Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis Commons

Open Access. Powered by Scholars. Published by Universities.®

2023

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 42

Full-Text Articles in Risk Analysis

Recommendations On Flood Management At Cengkareng Drain Estuary In Enhancing Estuary Resilience To Compound Hazard, Athena Hastomo, Evi Anggraheni, Adi Prasetyo, Dwita Sutjiningsih Dec 2023

Recommendations On Flood Management At Cengkareng Drain Estuary In Enhancing Estuary Resilience To Compound Hazard, Athena Hastomo, Evi Anggraheni, Adi Prasetyo, Dwita Sutjiningsih

CSID Journal of Infrastructure Development

Jakarta's coastal region, characterized by dense settlements and industrial zones, faces significant flood risks due to land subsidence and rising sea levels, exacerbated by human activities and climate change. This study evaluates the effectiveness of the National Capital Integrated Coastal Development (NCICD) project, which proposes embankments along Jakarta's coast for enhanced flood resilience. Focusing on the Cengkareng Drain estuary, two-dimensional HEC-RAS simulations were employed. This study incorporates various factors such as precipitation, tides, waves, rising sea levels, and land subsidence to model extreme flood scenarios. The analysis reveals key strategies to improve flood management. Firstly, introducing new pumping stations and …


Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia Dec 2023

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia

Journal of Nonprofit Innovation

Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.

Imagine Doris, who is …


Combined Risk Based Inspection And Fault Tree Analysis For Repetitive 3-Phase Line Piping Leakage At West Java Offshore Topside Facility, Dona Yuliati, Akhmad Herman Yuwono, Datu Rizal Asral, Donanta Dhaneswara Dec 2023

Combined Risk Based Inspection And Fault Tree Analysis For Repetitive 3-Phase Line Piping Leakage At West Java Offshore Topside Facility, Dona Yuliati, Akhmad Herman Yuwono, Datu Rizal Asral, Donanta Dhaneswara

Journal of Materials Exploration and Findings (JMEF)

Hydrocarbon releases might result in serious consequences in various aspects. In addition to the contribution to environmental pollution, repetitive leakages need high repair costs. This study aim is to minimize potential repetitive leakage for other typical 3-phase piping systems. We conducted the risk assessment by adopting Risk Based Inspection (RBI) API 581 to identify risk level, calculating piping lifetime, recommended inspection plan and mitigations. The most relevant root causes can be obtained through quantitative Fault Tree Analysis (FTA). Observation and investigation was taken from eight 3-phase piping systems that experienced repetitive leakages. It has been found that the risk level …


Nitrogen Gas Quenching Pressure Effect On Bs S155 Alloy Steel In Vacuum Furnace, Agus Mulyadi Hasanudin, Eddy Sumarno Siradj Dec 2023

Nitrogen Gas Quenching Pressure Effect On Bs S155 Alloy Steel In Vacuum Furnace, Agus Mulyadi Hasanudin, Eddy Sumarno Siradj

Journal of Materials Exploration and Findings (JMEF)

The production of metal and alloy products requires the use of heat treatment, when during the heat treatment process, quenching is a crucial step. The quenching medium can be anything from water, a salt bath, oil, air and gas. In a vacuum furnace, pressurized gas, most frequently nitrogen (N2) gas, serves as one of the quenching mediums. One of the drawbacks of the quenching process is the distortion and dimensional change of the parts. This paper aims to investigate the influence of nitrogen gas quenching pressure on the distortion and dimensional change of aerospace actuator gear planet parts …


Pipeline Risk Analysis Optimization With Monte Carlo Method Using Gamma Distribution, Farhan Rama Digita, Jaka Fajar Fatriansyah, Abdul Rahim Ridzuan, Hanna Ovelia, Imam Abdillah Mas'ud, Irma Hartia Tihara, Baiq Diffa Pakarti Linuwih Dec 2023

Pipeline Risk Analysis Optimization With Monte Carlo Method Using Gamma Distribution, Farhan Rama Digita, Jaka Fajar Fatriansyah, Abdul Rahim Ridzuan, Hanna Ovelia, Imam Abdillah Mas'ud, Irma Hartia Tihara, Baiq Diffa Pakarti Linuwih

