Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (12)
- Mechanical Engineering (11)
- Civil and Environmental Engineering (10)
- Computer Engineering (10)
- Materials Science and Engineering (10)
-
- Computer Sciences (8)
- Business (7)
- Operations Research, Systems Engineering and Industrial Engineering (7)
- Data Science (6)
- Other Engineering (6)
- Systems Science (6)
- Artificial Intelligence and Robotics (5)
- Civil Engineering (5)
- Computational Engineering (5)
- Information Security (5)
- Chemical Engineering (4)
- Engineering Science and Materials (4)
- Environmental Engineering (4)
- Medicine and Health Sciences (4)
- Physics (4)
- Social and Behavioral Sciences (4)
- Statistics and Probability (4)
- Technology and Innovation (4)
- Theory and Algorithms (4)
- Aerospace Engineering (3)
- Applied Mechanics (3)
- Business Administration, Management, and Operations (3)
- Chemicals and Drugs (3)
- Institution
-
- Universitas Indonesia (7)
- Old Dominion University (3)
- Air Force Institute of Technology (2)
- California State University, San Bernardino (2)
- City University of New York (CUNY) (2)
-
- Clemson University (2)
- Kennesaw State University (2)
- Mississippi State University (2)
- Southern Methodist University (2)
- University of Arkansas, Fayetteville (2)
- Brigham Young University (1)
- Center for the Blue Economy (1)
- Embry-Riddle Aeronautical University (1)
- Georgia Southern University (1)
- Institute of Business Administration (1)
- Journal of Police and Legal Sciences (1)
- Louisiana State University (1)
- Marshall University (1)
- Michigan Technological University (1)
- Northern Illinois University (1)
- Purdue University (1)
- United Arab Emirates University (1)
- University of Massachusetts Amherst (1)
- University of Texas Rio Grande Valley (1)
- West Virginia University (1)
- Western University (1)
- Keyword
-
- Machine learning (2)
- Risk (2)
- Risk Analysis (2)
- Risk assessment (2)
- Risk management (2)
-
- 3-phase service (1)
- <p>Mine safety – Research – United States.</p> <p>Machine learning.</p> <p>Mine accidents.</p> <p>Machine learning – Technique.</p> <p>Coal mines and mining – United States – Safety measures.</p> <p>Coal mines and mining – Health aspects – United States.</p> <p>Coal miners – Health aspects – United States.</p> (1)
- ADAS (1)
- Aeromedical Patient Isolation Transport Systems (1)
- Aeromedical Transport System (1)
- Allowable (1)
- Anomaly detection (1)
- Approximate inference (1)
- Artificial Intelligence (AI) (1)
- Artificial intelligence (AI) (1)
- Asphalt (1)
- Atmospheric dispersion (1)
- Automated PPE Monitoring (1)
- Automation (1)
- Autonomous vehicle (1)
- Average Annual Loss (1)
- Azure machine learning (1)
- BS S155 Alloy steel (1)
- Bayes (1)
- Bayesian (1)
- Bayesian Algorithms (1)
- Bayesian Neural Networks (1)
- Big data technology (1)
- Black-box Variational Inference (1)
- CAPA (1)
- Publication
-
- Journal of Materials Exploration and Findings (JMEF) (6)
- All Dissertations (2)
- Electronic Theses, Projects, and Dissertations (2)
- Faculty Publications (2)
- Publications and Research (2)
-
- SMU Data Science Review (2)
- Symposium of Student Scholars (2)
- Theses and Dissertations (2)
- Business Review (1)
- CSID Journal of Infrastructure Development (1)
- Chemical Engineering Undergraduate Honors Theses (1)
- Cybersecurity Undergraduate Research Showcase (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Electronic Theses and Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Emirates Journal for Engineering Research (1)
- Engineering Management & Systems Engineering Theses & Dissertations (1)
- Engineering Technology Faculty Publications (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- Honors Capstones (1)
