Evaluation Of Reliability Indices For Gas Turbines Based On The Johnson Sb Distribution: Towards Practical Development,
2023
Applied Automation and Industrial Diagnostics Laboratory, Faculty of Science and Technology, University of Djelfa 17000 DZ, Algeria
Evaluation Of Reliability Indices For Gas Turbines Based On The Johnson Sb Distribution: Towards Practical Development, Elbar Mohamed, Djeddi Ahmed Zohair, Ahmed Hafaifa, Charrak Naas, Abdelhamid Iratni, Ilhami Colak
Emirates Journal for Engineering Research
Recent advancements in computer engineering have provided effective solutions for processing and analyzing complex systems and big data. Consequently, the adjustment and standardization of this data play a crucial role in addressing issues related to the monitoring of industrial systems. In this study, we propose a reliability approach for gas turbines to identify and characterize their degradation using operational data. We introduce a method for adjusting turbine reliability data, which resolves the challenges associated with the nature of these operating data. This enables us to determine a mathematical function that models the relationships between turbine reliability parameters and evaluate the …
Failure Mode Effective Analysis In A Boiler Using Combination Of Event Tree And Fault Tree Analysis,
2023
Department of Mechanical Engineering, Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai,Tamilnadu,India
Failure Mode Effective Analysis In A Boiler Using Combination Of Event Tree And Fault Tree Analysis, Jayaprradap R, Udaya Prakash J
International Journal of Applied Research in Mechanical Engineering
Boilers are valued highly in many industrial industries and are expensive assets. In addition to their initial expense, they demand a large maintenance budget in order to guarantee output in respectable and safe working conditions. In order to avoid extreme repercussions, including the loss of lives, these assets must be carefully operated under experienced, well-trained supervision and subject to rigorous maintenance schedules and safety activities. However, this investigation is carried out with the help of the FMEA method, considering the previous literature's studies of boiler accidents in Asia so far. Phase I has detailed information about boilers and Asian boiler …
Risk Maintenance Strategy In Blade Manufacturing Industry Machineries - By Using Applications Of Topsis Method,
2023
Department of Mechanical Engineering, Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai,Tamilnadu,India
Risk Maintenance Strategy In Blade Manufacturing Industry Machineries - By Using Applications Of Topsis Method, Poovanna Vivek Dev S, Sachin Salunkhe
International Journal of Applied Research in Mechanical Engineering
Regarding the capital and operating expenses of windmill turbines, blades are amongst the most vital parts. Those blades are made using conventional manufacturing methods such as deep groove machine, CNC Machine, foam slicing machine, glass layer machine, glass layer winding machine, balsa angle cutting machine, etc. In this research, TOPSIS (Technique for Order Performance by Similarity to Ideal Solution) method is used to sort the machining methods that need to be handled very carefully according to risk and hazard in blade production. This research objective is to find the windmill blade design data, various production processes and its hazards, risks …
Static Malware Family Clustering Via Structural And Functional Characteristics,
2023
Southern Methodist University
Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater
SMU Data Science Review
Static and dynamic analyses are the two primary approaches to analyzing malicious applications. The primary distinction between the two is that the application is analyzed without execution in static analysis, whereas the dynamic approach executes the malware and records the behavior exhibited during execution. Although each approach has advantages and disadvantages, dynamic analysis has been more widely accepted and utilized by the research community whereas static analysis has not seen the same attention. This study aims to apply advancements in static analysis techniques to demonstrate the identification of fine-grained functionality, and show, through clustering, how malicious applications may be grouped …
Mechanisms To Reduce Cyber Threats And Risks,
2023
Journal of Police and Legal Sciences
Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh
Journal of Police and Legal Sciences
Addressing the mechanisms of reducing cyber threats and risks Research Because cyberspace is an important arena for various international interactions, especially in recent times in light of the increase in cyber-attacks between some countries, which affects their national security. In this context, many countries are trying to make an effort to develop their capabilities to be used in any cyber-attack, or to take adequate preventive measures to protect them from any possible cyberattacks, especially in light of the impact of these attacks on vital places and institutions such as banks and ministries or on important facilities such as water and …
Framework For Assessing Information System Security Posture Risks,