Journal of Materials Exploration and Findings (JMEF)

The inspection process of piping components in the oil and gas industry is one of the most crucial things, given the high risk posed by pipeline system failures, which have a huge impact on losses, both from environmental and financial aspects. Risk-based inspection with the Monte Carlo method is one of the efforts that can be made to minimize failures in piping systems, by involving data distribution to calculate the probability of component failure. Although the normal distribution is commonly used for generating random variables, its use in corrosion rate calculation can lead to overestimation due to negative corrosion rate …


The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati Dec 2023

The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati

Cybersecurity Undergraduate Research Showcase

This paper explores the transformative potential of integrating Artificial Intelligence (AI) with established cybersecurity frameworks such as the Cybersecurity Maturity Model Certification (CMMC) and the National Institute of Standards and Technology (NIST) Special Publication 800-171. The thesis argues that the relationship between AI and these frameworks has the capacity to transform risk management in cybersecurity, where it could serve as a critical element in threat mitigation. In addition to addressing AI’s capabilities, this paper acknowledges the risks and limitations of these systems, highlighting the need for extensive research and monitoring when relying on AI. One must understand boundaries when integrating …


A Review On Ship Recycling Industry In Bangladesh From Global Perspective, Ahammad Abdullah, Zobair Ibn Awal, M Ziauddin Alamgir, Md. Jobayer Mia, Farihatul Mim, Utpal K. Dhar Dec 2023

A Review On Ship Recycling Industry In Bangladesh From Global Perspective, Ahammad Abdullah, Zobair Ibn Awal, M Ziauddin Alamgir, Md. Jobayer Mia, Farihatul Mim, Utpal K. Dhar

Journal of Ocean and Coastal Economics

At present, the global center of the ship breaking and recycling industry is in South Asia, specifically Bangladesh, India, and Pakistan. These three countries account for 70–80 percent of the international recycling market for ocean-going vessels, with China and Turkey covering most of the remaining market. Only about 5 percent of global volume is scrapped outside these five countries. Bangladesh has environmentally beneficial coastal region and affordable labor that make the shipbreaking and recycling business as a potential sector for the country. In addition, ship recycling and its related businesses are helping to solve our nation’s unemployment issues at all …


Climate Change Impact On Bridge Scour Risk In Ny State: A Gis-Based Risk Analysis Model, Muhammad Hassan Butt Dec 2023

Climate Change Impact On Bridge Scour Risk In Ny State: A Gis-Based Risk Analysis Model, Muhammad Hassan Butt

Publications and Research

Bridge scour, the primary cause of bridge failure in the United States, escalates post-severe storms, necessitating effective mitigation. This study employs a GIS-based risk analysis model to assess climate change's impact on bridge scour and associated risks in New York State. Data from the National Bridge Inventory, climate hazard maps, and geospatial data are integrated.


Enhancing Accident Investigation Using Traffic Cctv Footage, Aksharapriya Peddi Dec 2023

Enhancing Accident Investigation Using Traffic Cctv Footage, Aksharapriya Peddi

Electronic Theses, Projects, and Dissertations

This Culminating Experience Project investigated how the densenet-161 model will perform on accident severity prediction compared to proposed methods. The research questions are: (Q1) What is the impact of usage of augmentation techniques on imbalanced datasets? (Q2) How will the hyper parameter tuning affect the model performance? (Q3) How effective is the proposed model compared to existing work? The findings are: Q1. The effectiveness of our model depends on the implementation of augmentation techniques that pay attention to handling imbalanced datasets. Our dataset poses a challenge due to distribution of classes in terms of accident severity. To address this challenge …


Addressing Mercury Contamination From Artisanal Gold Mining In Colombia: Pollution Exposure, Health Risk, And Educational Efforts In The Communities Of La Toma, Colombia, Kelli Mccourt Dec 2023

Addressing Mercury Contamination From Artisanal Gold Mining In Colombia: Pollution Exposure, Health Risk, And Educational Efforts In The Communities Of La Toma, Colombia, Kelli Mccourt