- Industrial Engineering Undergraduate Honors Theses (1)
- International Journal of Aviation, Aeronautics, and Aerospace (1)
- Journal of Nonprofit Innovation (1)
- Journal of Ocean and Coastal Economics (1)
- Journal of Police and Legal Sciences (1)
- LSU Doctoral Dissertations (1)
- Masters Theses (1)
- Mechanical Engineering Faculty Publications and Presentations (1)
- Purdue Road School (1)
- Theses, Dissertations and Capstones (1)
- Publication Type
- File Type
Articles 1 - 30 of 42
Full-Text Articles in Risk Analysis
Recommendations On Flood Management At Cengkareng Drain Estuary In Enhancing Estuary Resilience To Compound Hazard, Athena Hastomo, Evi Anggraheni, Adi Prasetyo, Dwita Sutjiningsih
Recommendations On Flood Management At Cengkareng Drain Estuary In Enhancing Estuary Resilience To Compound Hazard, Athena Hastomo, Evi Anggraheni, Adi Prasetyo, Dwita Sutjiningsih
CSID Journal of Infrastructure Development
Jakarta's coastal region, characterized by dense settlements and industrial zones, faces significant flood risks due to land subsidence and rising sea levels, exacerbated by human activities and climate change. This study evaluates the effectiveness of the National Capital Integrated Coastal Development (NCICD) project, which proposes embankments along Jakarta's coast for enhanced flood resilience. Focusing on the Cengkareng Drain estuary, two-dimensional HEC-RAS simulations were employed. This study incorporates various factors such as precipitation, tides, waves, rising sea levels, and land subsidence to model extreme flood scenarios. The analysis reveals key strategies to improve flood management. Firstly, introducing new pumping stations and …
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Combined Risk Based Inspection And Fault Tree Analysis For Repetitive 3-Phase Line Piping Leakage At West Java Offshore Topside Facility, Dona Yuliati, Akhmad Herman Yuwono, Datu Rizal Asral, Donanta Dhaneswara
Combined Risk Based Inspection And Fault Tree Analysis For Repetitive 3-Phase Line Piping Leakage At West Java Offshore Topside Facility, Dona Yuliati, Akhmad Herman Yuwono, Datu Rizal Asral, Donanta Dhaneswara
Journal of Materials Exploration and Findings (JMEF)
Hydrocarbon releases might result in serious consequences in various aspects. In addition to the contribution to environmental pollution, repetitive leakages need high repair costs. This study aim is to minimize potential repetitive leakage for other typical 3-phase piping systems. We conducted the risk assessment by adopting Risk Based Inspection (RBI) API 581 to identify risk level, calculating piping lifetime, recommended inspection plan and mitigations. The most relevant root causes can be obtained through quantitative Fault Tree Analysis (FTA). Observation and investigation was taken from eight 3-phase piping systems that experienced repetitive leakages. It has been found that the risk level …
Nitrogen Gas Quenching Pressure Effect On Bs S155 Alloy Steel In Vacuum Furnace, Agus Mulyadi Hasanudin, Eddy Sumarno Siradj
Nitrogen Gas Quenching Pressure Effect On Bs S155 Alloy Steel In Vacuum Furnace, Agus Mulyadi Hasanudin, Eddy Sumarno Siradj
Journal of Materials Exploration and Findings (JMEF)
The production of metal and alloy products requires the use of heat treatment, when during the heat treatment process, quenching is a crucial step. The quenching medium can be anything from water, a salt bath, oil, air and gas. In a vacuum furnace, pressurized gas, most frequently nitrogen (N2) gas, serves as one of the quenching mediums. One of the drawbacks of the quenching process is the distortion and dimensional change of the parts. This paper aims to investigate the influence of nitrogen gas quenching pressure on the distortion and dimensional change of aerospace actuator gear planet parts …
