ENGINEERS | ENGINEERING JOBS | ENGINEERING COLLEGES

Saturday 20 July 2013

PPT ON ISPS


CLICK HERE TO DOWNLOAD PPT ON ISPS
ISPS  Presentation Transcript
1.ISPS
2.AMENDMENTS TO SOLAS CHAPTER
XI & ISPS CODE
The international Ship and Port Facility Security Code is the latest comprehensive code
adopted by IMO. In essence, the Code takes the approach that ensuring the security of
ships and port facilities is basically a risk management activity and that to determine what
security measures are appropriate, an assessment of the risks must be made in each
particular case.
3.The purpose of the Code is to provide a standardized, consistent framework for
evaluating risk, enabling governments to offset changes in threat with changes in
vulnerability for ships and port facilities.
To begin the process, each Contracting Government will conduct port facility security
assessments. Security assessments will have three essential components.
First, they must identify and evaluate important assets and infrastructures that are critical
to the port facility as well as those areas or structures that, if damaged, could cause
significant loss of life or damage to the port facility's economy or environment.
4.Then, the assessment must identify the actual threats to those critical assets and
infrastructure in order to prioritise security measures.
Finally, the assessment must address vulnerability of the port facility by identifying its
weaknesses in physical security, structural integrity, protection systems, procedural
policies, communications systems, transportation infrastructure, utilities, and other areas
within a port facility that may be a likely target. Once this assessment has been
completed, Contracting Government can accurately evaluate risk.
5.This risk management concept will be embodied in the Code through a number of
minimum functional security requirements for ships and port facilities. For ships, these
requirements will include:
· ship security plans
· ship security officers
· company security officers
· certain onboard equipment
For port facilities, the requirements will include:
· port facility security plans
· port facility security officers
· certain security equipment
6.In addition the requirements for ships and for port facilities include:
· monitoring and controlling access
· monitoring the activities of people and cargo
· ensuring security communications are readily available
Because each ship (or class of ship) and each port facility present different risks, the
method in which they will meet the specific requirements of this Code will be determined
and eventually be approved by the Administration or Contracting Government, as the
case may be.
7.The Port Facility
Each Contracting Government has to ensure completion of a Port Facility Security Assessment for each port facility within its territory that serves ships engaged on international voyages. The Port Facility Security Assessment is fundamentally a risk analysis of all aspects of a port facility's operation in order to determine which parts of it are more susceptible, and/or more likely, to be the subject of attack.
 Security risk is seen a function of the threat of an attack coupled with the vulnerability of the target and the consequences of an attack
8.On completion of the analysis, it will be possible to produce an overall assessment of the
level of risk. The Port Facility Security Assessment will help determine which port
facilities are required to appoint a Port Facility Security Officer and prepare a Port
Facility Security Plan.
This plan should indicate the operational and physical security measures the port facility should take to ensure that it always operates at security level
9.1.The plan should also indicate the additional, or intensified, security measures the port facility can take to move to and operate at security level
 2 when instructed to do so. It should also indicate the possible preparatory actions the port facility could take to allow prompt response to the instructions that may be issued at security level
3.Ships using port facilities may be subject to port State control inspections and additional control measures. The relevant authorities may request the provision of information regarding the ship, its cargo, passengers and ship's personnel prior to the ship's entry into port. There may be circumstances in which entry into port could be denied.
10.Responsibilities of Contracting Governments
Contracting Governments have various responsibilities, including setting the applicable security level, approving the Ship Security Plan and relevant amendments to a previously approved plan, verifying the compliance of ships with the provisions of SOLAS chapter XI-2 and part A of the ISPS Code and issuing the International Ship Security Certificate, determining which port facilities located within their territory are required to designate a Port Facility Security Officer, ensuring completion and approval of the Port Facility
11.Security Assessment and the Port Facility Security Plan and any subsequent amendments;
and exercising control and compliance measures. It is also responsible for communicating
information to the International Maritime Organization and to the shipping and port
industries.
12.Contracting Governments can designate, or establish, Designated Authorities within
Government to undertake their security duties and allow Recognised Security
Organisations to carry out certain work with respect to port facilities, but the final
decision on the acceptance and approval of this work should be given by the Contracting
Government or the Designated Authority.
13.Amendments to SOLAS
The Conference adopted a series of Amendments to the 1974 SOLAS Convention, aimed at enhancing maritime security on board ships and at ship/port interface areas. Among  other things, these amendments create a new SOLAS chapter dealing specifically with maritime security, which in turn contains the mandatory requirement for ships to comply with the ISPS Code.
14.Modifications to Chapter V (Safety of Navigation) contain a new timetable for the fitting of Automatic Information Systems (AIS). Ships, other than passenger ships and tankers of 300 gross tonnage and upwards but less than 50,000 gross tonnage, will be required to fit AIS not later than the first safety equipment survey after 1 July 2004 or by 31 December 2004, whichever occurs earlier. Ships fitted with AIS shall maintain AIS in operation at all times except where international agreements, rules or standards provide for the protection of navigational information."
15.ELEMENTS OF ISPS CODE
PART A
Mandatory Requirements Regarding The  Provisions Of Chapter XI-2 of The International
    Convention For The Safety Of Life At Sea, 1974,  as amended
1. General
This outlines the objectives and functional requirements for the code
2. Definitions
This part gives all the relevant definitions
16.3. Application
This Code applies to the following types of ships engaged on international voyages:
   Passenger ships, including high-speed passenger craft; cargo ships, including highspeed craft, of 500 gross tonnage and upwards, mobile offshore drilling units; and port facilities serving such ships engaged on international voyages.
