Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis

2020

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 58

Full-Text Articles in Engineering

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro Dec 2020

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro

Seattle Journal of Technology, Environmental, & Innovation Law

No abstract provided.


Small Modular Reactors And Advanced Reactor Security: Regulatory Perspectives On Integrating Physical And Cyber Security By Design To Protect Against Malicious Acts And Evolving Threats, Raphael Duguay Dec 2020

Small Modular Reactors And Advanced Reactor Security: Regulatory Perspectives On Integrating Physical And Cyber Security By Design To Protect Against Malicious Acts And Evolving Threats, Raphael Duguay

International Journal of Nuclear Security

How can future nuclear technologies and Small Modular Reactors (SMRs) deter and prevent organized crime groups, terrorists, and malicious actors from attempting to steal or sabotage nuclear materials and facilities? This paper presents the benefits of integrating Security by Design (SeBD) into a regulatory framework to allow more a flexible and effective design of physical protection systems for SMRs. During its effort to modernize the Nuclear Security Regulations, the Canadian Nuclear Safety Commission (CNSC) licensing application process provides for the option of SeBD in moving toward a performance-based approach with less prescriptive requirements. CNSC also recognizes the need for a …


Research On Risk Identification, Evaluation And Countermeasures Of Liquid Dangerous Cargo Ships In Yangpu Waters, Xiaofeng Han Dec 2020

Research On Risk Identification, Evaluation And Countermeasures Of Liquid Dangerous Cargo Ships In Yangpu Waters, Xiaofeng Han

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Using Interacting Multiple Model Filters To Indicate Program Risk, Amy Sunshine Smith-Carroll Dec 2020

Using Interacting Multiple Model Filters To Indicate Program Risk, Amy Sunshine Smith-Carroll

Engineering Management & Systems Engineering Theses & Dissertations

Technology development has increased exponentially. Program managers are pushed to accelerate development. There are many resources available to program managers that enable acceleration, such as: additional resources in the form of funding, people and technology. There are also negative impacts to acceleration, such as: inclusion, inexperience program managers, and communication. This research seeks to identify the limit to which a program or project can be accelerated before the program manager begins to accept an unacceptable amount of pre-determined risk.

This research will utilize estimation algorithms used by sensor systems to estimate the current and future state of objects in space. …


Incorporating Shear Resistance Into Debris Flow Triggering Model Statistics, Noah J. Lyman Dec 2020

Incorporating Shear Resistance Into Debris Flow Triggering Model Statistics, Noah J. Lyman

Master's Theses

Several regions of the Western United States utilize statistical binary classification models to predict and manage debris flow initiation probability after wildfires. As the occurrence of wildfires and large intensity rainfall events increase, so has the frequency in which development occurs in the steep and mountainous terrain where these events arise. This resulting intersection brings with it an increasing need to derive improved results from existing models, or develop new models, to reduce the economic and human impacts that debris flows may bring. Any development or change to these models could also theoretically increase the ease of collection, processing, and …


Uas Detection And Negation, Houbing Song, Yongxin Liu, Jian Wang Nov 2020

Uas Detection And Negation, Houbing Song, Yongxin Liu, Jian Wang

Publications

Unauthorized operation of a UAV may present privacy or security risks. A software-defined radio (SDR) or other receiver can be used to monitor a specified range of frequencies to provide detection of wireless communication signals suspected of relating to UAV operation. A protocol detector corresponding to a trained classifier can be applied to data packets demodulated by the SDR. A transmitter can then be triggered to provide warnings by injecting warning data into a video channel in response to the detected protocol. Control of the UAV can be established by transmitting simulated control commands that overwhelm the signals received from …


Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Bok Gyo Jeong, Claire Yun Nov 2020

Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Bok Gyo Jeong, Claire Yun

Center for Cybersecurity

This paper discusses and proposes the inclusion of a cyber or security risk assessment section during the course of public health initiatives involving the use of information and communication computer technology. Over the last decade, many public health research efforts have included information technologies such as Mobile Health (mHealth), Electronic Health (eHealth), Telehealth, and Digital Health to assist with unmet global development health needs. This paper provides a background on the lack of documentation on cybersecurity risks or vulnerability assessments in global public health areas. This study suggests existing frameworks and policies be adopted for public health. We also propose …


