Introduction of Fire Protection Technology and Its Design Method of Offshore Facilities

Author(s):  
Myeong Jun Koo ◽  
Jae Woong Choi ◽  
Ho Byung Yoon
2010 ◽  
Vol 26-28 ◽  
pp. 608-611 ◽  
Author(s):  
Chang Kun Chen ◽  
Dong Zhang

A new design method for fire protection, based on analytic hierarchy process (AHP), was put forward, to explore an economic and secure strategy for fire protection of steel staggered-truss structure (SSTS). The chords and web members of SSTS were classified into different important grades by AHP according to the influence which components make on the stability of structure at elevated temperature. And the components are protected by different levels based on the important grades. Furthermore, a comparative investigation was conducted in order to appraise the economic and practical performance of the provided new fire protection method with traditional fire protection. The results indicate that the proposed fire protection strategy for SSTS based on AHP could achieve higher security with the same volume of fire retardant coatings.


Author(s):  
Wei Chen ◽  
Sheng Hu ◽  
Lisong Tang ◽  
YangLing Ou ◽  
Jianhong Lv ◽  
...  

2013 ◽  
Vol 284-287 ◽  
pp. 1373-1378
Author(s):  
I Jyh Wen ◽  
Ming Jyh Lee

Historic buildings and Monuments in the precious historical and cultural heritage plays an extremely important position, with the characteristics of the rare, special and historical value. Over the years in Taiwan, The fire management deficiencies, Cause a fire to become the biggest killer on the destruction of historic monuments. In this study, Explore by referencing and comparing the major fire prevention regulations for historic buildings active and passive fire protection technology around the world, We can find more Active fire protection equipment is widely used . And the use of the superior characteristics of the water mist system in Long-Shan Temple in Lu-Kang, Chang-Hua County as an Empirical research, try to exemplify the way, make appropriate fire use in historic architecture the best program to explore. In conclusion, comparison of the application of various innovative active and passive fire prevention system , and use the appropriate fire prevention technology to design and planning to improve the fire safety for historic monuments and buildings is an important issue. According to the empirical research of “Long-Shan Temple”, we can find water mist technology suitable for historic buildings fire protection in Taiwan.


1972 ◽  
Author(s):  
J. G. Alexander ◽  
J. H. Newland ◽  
D. M. Patterson ◽  
F. L. Tempesta

2011 ◽  
Vol 368-373 ◽  
pp. 3857-3861
Author(s):  
Lei Bai ◽  
Zeng Feng Yan ◽  
Shu Ping Zhang

Partial current rules of the National Standard of Fire Code are disjointed from the current development of large commercial building; as a result, part of the design cannot be carried out according to the specifications. The new digital fire control design method can solve this difficulty. This paper is to take a large commercial building as an engineering example, introducing the new design concept of “independent fire protection unit” and “quasi-safety area” to adjust the program; then, on the basis of fire safety engineering principles, it uses the computer-assisted method to predict and assess the dangers of fire and the safety of evacuation, and thus demonstrating the feasibility of this method.


2013 ◽  
Vol 446-447 ◽  
pp. 876-881
Author(s):  
Xiao Peng Niu ◽  
Qing Bao Li ◽  
Xiao Dong Xie

To solve the hiding problem of hardware Trojan in chip, we first analyzed the self-protection technology of malicious software, and then proposed a trigger mechanism that base on timing finite state machine (TFSM), energy flow, and distributed Trojan design method. As for the trigger mechanism that based on TFSM, one must enter the right pattern on the correct time to activate the Trojan. The mechanism based on energy flow can make the hardware Trojan keep hiding in the RTL code logical analysis. The distributed hardware Trojan design is to divide a complete Trojan into several components, and the Trojan will keep silent if all the components are not in order. The design methods of hardware Trojan have been verified in our self-made hardware threat simulate platform, it can reduce the rate of been detected out, and the possibility of been triggered out by random operations.


Sign in / Sign up

Export Citation Format

Share Document