Skip to main content

Black Box on an airplane

When an aircraft accident the most sought-after tool is a black box. Then what is a black box? Black box is a recording device used in the field of transportation. Black box usually found on airplanes and cars. Black box on airplanes were created by Dr. David Warren from Australia. So, Australia is the first country that requires using black box on airplanes. Black box usually placed in the tail section of an aircraft because if the accident is the safest area than other areas. In fact the black box on an airplane is not black but is orange.
Black box on an airplane (idntimes.com)

Black box consists of two parts. First, a flight data recorder (FDR) functions to record data on aircraft speed, altitude, vertical acceleration, and fuel flow. This section will save a record of 25 hours of flight data. Second, the Cockpit Voice Recorder (CVR) contains records conversations in the cockpit between the pilot and the copilot. This section will save a recording of 2 hours of conversation in the cockpit.

Black boxes wrapped in titanium or steel so they are rust resistant, burn resistant at 1,110 degrees Celsius, hold in high pressure salt water. Then the black box is the most important thing to look for if an aircraft experiences an accident. This is to prove the cause of aircraft accidents. However, the black box search limit only lasts for 30 days because if more than 30 days the black box signal disappears and the search will be difficult.
Ersa Virlidya Destia
IR 1 106218049
Reference
Azanella, Luthfia A. 2018. 8 Fakta Black box, Benda Paling Dicari Saat Kecelakaan Pesawat.  Retrieved from https://internasional.kompas.com/read/2018/11/01/06020041/8-fakta-black-box-benda-paling-dicari-saat-kecelakaan-pesawat?page=all

Comments

Popular posts from this blog

Artifical Neural Network

Artificial Neural Network  is a computational model based on the structure and functions of biological neural networks. Information that flows through the network affects the  a neural network changes or learns, based on that input and output. So the point is  to create a computational system that could solve problems like a human brain. The Neural Networks was founded by  Warren McCulloch and Walter Pitts in 1943. Then it was upgraded with AI (Artificial Intelligence) in 1975 by Kunijiko Fukushima called Artificial Neural Network (ANN) .   Warren McCulloch and Walter Pitts Today  Neural Networks are important in information age, because help society to solve complex problems in real life condition. They can learn from model the relationships between inputs and outputs that are nonlinear and complex; make generalizations and inferences; reveal hidden relationships, patterns and predictions (such as financial time series data) and varianc...

RFM in Business Strategy

RFM Analysis For Successful Customer Segmentation Analysis RFM in Big Data RFM (Recency, Frequency, Monetary) analysis is a proven marketing model for behavior based customer segmentation. It groups customers based on their transaction history – how recently, how often and how much did they buy. RFM helps divide customers into various categories or clusters to identify customers who are more likely to respond to promotions and also for future personalization services. RFM analysis evaluates which customers are of highest and lowest value to an organization based on purchase recency, frequency, and monetary value, in order to reasonably predict which customers are more likely to make purchases again in the future. What are Recency, Frequency and Monetary? ·         Recency      : How much time has elapsed since a customer’s last activity or transaction with the brand. ·     ...

A Thing called Ransomware

A Thing called Ransomware Ransom malware, or   ransomware , is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. The earliest variants of ransomware were developed in the late 1980s, and payment was to be sent via snail mail. In this day, ransomware authors order that payment be sent via cryptocurrency or credit card. There are several different ways that ransomware can infect your computer. One of the most common methods today is through malicious spam, or  malspam , which is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites. Malspam uses  social engineering  in order to trick people into opening attachments or clicking on links by appearing as legitimate—whether that’s by seeming to be from a trusted institution or a friend. Cybercriminals...