Promoting Maritime Safety Through ‘Findings’ Of Accident Investigations, Surveys And Audits In The Pacific : The Case Of Papua New Guinea, Conny Ralph Hauseng Nov 2020

Promoting Maritime Safety Through ‘Findings’ Of Accident Investigations, Surveys And Audits In The Pacific : The Case Of Papua New Guinea, Conny Ralph Hauseng

World Maritime University Dissertations

No abstract provided.


Accident Analysis And Prevention : Application Of Hfacs In Maritime Casualty Investigation Reports Of Ecuador, David Guevara Haro Nov 2020

Accident Analysis And Prevention : Application Of Hfacs In Maritime Casualty Investigation Reports Of Ecuador, David Guevara Haro

World Maritime University Dissertations

No abstract provided.


Saudi Regime For Ships Source Oil Spill In The Arabian Gulf Preparedness And Response, Abdullah M. Almutairi Nov 2020

Saudi Regime For Ships Source Oil Spill In The Arabian Gulf Preparedness And Response, Abdullah M. Almutairi

World Maritime University Dissertations

No abstract provided.


A Comparative Study Of The Implementation Of Oil Spill Contingency Planning In Promoting Ocean Sustainability And Governance : A Case Study Of Ghana And Canada., Marvin Bang-Gesina Ayoo Nov 2020

A Comparative Study Of The Implementation Of Oil Spill Contingency Planning In Promoting Ocean Sustainability And Governance : A Case Study Of Ghana And Canada., Marvin Bang-Gesina Ayoo

World Maritime University Dissertations

No abstract provided.


Compliance Assessment Of The National Oil Spill Contingency Plan Of The Philippines On 1990 International Convention On Oil Spill Preparedness, Response And Co-Operation Using Retos, Godofredo Garcia Vagilidad Nov 2020

Compliance Assessment Of The National Oil Spill Contingency Plan Of The Philippines On 1990 International Convention On Oil Spill Preparedness, Response And Co-Operation Using Retos, Godofredo Garcia Vagilidad

World Maritime University Dissertations

No abstract provided.


Assessing Oil Spill Management In Senegal Using The Iso 31000:2018 Standard As A Risk Management Framework, Abdou Aziz Diouf Nov 2020

Assessing Oil Spill Management In Senegal Using The Iso 31000:2018 Standard As A Risk Management Framework, Abdou Aziz Diouf

World Maritime University Dissertations

No abstract provided.


Wind Hazard Resilient Construction Mitigation Decision-Making Using A Multi-Objective Optimization, Erin Gregory Oct 2020

Wind Hazard Resilient Construction Mitigation Decision-Making Using A Multi-Objective Optimization, Erin Gregory

Masters Theses & Specialist Projects

While storms worsen and damage to homes increases, limited information is available about mitigations that are effective in lessening damage to homes and/or buildings. Information on past storms exists within FEMA’s Hazus-MH application, but the information provided by the data within the Hazus-MH application, while very informative on its own, was decidedly more precise and useful when optimized to provide defined information to those responsible for determining building codes or regulations for homes.

The research available from Hazus-MH details results from past storms categorized by building type, mitigations, and intensity of disaster. The data can be used to simulate storm …


2019-2020 Annual Security And Fire Report - Sayre Campus, Southwestern Oklahoma State University Sep 2020

2019-2020 Annual Security And Fire Report - Sayre Campus, Southwestern Oklahoma State University

ANNUAL SECURITY & FIRE REPORTS

This is the 2019-2020 Annual Security and Fire Report of the Sayre Campus by Southwestern Oklahoma State University.


2019-2020 Annual Security And Fire Report - Weatherford Campus, Southwestern Oklahoma State University Sep 2020

2019-2020 Annual Security And Fire Report - Weatherford Campus, Southwestern Oklahoma State University

ANNUAL SECURITY & FIRE REPORTS

This is the 2019-2020 Annual Security and Fire Report of the Weatherford Campus by Southwestern Oklahoma State University.


