StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

CONTROLLED MOVEMENT AREA VIOLATIONS AND REDUCTION METHODS - Thesis Example

Comments (0) Cite this document
Summary
This study will look at the technological inventions that will help in dealing with the situation of the increasing controlled movement area (CMA) violations. The participants in the collection of primary data will be 42 respondents from the management, security and operations…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
CONTROLLED MOVEMENT AREA VIOLATIONS AND REDUCTION METHODS
Read TextPreview

Extract of sample "CONTROLLED MOVEMENT AREA VIOLATIONS AND REDUCTION METHODS"

Download file to see previous pages The research topic is “Types of Violations of CMA rules and the Proposed. The methodology used includes questionnaires and interviews as the primary data collection methods since the studies are qualitative. In the statistical section, the data analysis tools used on the sample sizes were factor analysis and regression methods.
The CMA incursions are on the increase and the domestic airports are technologically capable of handling any negative occurrences. There will a statistical significance on the situation when the interviewees respond with a (p>0.6) margin in disapproval of the null hypothesis. Any figure less than that will not be recorded as significant.
The technologies used in aircraft health monitoring aspect include use of the approved intra-aviation techniques such as the Airport Surface Detection Equipment and Model X (ASDE-X). These are some of the foolproof ways of approaching the issue. On the social aspect the promotion of safety using reliable and cost effective aircraft will not only impact the aviation positively but also increase the profitability of airlines. As it occurred, few accidents will encourage frequent travel.
The environmental and political aspect always depends on the support in the early stages with stakeholders who include as operators, maintainers, and managers and so on. The project proposal outcomes were on the conclusion that the aviation industry’s fundamentals require all the five factors to operate well.
In this outcome, the type of research was varied between correlations /descriptions and secondary means that included data that was collected and made available by The AFFA. The collection methods used were secondary methods and the data was compiled from experts in the Airfield Management Career Field. Condition Based Maintenance (CBM) is the epic centre with an analysis using the ANOVA that provided the sought after results.
Some unsafe acts such as ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CONTROLLED MOVEMENT AREA VIOLATIONS AND REDUCTION METHODS Thesis”, n.d.)
CONTROLLED MOVEMENT AREA VIOLATIONS AND REDUCTION METHODS Thesis. Retrieved from https://studentshare.org/miscellaneous/1592165-controlled-movement-area-violations-and-reduction-methods
(CONTROLLED MOVEMENT AREA VIOLATIONS AND REDUCTION METHODS Thesis)
CONTROLLED MOVEMENT AREA VIOLATIONS AND REDUCTION METHODS Thesis. https://studentshare.org/miscellaneous/1592165-controlled-movement-area-violations-and-reduction-methods.
“CONTROLLED MOVEMENT AREA VIOLATIONS AND REDUCTION METHODS Thesis”, n.d. https://studentshare.org/miscellaneous/1592165-controlled-movement-area-violations-and-reduction-methods.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF CONTROLLED MOVEMENT AREA VIOLATIONS AND REDUCTION METHODS

Human Rights Violations

This paper shall not address all violations related to sexual orientation or gender identity due to the depth of discussion involved in such areas. However, it shall focus on critical human rights concerns among LGBTs. LGBTs flee their home countries due to serious violations of their fundamental human rights. Violations include executions and other severe violent attacks from state and non-state actors. This paper predominantly focuses on the human rights violations of persons based on their sexual orientation or gender identity. Under these conditions, it would be possible to better understand the reasons why host countries must provide adequate surrogate protection to LGBTs who have fled gross living conditions from their...
11 Pages(2750 words)Essay