Pipeline Risk Analysis Optimization With Monte Carlo Method Using Gamma Distribution, Farhan Rama Digita, Jaka Fajar Fatriansyah, Abdul Rahim Ridzuan, Hanna Ovelia, Imam Abdillah Mas'ud, Irma Hartia Tihara, Baiq Diffa Pakarti Linuwih
Pipeline Risk Analysis Optimization With Monte Carlo Method Using Gamma Distribution, Farhan Rama Digita, Jaka Fajar Fatriansyah, Abdul Rahim Ridzuan, Hanna Ovelia, Imam Abdillah Mas'ud, Irma Hartia Tihara, Baiq Diffa Pakarti Linuwih
Journal of Materials Exploration and Findings (JMEF)
The inspection process of piping components in the oil and gas industry is one of the most crucial things, given the high risk posed by pipeline system failures, which have a huge impact on losses, both from environmental and financial aspects. Risk-based inspection with the Monte Carlo method is one of the efforts that can be made to minimize failures in piping systems, by involving data distribution to calculate the probability of component failure. Although the normal distribution is commonly used for generating random variables, its use in corrosion rate calculation can lead to overestimation due to negative corrosion rate …
The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati
Cybersecurity Undergraduate Research Showcase
This paper explores the transformative potential of integrating Artificial Intelligence (AI) with established cybersecurity frameworks such as the Cybersecurity Maturity Model Certification (CMMC) and the National Institute of Standards and Technology (NIST) Special Publication 800-171. The thesis argues that the relationship between AI and these frameworks has the capacity to transform risk management in cybersecurity, where it could serve as a critical element in threat mitigation. In addition to addressing AI’s capabilities, this paper acknowledges the risks and limitations of these systems, highlighting the need for extensive research and monitoring when relying on AI. One must understand boundaries when integrating …
A Review On Ship Recycling Industry In Bangladesh From Global Perspective, Ahammad Abdullah, Zobair Ibn Awal, M Ziauddin Alamgir, Md. Jobayer Mia, Farihatul Mim, Utpal K. Dhar
A Review On Ship Recycling Industry In Bangladesh From Global Perspective, Ahammad Abdullah, Zobair Ibn Awal, M Ziauddin Alamgir, Md. Jobayer Mia, Farihatul Mim, Utpal K. Dhar
Journal of Ocean and Coastal Economics
At present, the global center of the ship breaking and recycling industry is in South Asia, specifically Bangladesh, India, and Pakistan. These three countries account for 70–80 percent of the international recycling market for ocean-going vessels, with China and Turkey covering most of the remaining market. Only about 5 percent of global volume is scrapped outside these five countries. Bangladesh has environmentally beneficial coastal region and affordable labor that make the shipbreaking and recycling business as a potential sector for the country. In addition, ship recycling and its related businesses are helping to solve our nation’s unemployment issues at all …
Climate Change Impact On Bridge Scour Risk In Ny State: A Gis-Based Risk Analysis Model, Muhammad Hassan Butt
Climate Change Impact On Bridge Scour Risk In Ny State: A Gis-Based Risk Analysis Model, Muhammad Hassan Butt
Publications and Research
Bridge scour, the primary cause of bridge failure in the United States, escalates post-severe storms, necessitating effective mitigation. This study employs a GIS-based risk analysis model to assess climate change's impact on bridge scour and associated risks in New York State. Data from the National Bridge Inventory, climate hazard maps, and geospatial data are integrated.