Security Analysis Of The Anonabox Pro, Devi Sowjanya Vempati Sep 2020

Security Analysis Of The Anonabox Pro, Devi Sowjanya Vempati

LSU Master's Theses

The security posture of critical network appliances, such as routers, switches, and firewalls, is crucial as these devices provide the first line of defense against malicious actors. As there is typically no endpoint security software, such as anti-virus available for these devices, it is crucial that vendors release timely updates for vulnerabilities and that customers apply them quickly. The research effort documented in this thesis describes a developed methodology for triaging known vulnerabilities in network devices, assessing the security posture of device vendors, and locating likely weak points in released firmware images. To highlight this methodology, the Anonabox security appliance …


Ventilation & Masks: Reducing Airborne Transmission Of Covid-19 In A Classroom, Eric A. Schiff Aug 2020

Ventilation & Masks: Reducing Airborne Transmission Of Covid-19 In A Classroom, Eric A. Schiff

SyracuseCoE Research Brief Series

We've calculated the number of COVID-19 infections that will be spread from a single COVID-19 "superspreader" to students and teachers in a classroom shared for 4 hours in different ventilation and masking conditions.


Navigation Risk Evaluation Of The Northeast Passage Based On The Entropy Weight Topsis Model, Fengde Qu Aug 2020

Navigation Risk Evaluation Of The Northeast Passage Based On The Entropy Weight Topsis Model, Fengde Qu

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Risk Perception Affacting The Performance Of Shipping Company, Yubing Wang Aug 2020

Risk Perception Affacting The Performance Of Shipping Company, Yubing Wang

World Maritime University Dissertations

No abstract provided.


Exploring The Spillover Effects Between The Cargo Market And Shipping Market: The Case Of The Dry Bulk Market, Yifeng Li Aug 2020

Exploring The Spillover Effects Between The Cargo Market And Shipping Market: The Case Of The Dry Bulk Market, Yifeng Li

World Maritime University Dissertations

No abstract provided.


Research On Quantity Discount Pricing By Container Liner Shipping, Runzhe Zhao Aug 2020

Research On Quantity Discount Pricing By Container Liner Shipping, Runzhe Zhao

World Maritime University Dissertations

No abstract provided.


Towards Scaling Laws For Ddt In Obstructed Channels, Elaine S. Oran, Vadim N. Gamezo Aug 2020

Towards Scaling Laws For Ddt In Obstructed Channels, Elaine S. Oran, Vadim N. Gamezo

Progress in Scale Modeling, an International Journal

In a coal mine, natural gas can leak through walls and accumulate in enclosed regions that are no longer being mined or ventilated. If there is an accidental spark in the region containing this gas, it can ignite a flame that may transition to detonation (DDT). An important problem is to assess if, when, and where DDT can occur, and thus provide information needed to design strong enough barriers to protect active mining areas. We describe results of numerical simulations of flame acceleration and DDT in obstacle-laden channels to find a scaling law for 𝐿DDT, the distance the …


Scaling Considerations For Fire Whirls, Forman A. Williams Aug 2020

Scaling Considerations For Fire Whirls, Forman A. Williams

Progress in Scale Modeling, an International Journal

This brief report, based on a presentation made at the Eighth International Symposium on Scale Modeling, held in Portland, Oregon, in September of 2017, summarizes and evaluates different methods for classifying fire whirls and their scaling laws. It is indicated that a number of relevant non-dimensional parameters are known for fire whirls, and future scale-modeling experiments could provide useful additional information and insights.


