalwith

organisations



60 MSS405010A pelatioshisManagernnon-customerwithexternal organisations

60

MSACMC611A

gaaeMn

people

peaosslnthiri



60

MSS405011A

gaaeMn

people

peaosslnthiri

60

MSACMC612A

gaaeMn

poacelrkw

gearninl



60

MSA405012A

gaaeMn

poacelrkw

gearninl

60

MSACMC613A

culture ainimprovementacaelitFtioscihtil

gaacfnuturinm enterprise



60 MSA405013A cultureaninimprovementoscihtilacaelitFti organisation

60

MSACMC614A

peeloDvgyaesrttcommunicationsasupportot

production



50 MSS405014A gypeeloDvcommunicationsaoaesrttsupportt operations

50

MSACMG700A


70

processescontinuousReviewimprovement

MSS407013A

processescontinuousReviewimprovement

70

MSACMG701A

Prepare

changeforandimplement

70


MSS407001A

Prepare

changeforandimplement

70

MSACMG702A


70

gpracticeqechiesaacinuturfnmReviewoolsanduntt

MSS407002A

practiceqechiesReviewoperationsoolsanduntt

70

MSACMG703A

processAnalyse

changes

70


MSS407003A

processchangesAnalyse

70

MSACMG704A


70

chainaleFacilitateimprovementsinheuvinternalt

MSS407004A

alechainFacilitateimprovementsinheuvinternalt

70

MSACMG705A


70

qualitativeprocessUndertakeaachangereviewof

MSS407005A

qualitativeprocessUndertakeaachangereviewof

70

MSACMG706A

pelaioshistrnbetweeninaBuildeasmt


g auacuitnrfnmenvironment

MSS407006A

07

pelaioshisinanoperationsbetweeneastrnBuild mt

environment

70

MSACMG707A


70

frmnnnn-ocooaceaomajorRespondt

MSS407007A

frmnnnn-ocooaceaomajorRespondt

70

MSACMG708A

geailrnnyaildCaptureactivitiesinafrom


gauacuitnrfnm organisation

MSS407008A

07

geailrnnyaildactivitiesCaptureinafrom

organisation

70

MSACMG709A



valuechainFacilitateinimprovementsheexternalt

07

MSS407009A

valueFacilitateinimprovementschainexternalhet

70

MSACMG710A



Improveinworkplacevisualhetmanagement

07

MSS407010A

Improvein

workplacevisualhetmanagement

70

MSACMG711A

gechakibmnnrManage

studies



07

MSS40711A

gechakibmnnrstudiesManage

70




MSACMG712A

gprocessproblemolvisntodetermineaandLead

cause ootr solve

07 MSS407012A gprocessproblemolvisnatodetermineandLead causeoot rsolve

70


Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 13 of 18



VersionVersionS077MA2MSS11

NominalNominal

te Codete hourhourTliTliCode

MSACMG800A

eleacenvrAnalysedatafororganisationalot

g eailrnn



70

MSS408008A

geailrnneleaceAnalysedataofornvrorganisationalt

70

MSACMG801A

gpaacinuturfnmeeloDvcompetitiveheapproacht



07 MSS408001A gpaacinuturfnmeeloDvcompetitivesystemsheandt practicesapproach

70


competitiveseoolsheuAuditttof


MSACMG802A

07

MSS408002A

competitiveseheoolsuAuditttof

70


gpaacinuturfnmeeloDvodelsstateemofuturf

practice


MSACMG803A

07

MSS408003A

practicepeeloDvstateoperationsodelsemofuturf

70


peveloD

the

value

chain


MSACMG804A

07

MSS408004A

valuepeveloDstreamthe

70


gprocessesptheeailrnntheeveloDof

g auacuitnrfnmorganisation


MSACMG805A

07 MSS408005A gprocessespthetheoperationseailrnneveloDof organisation

70


psystemscontinuouseieforandeveloDrnf

gaufactuirnnm organisationsinimprovement


MSACMG806A

07 MSS408006A psystemscontinuouseieforandeveloDrnf operations inimprovement

70


ypaabilitcgolvisnproblempeveloDaof

g aufactuirnnmorganisation


MSACMG807A

07

MSS408007A

ygpaabilitcproblempolvisnanorganisationeveloDof

70

MSACMS200A

gpracticesppyaacfnuturinmcompetitivelA



40

MSS402001A

practicesppysystemscompetitiveandlA

40

MSACMS201A

processpoeesvimrntmSustain



40

MSS402002A

processpoeesvimrntmSustain

40

MSACMS400A

gaacfnuturinmacompetitivesystemImplement



50

MSS403001A

practicescompetitivesystemsaandImplement

50

MSACMS401A

processpoeesaresevimrntmEurn

sustained


MSS403002A

50

processpoeesseareEurnvimrntm

sustained

50

MSACMS405A

gaacfnuturinmgsinuaascoreteamLeadbalanced

card approach



40 MSS403005A aseacaeforuScorecardoflitFtiBalanced performance improvement

40



60

MSACMS600A

gpaacfnuturinmcompetitiveasystemeeolvD

MSS405001A

practicespcompetitivesystemsanaforeeolvDand

