Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis

2023

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 16 of 16

Full-Text Articles in Physical Sciences and Mathematics

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia Dec 2023

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia

Journal of Nonprofit Innovation

Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.

Imagine Doris, who is …


Combined Risk Based Inspection And Fault Tree Analysis For Repetitive 3-Phase Line Piping Leakage At West Java Offshore Topside Facility, Dona Yuliati, Akhmad Herman Yuwono, Datu Rizal Asral, Donanta Dhaneswara Dec 2023

Combined Risk Based Inspection And Fault Tree Analysis For Repetitive 3-Phase Line Piping Leakage At West Java Offshore Topside Facility, Dona Yuliati, Akhmad Herman Yuwono, Datu Rizal Asral, Donanta Dhaneswara

Journal of Materials Exploration and Findings

Hydrocarbon releases might result in serious consequences in various aspects. In addition to the contribution to environmental pollution, repetitive leakages need high repair costs. This study aim is to minimize potential repetitive leakage for other typical 3-phase piping systems. We conducted the risk assessment by adopting Risk Based Inspection (RBI) API 581 to identify risk level, calculating piping lifetime, recommended inspection plan and mitigations. The most relevant root causes can be obtained through quantitative Fault Tree Analysis (FTA). Observation and investigation was taken from eight 3-phase piping systems that experienced repetitive leakages. It has been found that the risk level …


Nitrogen Gas Quenching Pressure Effect On Bs S155 Alloy Steel In Vacuum Furnace, Agus Mulyadi Hasanudin, Eddy Sumarno Siradj Dec 2023

Nitrogen Gas Quenching Pressure Effect On Bs S155 Alloy Steel In Vacuum Furnace, Agus Mulyadi Hasanudin, Eddy Sumarno Siradj

Journal of Materials Exploration and Findings

The production of metal and alloy products requires the use of heat treatment, when during the heat treatment process, quenching is a crucial step. The quenching medium can be anything from water, a salt bath, oil, air and gas. In a vacuum furnace, pressurized gas, most frequently nitrogen (N2) gas, serves as one of the quenching mediums. One of the drawbacks of the quenching process is the distortion and dimensional change of the parts. This paper aims to investigate the influence of nitrogen gas quenching pressure on the distortion and dimensional change of aerospace actuator gear planet parts …


The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati Dec 2023

The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati

Cybersecurity Undergraduate Research Showcase

This paper explores the transformative potential of integrating Artificial Intelligence (AI) with established cybersecurity frameworks such as the Cybersecurity Maturity Model Certification (CMMC) and the National Institute of Standards and Technology (NIST) Special Publication 800-171. The thesis argues that the relationship between AI and these frameworks has the capacity to transform risk management in cybersecurity, where it could serve as a critical element in threat mitigation. In addition to addressing AI’s capabilities, this paper acknowledges the risks and limitations of these systems, highlighting the need for extensive research and monitoring when relying on AI. One must understand boundaries when integrating …


Climate Change Impact On Bridge Scour Risk In Ny State: A Gis-Based Risk Analysis Model, Muhammad Hassan Butt Dec 2023

Climate Change Impact On Bridge Scour Risk In Ny State: A Gis-Based Risk Analysis Model, Muhammad Hassan Butt

Publications and Research

Bridge scour, the primary cause of bridge failure in the United States, escalates post-severe storms, necessitating effective mitigation. This study employs a GIS-based risk analysis model to assess climate change's impact on bridge scour and associated risks in New York State. Data from the National Bridge Inventory, climate hazard maps, and geospatial data are integrated.


Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater Aug 2023

Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater

SMU Data Science Review

Static and dynamic analyses are the two primary approaches to analyzing malicious applications. The primary distinction between the two is that the application is analyzed without execution in static analysis, whereas the dynamic approach executes the malware and records the behavior exhibited during execution. Although each approach has advantages and disadvantages, dynamic analysis has been more widely accepted and utilized by the research community whereas static analysis has not seen the same attention. This study aims to apply advancements in static analysis techniques to demonstrate the identification of fine-grained functionality, and show, through clustering, how malicious applications may be grouped …


Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh Jul 2023

Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh

Journal of Police and Legal Sciences

Addressing the mechanisms of reducing cyber threats and risks Research Because cyberspace is an important arena for various international interactions, especially in recent times in light of the increase in cyber-attacks between some countries, which affects their national security. In this context, many countries are trying to make an effort to develop their capabilities to be used in any cyber-attack, or to take adequate preventive measures to protect them from any possible cyberattacks, especially in light of the impact of these attacks on vital places and institutions such as banks and ministries or on important facilities such as water and …


Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani Jun 2023

Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani

Electronic Thesis and Dissertation Repository

In today’s data-driven world, Information Systems, particularly the ones operating in regulated industries, require comprehensive security frameworks to protect against loss of confidentiality, integrity, or availability of data, whether due to malice, accident or otherwise. Once such a security framework is in place, an organization must constantly monitor and assess the overall compliance of its systems to detect and rectify any issues found. This thesis presents a technique and a supporting toolkit to first model dependencies between security policies (referred to as controls) and, second, devise models that associate risk with policy violations. Third, devise algorithms that propagate risk when …


Machine Learning-Based Data And Model Driven Bayesian Uncertanity Quantification Of Inverse Problems For Suspended Non-Structural System, Zhiyuan Qin May 2023

Machine Learning-Based Data And Model Driven Bayesian Uncertanity Quantification Of Inverse Problems For Suspended Non-Structural System, Zhiyuan Qin