17.4. Responsibilities Of Contracting Governments
This section covers the responsibilities of the contracting governments. Some of the key
    points are as given below
Subject to the provisions of SOLAS regulation XI-2/3 and XI-2/7, Contracting Governments shall set security levels and provide guidance for protection from security incidents
18.Contracting Governments may delegate to a recognized security organization certain of their security related duties under chapter XI-2 and this Part of the Code with the exception of:
1) setting of the applicable security level;
2) approving a Port Facility Security Assessment and subsequent amendments to an approved assessment;
3) determining the port facilities which will be required to designate a Port Facility Security Officer
19.4) approving a Port Facility Security Plan and subsequent amendments to an
approved plan;
5) exercising control and compliance measures pursuant to regulation XI-2/9
6) establishing the requirements for a Declaration of Security.
20.5 Declaration Of Security
The Declaration of Security is a document that shall address the security
requirements that could be shared between a port facility and a ship (or between ships) and shall state the responsibility for each.
A ship can request completion of a Declaration of Security when:
21.1) the ship is operating at a higher security level than the port facility or another ship it is interfacing with;
2) there is an agreement on a Declaration of Security between Contracting Governments covering certain international voyages or specific ships on Those voyages
3) there has been a security threat or a security incident involving the ship or involving the port facility, as applicable;
22.4) the ship is at a port which is not required to have and implement an approved port facility security plan; or
5) the ship is conducting ship to ship activities with another ship not required to have and implement an approved ship security plan.
23.6. Obligations Of The Company
The Company shall ensure that the ship security plan contains a clear statement emphasizing the master’s authority.
The Company shall establish in the ship security plan that the master has the overriding authority and responsibility to make decisions with respect to the safety and security of the ship and to request the assistance of the Company or of any Contracting Government as may be necessary.
24.The Company shall ensure that the company security officer, the master and the ship security officer are given the necessary support to fulfil their duties and responsibilities in accordance with chapter XI-2 and this Part of the Code.
25.7. Ship Security
This section covers the following key points
The actions to be taken by the vessel at different security levels
The actions to be taken if the vessel is operating at a higher security level than the port.
26.8. Ship Security Assessment
This section gives detailed information regarding the SSA. Some of the key points areas follows
The ship security assessment is an essential and integral part of the process of developing and updating the ship security plan
27.The company security officer shall ensure that the ship security assessment is carried out by persons with appropriate skills to evaluate the security of a ship The ship security assessment shall include an on-scene security survey and, at least, the following elements:
1) identification of existing security measures, procedures and operations;
2) identification and evaluation of key ship board operations that it is important to protect;
28.3) identification of possible threats to the key ship board operations and the
4) likelihood of their occurrence, in order to establish and prioritise security measures; and
5) identification of weaknesses, including human factors in the infrastructure,
6) policies and procedures.
The ship security assessment shall be documented, reviewed, accepted and retained by the Company
29.9. SHIP SECURITY PLAN
Each ship shall carry on board a ship security plan approved by the
Administration. The plan shall make provisions for the three security levels as defined in this Part of the Code.
30.The plan shall address, at least, the following:
1) measures designed to prevent weapons, dangerous substances and devices intended for use against persons, ships or ports and the carriage of which is not authorized from being taken on board the ship
2) identification of the restricted areas and measures for the prevention of unauthorized access to them;
31.3) measures for the prevention of unauthorized access to the ship;
4) procedures for responding to security threats or breaches of security, including provisions for maintaining critical operations of the ship or ship/port interface;
5) procedures for responding to any security instructions Contracting Governments may give at security level 3;
32.6) procedures for evacuation in case of security threats or breaches of security;
7) duties of shipboard personnel assigned security responsibilities and of other
8) shipboard personnel on security aspects;
9) procedures for auditing the security activities;
33.10) procedures for training, drills and exercises associated with the plan; procedures for interfacing with port facility security activities;
11) procedures for the periodic review of the plan and for updating;
12) procedures for reporting security incidents;
13) identification of the ship security officer;
34.14) identification of the company security officer including 24-hour contact details;
15) procedures to ensure the inspection, testing, calibration, and maintenance of any security equipment provided on board;
16) frequency for testing or calibration of any security equipment provided on board;
17) identification of the locations where the ship security alert system activation points are provided
35.18) procedures, instructions and guidance on the use of the ship security alert system, including the testing, activation, deactivation and resetting and to limit false alerts.
10 Records
Records of the following activities addressed in the ship security plan shall be kept on board
36.1. training, drills and exercises;
2. security threats and security incidents;
3. breaches of security;
4. changes in security level;
5. communications relating to the direct security of the ship such as specific threats to the ship or to port facilities the ship is, or has been;
6. internal audits and reviews of security activities;
37.7. periodic review of the ship security assessment
8. periodic review of the ship security plan;
9. implementation of any amendments to the plan; and
10. maintenance, calibration and testing of any security equipment provided on board including testing of the ship security alert system.
38.11 Company Security Officer
The duties and responsibilities of the company security officer shall include, but are not limited to:
1. advising the level of threats likely to be encountered by the ship, using appropriate security assessments and other relevant information;
2. ensuring that ship security assessments are carried out;
3. ensuring the development, the submission for approval, and thereafter the
implementation and maintenance of the ship security plan;
39.12 Ship Security Officer
The duties and responsibilities of the ship security officer shall include, but are not limited to:
1. undertaking regular security inspections of the ship to ensure that appropriate security measures are maintained;
2. maintaining and supervising the implementation of the ship security plan, including any amendments to the plan;
40.4. proposing modifications to the ship security plan;
5. enhancing security awareness and vigilance on board;
6. reporting all security incidents;
41.13.Training, Drills And Exercises On Ship Security
The training required to be given to CSO ,SSO and other ship’s personnel is specified in part B of the code. Drills at 3 monthly intervals and exercises at annual intervals are to be carried out.