organisation

60



60

MSACMS601A

pamaeluvchainayaseAnland

MSS405002A

pamaaeluvstreamyaseAnland

60

MSACMS602A


60

achainManagealeuv

MSS405003A

aaleuvManage

stream

60



60

MSACMS603A

gplanspaacinuturfnmeeloDvbusinesselaedrt

MSS405004A

pplanseeloDvbusinessinanorganisation

g pleeiintmnmpracticescompetitivesystems and

60




MSACMS604A

gaacinuturfnmprocessescompetitiveinManagea

jobbing p hosenvironment

MSS405005A

60

practicessystems Managecompetitiveand

g pseodinnr qie uun customerordersotandindividual

60


Develop a Balanced Scorecard for use in competitive manufacturing

40

MSACMS605A

MSS405006A

peeloDv

a

scorecardbalanced

40

MSACMS606A


60

gauacuitnrfnmaIntroducecompetitiveorsmallot

enterprisemedium

MSS405007A

practicescompetitiveIntroducesystemsaandot

or enterprisemediumsmall

60

MSACMT220A

ypplA



proceduresquickchangeover

30

MSS402020A

yprocedurespplAchangeoverquick

30

MSACMT221A



proceduresypplAinTime(JIT)Just

30

MSS402021A

yprocedurespplATimeinJust

30

MSACMT230A



practicesypplAacosfrtworkcostot

35

MSS402030A

ypracticespplAoacosworkcosttfrt

35

MSACMT231A



productcoststermscustomerinInterpretof

30

MSS402031A

productcostsintermscustomerInterpretof

30


Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 14 of 18



VersionVersionS077MA2MSS11

NominalNominal

te CodetehourhourTliTliCode


requirements



qeieesumrntr


MSACMT240A

gaacinuturfnmproceduresappylAin5S

environment



30

MSS402040A

proceduresppylA5S

30

MSACMT250A

processypaabilictMonitor



30

MSS402050A

processypaabilictMonitor

30


ypplA

yqaliut

standards


MSACMT251A

30

MSS402051A

yqaliutypplA

standards

30


ggpailnnnauacuitnrfnmsystemsinUsesoftware


MSACMT260A

30

MSS402060A

gpailnnnUse

softwarein

systems

operations

30


gauacuitnrfnmUsesystemsinSCADA


MSACMT261A

30

MSS402061A

Use

systemsinoperationsSCADA

30


MSACMT270A

gyeernpracticessustainableUse



30

oadwfrreoedvmr–carriedUnitnot



practicessustainableUseenvironmental


MSACMT271A

30

oadwfrreoedvmr–carriedUnitnot



causeanalysisUndertakeroot


MSACMT280A

30

MSS402080A

causeUndertakeanalysisroot

30


proactiveContributeaapplicationheottof

gyatestraiteace mnnn


MSACMT281A

30 MSS402081A proactiveapplicationaContributeohettof gyatestraiteacemnnn

30


aTimeFacilitatesystemin(JIT)Just


MSACMT421A

50

MSS403021A

Facilitatea

inTimesystemJust

50

MSACMT423A

gauactuifrnnmMonitor

pullasystemlevelled



50

MSS403023A

Monitor

pullsystemaoperationslevelledof

50

MSACMT430A

practicesImprovefactorsincostwork



50

MSS403030A

practicesImprovefactorsincostwork

50

MSACMT432A

gprocessesadlihnnAnalysenmaual


MSS403032A

50

gprocessesadlihnnAnalysenmaual

50

MSACMT440A

gaufactuirnnmainenvironmentS5Lead



50

MSS403040A

S5andimproveimplementationFacilitateof

50

MSACMT441A

gaufactuirnnmcontinuousinFacilitateimprovement



40

MSS403041A

Facilitate

improvementsbreakthrough

40

MSACMT450A

Undertake process capability improvements

50

MSS404050A

ypaabilitcprocessUndertake

improvements

50

MSACMT451A

productionprocessMistakeproofa

50


MSS403051A

processMistakeoperationanproof

50

MSACMT452A


40

ygprocessespplAstatisticsaufactuirnnmtoin

MSS405052A

ypplA

processestostatisticsoperational

40

MSACMT453A

sixUse

sigma

40


techniques

MSS404053A

sixsigmaUse

techniques

40


g aacfnuturinm

50

MSACMT460A

gpanninlsoftwareseusystemsinehtacaelitFtiof

MSS404060A

gsoftwaresystemsseaeacaeinupanninlhtoflitFti

orarea team work

50



50

MSACMT461A

gaacfnuturinmasystemsinteamSCADAacaelitFti

area orwork

MSS404061A

systemsseaeacaeuinofSCADAhtlitFti

g aacfnuturinm areaorteamwork

50




MSACMT481A

proactiveanalysesaeaceeaemninntUrtnkd

MSS404081A

50

proactiveanalysesaeaceeaemninntUrtnkd

50

MSACMT482A



proactivegpeemmlntiniainaeacemninntAssist

gyaesrtt

MSS404082A

50

proactiveagpeemmlntiniinaeacemninntAssist

gyaesrtt

50

MSACMT483A

Support proactive maintenance

50

