Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis Commons

Open Access. Powered by Scholars. Published by Universities.®

782 Full-Text Articles 1,188 Authors 380,800 Downloads 106 Institutions

All Articles in Risk Analysis

Faceted Search

782 full-text articles. Page 10 of 33.

Compliance Assessment Of The National Oil Spill Contingency Plan Of The Philippines On 1990 International Convention On Oil Spill Preparedness, Response And Co-Operation Using Retos, Godofredo Garcia Vagilidad 2020 World Maritime University

Compliance Assessment Of The National Oil Spill Contingency Plan Of The Philippines On 1990 International Convention On Oil Spill Preparedness, Response And Co-Operation Using Retos, Godofredo Garcia Vagilidad

World Maritime University Dissertations

No abstract provided.


Promoting Maritime Safety Through ‘Findings’ Of Accident Investigations, Surveys And Audits In The Pacific : The Case Of Papua New Guinea, Conny Ralph Hauseng 2020 World Maritime University

Promoting Maritime Safety Through ‘Findings’ Of Accident Investigations, Surveys And Audits In The Pacific : The Case Of Papua New Guinea, Conny Ralph Hauseng

World Maritime University Dissertations

No abstract provided.


Assessing Oil Spill Management In Senegal Using The Iso 31000:2018 Standard As A Risk Management Framework, Abdou Aziz Diouf 2020 World Maritime University

Assessing Oil Spill Management In Senegal Using The Iso 31000:2018 Standard As A Risk Management Framework, Abdou Aziz Diouf

World Maritime University Dissertations

No abstract provided.


A Comparative Study Of The Implementation Of Oil Spill Contingency Planning In Promoting Ocean Sustainability And Governance : A Case Study Of Ghana And Canada., Marvin Bang-gesina Ayoo 2020 World Maritime University

A Comparative Study Of The Implementation Of Oil Spill Contingency Planning In Promoting Ocean Sustainability And Governance : A Case Study Of Ghana And Canada., Marvin Bang-Gesina Ayoo

World Maritime University Dissertations

No abstract provided.


Wind Hazard Resilient Construction Mitigation Decision-Making Using A Multi-Objective Optimization, Erin Gregory 2020 Western Kentucky University

Wind Hazard Resilient Construction Mitigation Decision-Making Using A Multi-Objective Optimization, Erin Gregory

Masters Theses & Specialist Projects

While storms worsen and damage to homes increases, limited information is available about mitigations that are effective in lessening damage to homes and/or buildings. Information on past storms exists within FEMA’s Hazus-MH application, but the information provided by the data within the Hazus-MH application, while very informative on its own, was decidedly more precise and useful when optimized to provide defined information to those responsible for determining building codes or regulations for homes.

The research available from Hazus-MH details results from past storms categorized by building type, mitigations, and intensity of disaster. The data can be used to simulate storm …


2019-2020 Annual Security And Fire Report - Sayre Campus, Southwestern Oklahoma State University 2020 Southwestern Oklahoma State University

2019-2020 Annual Security And Fire Report - Sayre Campus, Southwestern Oklahoma State University

ANNUAL SECURITY & FIRE REPORTS

This is the 2019-2020 Annual Security and Fire Report of the Sayre Campus by Southwestern Oklahoma State University.


2019-2020 Annual Security And Fire Report - Weatherford Campus, Southwestern Oklahoma State University 2020 Southwestern Oklahoma State University

2019-2020 Annual Security And Fire Report - Weatherford Campus, Southwestern Oklahoma State University

ANNUAL SECURITY & FIRE REPORTS

This is the 2019-2020 Annual Security and Fire Report of the Weatherford Campus by Southwestern Oklahoma State University.


Security Analysis Of The Anonabox Pro, Devi Sowjanya Vempati 2020 Louisiana State University

Security Analysis Of The Anonabox Pro, Devi Sowjanya Vempati

LSU Master's Theses

The security posture of critical network appliances, such as routers, switches, and firewalls, is crucial as these devices provide the first line of defense against malicious actors. As there is typically no endpoint security software, such as anti-virus available for these devices, it is crucial that vendors release timely updates for vulnerabilities and that customers apply them quickly. The research effort documented in this thesis describes a developed methodology for triaging known vulnerabilities in network devices, assessing the security posture of device vendors, and locating likely weak points in released firmware images. To highlight this methodology, the Anonabox security appliance …


Ventilation & Masks: Reducing Airborne Transmission Of Covid-19 In A Classroom, Eric A. Schiff 2020 Syracuse University

Ventilation & Masks: Reducing Airborne Transmission Of Covid-19 In A Classroom, Eric A. Schiff

SyracuseCoE Research Brief Series

We've calculated the number of COVID-19 infections that will be spread from a single COVID-19 "superspreader" to students and teachers in a classroom shared for 4 hours in different ventilation and masking conditions.


Navigation Risk Evaluation Of The Northeast Passage Based On The Entropy Weight Topsis Model, Fengde Qu 2020 World Maritime University

Navigation Risk Evaluation Of The Northeast Passage Based On The Entropy Weight Topsis Model, Fengde Qu

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Research On Quantity Discount Pricing By Container Liner Shipping, Runzhe Zhao 2020 World Maritime University

Research On Quantity Discount Pricing By Container Liner Shipping, Runzhe Zhao

World Maritime University Dissertations

No abstract provided.


Risk Perception Affacting The Performance Of Shipping Company, Yubing Wang 2020 World Maritime University

Risk Perception Affacting The Performance Of Shipping Company, Yubing Wang

World Maritime University Dissertations

No abstract provided.


