Search results for "Security"

showing 10 items of 1693 documents

Risk Assessment of a compound feed process based on HAZOP analysis and linguistic terms

2016

[EN] The size and complexity of industrial plants, along with the characteristics of the products used, require a study, analysis and control of the existing risks in every industrial process. In this paper, a methodology for risk assessment in industrial plants, based on the combination of risks identification through the Hazard and Operability (HAZOP) analysis and the risks evaluation through linguistic variables and fuzzy numbers is applied to a case study consisting on a compound feed plant located in the town of Silla (Valencia, Spain). The results from this study show that the main risk in the compound feed production process is the formation of explosive atmospheres (ATEX). Therefore…

EngineeringOperabilityHazard and operability studyProcess (engineering)Explosive atmospheresGeneral Chemical EngineeringCompound feed0211 other engineering and technologiesEnergy Engineering and Power TechnologyLinguistic variables02 engineering and technologyManagement Science and Operations ResearchRaw materialIndustrial and Manufacturing Engineeringlaw.inventionlaw0502 economics and businessFuzzy numberRisks050207 economicsSafety Risk Reliability and QualityPROYECTOS DE INGENIERIA021110 strategic defence & security studiesbusiness.industry05 social sciencesFuzzy numbersHazardLinguisticsIgnition systemControl and Systems EngineeringHAZOPRisk assessmentbusinessFood Science
researchProduct

Incremental dynamic based fragility assessment of reinforced concrete structures: Stationary vs. non-stationary artificial ground motions

2017

Abstract Artificial and natural records are commonly employed by researches and practitioners to perform refined seismic assessments of structures. The techniques for the generation of artificial records and their effectiveness in producing signals which are significantly representative of real earthquakes are still debated as well as results of the consequent seismic assessment to expect from their application. The paper presents an in-depth comparative study highlighting the effect of employing different typologies of artificial ground motion records on seismic assessment results, especially addressing seismic fragility curves. Three sets of 50 stationary, nonstationary evenly modulated a…

EngineeringPeak ground accelerationIncremental dynamic analysi0211 other engineering and technologiesSoil Science020101 civil engineering02 engineering and technologyIncremental dynamic analysisSpectral accelerationIncremental Dynamic Analysis0201 civil engineeringFragilitySeismic assessmentReinforced concrete structuresNonlinear dynamic analysiNon-stationary random processeNonlinear dynamic analysisCivil and Structural EngineeringReinforced concrete structureFragility curves021110 strategic defence & security studiesbusiness.industryArtificial accelerogramsNon-stationary random processesStructural engineeringArtificial accelerograms; Fragility curves; Incremental dynamic analysis; Non-stationary random processes; Nonlinear dynamic analysis; Reinforced concrete structures; Civil and Structural Engineering; Geotechnical Engineering and Engineering Geology; Soil ScienceGeotechnical Engineering and Engineering GeologyReinforced concreteArtificial accelerograms Non-stationary random processes Nonlinear dynamic analysis Incremental dynamic analysis Fragility curves Reinforced concrete structuresNonlinear systemTime historyArtificial accelerogramFragility curvebusiness
researchProduct

The predictability of international terrorism: A time‐series analysis

1988

Abstract The study examines the predictability of international terrorism in terms of the existence of trends, seasonality, and periodicity of terrorist events. The data base used was the RAND Corporation's Chronology of International Terrorism. It contains the attributes of every case of international terrorism from 1968 to 1986 (n = 5,589). The authors applied Box‐Jenkins models for a time‐series analysis of the occurrence of terrorist events as well as their victimization rates. The analysis revealed that occurrence of terrorist events is far from being random: There is a clear trend and an almost constant periodicity of one month that can be best described by a first‐order moving averag…

EngineeringRand corporationbusiness.industryHuman factors and ergonomicsPoison controlSeasonalitymedicine.diseaseComputer securitycomputer.software_genreMoving-average modelTerrorismmedicineEconometricsTime seriesPredictabilitybusinesscomputerTerrorism
researchProduct

Steady-state security analysis on the transmission grid for various scenarios of wind generation in Sicily

2009

The proposed paper is part of a research aimed at assessing the impact of wind generation on the transmission grid of Sicily, second among the Italian regions for wind power installed. After describing the current state of wind energy generation in Sicily, the paper reports and comments the results of the steady-state security analysis done for various scenarios of wind penetration. For each scenario (maximum and minimum load conditions), the redistribution of power flows on the transmission network, the voltage profiles at nodes, the analysis of contingencies and losses variations are reported.