All Dissertations

Artisanal and small-scale gold mining (ASGM) has become a primary environmental and public health concern in the region of Colombia known as Alto Cauca. The predominantly Afro-descendent communities of Yolombó and La Toma in Alto Cauca have experienced pollution linked to the use of mercury in the ASGM process. For the past decade, mercury has emerged as a contaminant of increasing concern in the communities due to its toxicity and ability to bioaccumulate and biomagnify. Likewise, mining in the region raises concerns over the leaching of metals into local waters. Given the complexity of risk and pollution in the communities, …


Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan Nov 2023

Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan

Symposium of Student Scholars

"KWAD" or "KSU all-Weather Autonomous Drone" project was sponsored by Ultool, LLC to the KSU Research and Service Foundation to create a lightweight drone capable of capturing HD video during all-weather operations. The conditions of all-weather operation include rainfall of one inch per hour and wind speeds of up to twenty miles per hour. In addition, a global minimum structural safety factor of two is required to ensure the system's integrity in extreme weather conditions. Potential mission profiles include autonomous aerial delivery, topological mapping in high moisture areas, security surveillance, search and rescue operations, emergency transportation of medical supplies, and …


Influencing Air Force Logisticians' Information Seeking During The Covid-19 Pandemic: The Role Of Organizational Meetings In An Expanded Prism Framework, Matthew D. Roberts, Christopher T. Price, Seong-Jong Joo Sep 2023

Influencing Air Force Logisticians' Information Seeking During The Covid-19 Pandemic: The Role Of Organizational Meetings In An Expanded Prism Framework, Matthew D. Roberts, Christopher T. Price, Seong-Jong Joo

Faculty Publications

Purpose: This research aims to understand how organizational workplace meetings surrounding the COVID-19 pandemic impacted logistics Airmen across the United States Air Force and how these meetings impacted their risk seeking behavior on social media.

Design/methodology/approach: This survey research tested an extended Planned Risk Information Risk Seeking Model (PRISM) with organizational meetings as an antecedent to determine if current meetings influenced an Airman's perceived behavioral control, attitude toward seeking, subjective norms, knowledge sufficiency and intention to seek information regarding COVID-19.

Findings: Results of the CFA showed that the expanded PRISM model had good model fit. Additionally, using …


Evaluation Of Reliability Indices For Gas Turbines Based On The Johnson Sb Distribution: Towards Practical Development, Elbar Mohamed, Djeddi Ahmed Zohair, Ahmed Hafaifa, Charrak Naas, Abdelhamid Iratni, Ilhami Colak Aug 2023

Evaluation Of Reliability Indices For Gas Turbines Based On The Johnson Sb Distribution: Towards Practical Development, Elbar Mohamed, Djeddi Ahmed Zohair, Ahmed Hafaifa, Charrak Naas, Abdelhamid Iratni, Ilhami Colak

Emirates Journal for Engineering Research

Recent advancements in computer engineering have provided effective solutions for processing and analyzing complex systems and big data. Consequently, the adjustment and standardization of this data play a crucial role in addressing issues related to the monitoring of industrial systems. In this study, we propose a reliability approach for gas turbines to identify and characterize their degradation using operational data. We introduce a method for adjusting turbine reliability data, which resolves the challenges associated with the nature of these operating data. This enables us to determine a mathematical function that models the relationships between turbine reliability parameters and evaluate the …


Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater Aug 2023

Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater

SMU Data Science Review

Static and dynamic analyses are the two primary approaches to analyzing malicious applications. The primary distinction between the two is that the application is analyzed without execution in static analysis, whereas the dynamic approach executes the malware and records the behavior exhibited during execution. Although each approach has advantages and disadvantages, dynamic analysis has been more widely accepted and utilized by the research community whereas static analysis has not seen the same attention. This study aims to apply advancements in static analysis techniques to demonstrate the identification of fine-grained functionality, and show, through clustering, how malicious applications may be grouped …


Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh Jul 2023

Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh

Journal of Police and Legal Sciences

Addressing the mechanisms of reducing cyber threats and risks Research Because cyberspace is an important arena for various international interactions, especially in recent times in light of the increase in cyber-attacks between some countries, which affects their national security. In this context, many countries are trying to make an effort to develop their capabilities to be used in any cyber-attack, or to take adequate preventive measures to protect them from any possible cyberattacks, especially in light of the impact of these attacks on vital places and institutions such as banks and ministries or on important facilities such as water and …


Residential Building Flood Risk Assessment And The Benefits Of Home Elevation, Ayat Al Assi Jul 2023

Residential Building Flood Risk Assessment And The Benefits Of Home Elevation, Ayat Al Assi

LSU Doctoral Dissertations

Evaluating flood risk is an essential component of understanding and increasing community resilience. A robust approach for quantifying flood risk in terms of average annual loss (AAL) in dollars is needed to provide valuable information for stakeholder decision-making inside and outside the special flood hazard area (SFHA, which corresponds to the 100-year floodplain). To further inform flood mitigation strategies, quantifying flood risk reduction with home elevation above an initial first-floor height (FFH0) and the cost effectiveness of federal mitigation assistance for elevation are important steps to enhance awareness of the effect of elevation in reducing flood risk. …


Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani Jun 2023

Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani

Electronic Thesis and Dissertation Repository

In today’s data-driven world, Information Systems, particularly the ones operating in regulated industries, require comprehensive security frameworks to protect against loss of confidentiality, integrity, or availability of data, whether due to malice, accident or otherwise. Once such a security framework is in place, an organization must constantly monitor and assess the overall compliance of its systems to detect and rectify any issues found. This thesis presents a technique and a supporting toolkit to first model dependencies between security policies (referred to as controls) and, second, devise models that associate risk with policy violations. Third, devise algorithms that propagate risk when …


Integrating Steel Slag Aggregates Into Asphalt Paving By Harmonizing Availability, Quality, Economics, And The Environment, Timothy R. Murphy May 2023

Integrating Steel Slag Aggregates Into Asphalt Paving By Harmonizing Availability, Quality, Economics, And The Environment, Timothy R. Murphy

Theses and Dissertations

This thesis provides guidance on how to balance matters related to the environmental stewardship, market sources, origin and uses, material properties, performance, and economic impact of using slag materials in pavements. The literature on this topic provides numerous references on the use of slag materials for specific applications, and this thesis aims to make use of those references along with other data from the author to describe slag materials from a holistic perspective and provide some suggestions for balancing several factors that impact optimal use of this resource within pavement structures. Discussion is given to the increased importance of recycling …


Risk Assessments And Modeling Of Driver By Using Risk Potential Theory, Riku Kikuta May 2023

Risk Assessments And Modeling Of Driver By Using Risk Potential Theory, Riku Kikuta

Theses and Dissertations

Recently, various self-driving and driving assistance systems such as Advanced Driver Assistance System (ADAS) have been developed with the intent to reduce the number of motor vehicle accidents. While self-driving systems have been proven to reduce traffic accidents, the systems sometimes make other drivers confused because of their mechanical behavior. To avoid confusion and possible error, it is necessary to construct self-driving systems that exhibit human-like behaviors. Risk Potential theory has been used to construct models that successfully represent driver behavior, especially expert behavior. This project uses Risk Potential theory to construct and evaluate a collision avoidance driver model which …


Sensor Module Network For Monitoring Trace Gases In The International Space Station, Aaron Beck, Drake Provost, Christopher English, Kamrin Gustave May 2023

Sensor Module Network For Monitoring Trace Gases In The International Space Station, Aaron Beck, Drake Provost, Christopher English, Kamrin Gustave

Honors Capstones

The Jet Propulsion Laboratory (JPL) of the National Aeronautics and Space Administration (NASA) aims to develop a sensor network for the International Space Station (ISS) to ensure a comprehensive understanding of air quality within the station. The accumulation of carbon dioxide (CO­­­­­2) can lead to cognitive impairment, headaches, and potentially dangerous situations at high concentrations. Monitoring air content at the ISS is critical to maintaining a healthy environment for crew onboard. Exposure to harmful gases causes negative side effects that make crew sick, which may interfere with their responsibilities. CO2 is a gas that should be monitored …


Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu May 2023

Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu

Publications and Research

Cyber-attacks are increasingly prevalent in today's digital age, and their impact can be severe for individuals, organizations, and governments. To effectively protect against these threats, it is essential to understand the different types of attacks and have an incident response plan in place to minimize damage and restore normal operations quickly.

