2015 ◽  
Vol 3 (0) ◽  
pp. 9781780404141-9781780404141
Author(s):  
J. A. Soller ◽  
A. W. Olivieri ◽  
J. N. S. Eisenberg ◽  
R. Sakajii ◽  
R. Danielson

1989 ◽  
Vol 7 (1-2) ◽  
pp. 1-28
Author(s):  
F Cantrell ◽  
J Clifton ◽  
J N Edmondson ◽  
F R Hartley ◽  
P D Michell ◽  
...  

2021 ◽  
pp. 9-15
Author(s):  
Sergey F. Levin

The problem of calibration of measuring instruments for given conditions based on the correction function is considered as a measurement problem of structural-parametric identification of the calibration diagram. It is shown, that the correction function allows at the first stage to obtain a ratio for correcting the readings, and at the second stage to obtain a corrected measurement result, it is necessary to identify the probability distribution of possible deviations from it. An example of solving the measurement problem of calibration for given conditions is given. Negative aspects of the practice of calibration of measuring instruments are noted: carrying out calibration under normal conditions according to the methods of verification of measuring instruments; presentation of calibration results by tables of joint readings of measuring instruments and standards; the presence in the calculations of the calibration diagram of significant restrictions on the mathematical apparatus of the «Guidelines for the expression of measurement uncertainty», specified by ISO/IEC 31010:2019 “Risk management – Risk assessment techniques”.


2016 ◽  
Vol 5 (4) ◽  
pp. 1-15 ◽  
Author(s):  
Ermias Tesfaye ◽  
Eshetie Berhan ◽  
Daniel Kitaw

The purpose of this paper is to present the chronological development of risk assessment techniques and models undertaken in construction project for the past two decades. This research used a systematic review and meta-analysis on risk assessment of construction project literatures. This includes browsing relevant researches and publications, screening articles based on the year of publication, identifying the domains and attributes. Accordingly, findings of major results achieved have been presented systematically based on the chronology of the research and research gaps are identified. From the review, it is found out that the dominant risk assessment tools used for the past twenty years is statistical analysis and fuzzy expert system.


Author(s):  
Poornima Balakrishna ◽  
Sherry Smith Borener ◽  
Ian Crook ◽  
Alan Durston ◽  
Mindy J. Robinson

When making policy, procedural, or technological changes to a complex system that has safety implications, a key question decision makers must answer is: What are the risks to the users of the system that will result from making these changes to the system? This chapter illustrates a method to explore different facets of this question using mathematical modeling and probabilistic risk assessment techniques, with the objective of assessing the safety impact of changes to the National Airspace System that follow from the Federal Aviation Administration's next generation air traffic modernization program. The authors describe the development of an Integrated Safety Assessment Model as a structured approach to evaluating current and emerging risks in National Airspace System operations. This process addresses the previously stated risk question by combining fault tree and event sequence diagram modeling techniques, hazard identification and analysis methods, opinions from subject matter experts, and concepts from business intelligence.


2020 ◽  
Vol 54 (6) ◽  
pp. 108-113
Author(s):  
Sarah Freeman ◽  
Jake Gentle ◽  
Tim Conway

AbstractAs wind generation becomes more prevalent, it is critical that these resources remain secure and, perhaps more significantly, resilient in the face of cyberattacks. Additionally, the remote locations of offshore wind assets increase the cost associated with responding to cyber incidents. Existing risk assessment techniques, such as consequence prioritization and MITRE ATT&CK, can be used by the wind industry to identify potential impacts from cyberattacks. This perspective can then inform cybersecurity investment strategies for greatest impact.


Sign in / Sign up

Export Citation Format

Share Document