MSS404083A

proactiveaieacennntmSupport

50

MSACMT620A


60

pprocedureseeloDvquickchangeover

MSS405020A

procedurespeeloDvchangeoverquick

60

MSACMT621A

peeloDvainTimesystem(JIT)Just



60

MSS405021A

peeloDvain

TimesystemJust

60

MSACMT622A



processDesignalayout

80

MSS405022A

processDesigna

layout

80

MSACMT623A



gpaacinuturfnmeeloDvpullasystemlevelledof

60 MSS405023A peeloDv pullasystemoperationsforandlevelled processes

60

MSACMT630A



productOptimisecostof

60

MSS405030A

Optimise

productorservicecostof

60


Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 15 of 18



VersionVersionS077MA2MSS11

NominalNominal

teCodete hourhourTliTliCode

MSACMT631A

productanalysiscostsaleuvinUndertakeesrmtof

qeieesumrntrcustomerof


MSS405031A

60

Undertake value analysis of product or process costs

in terms of customer requirements

60

MSACMT632A

gyimplicationsAnalyseaieacennntmaesrttcostof


MSS405032A

60

Analyse cost implications of maintenance strategy

60

MSACMT640A

gauacuitnrfnmainManagesystemenvironment5S


MSS405040A

60

Manage 5S system in an organisation

60


acontinuoussystemimprovementImplement


MSACMT641A

MSS405041A

60

Implement a continuous improvement systems in an

organisation

60


processpyimproveDeterminecabiliatand


MSACMT650A

MSS405050A

60

Determine and improve process capability

60


Design

an

experiment


MSACMT652A

80

MSS405052A

Design an experiment

80


yprocesssixpplAsigmaocontrolandt

improvement


MSACMT653A

MSS405053A

60

Manage application of six sigma for process control

and improvement

60


applicationpeveloDenterprisesystemstheinof

gauactuifrnnm


MSACMT660A

60 MSS405060A peveloDenterprisethesystemsapplicationcontrolof organisation an in

60


informationcollectionDetermineandestablish

processes qeuieetsrnrmand


MSACMT661A

Determineinformationcollectionestablishand

60

MSS405061A

processes qeuieetsrnrm and

60

MSACMT662A

gyatestrpeveloDdocumentationforaacontrol

g aacfnuturinmenterprise



60 MSS405062A gypatestraforandocumentationeveloDcontrol organisation

60

MSACMT670A

gygaaepracticespeernsustainablemneeolvDand


MSS405070A

60

gaaegypracticespsustainableeernmneeolvDand

60

MSACMT671A

gaaemnsustainablepeeolvDandenvironmental

practices



60

,eoevmdrcarriednotUnit

forward


MSACMT675A

productaacaeenewdevelopmentofhtlitFti


MSS405075A

60

productaeacaenewofhtdevelopmentlitFti

60

MSACMT681A


60

gyproactivepaeaceaesrtteeolvDmninnt

MSS405081A

gyproactivepaaeaceaesrtteeolvDmninnt

60

MSACMT682A


60

proactivegyaesrttaaeacemninntotehtAdapt

g aacfnuturinm process sector

MSS405082A

proactivegyaesrttaotaeacemninntehtAdapt

process operations sector

60

MSACMT683A

proactivegy aesrttaaaieacennntmforAdapt

60

gaacinuturfnm operation or cyclicalseasonal

MSS405083A

proactivegyaesrttaaieacennntmaforAdapt

orbusiness seasonalcyclical

60


Western Australian Nominal Hours Guide – MSA07 Manufacturing Training Package Version 8

Page 16 of 18


Traineeships

The following table provides a summary of the traineeships available in the MSA07 Manufacturing Training Package Version 8.

VersionMSA078

QualificationteosTliurHpaieeshiTrnNational

ID

MSA20107

gaufactuiMnnrCertificateProcessinII

Process Manufacturing (Level 2)

427

MSA20610

Certificate

VehicleManufactureinRecreationalII

Recreation Vehicle Production Assistant (Level 2)

355

MSA30107

gaufactuiMnnrCertificateinProcessIII

Process Support (Level 3)

558

MSA30107

gaufactuiMnnrCertificateProcessinIII

Process Manufacturing (Level 3)

558

MSA30309

goatiCnCertificatePreparationSurfaceinApplicationIIIand

Surface Preparation and Coating Application

731

MSA30610

Certificate

inRecreationVehicleManufactureIII

Recreational Vehicle Production Team Leader (Level 3)

516

MSA50108

gaaciMuturfnngycholoTenDiplomaof

gyallMertugaaciMuturfnn-Technician

778

MSA60108

ggyaaciMuturfnncholoTenDiplomaAdvancedof

ggyaaciMuturfnnallMertu–Technologist

1320


Tidak ada komentar:

Posting Komentar