A Framework For Adaptive Capacity In Complex Systems, Abdulrahman Alfaqiri Aug 2020

A Framework For Adaptive Capacity In Complex Systems, Abdulrahman Alfaqiri

Engineering Management & Systems Engineering Theses & Dissertations

Complex systems are characterized by their high level of inter-connectivity, ambiguity, and emergence. Therefore, a failure in one element of a system (e.g. cyber layer) due to external or internal disturbances can lead to a cascade effect that may influence all elements of the system. Consequently, the complex system will not be able to perform its functional performance. Threats related to complex systems are very dynamic, fast, complex and damage can be severe. Thus, to respond to the dynamic and unpredictable nature of these threats, complex systems need to be highly adaptive to survive and thrive in the face of …


Human Supremacy As Posthuman Risk, Daniel Estrada Jul 2020

Human Supremacy As Posthuman Risk, Daniel Estrada

The Journal of Sociotechnical Critique

Human supremacy is the widely held view that human interests ought to be privileged over other interests as a matter of ethics and public policy. Posthumanism is the historical situation characterized by a critical reevaluation of anthropocentrist theory and practice. This paper draws on animal studies, critical posthumanism, and the critique of ideal theory in Charles Mills and Serene Khader to address the appeal to human supremacist rhetoric in AI ethics and policy discussions, particularly in the work of Joanna Bryson. This analysis identifies a specific risk posed by human supremacist policy in a posthuman context, namely the classification of …


An Analysis Of A Hurricane Loss Model, Validation From Tyndall Afb, And Applications For The Air Force, Nestor Hernandez Jun 2020

An Analysis Of A Hurricane Loss Model, Validation From Tyndall Afb, And Applications For The Air Force, Nestor Hernandez

Theses and Dissertations

Recent reconstruction of infrastructure and its associated cost due to hurricanes justify research into hurricane loss models that can provide a more robust cost estimate. Academic research indicates that hurricane disasters are becoming more frequent and are becoming costlier. This research intends to explore hurricane loss models used by Federal Emergency Management Agency (FEMA), Risk Management Solution (RMS) and Florida State University (FSU). Within the literature review, key components of hurricane loss models were identified. These models and the key components were explored in order to help bring an understanding of loss estimation. The research found that the implementation of …


Design And Test Of An Autonomy Monitoring Service To Detect Divergent Behaviors On Unmanned Aerial Systems, Loay Y. Almannaei Jun 2020

Design And Test Of An Autonomy Monitoring Service To Detect Divergent Behaviors On Unmanned Aerial Systems, Loay Y. Almannaei

Theses and Dissertations

Operation of Unmanned Aerial Vehicles (UAV) support many critical missions in the United State Air Force (USAF). Monitoring abnormal behavior is one of many responsibilities of the operator during a mission. Some behaviors are hard to be detect by an operator, especially when flying one or more autonomous vehicles; as such, detections require a high level of attention and focus to flight parameters. In this research, a monitoring system and its algorithm are designed and tested for a target fixed-wing UAV. The Autonomy Monitoring Service (AMS) compares the real vehicle or simulated Vehicle with a similar simulated vehicle using Software …


Backing Up Into Advocacy: The Case Of Smartphone Driver Distraction, Robert Rosenberger May 2020

Backing Up Into Advocacy: The Case Of Smartphone Driver Distraction, Robert Rosenberger

The Journal of Sociotechnical Critique

For the last decade, I’ve been studying the topic of the driving impairment of smartphones. While this began as an exclusively academic project, it has increasingly compelled public engagement. One example of this came in an opinion piece I wrote in 2018 in response to a new traffic law. I take the opportunity here to fill out the academic backstory of this particular op-ed, reflect on how this larger project has evolved to include an unanticipated public-facing edge, and abstract some lessons about public writing.


Intruder Preference And Route Selection: A Gis Data Approach, Griffin Mathews May 2020

Intruder Preference And Route Selection: A Gis Data Approach, Griffin Mathews

Industrial Engineering Undergraduate Honors Theses

The Department of Homeland Security (DHS) requested an Engineering Research and Development Center study incorporating modeling and simulation to determine the selection, amount, and optimal location of sensor suites along the U.S. Border. The study objective is to maximize the probability of detection and apprehension of illegal elements attempting to enter. A study on intruders and their preferences were conducted to create an intruder preference value map to determine the preferred intruder routes taken after crossing the border. The results of this research were integrated into another study on the selection and simulation of sensor suites.

Intruder context and preferences …