EngineeringSecurity analysiswind generationWind powerbusiness.industryGridSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaElectricity generationTransmission networkMesh generationElectronic engineeringPower-flow studybusinessSteady-state security analysiMarine engineeringVoltage
researchProduct

Identifying First Responders Information Needs

2016

At the onset of an indoor fire emergency, the availability of the information becomes critical due to the chaotic situation at the emergency site. Moreover, if information is lacking, not shared, or responders are too overloaded to acknowledge it, lives can be lost and property can be harmed. Therefore, the goal of this paper is to identify information items that are needed for first responders during search and rescue operations. The authors use an educational building fire emergency as a case and show how first responders can be supported by getting access to information that are stored in different information systems. The research methodology used was a combination of literature review,…

EngineeringSituation awarenessbusiness.industryResearch methodology05 social sciences0211 other engineering and technologiesInformation needs02 engineering and technologyComputer securitycomputer.software_genremedicine.diseaseAccess to informationEmergency responseInformation model021105 building & construction0502 economics and businessmedicineInformation systemMedical emergencybusinesscomputer050203 business & managementSearch and rescueInternational Journal of Information Systems for Crisis Response and Management
researchProduct

Sustainability issues in sheet metal forming processes: an overview

2011

Abstract Environmental sustainability in manufacturing is nowadays an urgent and remarkable issue and the main concerns are related to more efficient use of materials and energy. In sheet metal forming processes there is still a lack of knowledge in this field mainly due to the need of a proper modelling of sustainability issues and factors to be taken into account. The aim of this paper is mainly to underline the state of the art from a forming point of view about the sustainability contributions offered in any phase of a product life cycle. Actually, a lack in terms of comprehensive contributions is present in the technical literature, thus, the authors try to give a sort of holistic visi…

EngineeringUnderlineRenewable Energy Sustainability and the EnvironmentManagement sciencebusiness.industryStrategy and ManagementLife cyclePrincipal (computer security)Resource efficiencyForming processesSheet metal formingIndustrial and Manufacturing EngineeringResource efficiencyProduct lifecycleRisk analysis (engineering)SustainabilityOrder (exchange)SustainabilitySustainability organizationsbusinessSettore ING-IND/16 - Tecnologie E Sistemi Di LavorazioneGeneral Environmental Science
researchProduct

The interdisciplinary nature of <i>SOIL</i>

2015

Abstract. The holistic study of soils requires an interdisciplinary approach involving biologists, chemists, geologists, and physicists, amongst others, something that has been true from the earliest days of the field. In more recent years this list has grown to include anthropologists, economists, engineers, medical professionals, military professionals, sociologists, and even artists. This approach has been strengthened and reinforced as current research continues to use experts trained in both soil science and related fields and by the wide array of issues impacting the world that require an in-depth understanding of soils. Of fundamental importance amongst these issues are biodiversity,…

EngineeringWater securityFood securitybusiness.industryOrder (exchange)Land degradationSoil ScienceEngineering ethicsEnergy securitybusinessPublicationField (computer science)Ecosystem servicesSOIL
researchProduct

Ubiquitous Co-Driver System and Its Effects on the Situation Awareness of the Driver

2008

The aim of this paper is to explore the effects of ubiquitous computing in cars on the situation awareness and expectations of the driver. In a driving simulation environment with participants using a co-driver system, we investigated how people took and recovered from misinformation provided by the system. The system presented safety-critical information about the upcoming curves on the road, but in the experiment part of the messages contained false information. The effects of this information on participants’ behavior were investigated. On the grounds of the experiment, we discuss two approaches for investigating drivers’ situational awareness, which are based on either mental workload o…

EngineeringajoneuvotietojärjestelmätUbiquitous computingSituation awarenessbusiness.industryApplied psychologyWorkloadkapasiteettiComputer securitycomputer.software_genretilannetietoisuusInformation systemDriving simulationMisinformationbusinesscomputermielensisällöt
researchProduct

Decentralized intrusion detection for secure cooperative multi-agent systems

2007

In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A novel decentralized and scalable architecture that can be adopted to realize a monitor of the agents’ behavior is proposed. We consider agents which may perform different independent tasks, but cooperate to guarantee the entire system’s safety. Agents plan their next actions by following a set of rules which is shared among them. Such rules are decentralized, i.e. they dictate actions that depend only on configurations of neighboring agents. Some agents may not be acting according to this cooperation protocol, due to tampering or spontaneous failure. To detect such misbehaviors we propose a so…

Engineeringbusiness.industryDistributed computingMulti-agent systemsecurityScalable architectureIntrusion detection systemIntrusionSettore ING-INF/04 - AutomaticaIntrusion detectionmulti-agent systemsIntrusion prevention systembusinessSet (psychology)Protocol (object-oriented programming)2007 46th IEEE Conference on Decision and Control
researchProduct

Class Actions or Collective Redress: The Need for an Efficient European Tool

2014

Collective redress makes sense both in court-based litigation and in alternative dispute resolution (ADR). Yet while the courts generally have a good sense of collective redress (though arguably there is room for improvements), in the second framework, there are some contradictions from a dogmatic point of view. When collective interests come up in conflict, judicial coercion and a judicial structure are often needed to resolve the conflict. In addition, the absence of a voluntary agreement, especially from the abuser’s side, makes it more difficult to resolve conflicts using ADR. The future EU Directive in Consumer Collective Redress aims to bring a new era to the field. In this paper, I s…

Engineeringbusiness.industryField (Bourdieu)Punitive damagesCoercionConsumer protectionCivil procedureDirectiveComputer securitycomputer.software_genreAlternative dispute resolutionbusinessCollective redresscomputerLaw and economics
researchProduct