scholarly journals Substantiation of Application of the Strategic Planning Methods in Order to Improve Efficiency of the Automated Systems of Fire and Explosion Protection at the Fuel and Energy Complex Facilities in the Special Conditions

Author(s):  
Ilya V. Samarin ◽  
Sergey N. Grinyaev ◽  
Andrey Yu. Strogonov ◽  
Nikolay G. Topolskiy ◽  
Aleksey V. Kruchkov

This paper presents substantiation of the obligatory application of the strategic planning methods in order to improve efficiency of the automated systems of fire and explosion protection (ASFEP) at the facilities of the fuel and energy complex (FEC) in the special conditions. To this end, the technological production process of the FEC facilities is divided into destructive and creative subprocesses. It is assumed that the events that cause the potentially dangerous situations, which are connected with fires and explosions, form the destructive subprocess. The activities, which are carried out within the framework of fire safety plans at the FEC facilities and which are controlled by the shift on duty, form the creative subprocess. Events of the first subprocess reduce efficiency of the ASFEP, while events of the second subprocess increase efficiency of this system. Authors of the article propose the continuous curve of recovery of the ASFEP efficiency in order to ensure modelling the type of influence of various rehabilitation measures. Two kinds of the exponential functions enveloping the moments of fire and rehabilitation are analysed for these subprocesses. The article describes the graph of actual rehabilitation of the ASFEP efficiency taking into account assumptions concerning nature of these functions. The total efficiency of the rehabilitation measures within the creative subprocess consists of the partial efficiencies of the measures, which are included to individual plans of various subsystems of the ASFEP (subsystems of the first and second levels). These partial shares of efficiency have been analysed from the point of view of their dependency on the period of performance of these measures, on their funding and management. It was established that management of the relevant measures, which is determined with the help of the strategic planning methods, is the most significant parameter in this model.

2018 ◽  
Vol 247 ◽  
pp. 00028
Author(s):  
Szymon Ptak ◽  
Albert Smalcerz ◽  
Piotr Ostrowski

Fire and explosion protection in industrial conditions requires multidimensional approach. Usually the risk of hazardous zone creation is unavoidable, if the combustible material is processed. Therefore controlling of potential ignition sources is introduced. One of most popular sources of ignition is electrostatic discharge. Depending on the type of the discharge, as well as on exact discharge conditions, energy released might reach hundreds or even thousands of mJ, being able to ignite most of gaseous or dust-air hazardous mixtures. A dedicated methodology was created to record the discharge with fast camera with maximum speed of 1M fps and with the oscilloscope up to 25 GS/s. Dedicated test stand allows to obtain high voltage to create the conditions for electrostatic discharge. The aim of presented research was to analyze the course of electrostatic spark discharge in laboratory conditions and to place the outcomes in the context of explosion safety in the industrial conditions. The course of electrostatic discharge is dependent on various conditions: the polarity, distance between the electrodes, shape of electrodes, grounding conditions, etc. Understanding of the phenomenon is crucial from the point of view of explosion safety.


2020 ◽  
Vol 1 (10) ◽  
pp. 13-25
Author(s):  
A. P. SOKOLOV ◽  
◽  
L. P. VASILIEVA ◽  
I. V. BRATKO ◽  
◽  
...  

The authors consider the issues of forming a procurement strategy for enterprises of the fuel and energy complex (FEC) as a management tool. The study begins with a review of the categories of strategy, purchasing, and risk. Based on the generalization and interpretation of the obtained knowledge, the author's model of procurement strategy for enterprises of the fuel and energy complex is proposed, which differs from the existing ones in that it simultaneously acts as a means of connecting the enterprise with the external market environment. The strategy has a complex multi-stage character with many elements. Through detailed strategic planning can be achieved high efficiency of the procurement activities of enterprises of fuel and energy. The proposed algorithm can form the basis of an unlimited number of branches of the national economy.


1981 ◽  
Vol 18 (03) ◽  
pp. 234-244
Author(s):  
John D. Vitkauskas ◽  
John R. Peters

The Coast Guard NVIC 1–69 has provided guidelines for the design of automated systems so that human surveillance can be reduced without jeopardizing the vessel. An integral part of these guidelines is the preparation of a Test Procedure which periodically tests the vital safety systems to increase the probability that they will function properly when called on. However, the Test Procedure guidelines are general and subject to wide interpretation. This paper attempts to provide some insight into what needs to be periodically tested, why the testing is required, and what techniques are acceptable, at the same time stressing the need for efficient testing. Some examples are also provided of testing procedures that have been found to be efficient and sufficiently comprehensive.


2006 ◽  
Vol 7 (2) ◽  
pp. 37-43 ◽  
Author(s):  
Marek Lisiński ◽  
Mark Šaruckij

Strategic planning methods form an extensively developed and interrelated group of dozens of methods used for organisation strategy development. Research has confirmed that only a small amount of firms use strategic planning methods in practice due to different reasons. The publications on strategic planning are devoted mostly to theoretical issues or empirical characteristics of chosen sub‐problems related to this concept of management. The methodological aspects, if at all, are taken into account as marginal or of minor importance. The purpose of this article is to present the principles of strategic planning methods classification and application. The methodology used in this research is based on the taxonomy methods and particularly Ward's method. A total amount of 28 different strategic planning methods were chosen and classified in our study.


2020 ◽  
Vol 3 (7) ◽  
pp. 153-164 ◽  
Author(s):  
Hennadii Hulak

The components of ensuring the warranty of automated systems, which are subject to increased requirements in connection with their use in many sensitive areas of public activity, including national security and defense, critical industrial technologies, energy and communications, banking, environmental protection , technologies of legitimate distance learning, etc. Certain components can significantly affect the quality and reliability of information services in regulatory conditions. In particular, the special role of the functional security of the cryptographic subsystem in terms of supporting the performance of the automated system for its tasks and functions in general, as well as in terms of ensuring the confidentiality and integrity of information. The components of the cryptographic subsystem have been identified, the poor or incorrect operation of which negatively affects the security of these subsystems. The types of the most dangerous attacks on these subsystems are analyzed, their classification from the point of view of possibility of realization in modern scientific and technical conditions and depending on capacity of available computing means and technologies on the basis of which the most real and dangerous variant of realization of remote attacks on software implementation of cryptographic subsystem is defined. . Based on the analysis, a method for evaluating the quality of cryptographic transformations based on a modified algorithm for solving the problem of finding solutions of systems of linear equations with distorted right-hand parts using the so-called decoding based on "lists" of first-order "shortened" Reed-Muller codes is proved. the correctness of the proposed algorithm.


Sign in / Sign up

Export Citation Format

Share Document