2023
The University of Western Ontario
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Electronic Thesis and Dissertation Repository
In today’s data-driven world, Information Systems, particularly the ones operating in regulated industries, require comprehensive security frameworks to protect against loss of confidentiality, integrity, or availability of data, whether due to malice, accident or otherwise. Once such a security framework is in place, an organization must constantly monitor and assess the overall compliance of its systems to detect and rectify any issues found. This thesis presents a technique and a supporting toolkit to first model dependencies between security policies (referred to as controls) and, second, devise models that associate risk with policy violations. Third, devise algorithms that propagate risk when …
Prioritizing Ports And Waterways Safety Assessments (Pawsas),
2023
United States Coast Guard Academy
Prioritizing Ports And Waterways Safety Assessments (Pawsas), Matalynn Clark, Peyton Phillips, Claire Portigue, Justin Canovas, Eric Johnson, Andrew Zuckerman
Mathematica Militaris
A Ports and Waterways Safety Assessment (PAWSA) is a discussion forum facilitated by the United States Coast Guard Navigation Center (NAVCEN) to analyze the state of a port or waterway as it relates to navigation, vessel traffic, and physical attributes of the waterway. A successful workshop requires the collaboration between various stakeholders such as waterway users, environmental interest groups and local law enforcement. Without involving the relevant parties and encouraging their insight, the USCG risks creating an incomplete understanding of the port’s dynamic.
This project examines the characteristics of eight ports across the U.S. to determine which is in most …
Risk Assessments And Modeling Of Driver By Using Risk Potential Theory,
2023
Mississippi State University
Risk Assessments And Modeling Of Driver By Using Risk Potential Theory, Riku Kikuta
Theses and Dissertations
Recently, various self-driving and driving assistance systems such as Advanced Driver Assistance System (ADAS) have been developed with the intent to reduce the number of motor vehicle accidents. While self-driving systems have been proven to reduce traffic accidents, the systems sometimes make other drivers confused because of their mechanical behavior. To avoid confusion and possible error, it is necessary to construct self-driving systems that exhibit human-like behaviors. Risk Potential theory has been used to construct models that successfully represent driver behavior, especially expert behavior. This project uses Risk Potential theory to construct and evaluate a collision avoidance driver model which …
Integrating Steel Slag Aggregates Into Asphalt Paving By Harmonizing Availability, Quality, Economics, And The Environment,
2023
Mississippi State University
Integrating Steel Slag Aggregates Into Asphalt Paving By Harmonizing Availability, Quality, Economics, And The Environment, Timothy R. Murphy
Theses and Dissertations
This thesis provides guidance on how to balance matters related to the environmental stewardship, market sources, origin and uses, material properties, performance, and economic impact of using slag materials in pavements. The literature on this topic provides numerous references on the use of slag materials for specific applications, and this thesis aims to make use of those references along with other data from the author to describe slag materials from a holistic perspective and provide some suggestions for balancing several factors that impact optimal use of this resource within pavement structures. Discussion is given to the increased importance of recycling …
Sensor Module Network For Monitoring Trace Gases In The International Space Station,
2023
Northern Illinois University
Sensor Module Network For Monitoring Trace Gases In The International Space Station, Aaron Beck, Drake Provost, Christopher English, Kamrin Gustave
Honors Capstones
The Jet Propulsion Laboratory (JPL) of the National Aeronautics and Space Administration (NASA) aims to develop a sensor network for the International Space Station (ISS) to ensure a comprehensive understanding of air quality within the station. The accumulation of carbon dioxide (CO2) can lead to cognitive impairment, headaches, and potentially dangerous situations at high concentrations. Monitoring air content at the ISS is critical to maintaining a healthy environment for crew onboard. Exposure to harmful gases causes negative side effects that make crew sick, which may interfere with their responsibilities. CO2 is a gas that should be monitored …
Types Of Cyber Attacks And Incident Responses,
2023
CUNY New York City College of Technology
Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu
Publications and Research
Cyber-attacks are increasingly prevalent in today's digital age, and their impact can be severe for individuals, organizations, and governments. To effectively protect against these threats, it is essential to understand the different types of attacks and have an incident response plan in place to minimize damage and restore normal operations quickly.