Enhancing Accident Investigation Using Traffic Cctv Footage, Aksharapriya Peddi
Enhancing Accident Investigation Using Traffic Cctv Footage, Aksharapriya Peddi
Electronic Theses, Projects, and Dissertations
This Culminating Experience Project investigated how the densenet-161 model will perform on accident severity prediction compared to proposed methods. The research questions are: (Q1) What is the impact of usage of augmentation techniques on imbalanced datasets? (Q2) How will the hyper parameter tuning affect the model performance? (Q3) How effective is the proposed model compared to existing work? The findings are: Q1. The effectiveness of our model depends on the implementation of augmentation techniques that pay attention to handling imbalanced datasets. Our dataset poses a challenge due to distribution of classes in terms of accident severity. To address this challenge …
Addressing Mercury Contamination From Artisanal Gold Mining In Colombia: Pollution Exposure, Health Risk, And Educational Efforts In The Communities Of La Toma, Colombia, Kelli Mccourt
All Dissertations
Artisanal and small-scale gold mining (ASGM) has become a primary environmental and public health concern in the region of Colombia known as Alto Cauca. The predominantly Afro-descendent communities of Yolombó and La Toma in Alto Cauca have experienced pollution linked to the use of mercury in the ASGM process. For the past decade, mercury has emerged as a contaminant of increasing concern in the communities due to its toxicity and ability to bioaccumulate and biomagnify. Likewise, mining in the region raises concerns over the leaching of metals into local waters. Given the complexity of risk and pollution in the communities, …
Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan
Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan
Symposium of Student Scholars
"KWAD" or "KSU all-Weather Autonomous Drone" project was sponsored by Ultool, LLC to the KSU Research and Service Foundation to create a lightweight drone capable of capturing HD video during all-weather operations. The conditions of all-weather operation include rainfall of one inch per hour and wind speeds of up to twenty miles per hour. In addition, a global minimum structural safety factor of two is required to ensure the system's integrity in extreme weather conditions. Potential mission profiles include autonomous aerial delivery, topological mapping in high moisture areas, security surveillance, search and rescue operations, emergency transportation of medical supplies, and …
Influencing Air Force Logisticians' Information Seeking During The Covid-19 Pandemic: The Role Of Organizational Meetings In An Expanded Prism Framework, Matthew D. Roberts, Christopher T. Price, Seong-Jong Joo
Influencing Air Force Logisticians' Information Seeking During The Covid-19 Pandemic: The Role Of Organizational Meetings In An Expanded Prism Framework, Matthew D. Roberts, Christopher T. Price, Seong-Jong Joo
Faculty Publications
Purpose: This research aims to understand how organizational workplace meetings surrounding the COVID-19 pandemic impacted logistics Airmen across the United States Air Force and how these meetings impacted their risk seeking behavior on social media.
Design/methodology/approach: This survey research tested an extended Planned Risk Information Risk Seeking Model (PRISM) with organizational meetings as an antecedent to determine if current meetings influenced an Airman's perceived behavioral control, attitude toward seeking, subjective norms, knowledge sufficiency and intention to seek information regarding COVID-19.
Findings: Results of the CFA showed that the expanded PRISM model had good model fit. Additionally, using …
Evaluation Of Reliability Indices For Gas Turbines Based On The Johnson Sb Distribution: Towards Practical Development, Elbar Mohamed, Djeddi Ahmed Zohair, Ahmed Hafaifa, Charrak Naas, Abdelhamid Iratni, Ilhami Colak
Evaluation Of Reliability Indices For Gas Turbines Based On The Johnson Sb Distribution: Towards Practical Development, Elbar Mohamed, Djeddi Ahmed Zohair, Ahmed Hafaifa, Charrak Naas, Abdelhamid Iratni, Ilhami Colak
Emirates Journal for Engineering Research
Recent advancements in computer engineering have provided effective solutions for processing and analyzing complex systems and big data. Consequently, the adjustment and standardization of this data play a crucial role in addressing issues related to the monitoring of industrial systems. In this study, we propose a reliability approach for gas turbines to identify and characterize their degradation using operational data. We introduce a method for adjusting turbine reliability data, which resolves the challenges associated with the nature of these operating data. This enables us to determine a mathematical function that models the relationships between turbine reliability parameters and evaluate the …
Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater
Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater
SMU Data Science Review
Static and dynamic analyses are the two primary approaches to analyzing malicious applications. The primary distinction between the two is that the application is analyzed without execution in static analysis, whereas the dynamic approach executes the malware and records the behavior exhibited during execution. Although each approach has advantages and disadvantages, dynamic analysis has been more widely accepted and utilized by the research community whereas static analysis has not seen the same attention. This study aims to apply advancements in static analysis techniques to demonstrate the identification of fine-grained functionality, and show, through clustering, how malicious applications may be grouped …
Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh
Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh
Journal of Police and Legal Sciences
Addressing the mechanisms of reducing cyber threats and risks Research Because cyberspace is an important arena for various international interactions, especially in recent times in light of the increase in cyber-attacks between some countries, which affects their national security. In this context, many countries are trying to make an effort to develop their capabilities to be used in any cyber-attack, or to take adequate preventive measures to protect them from any possible cyberattacks, especially in light of the impact of these attacks on vital places and institutions such as banks and ministries or on important facilities such as water and …
Residential Building Flood Risk Assessment And The Benefits Of Home Elevation, Ayat Al Assi
Residential Building Flood Risk Assessment And The Benefits Of Home Elevation, Ayat Al Assi
LSU Doctoral Dissertations
Evaluating flood risk is an essential component of understanding and increasing community resilience. A robust approach for quantifying flood risk in terms of average annual loss (AAL) in dollars is needed to provide valuable information for stakeholder decision-making inside and outside the special flood hazard area (SFHA, which corresponds to the 100-year floodplain). To further inform flood mitigation strategies, quantifying flood risk reduction with home elevation above an initial first-floor height (FFH0) and the cost effectiveness of federal mitigation assistance for elevation are important steps to enhance awareness of the effect of elevation in reducing flood risk. …
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Electronic Thesis and Dissertation Repository
In today’s data-driven world, Information Systems, particularly the ones operating in regulated industries, require comprehensive security frameworks to protect against loss of confidentiality, integrity, or availability of data, whether due to malice, accident or otherwise. Once such a security framework is in place, an organization must constantly monitor and assess the overall compliance of its systems to detect and rectify any issues found. This thesis presents a technique and a supporting toolkit to first model dependencies between security policies (referred to as controls) and, second, devise models that associate risk with policy violations. Third, devise algorithms that propagate risk when …
Integrating Steel Slag Aggregates Into Asphalt Paving By Harmonizing Availability, Quality, Economics, And The Environment, Timothy R. Murphy
Integrating Steel Slag Aggregates Into Asphalt Paving By Harmonizing Availability, Quality, Economics, And The Environment, Timothy R. Murphy
Theses and Dissertations
This thesis provides guidance on how to balance matters related to the environmental stewardship, market sources, origin and uses, material properties, performance, and economic impact of using slag materials in pavements. The literature on this topic provides numerous references on the use of slag materials for specific applications, and this thesis aims to make use of those references along with other data from the author to describe slag materials from a holistic perspective and provide some suggestions for balancing several factors that impact optimal use of this resource within pavement structures. Discussion is given to the increased importance of recycling …
Risk Assessments And Modeling Of Driver By Using Risk Potential Theory, Riku Kikuta
Risk Assessments And Modeling Of Driver By Using Risk Potential Theory, Riku Kikuta
Theses and Dissertations
Recently, various self-driving and driving assistance systems such as Advanced Driver Assistance System (ADAS) have been developed with the intent to reduce the number of motor vehicle accidents. While self-driving systems have been proven to reduce traffic accidents, the systems sometimes make other drivers confused because of their mechanical behavior. To avoid confusion and possible error, it is necessary to construct self-driving systems that exhibit human-like behaviors. Risk Potential theory has been used to construct models that successfully represent driver behavior, especially expert behavior. This project uses Risk Potential theory to construct and evaluate a collision avoidance driver model which …
Sensor Module Network For Monitoring Trace Gases In The International Space Station, Aaron Beck, Drake Provost, Christopher English, Kamrin Gustave
Sensor Module Network For Monitoring Trace Gases In The International Space Station, Aaron Beck, Drake Provost, Christopher English, Kamrin Gustave
Honors Capstones
The Jet Propulsion Laboratory (JPL) of the National Aeronautics and Space Administration (NASA) aims to develop a sensor network for the International Space Station (ISS) to ensure a comprehensive understanding of air quality within the station. The accumulation of carbon dioxide (CO2) can lead to cognitive impairment, headaches, and potentially dangerous situations at high concentrations. Monitoring air content at the ISS is critical to maintaining a healthy environment for crew onboard. Exposure to harmful gases causes negative side effects that make crew sick, which may interfere with their responsibilities. CO2 is a gas that should be monitored …
Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu
Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu
Publications and Research
Cyber-attacks are increasingly prevalent in today's digital age, and their impact can be severe for individuals, organizations, and governments. To effectively protect against these threats, it is essential to understand the different types of attacks and have an incident response plan in place to minimize damage and restore normal operations quickly.