This research aims to contribute to the field by addressing the following questions: What are the main types of cyber-attacks, and how can organizations effectively respond to these incidents? How can the incident response process be improved through post-incident activities?

The study examines various cyber-attack types, including malware, phishing, …


Multi-Mode Total Focusing Method (Mtfm) To Detect High-Temperature Hydrogen Attack (Htha) – A Review, Anjar Oktikawati, Rini Riastuti, Nursidi Yuanto May 2023

Multi-Mode Total Focusing Method (Mtfm) To Detect High-Temperature Hydrogen Attack (Htha) – A Review, Anjar Oktikawati, Rini Riastuti, Nursidi Yuanto

Journal of Materials Exploration and Findings (JMEF)

High temperature hydrogen attack (HTHA) is a commonly observed harm component in carbon steels exposed to high temperature and pressure in a hydrogen-rich environment. Hydrogen together with carbon responds to produce methane. The formation of methane bubbles in steel can lead to loss of fracture toughness and lead to intergranular cracking. The main challenge of this problem lies in early warning systems that can detect these bubble clusters before they reach the advanced stage. Several advanced ultrasonic inspections have been developed over the years due to the challenges of inspecting materials for defects and discontinuities. These cover time-of-flight diffraction (ToFD), …


Analyzing The Impact Of Automation On Employment In Different Us Regions: A Data-Driven Approach, Thejaas Balasubramanian May 2023

Analyzing The Impact Of Automation On Employment In Different Us Regions: A Data-Driven Approach, Thejaas Balasubramanian

Electronic Theses, Projects, and Dissertations

Automation is transforming the US workforce with the increasing prevalence of technologies like robotics, artificial intelligence, and machine learning. As a result, it is essential to understand how this shift will impact the labor market and prepare for its effects. This culminating experience project aimed to examine the influence of computerization on jobs in the United States and answer the following research questions: Q1. What factors affect how likely different jobs will be automated? Q2. What are the possible effects of automation on the US workforce across states and industries? Q3. What are the meaningful predictors of the likelihood of …


Machine Learning-Based Data And Model Driven Bayesian Uncertanity Quantification Of Inverse Problems For Suspended Non-Structural System, Zhiyuan Qin May 2023

Machine Learning-Based Data And Model Driven Bayesian Uncertanity Quantification Of Inverse Problems For Suspended Non-Structural System, Zhiyuan Qin

All Dissertations

Inverse problems involve extracting the internal structure of a physical system from noisy measurement data. In many fields, the Bayesian inference is used to address the ill-conditioned nature of the inverse problem by incorporating prior information through an initial distribution. In the nonparametric Bayesian framework, surrogate models such as Gaussian Processes or Deep Neural Networks are used as flexible and effective probabilistic modeling tools to overcome the high-dimensional curse and reduce computational costs. In practical systems and computer models, uncertainties can be addressed through parameter calibration, sensitivity analysis, and uncertainty quantification, leading to improved reliability and robustness of decision and …


Systemic Risk Analysis Of Human Factors In Phishing, Mark Guilford May 2023

Systemic Risk Analysis Of Human Factors In Phishing, Mark Guilford

Engineering Management & Systems Engineering Theses & Dissertations

The scope of this study is the systemic risk of the role of humans in the risk of phishing. The relevance to engineering managers and systems engineers of the risks of phishing attacks is the theft of data which has significantly increased in the past couple of years. Phishing has become a systemic persistent threat to all internet users. Understanding the role of humans in phishing from a systemic perspective is a critical objective towards creating a strong defense against complex and manipulative phishing attacks. The systemic view of phishing concentrates on how phishing affects the entire organizational system, not …