Operations Management. Lean Production/Waste Reduction Methods

...? Operations Management Introduction Lean production is considered as a method of production which seeks to diminish waste and inefficiency. In precise, it denotes the efficient utilization of resources. Lean production method is derived from the belief that resources which are unable to create value are a waste. The objective of lean production is to minimize the expenses and to make a business more effective along with reactive to market requirements. This approach is used in order to cut every activity which does not augment value to the manufacturing procedure. The core thought behind the incorporation of lean is to enhance customer value (Black, 2008). 1. Explanation of Lean Production/Waste Reduction Methods From the case studies...
4 Pages(1000 words)Essay

Expectancy Violations Theory

... Expectancy Violations Theory Expectancy violations theory (EVT) is a communication philosophy that entails the management of personal space in relation to the type of communication that one involves him/ herself in. According to Burgoon, expectancy violation theory is the analysis given on personal space through the collaboration of the non verbal expectancy violations mode. In her works, Burgoon denotes personal space as ‘ a space that is invisible with variable volume, surrounding an individual in a bid to give an individual his or her preferred distance from others’. In addition, Burgoon argues that the shape and size of our personal space is dependent on both cultural customs and individual choices. However...
3 Pages(750 words)Essay

Remotely Controlled Heating System

...Remotely Controlled Heating System Introduction: Technology advances in microprocessors and computer networks have openedthe doors to development of thousands of embedded systems. Embedded systems are designed and engineered towards the manipulation and execution of some specific task. Embedded systems provide high performance and low cost due to their dedication to their assigned task. Automatic control over various equipments could be achieved using modern computer technology. Communication technology extended the range of automated control endlessly. The Task to do: The task to be completed is the design of an embedded distributed network system. The client hardware such as mobile phones or a Personal Digital Assistant (PDA...
6 Pages(1500 words)Assignment

Victimization in Controlled Populations

...Running head: VICTIMIZATION WITHIN CONTROLLED POPULATIONS Victimization within Controlled Populations [Click here and type [Click here andtype your institution's name] Victimization in Controlled Populations One of the main problems with our expanding populations and our increased global dominance is the ability for criminal organizations to actually penetrate a victim's sense of security and fall prey to common criminal activity, such as identity theft and terrorist threats and/or activities. Through the following "contextual complexity" diagram outlining the "complex threat environment" prepared by Phil Williams in Oslo (1995) it is found that as we reach the global marketplace, our viability to threat increases exponentially...
3 Pages(750 words)Assignment

Controlled Assessment B

...Amy’s Hairdresser’s and Salon Business Methodolgy 1. Introduction Amy is considering making entry into Bishop’s Stortford which is a market town/town council in East Hertfordshire, in the county of Hertfordshire, England. Her business proposition is that of combining a hairdresser’s with a beauty salon. Bishop’s Stortford has a population of approximately 50,000. Thus at best it’s an effort to enter a niche market in an exclusively defined area – by geography, consumer demographics and income data (ECOTEC Research & Consulting Limited ,2005). Bishop’s Stortford Town Council area is particularly noted for its affluent society of which a greater percentage is involved in financial service related professions. 1.2. Research methods...
14 Pages(3500 words)Coursework

Deviance: Norm Violations

...Deviant Norm Violation of Firstly, I went to McDonald’s restaurant to have a meal with some of my friends. While being at the restaurant something happened that those who had accompanied me to the restaurant did not notice. A mother and her daughter entered the restaurant and I immediately established contact with her, my eyes were transfixed on her. She had average height, black curly hair and looked like she was eighteen years old. She stared at me and capped it with a smile as I also stared at her. This lasted for a while, because my friend whom I was with was busy enjoying his lunch and paid no attention to what I was doing. We were there for about twenty minutes and finally we left but only I knew the sequence of events. Having eye...
7 Pages(1750 words)Essay

HIPAA Violations

Nancy Lee states, “If Congress did not enact legislation, HIPAA requires the Secretary of HHS to propagate regulations on privacy protections” (Fernald 61).
Fernald (2002) argues that the government or law enforcers should not levy medical professionals, who share a patient’s information for protection of their own because they may need to do so in order to promote high quality health care (Fernald 45). Additionally, a medical professional may at time be forced to share a patient’s medical records with the public in order to seek for financial support, in case the patient’s family or friend permits him or her to do so (Fernald 47). Nass and her Co-authors (2009) also support this opinion. They argue that,, in case of emergent...
5 Pages(1250 words)Essay