This research aims to contribute to the field by addressing the following questions: What are the main types of cyber-attacks, and how can organizations effectively respond to these incidents? How can the incident response process be improved through post-incident activities?
The study examines various cyber-attack types, including malware, phishing, …
Multi-Mode Total Focusing Method (Mtfm) To Detect High-Temperature Hydrogen Attack (Htha) – A Review, Anjar Oktikawati, Rini Riastuti, Nursidi Yuanto
Multi-Mode Total Focusing Method (Mtfm) To Detect High-Temperature Hydrogen Attack (Htha) – A Review, Anjar Oktikawati, Rini Riastuti, Nursidi Yuanto
Journal of Materials Exploration and Findings (JMEF)
High temperature hydrogen attack (HTHA) is a commonly observed harm component in carbon steels exposed to high temperature and pressure in a hydrogen-rich environment. Hydrogen together with carbon responds to produce methane. The formation of methane bubbles in steel can lead to loss of fracture toughness and lead to intergranular cracking. The main challenge of this problem lies in early warning systems that can detect these bubble clusters before they reach the advanced stage. Several advanced ultrasonic inspections have been developed over the years due to the challenges of inspecting materials for defects and discontinuities. These cover time-of-flight diffraction (ToFD), …
Analyzing The Impact Of Automation On Employment In Different Us Regions: A Data-Driven Approach, Thejaas Balasubramanian
Analyzing The Impact Of Automation On Employment In Different Us Regions: A Data-Driven Approach, Thejaas Balasubramanian
Electronic Theses, Projects, and Dissertations
Automation is transforming the US workforce with the increasing prevalence of technologies like robotics, artificial intelligence, and machine learning. As a result, it is essential to understand how this shift will impact the labor market and prepare for its effects. This culminating experience project aimed to examine the influence of computerization on jobs in the United States and answer the following research questions: Q1. What factors affect how likely different jobs will be automated? Q2. What are the possible effects of automation on the US workforce across states and industries? Q3. What are the meaningful predictors of the likelihood of …
Machine Learning-Based Data And Model Driven Bayesian Uncertanity Quantification Of Inverse Problems For Suspended Non-Structural System, Zhiyuan Qin
All Dissertations
Inverse problems involve extracting the internal structure of a physical system from noisy measurement data. In many fields, the Bayesian inference is used to address the ill-conditioned nature of the inverse problem by incorporating prior information through an initial distribution. In the nonparametric Bayesian framework, surrogate models such as Gaussian Processes or Deep Neural Networks are used as flexible and effective probabilistic modeling tools to overcome the high-dimensional curse and reduce computational costs. In practical systems and computer models, uncertainties can be addressed through parameter calibration, sensitivity analysis, and uncertainty quantification, leading to improved reliability and robustness of decision and …
Systemic Risk Analysis Of Human Factors In Phishing, Mark Guilford
Systemic Risk Analysis Of Human Factors In Phishing, Mark Guilford
Engineering Management & Systems Engineering Theses & Dissertations
The scope of this study is the systemic risk of the role of humans in the risk of phishing. The relevance to engineering managers and systems engineers of the risks of phishing attacks is the theft of data which has significantly increased in the past couple of years. Phishing has become a systemic persistent threat to all internet users. Understanding the role of humans in phishing from a systemic perspective is a critical objective towards creating a strong defense against complex and manipulative phishing attacks. The systemic view of phishing concentrates on how phishing affects the entire organizational system, not …
Estimating Toxic Load From Finite-Duration Contaminant Releases In Wind Tunnel Experiments, Patrick B. Jones
Estimating Toxic Load From Finite-Duration Contaminant Releases In Wind Tunnel Experiments, Patrick B. Jones
Chemical Engineering Undergraduate Honors Theses
When gaseous contaminants are released into the atmosphere said contaminants form clouds that travel in the prevailing wind direction. An individual caught in the downwind path of one such cloud will accumulate a dosage, or toxic load, of said contaminant that is dependent on a multitude of environmental factors. This thesis quantifies unpredictability – or variation – in toxic load measurements using downwind concentration data captured from finite-duration gaseous contaminant releases conducted at set conditions in the Chemical Hazards Research Center ultra-low speed wind tunnel.