Exploring The Spillover Effects Between The Cargo Market And Shipping Market: The Case Of The Dry Bulk Market, Yifeng Li 2020 World Maritime University

Exploring The Spillover Effects Between The Cargo Market And Shipping Market: The Case Of The Dry Bulk Market, Yifeng Li

World Maritime University Dissertations

No abstract provided.


Towards Scaling Laws For Ddt In Obstructed Channels, Elaine S. Oran, Vadim N. Gamezo 2020 Texas A&M University

Towards Scaling Laws For Ddt In Obstructed Channels, Elaine S. Oran, Vadim N. Gamezo

Progress in Scale Modeling, an International Journal

In a coal mine, natural gas can leak through walls and accumulate in enclosed regions that are no longer being mined or ventilated. If there is an accidental spark in the region containing this gas, it can ignite a flame that may transition to detonation (DDT). An important problem is to assess if, when, and where DDT can occur, and thus provide information needed to design strong enough barriers to protect active mining areas. We describe results of numerical simulations of flame acceleration and DDT in obstacle-laden channels to find a scaling law for 𝐿DDT, the distance the …


Scaling Considerations For Fire Whirls, Forman A. Williams 2020 University of California San Diego

Scaling Considerations For Fire Whirls, Forman A. Williams

Progress in Scale Modeling, an International Journal

This brief report, based on a presentation made at the Eighth International Symposium on Scale Modeling, held in Portland, Oregon, in September of 2017, summarizes and evaluates different methods for classifying fire whirls and their scaling laws. It is indicated that a number of relevant non-dimensional parameters are known for fire whirls, and future scale-modeling experiments could provide useful additional information and insights.


A Framework For Adaptive Capacity In Complex Systems, Abdulrahman Alfaqiri 2020 Old Dominion University

A Framework For Adaptive Capacity In Complex Systems, Abdulrahman Alfaqiri

Engineering Management & Systems Engineering Theses & Dissertations

Complex systems are characterized by their high level of inter-connectivity, ambiguity, and emergence. Therefore, a failure in one element of a system (e.g. cyber layer) due to external or internal disturbances can lead to a cascade effect that may influence all elements of the system. Consequently, the complex system will not be able to perform its functional performance. Threats related to complex systems are very dynamic, fast, complex and damage can be severe. Thus, to respond to the dynamic and unpredictable nature of these threats, complex systems need to be highly adaptive to survive and thrive in the face of …


Human Supremacy As Posthuman Risk, Daniel Estrada 2020 New Jersey Institute of Technology

Human Supremacy As Posthuman Risk, Daniel Estrada

The Journal of Sociotechnical Critique

Human supremacy is the widely held view that human interests ought to be privileged over other interests as a matter of ethics and public policy. Posthumanism is the historical situation characterized by a critical reevaluation of anthropocentrist theory and practice. This paper draws on animal studies, critical posthumanism, and the critique of ideal theory in Charles Mills and Serene Khader to address the appeal to human supremacist rhetoric in AI ethics and policy discussions, particularly in the work of Joanna Bryson. This analysis identifies a specific risk posed by human supremacist policy in a posthuman context, namely the classification of …


An Analysis Of A Hurricane Loss Model, Validation From Tyndall Afb, And Applications For The Air Force, Nestor Hernandez 2020 Air Force Institute of Technology

An Analysis Of A Hurricane Loss Model, Validation From Tyndall Afb, And Applications For The Air Force, Nestor Hernandez

Theses and Dissertations

Recent reconstruction of infrastructure and its associated cost due to hurricanes justify research into hurricane loss models that can provide a more robust cost estimate. Academic research indicates that hurricane disasters are becoming more frequent and are becoming costlier. This research intends to explore hurricane loss models used by Federal Emergency Management Agency (FEMA), Risk Management Solution (RMS) and Florida State University (FSU). Within the literature review, key components of hurricane loss models were identified. These models and the key components were explored in order to help bring an understanding of loss estimation. The research found that the implementation of …


Design And Test Of An Autonomy Monitoring Service To Detect Divergent Behaviors On Unmanned Aerial Systems, Loay Y. Almannaei 2020 Air Force Institute of Technology

Design And Test Of An Autonomy Monitoring Service To Detect Divergent Behaviors On Unmanned Aerial Systems, Loay Y. Almannaei

Theses and Dissertations

Operation of Unmanned Aerial Vehicles (UAV) support many critical missions in the United State Air Force (USAF). Monitoring abnormal behavior is one of many responsibilities of the operator during a mission. Some behaviors are hard to be detect by an operator, especially when flying one or more autonomous vehicles; as such, detections require a high level of attention and focus to flight parameters. In this research, a monitoring system and its algorithm are designed and tested for a target fixed-wing UAV. The Autonomy Monitoring Service (AMS) compares the real vehicle or simulated Vehicle with a similar simulated vehicle using Software …


Backing Up Into Advocacy: The Case Of Smartphone Driver Distraction, Robert Rosenberger 2020 Georgia Institute of Technology

Backing Up Into Advocacy: The Case Of Smartphone Driver Distraction, Robert Rosenberger

The Journal of Sociotechnical Critique

For the last decade, I’ve been studying the topic of the driving impairment of smartphones. While this began as an exclusively academic project, it has increasingly compelled public engagement. One example of this came in an opinion piece I wrote in 2018 in response to a new traffic law. I take the opportunity here to fill out the academic backstory of this particular op-ed, reflect on how this larger project has evolved to include an unanticipated public-facing edge, and abstract some lessons about public writing.


Digital Commons powered by bepress