Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Adaptive management (1)
- Chimney (1)
- Cloud (1)
- Computer decision support system (1)
- Containers (1)
-
- Cross-flow (1)
- Cybersecurity (1)
- Decision support framework (1)
- Digital natives (1)
- Disruption analysis (1)
- Downwash (1)
- Dynamic RBI (1)
- Employee security behavior (1)
- Fisheries governance (1)
- Fisheries management (1)
- Floc (1)
- Functional dependency analysis (1)
- Gas Pipeline (1)
- Graphical models (1)
- Information security (1)
- Infrastructure (1)
- Iron (1)
- Kubernetes (1)
- Mean centering (1)
- Median centering (1)
- Modeling (1)
- Monitoring (1)
- Orchestrations (1)
- Organic (1)
- Piping Systems (1)
- Publication
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in Physical Sciences and Mathematics
Dynamic Rbi With Central Difference Method Approach In Calculation Of Uniform Corrosion Rate: A Casestudy On Gas Pipelines, M.Riefqi Dwi Alviansyah, Fernanda Hartoyo, Zahra Nadia Nurullia, Ari Kurniawan
Dynamic Rbi With Central Difference Method Approach In Calculation Of Uniform Corrosion Rate: A Casestudy On Gas Pipelines, M.Riefqi Dwi Alviansyah, Fernanda Hartoyo, Zahra Nadia Nurullia, Ari Kurniawan
Journal of Materials Exploration and Findings
The oil and gas industry generally uses a piping system to drain fluids. Even though the pipes used have been well designed, the use of pipes as a means of fluid transportation still provides the possibility of failure that can occur at any time, one of which is due to uniform corrosion. The use of standard Risk Based Inspection (RBI) according to the API RBI 581 document has been widely used to anticipate potential failures to pipe components. The use of standard RBI can reduce the risk of failure significantly. Because the standard RBI considers the component risk value to …
Cloud Container Security’ Next Move, Vishakha Sadhwani
Cloud Container Security’ Next Move, Vishakha Sadhwani
Dissertations and Theses
In the last few years, it is apparent to cybersecurity experts everywhere that the proverbial container tech genie is out of the bottle, and has been widely embraced across multiple organizations. To achieve the flexibility of building and deploying applications anywhere and everywhere, cloud native environments have gained great momentum and made the development lifecycle simpler than ever. However, container environments brings with them a range of cybersecurity issues that includes images, containers, hosts, runtimes, registries, and orchestration platforms, which needs the necessity to focus on investing in securing your container stack.
According to this report[1], released by cloud-native …
Towards Structured Planning And Learning At The State Fisheries Agency Scale, Caleb A. Aldridge
Towards Structured Planning And Learning At The State Fisheries Agency Scale, Caleb A. Aldridge
Theses and Dissertations
Inland recreational fisheries has grown philosophically and scientifically to consider economic and sociopolitical aspects (non-biological) in addition to the biological. However, integrating biological and non-biological aspects of inland fisheries has been challenging. Thus, an opportunity exists to develop approaches and tools which operationalize planning and decision-making processes which include biological and non-biological aspects of a fishery. This dissertation expands the idea that a core set of goals and objectives is shared among and within inland fisheries agencies; that many routine operations of inland fisheries managers can be regimented or standardized; and the novel concept that current information and operations can …
Scale Modeling Of An Appearance Of Downwash Pattern Of Hot Smoke Ejected From Chimney In The Turbulent Cross Flow, Xangpheuak Inthavideth, Nobumasa Sekishita, Sounthisack Phommachanh, Yuji Nakamura
Scale Modeling Of An Appearance Of Downwash Pattern Of Hot Smoke Ejected From Chimney In The Turbulent Cross Flow, Xangpheuak Inthavideth, Nobumasa Sekishita, Sounthisack Phommachanh, Yuji Nakamura
Progress in Scale Modeling, an International Journal
This study aims to elucidate the scaling law to provide the critical condition on appearance of the downwash pattern of the hot smoke ejected from a chimney in a turbulent cross flow. A specially designed wind tunnel with an active turbulence generator developed by Makita was adopted to offer a quasi-isotropic turbulence field in a lab-scale test facility. A heated jet with smoke is issued into the cross flow from the vertically oriented chimney placed in the test section of the wind tunnel. In this study, the experimental parameters considered are temperature of the heated jet (smoke), jet ejected velocity, …