Finite-duration releases can be divided into two categories – time-limited steady releases and puffs – …
Automated Visualization Pipeline For Near Real-Time Risk Management System, Paris Joslin
Automated Visualization Pipeline For Near Real-Time Risk Management System, Paris Joslin
Industrial Engineering Undergraduate Honors Theses
In modern society, technological capabilities and the amount of data readily available to users continue to grow exponentially. Many have adopted these new capabilities but lack the infrastructure needed to efficiently utilize high-powered software and programs. Without a method to collect, store, and process large datasets in real-time, individuals and businesses can quickly become overwhelmed, inhibiting effective decision-making processes. There is potential to improve decision-making abilities by enhancing the computing infrastructure. To accomplish this task, we will explore the ideas surrounding High Performance Computing (HPC) and data visualization software. High Performance Computing is the ability to process data and perform …
Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas
Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas
Symposium of Student Scholars
Ransomware is classified as one of the main types of malware and involves the design of exploitations of new vulnerabilities through a host. That allows for the intrusion of systems and encrypting of any information assets and data in order to demand a sum of payment normally through untraceable cryptocurrencies such as Monero for the decryption key. This rapid security threat has put governments and private enterprises on high alert and despite evolving technologies and more sophisticated encryption algorithms critical assets are being held for ransom and the results are detrimental, including the recent Colonial Pipeline ransomware attack in 2021 …
Wind-Wave Misalignment Effects On Multiline Anchor Systems For Floating Offshore Wind Turbines, Doron T. Rose
Wind-Wave Misalignment Effects On Multiline Anchor Systems For Floating Offshore Wind Turbines, Doron T. Rose
Masters Theses
Multiline anchors are a novel way to reduce the cost of arrays of floating offshore wind turbines (FOWTs), but their behavior is not yet fully understood. Through metocean characterization and dynamic simulations, this thesis investigates the effects of wind-wave misalignment on multiline anchor systems. Four coastal U.S. sites are characterized in order to develop IEC design load cases (DLCs) and analyze real-world misaligned conditions. Stonewall Bank, Oregon showed the highest 500-year extreme wave height, at 16.6 m, while Virginia Beach, Virginia showed the highest 500-year wind speed, at 56.8 m/s. Misalignment probability distributions, at all sites, are found to converge …
Utilizing The System Engineering Trade Study Analysis Method To Analyze Patient Aeromedical Evacuation, Sara Shaghaghi, Jeremy M. Slagley, Michael E. Miller, Gaiven Varshney
Utilizing The System Engineering Trade Study Analysis Method To Analyze Patient Aeromedical Evacuation, Sara Shaghaghi, Jeremy M. Slagley, Michael E. Miller, Gaiven Varshney
Faculty Publications
The US Air Force has gone through many aeromedical patient isolation transport system designs. The first designs were developed in response to the Ebola outbreak in 2014 and, more recently, the COVID-19 pandemic. The trade study analysis part of the system engineering design method was used to analyze the historic and current aeromedical patient contamination control transport systems. A trade study is a process that evaluates alternatives based upon various “-ilities”, such as reconfigurability, flexibility, durability, cost, and more, and performs a systematic analysis to aid designers in producing a ‘good’ design alternative given the large set of possible solutions. …