All About Controlled Drugs

...All About Controlled Drugs Ans 1 The five categories/schedules of controlled drugs are: 1. Drugs with no described medical use but have a risk for potential abuse. The drugs in this category include heroin etc. 2. These drugs have a specific medicinal role and can only be prescribed in by a specialist but their potential for abuse is also high and can lead to severe mental deterioration e.g. Morphine etc. 3. Relatively less potential for abuse, these drugs have low physical dependence and include aspirin and some steroids etc. 4. This group includes some anti-depressants and their abuse can lead to some degree of physical and psychological dependence. 5. Least potential for abuse as well as physical and psychological dependence... About...
3 Pages(750 words)Assignment

Violations of human rights

... Violations of human rights Introduction: Individual rights are those privileges or rights which are important for normal human success and for residing. They are designed on the idea that every man and woman, regardless of color, creed, competition, nationality, caste and creed is born with certain important privileges such as, right to independence, rights, conversation, stay etc. Therefore, these privileges are secured in the structure of the countries. The problem of human privileges is that individuals and countries have a different thoughtful of the term and its safety. In some areas public and administrative privileges or rights are not specified or given to its entire people. In some other countries, financial and community...
5 Pages(1250 words)Essay

Cultural History Versus Political History: The Varying Methods of the Two Fathers of History

Even though they have these similarities and have both been bestowed with the same title, these two historians drastically differed in their approaches.

Herodotus had another title bestowed upon him; he was also called the “Father of Lies.” Much of what is known of him has been gathered from his own writings as few other sources are available from his actual life. It should also be noted that the veracity of this information is in question as Herodotus was known to invent much in his own work, and it was sometimes the practice in Ancient Greece to attribute events from the life of one person to another; for instance, it has been questioned if the accounts of Herodotus’ exile are only due to the fact th...
10 Pages(2500 words)Essay

The Trade Union Movement in the UK

Before the ERA 1999, union membership and recognition in the UK were characterized by voluntarism, in which employers and employees could bargain over the terms and conditions of employment without any legal interference. With the statutory system ushered in by the new law, voluntary recognition of unions is no longer allowed and it becomes unlawful for British employers to deny recognition to unions under any circumstances. That conveys the impression that ERA created a radical change in British industrial relations. This paper takes the contrary view, however, and proposes that while the new industrial relations law looks revolutionary in principle, there are no fundamental changes in actuality for the change to qualify as &ldqu...
8 Pages(2000 words)Case Study

Research Methods in Linguistics

 The writer of content tries to preserve his/her culture and also wants his/her culture to get attached to his/her recent living due to which, he/she makes use of the bilingual aspect to write a narrative.

Because of this writing, the English reader faces some problem in decoding the meaning but he/she realizes the presence of another culture by means of this writing. Many writers provide a glossary at the end so that the readers face no problem in decoding the words given in another language such as Soueif has done but many take it for granted that readers know the other language as well.

The article contains a detailed evaluation of the novel by Soueif which can be categorized as the strength of the re...
6 Pages(1500 words)Assignment

Christian Identity Movement

verted to this religion believe that finally they have found their true identity by discovering that they are the descendants of the tribes of “white” Israel that were lost (Quarles 2004, p.7).
When any group of people say that they are superior to others on the basis of the race they belong to and also inculcate the belief that they are the only chosen people of God and not the people from other ethnic background, then one can very well say that that group or the organization is practicing racial beliefs. People who follow the Christian Identity believe that the people from Caucasian ethnic background are true Israelites and hence they are the only people from the God’s family (Quarles 2004, p.9). The teach...
6 Pages(1500 words)Coursework