42.14 Port Facility Security
This addresses similar security issues for the port such as actions at different levels of security etc.
15 Port Facility Security Assessment
16 Port Facility Security Plan
17 Port Facility Security Officer
18 Training, Drills And Exercises On Port Facility Security
43.19 Verification And Certification For Ships
Each ship to which this Part of the Code applies shall be subject to the verifications specified below:
44.Duration and validity of certificate
19.3.1 An International Ship Security Certificate shall be issued for a period specified by the Administration which shall not exceed five years
PART B of the ISPS Code provides detailed guidance regarding the provisions of
Chapter XI-2 of the annex to the International convention for the safety of life at sea, 1974 as amended and Part A of this code
Share this post
  • Share to Facebook
  • Share to Twitter
  • Share to Google+
  • Share to Stumble Upon
  • Share to Evernote
  • Share to Blogger
  • Share to Email
  • Share to Yahoo Messenger
  • More...

0 comments

:) :-) :)) =)) :( :-( :(( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ :-$ (b) (f) x-) (k) (h) (c) cheer

Labels

.PDF (2) 3D TECHNOLOGY (1) 3G (1) 4G (1) 4G TECHNOLOGY (1) 8085 MICROPROCESSOR (2) A CASE STUDY ON METHOD STUDY (1) ABAP (1) AC SUPPLY SYSTEM (1) ADDRESSING MODE (1) ADITYA CEMENT (1) ADMIXTURES (2) ADO.NET (1) Advance Processor (1) AERODYNAMIC DESIGN (1) AES (1) AGGREGATES (1) AICTE (1) AIR & DRAFT SYSTEM (2) AIR POLLUTION AND ITS LEGISLATIONS (1) Air Traffic Control (1) Airtel Mobile Service (2) AJAX (3) ALCOHOL (1) AMF PANEL (1) ANALOG AND DIGITAL FILTERS (1) ANALOG TO DIGITAL (1) Android (4) ANGLE MODULATION (1) ANIMATION (1) ANTENNA FUNDAMENTALS (1) APPLICATION DEVELOPMENT (1) APPLICATION OF NON CONVENTIONAL AND RENEWABLE ENERGY SOURCES (1) Application Programming Java (1) APPLICATIONS OF ASP.NET (1) Aricent Technologies (1) ARITHMETIC OPERATORS (1) ARM ARCHITECTURE (1) ARM Instruction Sets And Programs (1) ARM Programming (1) ARP And RARP (1) Artificial Intelligence (3) Artificial Neural Networks (1) ASH HANDLING SYSTEM (1) ASP (2) ASP .NET (6) ASP.NET FUNDAMENTALS (1) ASP.NET OVERVIEW (1) ASP.NET WITH C# (1) ASSEMBLY LANGUAGE (1) ASTRA SITE TEST (1) Attendance Management System In ASP.NET (1) AUSTRALIA (1) AUTOCAD (1) AUTOMATED TESTING (1) AUTOMATIC BEVERAGE VENDING MACHINE (1) AUTOMATION (1) AUTOMATION MANUFACTURING (1) Automobile (1) AUTOMOBILE SECTOR OF INDIA (1) Auxiliary Steam System (1) AVR INTRODUCTION (1) AVR Microcontroller Family (1) AVR RISC (1) B-SPLINE (1) B-SPLINE NOTES (1) BAR CODE TECHNOLOGY (1) BARC (1) Barcode Tech. (1) BARCODING FOR BEGINNERS (1) Barriers To Communication (1) BIG DATA (1) BINARY CODES (1) BIOCHIPS (1) BIOFULES (1) BIOLOGICAL DENITRIFICATION (1) Biophotonics (1) BIRLA CEMENT (1) BIRLA CEMENT WORKS (1) BLACK BOX TESTING TECHNIQUES (1) BLACKBERRY DEVELOPMENT (1) BLENDED CEMENTS FOR DURABLE CONCRETE STRUCTURES (1) Blu Ray Disc (1) Blue Eye Technology (1) Bluetooth (1) BOILER (1) BOILER AND AUXILIARIES (1) Boiler Normal Shut Down to Cold (1) BOILERS FUNDAMENTALS (2) Boilers In Indian Industries (1) BOKARO STEEL PLANT (1) BPO (2) BPO/KPO Job (2) BRAIN FINGERPRINTING (1) BROADBAND NETWORK OPERATION SYSTEM (1) Browser RAD Tools (1) BSNL (1) BUGZILLA (1) Bus AMBA (1) C LANGUAGE (2) C# (1) C++ (6) CABLE MODEM (1) CABLES (1) CACHE MEMORY (1) CALIBER MANAGEMENT TOOL (1) CANADA (1) CAPTCHA (1) CARBON CREDITS (1) CARGO TANK ATMOSPHERE (2) Cascading Style Sheets (1) CAT / MAT (1) CCNA (2) CDMA (1) CEERI (2) CELLULOSE (1) CEMENT CONCRETE MIX DESIGN (1) CEMENT PLANTS (1) Chameleon Chips (1) CHAOTIC- MIMO TECHNIQUES (1) CHARGED DEFECTS GETTERING AND CRYSTAL GROWING PROCESSES (1) CHEBYSHEV FILTER (1) CHHABRA THERMAL POWER STATION (1) CHROMATOGRAPHIC (1) CHROMATOGRAPHY (1) CINEMAX (1) CIRCULATING WATER (1) CIVIL AVIATION (1) CIVIL SERVICES (1) CLASSES AND OBJECTS (1) CLIMATE CHANGE FOR BETTER LIVING (2) CLOUD COMPUTING (5) Cluster Analysis (1) Cluster Computing (1) CMOS (1) COAL (1) COAL HANDLING PLANT (1) COAL TRANSPORTATION AND HANDLING (1) COBOL (1) COCA COLA (1) CODA (1) CODE LOCK (1) CODNS REPORT (1) COGNITIVE RADIO (1) COGNITIVE RADIO NETWORKS (1) COGNOS (1) Combinational logic Design (1) COMBUSTION THEORY (2) COMMUNICATION (3) COMMUNICATION SYSTEM (2) COMPUTER (5) COMPUTER CODES (1) COMPUTER DATA (1) COMPUTER FUNDAMENTALS (1) COMPUTER GRAPHICS (1) Computer Hardware (2) COMPUTER MEMORY (1) COMPUTER NETWORK TOPOLOGY (1) Computer Networking (2) COMPUTER NETWORKS (2) COMPUTER NUMBER SYSTEM (1) COMPUTER OPERATING SYSTEM (1) COMPUTER SYSTEMS (1) COMPUTER VIRUSES (2) COMPUTER'S PERIPHERALS (1) COMPUTERS (1) CONDENSER PERFORMANCE (1) CONNECTING DEVICES (1) CONSTITUENTS AND APPLICATIONS IN CONCRETE (1) Control Panels (1) COOLING TOWER (1) COPROMO (1) COQUALMO (1) CORADMO (1) CORE JAVA (1) CORRELATION AND REGRESSION ANALYSIS (1) CORROSION IN METALS (1) COSTAR SOFTWARE (1) CRITICAL PATH METHOD (1) CRM (1) CRUISE CONTROL (1) CRYPTOGRAPHY (2) CRYSTAL STRUCTURE (1) CSS (3) CT UNIT IMPULSE (1) CURIOSITY ROVER (1) CYBER CRIME (2) Cyber Forensic Tools (1) Cyber Terrorism (1) DATA COMMUNICATION (1) DATA FLOW MODEL (1) DATA LINK LAYER (1) DATA MANAGEMENT (1) Data Mining Classification and Prediction (1) Data Mining Concepts and Techniques (1) Data Mining Primitives (1) Data Preprocessing (1) Data Warehouse (1) DATA WAREHOUSING (1) DATABASE AND DATA WARAEHOUSE FUNDAMENTALS (1) Databases And DBMS (1) DATALINK LAYER (1) DB2 (1) DBMS (2) DC Supply System (1) DCCN (1) DCS (1) DEFENCE (1) Delegation Of Powers (1) DELL (1) DHCP (1) DHTML (1) DIFFUSION (1) DIGITAL SIGNATURE (1) Digital Watermarking (1) DIJKSTRA'S ALGORITHM (1) DIRECTIONAL PATTERN ANALYSIS (1) DISCOVERY (1) DISPLAY TECH. (1) Distributed Systems Principles and Paradigms (1) DISTRIBUTION SUBSTATIONS (1) DMAIC (1) DNA (1) DNA COMPUTING (1) DNS (1) DOCUMENT ARCHITECTURE (1) Doordarshan (1) DOS ATTACK (1) DRDO (1) DRUG TRANSPORT MECHANISMS (1) DRUPAL (1) DRY ETCHING (1) DSA (1) DSL (1) DTH (1) DVD TECHNOLOGY (1) DWDM (1) E GAS SEWA (1) E-BIKES (1) E-COMMERCE (2) E-PROCUREMENT SOLUTION IN NHPC (1) EIGRP (1) ELASTICITY (1) ELECTION ALGORITHMS (1) Election Algorithms and Distributed Processing (1) ELECTRIC HEATING (1) ELECTRIC MOTORS (2) ELECTRIC WELDING (1) ELECTRICAL INSTRUMENTS (1) Electrical Protections (1) ELECTRICAL SYSTEM (1) ELECTRICITY GENERATION PROCESS (1) Electromechanical Pulse Energy (1) ELECTRONIC INSTRUMENTATION (1) Electronic Milk Tester (1) ELECTRONIC TOLL COLLECTION SYSTEM (1) Electronics For Animals (1) eLitmus (1) EMAIL SYSTEMS (1) Embedded Linux (2) EMBEDDED SYSTEM (2) EMERGENCY SUPPLY SYSTEM (1) ENERGY CONSERVATION (1) ENERGY EFFICIENCY (1) ENERGY METERS (1) ENGINEERED PROTEIN (1) ENGINEERING CAREER (1) ENGINEERING PROCESSES (1) ENGINEERING REPORTS (1) ENVIRONMENT IMPACT ASSESSMENT (1) Environment Laws For Power Sector (1) ENVIRONMENTAL CONDITIONS (2) Environmental Protection Act-1986 (1) EQUATIONS (1) ERGONOMIC ANALYSIS (1) ERGONOMIC ASPECTS OF NOISE (1) ERGONOMICS (1) ERP (1) ESCORTS (1) ESP (1) ESSAR (1) ETHANOL (1) ETHICAL HACKING (1) EVEN AND ODD SIGNALS (1) EWSD (1) EXCITATION SYSTEM (2) EXTRANET (1) FACE RECOGNITION (2) FACE RECOGNITION TECHNIQUES (2) FAQs DURING AN INTERVIEW (1) FIBER OPTICS (1) Fighter Planes (1) FILE SYSTEM IN OPERATING SYSTEM (1) Fire Fighting Systems In Power Stations (1) FIREWALL (1) Flame Scanners (1) FLUE GAS SYSTEM AIR PRE HEATER (2) FLUIDIZED BED COMBUSTION SYSTEM (2) FLY ASH CONCRETE MIX DESIGN (1) Foster Wheeler Boiler (1) FOUR LEVELS OF INFORMATION SYSTEM (1) FOUR SPECIAL CASES IN SIMPLEX (1) FOURIER SERIES (1) Framework (1) FREE SPACE OPTICS (1) FREQUENCY HOPPING (2) FUEL (1) FUEL OIL SYSTEM (5) FUEL OIL SYSTEM PURPOSE (1) FULL WAVE RECTIFIER (1) FUNDAMENTALS OF MANUFACTURING SYSTEMS (1) FURNACE SAFEGUARD SUPERVISORY SYSTEM (2) FUTURE CAR (1) GAME THEORY (1) GATE (1) GENERATION OF ELECTRICITY (1) GENERATOR PROTECTION (1) GENETIC ALGORITHMS (1) Genetic Engineering (1) GENOMIC IMPRINTING (1) Genomic Library (1) Geophysical Instrumentation (1) GET AND POST METHODS (1) Gi-Fi (2) GLOBAL MANUFACTURING SYSTEM (1) GLOBAL SYSTEM FOR MOBILE COMMUNICATION (1) GMAT (1) GMPLS CONTROL PLANE (1) GOOGLE (1) GOOGLE NEXUS (1) Governing System (1) GOVERNMENT GRANTS (1) Govt. Job (3) GPRS (1) GPS (1) GRAFFITI (1) Graphics Editor (1) GRAVIMETRIC ANALYSIS (1) GRE (1) Green Computation (1) GREEN HOUSE EFFECT (1) GREEN REVOLUTION (1) GREY BOX TESTING (1) GRID COMPUTING (1) GSM (3) GSM ADVANCE TRAINING (1) GSM AIR INTERFACE (1) GSM BSS (1) GSM NETWORK ARCHITECTURE (1) GSM NETWORK INTERFACES (1) GSM RADIO TRANSMISSION (1) GSM TRAFFIC CASES (1) GSM TRAINING (1) GSS (1) HACKING (1) Hadoop (2) Handling And Disposal Of Oily Bilge Water (1) Haptics (1) HARLEY DAVIDSON (1) HEAPSORT (1) HINDUSTAN COPPER LIMITED (1) HINDUSTAN ZINC LIMITED (1) HMT (1) HOLOGRAPHY (1) Host Mobility (1) HOSTING (1) HOW DSL WORKS (1) HP BYPASS (1) HTML (5) HTTP (1) HUMAN ROBOT (1) HUMANOIDS (1) HUTCHISON TELECOM (2) HYDRO SECTOR (1) HYDROGEN ENERGY (1) HYPERTENSION (1) HYPNOSIS (1) HYUNDAI MOTORS (1) I MODE (1) IBM (1) IBM AS/400 (1) IBM INDIA (1) IC ENGINES (1) IC TECHNOLOGY (1) ILLUMINATION ENGINEERING (1) ILLUSTRATOR (1) IMAGE ENCRYPTION ALGORITHM (1) IMAGE FILE FORMATS (1) IMAGE FUSION (1) IMMUNO TECHNOLOGY (1) IMPACT OF ATMOSPHERICS ON QUALITY INFERENCES (1) IMPULSE TURBINE (1) INDUCTANCE (1) Induction Furnace (1) INDUCTION GENERATOR (1) INDUCTION MACHINE (1) Induction Motor (1) INDUCTION MOTOR MODEL (1) INDUCTION MOTOR STARTING (1) Industrial Automation (1) Industrial Design In India (1) Industrial Safety And Accident Prevention (1) Inert Gas System (1) INFORMATION SECURITY (1) INFORMATION SYSTEM FOR MANUFACTURING (1) INFOSYS (1) INFOSYS DRIVEN BY VALUES (1) INQUIRY (1) INSERTION SORTING (1) INSPECTION AND GOOD CONSTRUCTION PRACTICES (1) Integrated Management System (1) INTEGRATED MAUFACTURING SYSTEM (1) Inter Integrated Circuit (1) Internal Combustion Engines (2) Internet (4) Internet Protocol (1) INTERNETWORKING DEVICES (1) INTERRUPT MECHANISM (1) INTERVIEW SKILLS (1) INTRA ASN IEEE802.16e (1) INTRANET (1) INTRODUCTION OF GSM (1) INTRODUCTION OF THERMAL POWER PLANT (1) INTRODUCTION TO C SHARP (3) INVISIBLE BAR CODES (1) IOCL (1) ION EXCHANGE CHROMATOGRAPHY (1) ION IMPLANTATION (1) ION IMPLANTATION PROCESS (1) ION TRACK BASED TUNABLE DEVICES (1) iOS 6 (1) IP Addresses (2) iPHONE (1) iPHONE 5 (1) IS-LM MODEL (1) ISEH FRP V7.0 (1) ISM CODES (1) ISO 9001:2008 (1) ISPS (1) ISRO (1) IT And Communication Infrastructure (1) ITES (1) J2EE (1) JAVA (9) JAVA APPLICATIONS (1) JAVA BEANS (1) JAVA DATABASE CONNECTIVITY (1) JAVASCRIPT (3) JAVASCRIPT DIALOG BOXES (1) JIRO Technology (1) JK Cement (1) JK TYRE (1) Job Fair (3) JOOMLA (1) JSP (1) KRUSKAL'S ALGORITHM (1) L.T CIRCUIT BREAKERS (1) La-Mont boiler (1) LAN (1) Landmine Detection (1) LAPLACE CIRCUIT (1) Laser Security (1) LEACH (1) LIFEBUOY (1) LIGHT MICROSCOPY (1) LINEAR EQUATIONS (1) LINUX (3) Linux Booting Procedure (1) Linux Servers (1) LINUX SYSTEM (2) LITHOGRAPHY (1) LOAD SHARING (1) LOGIC CONTROLLER (1) LOGICS (1) LOGO DESIGN (1) LOW DROPOUT REGULATOR (1) LUBRICATION (1) MACHINING (1) Maglev Trains (1) MAGNETIC FORCES MATERIALS (1) MAHINDRA (1) MAINFRAME (1) MAMMOGRAMS (1) Manage IS Development (1) MANAGEMENT IN MANUFACTURING SYSTEM (1) MANUFACTURING PRESENTATION (1) MANUFACTURING EXCELLENCE (1) MARK I (1) MARK I FPA (1) MARK II FPA (1) MARPOL (1) MARS ROVER (1) MARUTI 800 (1) MASS CONCRETE MIX (1) MATLAB (3) MCA (1) MCITP (1) MEDIUM ACCESS CONTROL SUBLAYER (1) MEMS SWITCH (1) MEMS TECHNOLOGY (1) Meta Search Engines (1) METALLURGICAL TESTING (1) MICRO CANTILEVER ENERGY HARVESTER (1) MICROBIAL GROWTH (1) MICROCALCIFICATIONS (1) MICROCONTROLLER BASED ALARM SYSTEM (1) MICROCONTROLLERS (1) MICROPROCESSOR (2) Microscopic Techniques (1) MICROSOFT (MS) ACCESS (1) MICROSOFT (MS) SQL (1) MICROSOFT EXCEL (1) MICROSOFT OFFICE EXCEL 2003 (1) MICROSOFT OFFICE OVERVIEW (2) MICROSOFT OFFICE WORD 2003 (1) MICROSOFT PROJECT (1) MICROSOFT WORD (1) Microstrip Patch Antenna (1) MICROVIA TECH. (1) MICROWAVE ABSORPTION PROPERTIES OF GRAPHITE FLAKES (1) MICROWAVE COMMUNICATION (1) MICROWAVE LINK DESIGN (1) Microwave Technique (1) Milk Fat Testing (1) MINERALS (1) MIS (1) MOBILE COMPUTING (1) Mobile Number Portability (1) MOBILE SECURITY (1) MOBILE TESTING (1) MODELING AND SIMULATION FOR MANUFACTURING SYSTEM (1) MODELLING TOOLS IN MANUFACTURING (1) MODEMS (2) MODIFIED FUEL LEVEL INDICATOR (1) MODIFIER (1) MOG ANDROID (1) MOSFET (1) MOTION ECONOMY (1) MOTIVATION THEORY (1) Mozilla Firefox (1) MPEG4 (1) MPHASIS (1) MRAM (1) MRT (1) Multi Core Technology (1) MULTICAST ROUTING (1) MULTIMEDIA NETWORKING SYSTEM (1) MULTIMEDIA PROJECTS (1) MULTIMEDIA SKILLS (1) MULTIMEDIA TECHNOLOGIES (1) Multimedia Technology (1) MULTIPLE INTELLIGENCES (1) MULTISENSOR DATA FUSION (1) MYSQL (2) NANOBOTS (1) NANOTECHNOLOGY (2) NASA (1) NASCAR (1) Need Of ERP (1) NETWORK BASICS (1) NETWORK LAYER (2) NETWORK PROTOCOLS (1) Network Security (2) NETWORK SWITCH (1) NETWORKING (5) New Idea Put To Road Test (1) NEWZELAND (1) NHPC (1) NIS And Setting Up Router (1) Nokia Morph Concept (1) NOKIA SIEMENS NETWORKS (1) NON CONVENTIONAL ENERGY SOURCES (1) NONVERBAL COMMUNICATION (1) NTPC (2) NUCLEAR ENERGY (1) NUCLEAR POLLUTION (1) NUMBER SYSTEMS (1) OBJECT ORIENTED (1) OCCUPTIONAL VIBRATION (1) OFDM (1) OIL AND GAS INDUSTRY (1) OLYMPIC PRODUCTS (1) OMEGA ELECTRONICS (1) ONGC (1) ONLINE EDUCATION SERVICES (1) ONLINE MOBILE RECHARGE (1) ONLINE SHOPPING SITE (1) OOPS (1) OPERATING SYSTEM (3) OPERATING SYSTEM SECURITY (1) OPERATIONS DEPARTMENT PROCEDURE (1) Optical Computing (1) OPTICAL LOGIC GATES (1) OPTICAL NETWORK (1) OPTIMIZED ANN (1) ORACLE (4) ORACLE 10G (2) ORACLE 9I (1) Oracle Database (1) ORACLE HUMAN RESOURCES (1) ORGANIZATIONAL STRUCTURE AND DESIGN (1) OSI MODEL (1) OXIDATION (1) OXIDATION TECHNIQUES AND SYSTEMS (1) PACKET LOSS CONCEALMENT USING AUDIO MORPHING (1) Packet Tracer 5.0 (1) PAPER CLIP (1) PARKING MANAGEMENT SYSTEM (1) PARTS OF DESKTOP (1) PATTERN PRINTERS (1) PATTERN