Adaptive Risk Network Dependency Analysis Of Complex Hierarchical Systems, Katherine L. Smith
Adaptive Risk Network Dependency Analysis Of Complex Hierarchical Systems, Katherine L. Smith
Computational Modeling & Simulation Engineering Theses & Dissertations
Recently the number, variety, and complexity of interconnected systems have been increasing while the resources available to increase resilience of those systems have been decreasing. Therefore, it has become increasingly important to quantify the effects of risks and the resulting disruptions over time as they ripple through networks of systems. This dissertation presents a novel modeling and simulation methodology which quantifies resilience, as impact on performance over time, and risk, as the impact of probabilistic disruptions. This work includes four major contributions over the state-of-the-art which are: (1) cyclic dependencies are captured by separation of performance variables into layers which …
Evaluating A Statistical-Based Assessment Tool For Stratifying Risk Among U.S. Air Force Organizations, Tiffany A. Low
Evaluating A Statistical-Based Assessment Tool For Stratifying Risk Among U.S. Air Force Organizations, Tiffany A. Low
Theses and Dissertations
The Air Force Inspection System is a proponent of utilizing a risk-based sampling strategy (RBSS) for conducting inspections from major command levels down to the unit level. The strategy identifies areas deemed most important or risky by commanders and prioritizes them accordingly for an independent assessment by the Inspector General. While Air Force regulation specifies the need to use a RBSS for inspection, the implementation process is delegated to individual commands and, subsequently, wings. The 23rd Wing, the sponsor for this research, directed us to analyze a RBSS tool highlighted as an example from which to adopt for those units …
Wetland Uranium Transport Via Iron-Organic Matter Flocs And Hyporheic Exchange, Connor J. Parker
Wetland Uranium Transport Via Iron-Organic Matter Flocs And Hyporheic Exchange, Connor J. Parker
All Dissertations
Uranium (U) released from the M-Area at the Department of Energy Savannah River Site into Tims Branch, a seasonal wetland and braided stream system, is estimated to be 43,500 kg between 1965 and 1984. The motivation for this work is the uranium’s persistence in the wetland for decades, where it is estimated that 80% of the U currently remains in the Tims Branch wetland. U has begun to incorporate into wetland iron (Fe) and carbon cycles, associating with local Fe mineralogy and deposits of rich wetland organic matter (OM). The objective of this work is to characterize the chemical phases …
Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen
Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen
VMASC Publications
In addition to stresses induced by the Covid-19 pandemic, supply chains worldwide have been growing more complex while facing a continuous onslaught of disruptions. This paper presents an analysis and extension of a graph based model for modeling and simulating the effects of such disruptions. The graph based model combines a Bayesian network approach for simulating risks with a network dependency analysis approach for simulating the propagation of disruptions through the network over time. The initial analysis provides evidence supporting extension to for using a multi-layered approach allowing for the inclusion of cyclic features in supply chain models. Initial results …
The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He
The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He
Information Technology & Decision Sciences Faculty Publications
This paper identifies opportunities for potential theoretical and practical improvements in employees' awareness of cybersecurity and their motivational behavior to protect themselves and their organizations from cyberattacks using the protection motivation theory. In addition, it contributes to the literature by examining additional variables and mediators besides the core constructs of the Protection Motivation Model (PMT). This article uses empirical data and structural equation modeling to test the antecedents and mediators of employees' cybersecurity motivational behavior. The study offers theoretical and pragmatic guidance for cybersecurity programs. First, the model developed in this study can partially explain how people may change their …