Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Risk assessment

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 13 of 13

Full-Text Articles in Computer Engineering

Learning And Analysis Of Dynamic Models For Grid Discrete Events Based On Log Information, Danlong Zhu, Yunqi Yan, Ying Chen, Jiaqi Zhang, Longxing Jin, Wei Fu Oct 2023

Learning And Analysis Of Dynamic Models For Grid Discrete Events Based On Log Information, Danlong Zhu, Yunqi Yan, Ying Chen, Jiaqi Zhang, Longxing Jin, Wei Fu

Journal of System Simulation

Abstract: With the increasing scale of power grid, the massive amount of log information generated bydevices in the power grid poses a challenge to the manual analysis of abnormal grid conditions. The log information generated during the operation of the power grid has the typical discrete sequential characteristics. By analyzing the log information of grid alarm messages, a station event transition probability model and an event sequence risk calculation method are proposed to effectively model and analyze the abnormal operation level of primary and secondary systems in substations. The proposed method not only successfully identifies the event sequences corresponding to …


Dynamic Risk Assessment Of Vocs Cross Regional Flow Based On Petri Nets, Guangqiu Huang, He Wang Jan 2023

Dynamic Risk Assessment Of Vocs Cross Regional Flow Based On Petri Nets, Guangqiu Huang, He Wang

Journal of System Simulation

Abstract: In order to evaluate the interaction between regions due to the cross regional flow of VOCs(volatile organic compounds) under polluted weather, a dynamic risk assessment method of cross regional flow of VOCs is proposed by using Petri net modeling method. The migration paths of VOCs between multiple potential pollution sources and contaminated areas are determined by HYSPLIT model, and the relationship between each migration path is described by Petri net; the dynamic risk assessment method is defined, and the calculation of dynamic risk is integrated into the operation of functional Petri net; through case analysis, the dynamic risk assessment …


Research On Stick-Slip Vibration Level Estimation Of Near-Bit Based On Optimized Xgboost, Hanwen Tang, Zhang Tao, Yumei Li, Li Lei, Jinghua Zhang, Dongliang Hu Nov 2021

Research On Stick-Slip Vibration Level Estimation Of Near-Bit Based On Optimized Xgboost, Hanwen Tang, Zhang Tao, Yumei Li, Li Lei, Jinghua Zhang, Dongliang Hu

Journal of System Simulation

Abstract: Stick-slip vibration is an important limiting factor affecting drilling speed, safety and cost. The establishment of a reliable stick-slip vibration classification model is very important for oil drilling decision-making. A new method based on Bayesian optimization and eXtreme Gradient Boosting (XGBoost) is proposed to evaluate the severity of stick-slip vibration near the bit. The classification processing of the near-bit stick-slip vibration data is carried out. The main feature vectors of the original data is extracted through time domain and frequency domain analysis. A stick-slip vibration level identification and prediction model based on XGBoost is established, and Bayesian algorithm is …


Uncertainty Quantitative Analysis In Risk Assessment Of Returning To School In The Post-Covid-19 Era, Haibin Li, Jialiang Wang, Haiyan Li Jan 2021

Uncertainty Quantitative Analysis In Risk Assessment Of Returning To School In The Post-Covid-19 Era, Haibin Li, Jialiang Wang, Haiyan Li

Journal of System Simulation

Abstract: After the epidemic, taking the spread of the epidemic in returning to school as an example, a quantitative risk assessment study is conducted. Taking the activity trajectory description of the whole process of susceptible individuals from infection to isolation as a clue, an epidemiological model for risk assessment is established. The number of infected persons in the risk indicators of returning to school is quantified based on the quantified model parameters. According to the value characteristics of the parameters, the number of infected persons is taken as a function of discrete random variables. The probability distribution of the infected …


Visual Tsunami Simulation And Disaster Risk Assessment, Xie Cui, Jinjin Xun, Xiaowei Zhou, Junyu Dong Aug 2020

Visual Tsunami Simulation And Disaster Risk Assessment, Xie Cui, Jinjin Xun, Xiaowei Zhou, Junyu Dong

Journal of System Simulation

Abstract: Based on the effectively modeling and visual simulation of the potential tsunami event in the South China Sea, the tsunami generation, propagation, runup and inundation could be visually simulated with multiple scenarios. The inundation probability, the flood inundation area and degree were computed. The location and function of buildings/critical facilities in the study area were extracted and classified by GIS analysis and image processing technology. Then the population distribution was effectively modeled and the vulnerability of people response was estimated for risk assessment combining with the geographical information and the historical disasters record. This improved method considered the inundation …


A Security Review Of Local Government Using Nist Csf: A Case Study, Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry Jan 2018

A Security Review Of Local Government Using Nist Csf: A Case Study, Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry

Research outputs 2014 to 2021

Evaluating cyber security risk is a challenging task regardless of an organisation’s nature of business or size, however, an essential activity. This paper uses the National Institute of Standards and Technology (NIST) cyber security framework (CSF) to assess the cyber security posture of a local government organisation in Western Australia. Our approach enabled the quantification of risks for specific NIST CSF core functions and respective categories and allowed making recommendations to address the gaps discovered to attain the desired level of compliance. This has led the organisation to strategically target areas related to their people, processes, and technologies, thus mitigating …


