scholarly journals Research on Knowledge Graph Construction for Intelligent Operation and Maintenance of Electrical Transformers

2021 ◽  
Vol 1971 (1) ◽  
pp. 012013
Author(s):  
Bowen Zhang ◽  
Fei Gao ◽  
Ning Yang ◽  
Chengbo Hu ◽  
Ziquan Liu
2013 ◽  
Vol 33 (1) ◽  
pp. 45-55
Author(s):  
Henryk Tomaszek ◽  
Ryszard Kaleta ◽  
Mariusz Zieja

Abstract The paper deals with the process of shaping the operational effectiveness of military aircraft under some specific circumstances, i.e. while flying on missions. The term ‘effectiveness’ has been assumed to mean the probability of accomplishing an air mission by one of the aeronautical system’s components, i.e. the aircraft together with its pilot. There is a chance to improve the effectiveness, or make it worse, in subsequent flights, depending on how the maintenance support function. The correct operation and maintenance of the system’s components should provide that the following condition is satisfied: * Pk ≥ P , where Pk - effectiveness in the k-th flight, and P* - the lower demanded limit of effectiveness. The Authors drew their inspiration for this paper from publication [2].


2001 ◽  
Vol 84 (2) ◽  
pp. 40-48 ◽  
Author(s):  
Leif J. Vincentsen ◽  
Henrik Hauge Jacobsen

2020 ◽  
Vol 2 (2) ◽  
Author(s):  
Suzanna Schmeelk ◽  
Lixin Tao

Many organizations, to save costs, are movinheg to t Bring Your Own Mobile Device (BYOD) model and adopting applications built by third-parties at an unprecedented rate.  Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection, mitigation, and prevention.  This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project (OWASP).  OWASP maintains lists of the top ten security threats to web and mobile applications.  We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.  We analyze 200+ healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten moble threats, the threat of “Insecure Data Storage.”  We find that many of the applications are storing personally identifying information (PII) in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.


Sign in / Sign up

Export Citation Format

Share Document