TRANSFER (1) PCB (1) PCB ANALYSIS (1) PEDAL POWER HACKSAW (1) Pedal Power Zeolite Refrigeration (1) PEER TO PEER NETWORKS (1) Penetration Testing (1) Performance Management Process (1) PERL (1) PHISHING (1) PHOTOSHOP (1) PHOTOVOLTAIC SYSTEM (1) PHP (4) PHP AND SQL (1) PHP ERROR (1) PHP FILE INCLUSION (1) PHP FILE UPLOADING (1) PHP FILES (1) PHP FUNCTIONS (1) PHP OPERATORS (1) PHP SESSIONS (1) PHP TECHNOLOGY (1) PHYSICAL LAYER (2) Placement Papers (1) PLANT LAYOUT AND CAPACITY PLANNING (1) PLC (2) PLCC (1) Polaris (1) POST TRANSLATIONAL MODIFICATION (1) POWER DISTRIBUTION EQUIPMENT (1) POWER DISTRIBUTION SYSTEM (1) POWER GENERATION IN NTPC (1) POWER GENERATION THROUGH SPEED BREAKERS (1) POWER HOUSE (1) POWER PLANT (2) POWER PLANT EMERGENECIES (1) POWER PLANT OPERATION GENERATOR & AUXILIARIES (1) POWER QUALITY PARAMETERS (1) POWER SCENARIO IN INDIA (1) Prepaid Energy meter (1) PRESENTATION SOFTWARE (1) PREWRITING TECHNIQUES (1) PRINCIPLES OF CONCRETE MIX DESIGN (1) Private Job (1) Procedure For burning Oil (1) PROCESS (1) PROCESS DESCRIPTION (1) PROCESS DESIGN (1) Product Life Cycles And The Boston Matrix (1) PRODUCT STRATEGY (1) PROJECT QUALITY MANAGEMENT (1) Protection System Of Generating Stations (1) PTW SYSTEM (1) PULSE WIDTH MODULATION (1) PUMP (1) PURGING LOGIC (1) QR CODES (1) QUALITY REQUIREMENTS OF CONCRETE - MAKING MATERIALS (1) QUANTUM COMPUTER (2) QUANTUM COMPUTERS (1) QUANTUM COMPUTING (1) Quorum Sensing (1) RADAR (1) RADAR COMMUNICATIONS (1) RADIO CONTROLLED AIRCRAFT (1) RAILWAY (1) RAM (1) RECORDING TECHNIQUES (1) Red Tacton (1) REGENERATIVE SUSPENSION SYSTEM (1) RELAY (1) Remote Control (1) Remote Method Invocation (1) Remote Sensing (1) REMOTE SUSTAINABLE VILLAGES (1) Renewable Energy (4) REQUIREMENT ENGINEERING (1) REQUISITE PRO (1) RESTFUL WEBSERVICES (1) REVEAL.JS (1) RFID (3) Robotics (2) ROCK SLOPE ENGINEERING (1) Role Of Hydrogen In Generator (1) ROM (1) ROUTINE CHECKS BOILER (1) Routine Checks Generator (1) Routine Checks Turbine (1) RSRTC (1) RTLinux (1) RTOS (1) RUBY ON RAILS (1) SAAS AND CLOUD COMPUTING (1) SAMPLE RESUME FOR EXPERIENCED - DOWNLOAD FREE .DOC (1) SAMPLE RESUME FOR FRESHERS - DOWNLOAD FREE .DOC (1) SAMSUNG 3D LED TV (1) SAMSUNG S3 (1) SAP (2) SAP LAP ANALYSIS (1) Satellite Communication (1) SCADA (2) SCADA FUNDAMENTALS (1) SCANNING AND FOOTPRINTING (1) SCHEDULING OF OPERATIONS (1) Secretariat LAN (1) SELF AUTOMATED SAFETY SYSTEM OF TRAIN (1) SELF EMPLOYEMENT In ASP.Net (1) Semantic Web (1) SEMI AUTONOMOUS BIKE (1) SENSORY EVALUATION (1) SENSORY TESTING (2) SEO (1) SEQUENTIAL CIRCUIT (1) Serial Peripheral Interface (1) Servlets (1) Shell Programming (1) SHIFT REGISTERS AND COUNTERS (1) Ship Maneuverability (1) SIGNALS (1) SIGNALS AND SYSTEMS (1) SINGAPORE (1) SIX STROKE ENGINE (1) Sixth Sense Technology (1) SLIDING PRESSURE OPERATION (1) SLIM System (1) Smart Cards (1) SOCIAL ENGINEERING TOOLKIT (1) SOCIAL NETWORKING (1) SOCIAL NETWORKS (1) SOCIAL PROBLEMS (1) SOFT SYSTEM METHODOLOGY (1) SOFTWARE (1) SOFTWARE DESIGN (1) SOFTWARE DEVELOPMENT (1) SOFTWARE ENGINEERING (2) SOFTWARE FOR IMPLEMENTATION OF ATM (1) Software Management Topics (1) SOFTWARE METRICS (1) Software Requirements Specification (1) SOFTWARE RESEARCH EXPRESS (1) Software Testing (2) SOLAR CELL (2) SOLAR PANEL ROAD (2) SOLAR PV (1) SONY ERICSSON (1) SOURCE AND SINK ANALYSIS (1) SPEAKER RECOGNITION (1) SPECTROSCOPY (1) SPEECH RECOGNITION (2) Splines and Bezier Curves (1) SPREAD SHEET (1) Spring Framework (1) SQL (2) SQL INJECTION (1) State Management