Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (10)
- Physical Sciences and Mathematics (10)
- Electrical and Computer Engineering (6)
- Artificial Intelligence and Robotics (5)
- Numerical Analysis and Scientific Computing (5)
-
- Operations Research, Systems Engineering and Industrial Engineering (5)
- Systems Science (5)
- Data Storage Systems (3)
- Civil Engineering (2)
- Civil and Environmental Engineering (2)
- Information Security (2)
- Biomedical (1)
- Chemical Engineering (1)
- Computer Law (1)
- Electrical and Electronics (1)
- Environmental Engineering (1)
- Forensic Science and Technology (1)
- Health Information Technology (1)
- Law (1)
- Legal Studies (1)
- Materials Science and Engineering (1)
- Mechanical Engineering (1)
- Medicine and Health Sciences (1)
- Metallurgy (1)
- Ocean Engineering (1)
- Other Civil and Environmental Engineering (1)
- Social and Behavioral Sciences (1)
- Structural Engineering (1)
- Institution
- Publication
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in Computer Engineering
Learning And Analysis Of Dynamic Models For Grid Discrete Events Based On Log Information, Danlong Zhu, Yunqi Yan, Ying Chen, Jiaqi Zhang, Longxing Jin, Wei Fu
Learning And Analysis Of Dynamic Models For Grid Discrete Events Based On Log Information, Danlong Zhu, Yunqi Yan, Ying Chen, Jiaqi Zhang, Longxing Jin, Wei Fu
Journal of System Simulation
Abstract: With the increasing scale of power grid, the massive amount of log information generated bydevices in the power grid poses a challenge to the manual analysis of abnormal grid conditions. The log information generated during the operation of the power grid has the typical discrete sequential characteristics. By analyzing the log information of grid alarm messages, a station event transition probability model and an event sequence risk calculation method are proposed to effectively model and analyze the abnormal operation level of primary and secondary systems in substations. The proposed method not only successfully identifies the event sequences corresponding to …
Dynamic Risk Assessment Of Vocs Cross Regional Flow Based On Petri Nets, Guangqiu Huang, He Wang
Dynamic Risk Assessment Of Vocs Cross Regional Flow Based On Petri Nets, Guangqiu Huang, He Wang
Journal of System Simulation
Abstract: In order to evaluate the interaction between regions due to the cross regional flow of VOCs(volatile organic compounds) under polluted weather, a dynamic risk assessment method of cross regional flow of VOCs is proposed by using Petri net modeling method. The migration paths of VOCs between multiple potential pollution sources and contaminated areas are determined by HYSPLIT model, and the relationship between each migration path is described by Petri net; the dynamic risk assessment method is defined, and the calculation of dynamic risk is integrated into the operation of functional Petri net; through case analysis, the dynamic risk assessment …
Research On Stick-Slip Vibration Level Estimation Of Near-Bit Based On Optimized Xgboost, Hanwen Tang, Zhang Tao, Yumei Li, Li Lei, Jinghua Zhang, Dongliang Hu
Research On Stick-Slip Vibration Level Estimation Of Near-Bit Based On Optimized Xgboost, Hanwen Tang, Zhang Tao, Yumei Li, Li Lei, Jinghua Zhang, Dongliang Hu
Journal of System Simulation
Abstract: Stick-slip vibration is an important limiting factor affecting drilling speed, safety and cost. The establishment of a reliable stick-slip vibration classification model is very important for oil drilling decision-making. A new method based on Bayesian optimization and eXtreme Gradient Boosting (XGBoost) is proposed to evaluate the severity of stick-slip vibration near the bit. The classification processing of the near-bit stick-slip vibration data is carried out. The main feature vectors of the original data is extracted through time domain and frequency domain analysis. A stick-slip vibration level identification and prediction model based on XGBoost is established, and Bayesian algorithm is …
Uncertainty Quantitative Analysis In Risk Assessment Of Returning To School In The Post-Covid-19 Era, Haibin Li, Jialiang Wang, Haiyan Li
Uncertainty Quantitative Analysis In Risk Assessment Of Returning To School In The Post-Covid-19 Era, Haibin Li, Jialiang Wang, Haiyan Li
Journal of System Simulation
Abstract: After the epidemic, taking the spread of the epidemic in returning to school as an example, a quantitative risk assessment study is conducted. Taking the activity trajectory description of the whole process of susceptible individuals from infection to isolation as a clue, an epidemiological model for risk assessment is established. The number of infected persons in the risk indicators of returning to school is quantified based on the quantified model parameters. According to the value characteristics of the parameters, the number of infected persons is taken as a function of discrete random variables. The probability distribution of the infected …
Visual Tsunami Simulation And Disaster Risk Assessment, Xie Cui, Jinjin Xun, Xiaowei Zhou, Junyu Dong
Visual Tsunami Simulation And Disaster Risk Assessment, Xie Cui, Jinjin Xun, Xiaowei Zhou, Junyu Dong
Journal of System Simulation
Abstract: Based on the effectively modeling and visual simulation of the potential tsunami event in the South China Sea, the tsunami generation, propagation, runup and inundation could be visually simulated with multiple scenarios. The inundation probability, the flood inundation area and degree were computed. The location and function of buildings/critical facilities in the study area were extracted and classified by GIS analysis and image processing technology. Then the population distribution was effectively modeled and the vulnerability of people response was estimated for risk assessment combining with the geographical information and the historical disasters record. This improved method considered the inundation …
A Security Review Of Local Government Using Nist Csf: A Case Study, Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry
A Security Review Of Local Government Using Nist Csf: A Case Study, Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry
Research outputs 2014 to 2021