All Dissertations

Inverse problems involve extracting the internal structure of a physical system from noisy measurement data. In many fields, the Bayesian inference is used to address the ill-conditioned nature of the inverse problem by incorporating prior information through an initial distribution. In the nonparametric Bayesian framework, surrogate models such as Gaussian Processes or Deep Neural Networks are used as flexible and effective probabilistic modeling tools to overcome the high-dimensional curse and reduce computational costs. In practical systems and computer models, uncertainties can be addressed through parameter calibration, sensitivity analysis, and uncertainty quantification, leading to improved reliability and robustness of decision and …


Quantification Of Various Types Of Biases In Large Language Models, Sudhashree Sayenju Apr 2023

Quantification Of Various Types Of Biases In Large Language Models, Sudhashree Sayenju

Doctor of Data Science and Analytics Dissertations

Natural Language Processing (NLP) systems are included everywhere on the internet from search engines, language translations to more advanced systems like voice assistant and customer service. Since humans are always on the receiving end of NLP technologies, it is very important to analyze whether or not the Large Language Models (LLMs) in use have bias and are therefore unfair. The majority of the research in NLP bias has focused on societal stereotype biases embedded in LLMs. However, our research focuses on all types of biases, namely model class level bias, stereotype bias and domain bias present in LLMs. Model class …


Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn Mar 2023

Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn

SMU Data Science Review

Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …


Fragility Of The Florida Panhandle's Electrical Transmission Grid To Hurricanes, Zachary D. Schumann Mar 2023

Fragility Of The Florida Panhandle's Electrical Transmission Grid To Hurricanes, Zachary D. Schumann

Theses and Dissertations

The increased frequency and intensity of extreme weather events from climate change necessitates understanding impacts on critical infrastructure, particularly electrical transmission grids. One of the foundational concepts of a grid’s resilience is its robustness to extreme weather events, such as hurricanes. Resilience of the electric grid to high wind speeds is predicated upon the location and physical characteristics of the system components. Previous modeling assessments of electric grid failure were done at the systems level with assumptions on location and type of specific components. To facilitate more explicit adaptation metrics, accurate component-level information is needed. In this study, we build …


Modeling Radiation Exposure On Flight Missions To Analyze Aircrew Risk, Camila V. Quintero Hilsaca Mar 2023

Modeling Radiation Exposure On Flight Missions To Analyze Aircrew Risk, Camila V. Quintero Hilsaca

Theses and Dissertations

GCR and SPE comprise the majority of the ionizing radiation experienced in the upper atmosphere within flight-altitude environments. Although previous studies have analyzed radiation doses from single sources on civilian flight operations, there is a lack of research focused on dose received by military personnel during flight from both sources simultaneously. In-flight radiation environments are modeled through the MCNP6 for two separate aircraft, an Air Force A-10 and a Boeing 737. Particle fluence values for galactic cosmic rays and solar particle events for four separate flight paths are determined using the CARI-7A software and the SIRE2 toolkit, respectively. MCNP6 code …


Examining Fuel Service System Failures Of The Usaf R11 Using Survival Analysis, Roed M.S. Mejia Mar 2023

Examining Fuel Service System Failures Of The Usaf R11 Using Survival Analysis, Roed M.S. Mejia

Theses and Dissertations

Recent events show that fuel supply is a large contributor to the success or failure of a military operation in response to a contingency. Any future near-peer conflict will stress the supply chain and require fully operational vehicles to be ready for the primary mission sets they support. In the United States Air Force (USAF), the readiness of fuel distribution trucks is crucial to meeting those mission sets in global operations. Utilizing non-parametric and semi-parametric survival models, which do not assume specific probability distributions, this study analyzes maintenance data for R-11 trucks that refuel aircraft.


Improving The Health And Safety Of Manufacturing Workers By Detecting And Addressing Personal Protective Equipment (Ppe) Violations In Real-Time With The Use Of Automated Ppe Detection Technology, Joseph Olufemi Fasinu Jan 2023

Improving The Health And Safety Of Manufacturing Workers By Detecting And Addressing Personal Protective Equipment (Ppe) Violations In Real-Time With The Use Of Automated Ppe Detection Technology, Joseph Olufemi Fasinu

Graduate Theses, Dissertations, and Problem Reports

The Centers for Disease Control and Prevention (CDC) emphasized that Personal Protective Equipment (PPE) can significantly reduce the risk of occupational injuries and illnesses. However, improper use, failure to use, and other PPE-related violations can still result in injuries and fatalities. Eye and face protection violation has been one of the top 10 most frequently violated OSHA standards in fiscal years 2018, 2019, 2020, 2021 and 2022 consecutively. A common practice among safety professionals to ensure PPE compliance has been to physically inspect or monitor PPE usage among workers, which has been found to be unsustainable on a continuous real-time …


Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun Jan 2023

Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun

Electronic Theses and Dissertations

Data science plays a crucial role in enabling organizations to optimize data-driven opportunities within financial risk management. It involves identifying, assessing, and mitigating risks, ultimately safeguarding investments, reducing uncertainty, ensuring regulatory compliance, enhancing decision-making, and fostering long-term sustainability. This thesis explores three facets of Data Science projects: enhancing customer understanding, fraud prevention, and predictive analysis, with the goal of improving existing tools and enabling more informed decision-making. The first project examined leveraged big data technologies, such as Hadoop and Spark, to enhance financial risk management by accurately predicting loan defaulters and their repayment likelihood. In the second project, we investigated …