Chronic Risk And Disease Management Model Using Structured Query Language And Predictive Analysis, Mamata Ojha Jan 2018

Chronic Risk And Disease Management Model Using Structured Query Language And Predictive Analysis, Mamata Ojha

Electronic Theses and Dissertations

Individuals with chronic conditions are the ones who use health care most frequently and more than 50% of top ten causes of death are chronic diseases in United States and these members always have health high risk scores. In the field of population health management, identifying high risk members is very important in terms of patient health care, disease management and cost management. Disease management program is very effective way of monitoring and preventing chronic disease and health related complications and risk management allows physicians and healthcare companies to reduce patient’s health risk, help identifying members for care/disease management along …


Implementation Of A Web-Based Service For Mobile Application Risk Assessment, Asim Si̇nan Yüksel, Mehmet Erkan Yüksel, Ahmet Sertbaş, Abdül Hali̇m Zai̇m Jan 2017

Implementation Of A Web-Based Service For Mobile Application Risk Assessment, Asim Si̇nan Yüksel, Mehmet Erkan Yüksel, Ahmet Sertbaş, Abdül Hali̇m Zai̇m

Turkish Journal of Electrical Engineering and Computer Sciences

The Android operating system has increased in popularity and has been increasing its shares in the smart phone market. Users can carry out their daily work such as paying bills, being social, and sharing photos through mobile applications. These applications have access to sensitive information about the user, such as location, contacts, call logs, and SMS messages. However, the users have no knowledge of the applications or the personal information these applications have access to. Even if an application is not malware or does not have malicious behavior, it can compromise the security and privacy of the user by accessing …


Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron Sep 2016

Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron

Journal of Digital Forensics, Security and Law

Threats are communicative acts, but it is not always obvious what they communicate or when they communicate imminent credible and serious risk. This paper proposes a research- and theory-based set of over 20 potential linguistic risk indicators that may discriminate credible from non-credible threats within online threat message corpora. Two prongs are proposed: (1) Using expert and layperson ratings to validate subjective scales in relation to annotated known risk messages, and (2) Using the resulting annotated corpora for automated machine learning with computational linguistic analyses to classify non-threats, false threats, and credible threats. Rating scales are proposed, existing threat corpora …


Quantitative Risk Associated With Intermittent Wind Generation, Mohamed Shaaban, Mohd. Dzulhafizi Usman Jan 2016

Quantitative Risk Associated With Intermittent Wind Generation, Mohamed Shaaban, Mohd. Dzulhafizi Usman

Turkish Journal of Electrical Engineering and Computer Sciences

No abstract provided.


Water Quality Risk Simulation Of Laoguanhe River Based On Uncertainty, Jun Hu, Chunhui Li, Xuan Wang Jun 2014

Water Quality Risk Simulation Of Laoguanhe River Based On Uncertainty, Jun Hu, Chunhui Li, Xuan Wang

International Congress on Environmental Modelling and Software

Laoguanhe River as the nearest upstream tributary of Danjiangkou Reservoir to the Taocha diversion main canal in South-to-North Water Diversion Project, its water quality changes will directly affect the water quality level of the project. This study is intended to provide the scientific support for the comprehensive water environment risk assessment and provide the optimization decision-making basis for the water environment management of Laoguanhe River. This research used the QUAL2Kw model to simulate the water quality of Laoguanhe river form sandaohe section to downstream section. And then the calibrated model is used to calculate the water quality risk with Markov …


An Urgent Precaution System To Detect Students At Risk Of Substance Abuse Through Classification Algorithms, Faruk Bulut, İhsan Ömür Bucak Jan 2014

An Urgent Precaution System To Detect Students At Risk Of Substance Abuse Through Classification Algorithms, Faruk Bulut, İhsan Ömür Bucak

Turkish Journal of Electrical Engineering and Computer Sciences

In recent years, the use of addictive drugs and substances has turned out to be a challenging social problem worldwide. The illicit use of these types of drugs and substances appears to be increasing among elementary and high school students. After becoming addicted to drugs, life becomes unbearable and gets even worse for their users. Scientific studies show that it becomes extremely difficult for an individual to break this habit after being a user. Hence, preventing teenagers from addiction becomes an important issue. This study focuses on an urgent precaution system that helps families and educators prevent teenagers from developing …


Maintenance Activity Planning By Reability Centered Maintenance Ii Method, Rachmad Hidayat, Nachnul Ansori, Ali Imron Apr 2010

Maintenance Activity Planning By Reability Centered Maintenance Ii Method, Rachmad Hidayat, Nachnul Ansori, Ali Imron

Makara Journal of Technology

Maintenance Activity Planning by Reability Centered Maintenance II Method. This research discusses maintenance activity planning using the RCM II method to evaluate failure function risk on compresor screw. The calculation of maintenance time is performed by considering maintenance and repair costs. The risk evaluation result with RPN shows that the critical component that needs to get the main priority in applying maintenance on compresor screw is function disorder on timeworn piston and on the broken outgoing air sponge’s filter that receives RPN 45. The optimum maintenance time calculation is applied on components that undergo scheduled restoration and scheduled discard task …