Evaluating cyber security risk is a challenging task regardless of an organisation’s nature of business or size, however, an essential activity. This paper uses the National Institute of Standards and Technology (NIST) cyber security framework (CSF) to assess the cyber security posture of a local government organisation in Western Australia. Our approach enabled the quantification of risks for specific NIST CSF core functions and respective categories and allowed making recommendations to address the gaps discovered to attain the desired level of compliance. This has led the organisation to strategically target areas related to their people, processes, and technologies, thus mitigating …
Chronic Risk And Disease Management Model Using Structured Query Language And Predictive Analysis, Mamata Ojha
Chronic Risk And Disease Management Model Using Structured Query Language And Predictive Analysis, Mamata Ojha
Electronic Theses and Dissertations
Individuals with chronic conditions are the ones who use health care most frequently and more than 50% of top ten causes of death are chronic diseases in United States and these members always have health high risk scores. In the field of population health management, identifying high risk members is very important in terms of patient health care, disease management and cost management. Disease management program is very effective way of monitoring and preventing chronic disease and health related complications and risk management allows physicians and healthcare companies to reduce patient’s health risk, help identifying members for care/disease management along …
Implementation Of A Web-Based Service For Mobile Application Risk Assessment, Asim Si̇nan Yüksel, Mehmet Erkan Yüksel, Ahmet Sertbaş, Abdül Hali̇m Zai̇m
Implementation Of A Web-Based Service For Mobile Application Risk Assessment, Asim Si̇nan Yüksel, Mehmet Erkan Yüksel, Ahmet Sertbaş, Abdül Hali̇m Zai̇m
Turkish Journal of Electrical Engineering and Computer Sciences
The Android operating system has increased in popularity and has been increasing its shares in the smart phone market. Users can carry out their daily work such as paying bills, being social, and sharing photos through mobile applications. These applications have access to sensitive information about the user, such as location, contacts, call logs, and SMS messages. However, the users have no knowledge of the applications or the personal information these applications have access to. Even if an application is not malware or does not have malicious behavior, it can compromise the security and privacy of the user by accessing …
Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron
Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron
Journal of Digital Forensics, Security and Law
Threats are communicative acts, but it is not always obvious what they communicate or when they communicate imminent credible and serious risk. This paper proposes a research- and theory-based set of over 20 potential linguistic risk indicators that may discriminate credible from non-credible threats within online threat message corpora. Two prongs are proposed: (1) Using expert and layperson ratings to validate subjective scales in relation to annotated known risk messages, and (2) Using the resulting annotated corpora for automated machine learning with computational linguistic analyses to classify non-threats, false threats, and credible threats. Rating scales are proposed, existing threat corpora …
Quantitative Risk Associated With Intermittent Wind Generation, Mohamed Shaaban, Mohd. Dzulhafizi Usman
Quantitative Risk Associated With Intermittent Wind Generation, Mohamed Shaaban, Mohd. Dzulhafizi Usman
Turkish Journal of Electrical Engineering and Computer Sciences
No abstract provided.
Water Quality Risk Simulation Of Laoguanhe River Based On Uncertainty, Jun Hu, Chunhui Li, Xuan Wang
Water Quality Risk Simulation Of Laoguanhe River Based On Uncertainty, Jun Hu, Chunhui Li, Xuan Wang
International Congress on Environmental Modelling and Software
Laoguanhe River as the nearest upstream tributary of Danjiangkou Reservoir to the Taocha diversion main canal in South-to-North Water Diversion Project, its water quality changes will directly affect the water quality level of the project. This study is intended to provide the scientific support for the comprehensive water environment risk assessment and provide the optimization decision-making basis for the water environment management of Laoguanhe River. This research used the QUAL2Kw model to simulate the water quality of Laoguanhe river form sandaohe section to downstream section. And then the calibrated model is used to calculate the water quality risk with Markov …
An Urgent Precaution System To Detect Students At Risk Of Substance Abuse Through Classification Algorithms, Faruk Bulut, İhsan Ömür Bucak
An Urgent Precaution System To Detect Students At Risk Of Substance Abuse Through Classification Algorithms, Faruk Bulut, İhsan Ömür Bucak
Turkish Journal of Electrical Engineering and Computer Sciences
In recent years, the use of addictive drugs and substances has turned out to be a challenging social problem worldwide. The illicit use of these types of drugs and substances appears to be increasing among elementary and high school students. After becoming addicted to drugs, life becomes unbearable and gets even worse for their users. Scientific studies show that it becomes extremely difficult for an individual to break this habit after being a user. Hence, preventing teenagers from addiction becomes an important issue. This study focuses on an urgent precaution system that helps families and educators prevent teenagers from developing …
Maintenance Activity Planning By Reability Centered Maintenance Ii Method, Rachmad Hidayat, Nachnul Ansori, Ali Imron
Maintenance Activity Planning By Reability Centered Maintenance Ii Method, Rachmad Hidayat, Nachnul Ansori, Ali Imron
Makara Journal of Technology
Maintenance Activity Planning by Reability Centered Maintenance II Method. This research discusses maintenance activity planning using the RCM II method to evaluate failure function risk on compresor screw. The calculation of maintenance time is performed by considering maintenance and repair costs. The risk evaluation result with RPN shows that the critical component that needs to get the main priority in applying maintenance on compresor screw is function disorder on timeworn piston and on the broken outgoing air sponge’s filter that receives RPN 45. The optimum maintenance time calculation is applied on components that undergo scheduled restoration and scheduled discard task …