safety technique
Recently Published Documents


TOTAL DOCUMENTS

30
(FIVE YEARS 7)

H-INDEX

5
(FIVE YEARS 1)

2020 ◽  
Vol 3 (1) ◽  
Author(s):  
Syaza I. Ahmad ◽  
Mimi H. Hassim ◽  
Haslenda Hashim ◽  
Roslina Rashid

The index-based inherent safety assessment method is preferable in comparing alternative chemical process routes due to its ability to be used in the early process design stage with limited details availability of the route assessed. However, the current index-based inherent safety assessment methods available have the shortcoming of subjective scaling. The Numerical Descriptive Inherent Safety Technique (NuDIST) is an inherent safety assessment method for the research and development design stage that overcomes the shortcoming of subjective scaling by incorporating logistic functions in its scoring assignment. The aim of this paper is to verify the NuDIST method in comparison with the Prototype Index for Inherent Safety (PIIS) and Inherent Safety Index (ISI) in terms of subjective scaling elimination. The inter-boundary case subjective scaling is considered solved if the scores difference between sub-edge boundaries is small while the intra-boundary case subjective scaling is considered solved if every value in a range has different scores.  The results of the subjective scaling elimination test agree that NuDIST eliminates the shortcomings of subjective scaling with positive results for both inter-boundary and intra-boundary.


2020 ◽  
Vol 10 (15) ◽  
pp. 5339 ◽  
Author(s):  
Antonio Zuorro ◽  
Daylisney Cassiani-Cassiani ◽  
Demmy A. Meza-González ◽  
Kariana Andrea Moreno-Sader ◽  
Ángel Darío González-Delgado

Nowadays, inherently safer designs are considered as key priorities to prevent or mitigate serious incidents with devastating consequences. The need for process safety assessment during early design phases has motivated the development of several contributions related to computer-aided assessment methodologies to measure the inherent safety of chemical processes. In this work, the large-scale production of chitosan from shrimp wastes was evaluated from a process safety point of view using the numerical descriptive inherent safety technique (NuDIST). To this end, simulation of the chitosan production was performed using Aspen Plus ® to obtain extended mass and energy balances. The assessment of all the chemicals involved within the process was carried out for the following safety parameters: explosivity (EXP), flammability (FL), and toxicity (TOX). The safety assessment of the process included the parameters of temperature (T), pressure (P), and heat of reaction (HR). The maximum chemical safety score was estimated in 171.01 with ethanol as the main contributor to the parameters of explosivity and flammability. The score associated with operating data was calculated at 209.20 and heat of reaction reported to be the most affecting parameter. The NuDIST score was estimated at 380.20. This NuDIST value revealed the low hazards associated with the handling of substances such as shrimp wastes, chitosan, and water, as well as the non-extreme temperature and pressure conditions. In general, the large-scale production of chitosan from shrimp shells was shown to be an inherently safe alternative of waste valorization.


Author(s):  
Antonio Zuorro ◽  
Daylisney Cassiani-Cassiani ◽  
Demmy A. Meza-González ◽  
Kariana Andrea Moreno-Sader ◽  
Ángel Darío González-Delgado

Nowadays, inherently safer designs are considered as key priorities to prevent or mitigate serious incidents with devastating consequences. The need for process safety assessment during early design phases has motivated the development of several contributions related to computer-aided assessment methodologies in order to measure the inherent safety of chemical processes. In this work, the large-scale production of chitosan from shrimp wastes was evaluated from process safety point of view using the numerical descriptive inherent safety technique (NuDIST).To this end, simulation of the chitosan production was performed using Aspen Plus ® to obtain extended mass and energy balances. The assessment of all the chemicals involved within the process was carried out for the following safety parameters: explosivity (EXP), flammability (FL) and toxicity (TOX). The safety assessment of the process included the parameters of temperature (T), pressure (P) and heat of reaction (HR). The maximum chemical safety score was estimated in 171.01 with ethanol as main contributor to the parameter of explosivity and flammability. The score associated with operating data was calculated in 209.30 and heat of reaction reported to be the most affecting parameter. The NuDIST score was estimated in 380.30. This NuDIST value revealed the low hazards associated with the handling of substances such as shrimp wastes, chitosan and water, as well as the non-extreme temperature and pressure conditions. In general, the large-scale production of chitosan from shrimp shells showed to be an inherently safe alternative of waste valorization.


2020 ◽  
pp. 25-30
Author(s):  
Oksana Slepova

The latest smartphones make life easier for their customers. Mobile banking in smartphones is no longer news, but users are just getting used to the opportunity to pay for a purchase by touching the gadget to the terminal using the contactless payment technology. Going into the digital world is fraught with the illusion of security: a smart gadget stands up for itself. But this is true only partly – security depends primarily on the behavior of the user. Therefore, no matter what financial applications are installed on your smartphone, you first need to master the safety technique of mobile payments. As a result of the study, it is necessary to conclude that payment applications should not think about their own solutions, but only need to properly configure the work of pre-installed solutions in smartphones, as well as: 1) regularly check your devices for malicious software; 2) do not enter card data on other people’s computers and smartphones; 3) use stores that use a secure HTTPS connection; 4) to pay for online purchases, it is better not to use your main card, but to have a virtual card.


Author(s):  
Dian Paramita Br Perangin-angin

The authenticity of a digital file is something that must be able to be guaranteed its existence, considering that there are so many devices that can be used to carry out manipulation of the digital file. One of the digital files discussed in this study is an audio file with MP3 file extension. Please note that MP3 audio files are now very easy to obtain, even very easy to manipulate and insert objects in, so we need a safety technique to maintain the authenticity of the audio file. Overcoming the problem that has been explained in the previous paragraph, the appropriate security technique used is the hash cryptographic technique, by applying the CRC 32 algorithm. The application of CRC 32 aims to generate hash codes from MP3 audio files that can be used as key codes for authentication (key authenticity) of MP3 audio files. The results of this study are a representation of the technical explanation of the application of the CRC 32 algorithm in generating MP3 audio file hash codes, which the CRC 32 algorithm is applied to applications that have been designed and built using the help of MATLAB software version 6.1.Keywords: File Authenticity, Audio File, CRC 32, MATLAB 6.1


Surgery ◽  
2018 ◽  
Vol 164 (1) ◽  
pp. 31-39 ◽  
Author(s):  
Floyd W. van de Graaf ◽  
Jacqueline van den Bos ◽  
Laurents P.S. Stassen ◽  
Johan F. Lange

Sign in / Sign up

Export Citation Format

Share Document