Techniques (1) Stealth Technology (1) STEAM CIRCULATION SYSTEM (1) Steam Raising (1) STEAM TURBINE (1) STEAM TURBINES FOR SUPERCRITICAL POWER PLANTS (1) STEEL INDUSTRY (1) Steel Plant (1) STEVE JOBS (1) STIRLING ENGINE (1) STORAGE DEVICES (1) STORAGE OVERVIEW AND ARCHITECTURE (1) STRESS (1) STUDY ABROAD (6) SUBNETTING (1) SULZER RT FLEX MARINE DIESEL ENGINE (1) SUMS AND PRODUCTS OF SIGNALS (1) Sun Solaris Os (1) SURATGARH THERMAL PLANT (1) Surface Detection Methods (1) SURFACE MOUNT TECHNOLOGY (2) SUSTAINABLE DEVELOPMENT (1) Swarm Intelligence (1) SWITCHING AND NETWORKS (1) SWITCHING AND ROUTING (1) SWITCHYARD (1) SYMBIAN OS (1) SYSTEM PROGRAMMING (1) TABU SEARCH (1) TABULATION METHOD (1) TATA INDICOM (1) TATA MAGIC (1) TATA MOTERS (1) TATA MOTORS (2) TATA NANO (2) TATA STEEL (1) TATA Tele Services (1) Technical Analysis (1) TELECOM SOFTWARE (1) TELECOMMUNICATION INDUSTRY IN INDIA (1) Teleconferencing (1) TEST CENTER (1) TEST POINT ANALYSIS (1) TESTING (1) Testing And Calibration (1) TESTING LEVELS (1) TEXT (1) The Locus Distributed Operating System (1) THERMAL CUTTING PROCESS (1) THERMAL POWER PLANT (1) THERMAL POWER PLANTS (1) THERMAL POWER STATIONS (1) THERMOGRAPHY (1) THIN FILM TECHNOLOGY (2) THREE PHASE CIRCUITS (1) Tiled Microprocessor (1) TOEFL / IELTS (1) Tools of Internet (1) TOUCH SCREEN TECHNOLOGY (2) TOUCHSCREEN (1) TRADITIONAL DATABASE APPLICATIONS (1) TRAINING AND DEVELOPMENT (1) TRANSACTION PROCESSING (1) TRANSCRIPTION (1) TRANSDUCER MATERIALS (1) TRANSFORMERS (2) TRANSISTOR AGING (1) TRANSMISSION LINE (1) TRANSMISSION MEDIA (1) TRANSMISSION SYSTEM (1) TRANSMISSION SYSTEM AND ITS CONFIGURATION (1) TRANSPORT AND APPLICATION LAYER (1) TURBINE (1) TURBINE CONDENSATE SYSTEM (2) TURBINE FLEET IN NTPC (1) Turbo Generators (1) TWO STROKE FUEL ENGINE (1) TWO-WHEELER INDUSTRY IN INDIA (1) Ubiquitous Computing (1) UK (1) Underground Communication (1) UNIT SHUT DOWN PROCEDURE (1) UNIX (2) UNIX SPECIAL VARIABLES (1) UPS (1) UREA PLANT (1) USA (1) USE OF CHEMICAL AND MINERAL ADMIXTURES IN CONCRETE (1) UWB ECHO SIGNAL (1) VAPOR ABSORPTION REFRIGERATION (1) VARIABLE SPEED DRIVES (1) VERILOG (1) VHDL (1) VHDL AND DIGITAL CIRCUIT DESIGN (1) VIBRATION (1) VIDEO DISPLAY DEVICES (1) VIDEOCON (1) VIKRAM CEMENT (1) VIRTUAL KEYBOARD (1) VIRTUAL ONLINE TUTORING (1) VIRTUAL PROJECTION (1) VIRTUALIZATION (2) Viruses (1) VISIBLE SURFACE DETECTION (1) VISUAL BASIC (3) Visual Studio 2010 (1) VITAL LINK (1) VLAN (1) VLSI (1) VLSI DESIGN (1) VOIP (1) VPN (1) VSB MODULATION (1) VTP (1) Vulnerability Assessment (1) WAFER PREPARATION (1) War Weapons (1) WATER (1) Water pollution And Its Legislation (1) WAVEGUIDE GRATINGS BASED FILTERS (1) WEAPONS DESIGN AND CONTROL SYSTEMS (1) WEATHER RESOURCE SYSTEM (1) WEB DESIGNING (1) WEB ENGINEERING (1) Web OS (1) WEB SECURITY (1) WEB SERVER (1) WEB WAREHOUSING (1) WEBSITE DESIGN AND DEVELOPMENT (1) WELDING (1) WELSPUN CROP LTD (1) WET ETCHING (1) WHAT IS CEMENT (1) WHIRLPOOL (1) WHITE BOX TESTING TECHNIQUES (1) WHOLE NUMBER (1) WI-FI (1) WIBREE (1) WIMAX (2) WIMAX SECURITY (1) WIND ENERGY SYSTEM (1) WIND FARM (1) WINDOWS SERVER (1) Wireless Communication (1) WIRELESS LAN (1) Wireless Mesh Networks (1) WIRELESS SENSOR NETWORKS (2) WIRELESS TECHNOLOGY (1) WLAN CONFIGURATION (1) WORDPRESS (1) Work Environment (1) Workshop For Turbine (1) WORLD WIDE WEB (2) WSN'S (1) XML (2) XTie-RT (1) YAHOO! (1) Yield Curve (1) Z-TRANSFORM (1) ZIGBEE (2) ZINC OXIDE (1)
 
© 2011 ENGINEERS ON WAY
Designed by Ishant Gupta
Posts RSSComments RSS
Back to top