scholarly journals Security Assessment based on SCADA Aystem: Taking Shanshan Oil Transportation Station as an example

Author(s):  
Lian Xiao ◽  
Zhijun Bu ◽  
Chaosheng Chen ◽  
Binxian Yuan
2003 ◽  
pp. 136-146
Author(s):  
K. Liuhto

Statistical data on reserves, production and exports of Russian oil are provided in the article. The author pays special attention to the expansion of opportunities of sea oil transportation by construction of new oil terminals in the North-West of the country and first of all the largest terminal in Murmansk. In his opinion, one of the main problems in this sphere is prevention of ecological accidents in the process of oil transportation through the Baltic sea ports.


Author(s):  
N.A. Makhutov ◽  
◽  
Ya.M. Fridlyand ◽  
A.A. Raspopov ◽  
M.V. Lisanov ◽  
...  

Author(s):  
Marat R. Lukmanov ◽  
◽  
Sergey L. Semin ◽  
Pavel V. Fedorov ◽  
◽  
...  

The challenges of increasing the energy efficiency of the economy as a whole and of certain production sectors in particular are a priority both in our country and abroad. As part of the energy policy of the Russian Federation to reduce the specific energy intensity of enterprises in the oil transportation system, Transneft PJSC developed and implements the energy saving and energy efficiency improvement Program. The application of energy-saving technologies allowed the company to significantly reduce operating costs and emissions of harmful substances. At the same time, further reduction of energy costs is complicated for objective reasons. The objective of this article is to present additional methods to improve the energy efficiency of oil transportation by the example of the organizational structure of Transneft. Possibilities to reduce energy costs in the organization of the operating services, planning and execution of work to eliminate defects and preparatory work for the scheduled shutdown of the pipeline, the use of pumping equipment, including pumps with variable speed drive, the use of various pipelines layouts, changing the volume of oil entering the pipeline system and increase its viscosity.


Author(s):  
T.M. Yarkova ◽  

This article presents an analysis of the changes that have occurred in one of the most important state documents - the Food Security Doctrine of the Russian Federation. Criticism of this document can be traced in many scientific works: some experts attribute the Doctrine only to a program document, while others expect it to be implement and control, i.e. much more in practice. An assessment of the significance and essence of such a document as the doctrine as a whole made it possible to determine its place both in the system of public administration and the degree of its significance in the regulatory field. Based on the findings, an attempt was made to analyze changes in the new Doctrine of Food Security of the Russian Federation, approved by Decree of the President of Russia No. 20 of 01.21.2020. Structural changes in the new Doctrine are highlighted, as well as a critical assessment of the features of all its main sections. The greatest changes were revealed in the state food security assessment system, and it was also determined that the new version of the Doctrine has a greater social bias. If there are positive changes, some omissions of the most important areas of agri-food policy have been identified, which, despite their absence or insufficient reflection in the Doctrine, can be presented and decided at the level of subsequent documents, but only if the Doctrine in practice will be a fundamental document of public administration and regulatory framework.


2011 ◽  
Vol 8 (1) ◽  
pp. 233-238
Author(s):  
R.M. Bogdanov ◽  
S.V. Lukin

Oil and petroleum products transportation is characterized by a significant cost of electric power. Correct oil and petroleum products accounting and forecasting requires knowledge of many factors. The software for norms of electric power consumption analysis for the planned period was developed at the Ufa Scientific Center of the Russian Academy of Sciences. Based on the principles of the relational data model, a schematic diagram/arrangement for the main oil transportation objects was developed, which allows to hold the initial data and calculated parameters in a structured manner.


Author(s):  
Bassam A. Hemade ◽  
Hamed A. Ibrahim ◽  
Hossam E.A. Talaat

Background: The security assessment plays a crucial role in the operation of the modern interconnected power system network. Methods: Hence, this paper addresses the application of k-means clustering algorithm equipped with Principal Component Analysis (PCA) and silhouette analysis for the classification of system security states. The proposed technique works on three principal axes; the first stage involves contingency quantification based on developed insecurity indices, the second stage includes dataset preparation to enhance the overall performance of the proposed method using PCA and silhouette analysis, and finally the application of the clustering algorithm over data. Results: The proposed composite insecurity index uses available synchronized measurements from Phasor Measurement Units (PMUs) to assess the development of cascading outages. Considering different operational scenarios and multiple levels of contingencies (up to N-3), Fast Decoupled Power Flow (FDPF) have been used for contingency replications. The developed technique applied to IEEE 14-bus and 57-bus standard test system for steady-state security evaluation. Conclusion: The obtained results ensure the robustness and effectiveness of the established procedure in the assessment of the system security irrespective of the network size or operating conditions.


Author(s):  
Sampada G.C ◽  
Tende Ivo Sake ◽  
Amrita

Background: With the advancement in the field of software development, software poses threats and risks to customers’ data and privacy. Most of these threats are persistent because security is mostly considered as a feature or a non-functional requirement, not taken into account during the software development life cycle (SDLC). Introduction: In order to evaluate the security performance of a software system, it is necessary to integrate the security metrics during the SDLC. The appropriate security metrics adopted for each phase of SDLC aids in defining the security goals and objectives of the software as well as quantify the security in the software. Methods: This paper presents systematic review and catalog of security metrics that can be adopted during the distinguishable phases of SDLC, security metrics for vulnerability and risk assessment reported in the literature for secure development of software. The practices of these metrics enable software security experts to improve the security characteristics of the software being developed. The critical analysis of security metrics of each phase and their comparison are also discussed. Results: Security metrics obtained during the development processes help to improve the confidentiality, integrity, and availability of software. Hence, it is imperative to consider security during the development of the software, which can be done with the use of software security metrics. Conclusion: This paper reviews the various security metrics that are meditated in the copious phases during the progression of the SDLC in order to provide researchers and practitioners with substantial knowledge for adaptation and further security assessment.


2018 ◽  
pp. 124-128 ◽  
Author(s):  
Yu.A. Grinevich ◽  
◽  
S.L. Ivankovsky ◽  
G.A. Lezina ◽  
◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document