This research aims to contribute to the field by addressing the following questions: What are the main types of cyber-attacks, and how can organizations effectively respond to these incidents? How can the incident response process be improved through post-incident activities?
The study examines various cyber-attack types, including malware, phishing, …
Multi-Mode Total Focusing Method (Mtfm) To Detect High-Temperature Hydrogen Attack (Htha) – A Review,
2023
Universitas Indonesia
Multi-Mode Total Focusing Method (Mtfm) To Detect High-Temperature Hydrogen Attack (Htha) – A Review, Anjar Oktikawati, Rini Riastuti, Nursidi Yuanto
Journal of Materials Exploration and Findings (JMEF)
High temperature hydrogen attack (HTHA) is a commonly observed harm component in carbon steels exposed to high temperature and pressure in a hydrogen-rich environment. Hydrogen together with carbon responds to produce methane. The formation of methane bubbles in steel can lead to loss of fracture toughness and lead to intergranular cracking. The main challenge of this problem lies in early warning systems that can detect these bubble clusters before they reach the advanced stage. Several advanced ultrasonic inspections have been developed over the years due to the challenges of inspecting materials for defects and discontinuities. These cover time-of-flight diffraction (ToFD), …
Systemic Risk Analysis Of Human Factors In Phishing,
2023
Old Dominion University
Systemic Risk Analysis Of Human Factors In Phishing, Mark Guilford
Engineering Management & Systems Engineering Theses & Dissertations
The scope of this study is the systemic risk of the role of humans in the risk of phishing. The relevance to engineering managers and systems engineers of the risks of phishing attacks is the theft of data which has significantly increased in the past couple of years. Phishing has become a systemic persistent threat to all internet users. Understanding the role of humans in phishing from a systemic perspective is a critical objective towards creating a strong defense against complex and manipulative phishing attacks. The systemic view of phishing concentrates on how phishing affects the entire organizational system, not …
Machine Learning-Based Data And Model Driven Bayesian Uncertanity Quantification Of Inverse Problems For Suspended Non-Structural System,
2023
Clemson University
Machine Learning-Based Data And Model Driven Bayesian Uncertanity Quantification Of Inverse Problems For Suspended Non-Structural System, Zhiyuan Qin
All Dissertations
Inverse problems involve extracting the internal structure of a physical system from noisy measurement data. In many fields, the Bayesian inference is used to address the ill-conditioned nature of the inverse problem by incorporating prior information through an initial distribution. In the nonparametric Bayesian framework, surrogate models such as Gaussian Processes or Deep Neural Networks are used as flexible and effective probabilistic modeling tools to overcome the high-dimensional curse and reduce computational costs. In practical systems and computer models, uncertainties can be addressed through parameter calibration, sensitivity analysis, and uncertainty quantification, leading to improved reliability and robustness of decision and …
Estimating Toxic Load From Finite-Duration Contaminant Releases In Wind Tunnel Experiments,
2023
University of Arkansas, Fayetteville
Estimating Toxic Load From Finite-Duration Contaminant Releases In Wind Tunnel Experiments, Patrick B. Jones
Chemical Engineering Undergraduate Honors Theses
When gaseous contaminants are released into the atmosphere said contaminants form clouds that travel in the prevailing wind direction. An individual caught in the downwind path of one such cloud will accumulate a dosage, or toxic load, of said contaminant that is dependent on a multitude of environmental factors. This thesis quantifies unpredictability – or variation – in toxic load measurements using downwind concentration data captured from finite-duration gaseous contaminant releases conducted at set conditions in the Chemical Hazards Research Center ultra-low speed wind tunnel.
