integrated systems
Recently Published Documents


TOTAL DOCUMENTS

1383
(FIVE YEARS 284)

H-INDEX

47
(FIVE YEARS 8)

2022 ◽  
Vol 156 ◽  
pp. 112022
Author(s):  
A. Nikas ◽  
K. Koasidis ◽  
A.C. Köberle ◽  
G. Kourtesi ◽  
H. Doukas

Chemosphere ◽  
2022 ◽  
Vol 289 ◽  
pp. 133175
Author(s):  
Yuanyao Ye ◽  
Huu Hao Ngo ◽  
Wenshan Guo ◽  
Soon Woong Chang ◽  
Dinh Duc Nguyen ◽  
...  

2022 ◽  
pp. 187-212
Author(s):  
Arif Darmawan ◽  
Muhammad Aziz ◽  
Muhammad Kunta Biddinika ◽  
Koji Tokimatsu

2022 ◽  
pp. 289-335
Author(s):  
Ibrahim Dincer ◽  
Haris Ishaq

2022 ◽  
pp. 231-242
Author(s):  
Sarath C. Gowd ◽  
Deepak Kumar ◽  
Karthik Rajendran

Author(s):  
Bohdan Nikolaienko ◽  
Serhii Vasylenko

With the development of information technology, the need to solve the problem of information security has increased, as it has become the most important strategic resource. At the same time, the vulnerability of the modern information society to unreliable information, untimely receipt of information, industrial espionage, computer crime, etc. is increasing. In this case, the speed of threat detection, in the context of obtaining systemic information about attackers and possible techniques and tools for cyberattacks in order to describe them and respond to them quickly is one of the urgent tasks. In particular, there is a challenge in the application of new systems for collecting information about cyberevents, responding to them, storing and exchanging this information, as well as on its basis methods and means of finding attackers using integrated systems or platforms. To solve this type of problem, the promising direction of Threat Intelligence as a new mechanism for acquiring knowledge about cyberattacks is studied. Threat Intelligence in cybersecurity tasks is defined. The analysis of cyberattack indicators and tools for obtaining them is carried out. The standards of description of compromise indicators and platforms of their processing are compared. The technique of Threat Intelligence in tasks of operative detection and blocking of cyberthreats to the state information resources is developed. This technique makes it possible to improve the productivity of cybersecurity analysts and increase the security of resources and information systems.


Energies ◽  
2021 ◽  
Vol 14 (24) ◽  
pp. 8528
Author(s):  
Lucia Cattani ◽  
Paolo Cattani ◽  
Anna Magrini

Due to water scarcity, in the last few decades, air-to-water generator (AWG) technology, whose useful effect is the extraction of water from air, has been improved. In particular, in the last few years, advanced AWG integrated systems have been developed. Such systems permit, not only to condense water from air, but also the smart use of the by-side effects of the process in order to partially or totally cover the heating ventilation air conditioning (HVAC) needs of a building. Presently, there are no evaluation tools that permit a complete comparison among AWG machines, taking into account all the useful effects that can be obtained at the same time and with the same energy input. The current work, starting from the need for such a tool, proposes a global index whose formulation considers all useful effects of an integrated system, the energy required to obtain them, and the integration degree of the machine. The index translates into a single number the system global efficiency, by means of a particular combination of existing efficiency indicators. In its extended formulation, it can be applied, not only to AWGs, but also to other HVAC integrated systems, as well as to combinations of non-integrated and integrated solutions. In addition to equations, the paper provides calculation examples and a case study in order to show the practical application and advantages of GEI.


2021 ◽  
Author(s):  
Mohammed Mugharbil ◽  
Mohammed Al Khunaizi

Abstract Well integrity is one of the most critical elements for extending the producible life of a well. A healthy well enables optimization of productivity, enhanced oil recovery, trial tests of new technologies, and much more. Factors such as external corrosive aquifers, internal corrosion, corrosive hydrocarbons, cement bond damage, solids and sand production, and others are considered the main integrity dangers worldwide. When well integrity is affected, not only economic risks but also risks to health, environment and safety are probable. Well integrity is an objective achieved by optimum design and construction of the well after studying and assessing all possible hazards; effective monitoring of the well behavior while it's under production; and timely intervention when an integrity problem is detected. Evaluating all the aspects of well integrity during well operation is crucial. Cyclic surveillance is important to be followed, including wellhead pressures/annuli surveys, temperature surveys, corrosion logs, wellbore clearance, and well fluid samples, among other activities. With the help of smart and integrated systems, production engineers can have much better control over well integrity and be proactive in making timely decisions prior to any unforeseen events. The smart system keeps the well surveillance records, risk-rank the wells, and sets KPIs to tackle necessary actions wherever applicable. The developed system immediately triggers any threat on well integrity when it occurs.


Sign in / Sign up

Export Citation Format

Share Document