Analysis of the Methods of 3 Research Papers about Child Abuse

Research ethics was maintained as the identity of the individuals participating was kept secret. As far as the validity of the study was concerned, the researchers attempted to use content validity in order to get an accurate response. The content validity focused on measuring off the ethnicities and gender percentages within the area and attempting to get a random sample of individuals via the phone. Their approach to random calling allowed for a significant random sample in the study. There were a few issues, however, with this type of approach. Those answering the phone sometimes were not always the desired individual, and not all of the desired people were surveyed. Different replacements did have to be used, and the attempt w...
6 Pages(1500 words)Literature review

Using Computers to Teach Mathematics is Better than Traditional Methods

...Using computers to teach Mathematics is better than traditional methods Computer technology has changed the face of education, and is a useful tool in the teaching of other subjects as well with Mathematics being no exception. Various calculating devices have long been used in Mathematics, but the computer offers an even greater potential. Some teachers are reluctant to use computers, for example on the grounds that it is an expensive option and not every child has access to one at home, but its prevalence nowadays means that students should be given the opportunity to use computers in their Mathematics lessons. They have the advantage of being able to make complex calculations much quicker, demonstrate graphical visualisations, instilling...
7 Pages(1750 words)Case Study

Alternative Methods of Accounting

... decisions to gain advantage from depreciation irregularities. Straight line depreciation is a simple and practical method whose purpose has never been to manipulate data. Depreciation also does not affect the cash flow of the firm. There are business projects such as strategic investments which cannot be properly evaluated using outdated financial metrics. A strategic investment is a project that produces insufficient earnings to cover the cost of capital in the early years, but will produce higher income in future fiscal years. The use of EVA is much better at accessing the value of these types of projects. A movement to switch from net income to economic income could have negative consequences. Investors currently believe a lot...
8 Pages(2000 words)Article

Logan Act Violations via Foreign Policy

Former Presidents of the United States have been permitted to engage in foreign policy initiatives, even though technically such actions violate the 1799 Logan Act. However, the lack of successful prosecutions, or even indictments, is not in itself unusual given the legal and political convention surrounding the Act itself. For example, few non-Presidents have been charged in the two hundred years since the Logan Act was passed by Congress. As such, the Act appears to be designed more as a preventative measure, something designed to stop political or diplomatic excess by private citizens, rather than a statute with any actual teeth. Consequently, former Presidents have been allowed to engage quite freely in the diplomatic sphere w...
6 Pages(1500 words)Essay

Statistics and Quantitative Methods

The method is also not sensitive to variation in the value of money over time. However, it is easy to use and can be used to make a quick assessment of investment viability using existing data (Groppelli & Nikbakht, 2006: pp. 157-158).

Net present value (NPV) takes into account the value of money over time and uses the present value of future cash flows (Lasher, 2008: p. 426). This present value is compared with the initial investment and decision taken on whether the investment is viable over the long term or not. NPV is, therefore, a difference between the present value and the initial investment. If NPV is positive, the project is viable, and if it is negative, the project may be rejected. NPV uses the discount r...
17 Pages(4250 words)Assignment

The Study of Byzantine Movement

The term Byzantine art is usually referred to as the artistic products of the Eastern Roman Empire. Some regard it as the direct continuation of Greco-Roman art, especially the developing and flourishing of Roman art. During the thirteenth century, while the art and aesthetic ideas of antiquity were developing in the Roman culture, thought and writing was manifested in Greek rather than Latin. “From such perspective, Byzantine art emerges as western art and will be seen as its most effective in its continuation and adaptations of classicism” (Cormack, 2000 p. vi). The Byzantine artists claim to have followed the antiquity and they illustrated holy figures along with the images of the emperors of that time. Furthermore,...
8 Pages(2000 words)Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Thesis on topic CONTROLLED MOVEMENT AREA VIOLATIONS AND REDUCTION METHODS for FREE!

Contact Us