Finite-duration releases can be divided into two categories – time-limited steady releases and puffs – …
Automated Visualization Pipeline For Near Real-Time Risk Management System,
2023
University of Arkansas, Fayetteville
Automated Visualization Pipeline For Near Real-Time Risk Management System, Paris Joslin
Industrial Engineering Undergraduate Honors Theses
In modern society, technological capabilities and the amount of data readily available to users continue to grow exponentially. Many have adopted these new capabilities but lack the infrastructure needed to efficiently utilize high-powered software and programs. Without a method to collect, store, and process large datasets in real-time, individuals and businesses can quickly become overwhelmed, inhibiting effective decision-making processes. There is potential to improve decision-making abilities by enhancing the computing infrastructure. To accomplish this task, we will explore the ideas surrounding High Performance Computing (HPC) and data visualization software. High Performance Computing is the ability to process data and perform …
Analyzing The Impact Of Automation On Employment In Different Us Regions: A Data-Driven Approach,
2023
California State University, San Bernardino
Analyzing The Impact Of Automation On Employment In Different Us Regions: A Data-Driven Approach, Thejaas Balasubramanian
Electronic Theses, Projects, and Dissertations
Automation is transforming the US workforce with the increasing prevalence of technologies like robotics, artificial intelligence, and machine learning. As a result, it is essential to understand how this shift will impact the labor market and prepare for its effects. This culminating experience project aimed to examine the influence of computerization on jobs in the United States and answer the following research questions: Q1. What factors affect how likely different jobs will be automated? Q2. What are the possible effects of automation on the US workforce across states and industries? Q3. What are the meaningful predictors of the likelihood of …
Ransomware: Evaluation Of Mitigation And Prevention Techniques,
2023
Kennesaw State University
Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas
Symposium of Student Scholars
Ransomware is classified as one of the main types of malware and involves the design of exploitations of new vulnerabilities through a host. That allows for the intrusion of systems and encrypting of any information assets and data in order to demand a sum of payment normally through untraceable cryptocurrencies such as Monero for the decryption key. This rapid security threat has put governments and private enterprises on high alert and despite evolving technologies and more sophisticated encryption algorithms critical assets are being held for ransom and the results are detrimental, including the recent Colonial Pipeline ransomware attack in 2021 …
Wind-Wave Misalignment Effects On Multiline Anchor Systems For Floating Offshore Wind Turbines,
2023
University of Massachusetts Amherst
Wind-Wave Misalignment Effects On Multiline Anchor Systems For Floating Offshore Wind Turbines, Doron T. Rose
Masters Theses
Multiline anchors are a novel way to reduce the cost of arrays of floating offshore wind turbines (FOWTs), but their behavior is not yet fully understood. Through metocean characterization and dynamic simulations, this thesis investigates the effects of wind-wave misalignment on multiline anchor systems. Four coastal U.S. sites are characterized in order to develop IEC design load cases (DLCs) and analyze real-world misaligned conditions. Stonewall Bank, Oregon showed the highest 500-year extreme wave height, at 16.6 m, while Virginia Beach, Virginia showed the highest 500-year wind speed, at 56.8 m/s. Misalignment probability distributions, at all sites, are found to converge …
An Experimental Investigation Of Multi-Cylinder Conventional Ci Engine Using Madhuca Indica Oil As Fuel,
2023
Cambridge Institute of Technology
An Experimental Investigation Of Multi-Cylinder Conventional Ci Engine Using Madhuca Indica Oil As Fuel, Sreenivas S, Balakrishnan N, Kannan T K, Solaimuthu C
International Journal of Mechanical and Industrial Engineering
The present work is mainly discussed with a qualitative study of engine’s significant characteristics fuelled with mahua bio-diesel & its different types of mixtures with neat diesel. The significant technical properties of various mixtures are tabulated. A 4-S multi-cylinder (6-Cylinder) DI conventional CI engine is used for the study under different speed modes. All types of characteristics for various mixtures are estimated in running the engine. Pure diesel is indicated by B-0 and pure mahua bio-diesel is represented by B-100. From the test results, it is found that B-25 gives almost the same BTE as B-0 at maximum load, compared …