Estimating Toxic Load From Finite-Duration Contaminant Releases In Wind Tunnel Experiments, Patrick B. Jones May 2023

Estimating Toxic Load From Finite-Duration Contaminant Releases In Wind Tunnel Experiments, Patrick B. Jones

Chemical Engineering Undergraduate Honors Theses

When gaseous contaminants are released into the atmosphere said contaminants form clouds that travel in the prevailing wind direction. An individual caught in the downwind path of one such cloud will accumulate a dosage, or toxic load, of said contaminant that is dependent on a multitude of environmental factors. This thesis quantifies unpredictability – or variation – in toxic load measurements using downwind concentration data captured from finite-duration gaseous contaminant releases conducted at set conditions in the Chemical Hazards Research Center ultra-low speed wind tunnel.

Finite-duration releases can be divided into two categories – time-limited steady releases and puffs – …


Automated Visualization Pipeline For Near Real-Time Risk Management System, Paris Joslin May 2023

Automated Visualization Pipeline For Near Real-Time Risk Management System, Paris Joslin

Industrial Engineering Undergraduate Honors Theses

In modern society, technological capabilities and the amount of data readily available to users continue to grow exponentially. Many have adopted these new capabilities but lack the infrastructure needed to efficiently utilize high-powered software and programs. Without a method to collect, store, and process large datasets in real-time, individuals and businesses can quickly become overwhelmed, inhibiting effective decision-making processes. There is potential to improve decision-making abilities by enhancing the computing infrastructure. To accomplish this task, we will explore the ideas surrounding High Performance Computing (HPC) and data visualization software. High Performance Computing is the ability to process data and perform …


Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas Apr 2023

Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas

Symposium of Student Scholars

Ransomware is classified as one of the main types of malware and involves the design of exploitations of new vulnerabilities through a host. That allows for the intrusion of systems and encrypting of any information assets and data in order to demand a sum of payment normally through untraceable cryptocurrencies such as Monero for the decryption key. This rapid security threat has put governments and private enterprises on high alert and despite evolving technologies and more sophisticated encryption algorithms critical assets are being held for ransom and the results are detrimental, including the recent Colonial Pipeline ransomware attack in 2021 …


Wind-Wave Misalignment Effects On Multiline Anchor Systems For Floating Offshore Wind Turbines, Doron T. Rose Apr 2023

Wind-Wave Misalignment Effects On Multiline Anchor Systems For Floating Offshore Wind Turbines, Doron T. Rose

Masters Theses

Multiline anchors are a novel way to reduce the cost of arrays of floating offshore wind turbines (FOWTs), but their behavior is not yet fully understood. Through metocean characterization and dynamic simulations, this thesis investigates the effects of wind-wave misalignment on multiline anchor systems. Four coastal U.S. sites are characterized in order to develop IEC design load cases (DLCs) and analyze real-world misaligned conditions. Stonewall Bank, Oregon showed the highest 500-year extreme wave height, at 16.6 m, while Virginia Beach, Virginia showed the highest 500-year wind speed, at 56.8 m/s. Misalignment probability distributions, at all sites, are found to converge …


Utilizing The System Engineering Trade Study Analysis Method To Analyze Patient Aeromedical Evacuation, Sara Shaghaghi, Jeremy M. Slagley, Michael E. Miller, Gaiven Varshney Apr 2023

Utilizing The System Engineering Trade Study Analysis Method To Analyze Patient Aeromedical Evacuation, Sara Shaghaghi, Jeremy M. Slagley, Michael E. Miller, Gaiven Varshney

Faculty Publications

The US Air Force has gone through many aeromedical patient isolation transport system designs. The first designs were developed in response to the Ebola outbreak in 2014 and, more recently, the COVID-19 pandemic. The trade study analysis part of the system engineering design method was used to analyze the historic and current aeromedical patient contamination control transport systems. A trade study is a process that evaluates alternatives based upon various “-ilities”, such as reconfigurability, flexibility, durability, cost, and more, and performs a systematic analysis to aid designers in producing a ‘good’ design alternative given the large set of possible solutions. …