The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a computational Fuzzy Logic Model for chemical hazards risk assessment by inhalation in laboratories. Some influence factors on chemical risk are deterministic but not completely measurable. As a result, this research focusses on Fuzzy Logic, instead of a probabilistic approach. Data for simulation is based on a hypothetical but completely realistic laboratory. Dependency on time...
Risk management is a critical part of every industrial activity. In recent years, due to the complexity, importance and potential impacts of industrial processes, risk analysis has taken advantage of increasing computational availability to deliver tools at every level of the risk management spectrum. Bow-tie models, so called because of their generalized shape, are used at various levels in the risk...
Cascading outages can cause large blackouts, and a variety of methods are emerging to study this challenging topic. The Task Force on Understanding, Prediction, Mitigation, and Restoration of Cascading Failures, under the IEEE PES Computer Analytical Methods Subcommittee (CAMS), seeks to consolidate and review the progress of the field towards methods and tools of assessing the risk of cascading failure...
As there are a lot of factors with complexity and uncertainty, the process of coal-bed methane under balanced drilling has great risk. In order to overcome the one-sidedness and limitation caused by single evaluation method, the combined evaluation model for coal-bed methane under balanced drilling is established based on the combined evaluation theory. And on the basis of the software platform of...
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analysis for access control from the viewpoint of trust and demonstrate how to extend access control architectures to incorporate trust-based reasoning. We present a theoretical model which allows to reason about and manage risk...
This paper presents a probabilistic approach to encode causal relationships among various threat sources and victim systems in order to facilitate quantitative and relational security assessment of information systems. In addition to providing a simple risk analysis approach compared to qualitative methods, it is unique in that it makes no a priori assumptions regarding the test domain. Therefore,...
This paper presents a causal assessment model based on Bayesian Belief Networks to analyze and quantify information security risks caused by various threat sources. The proposed model can be applied to a variety of information security evaluation tasks, risk assessment, software development projects, IT products, and other decision making systems. This unique concept can also be used for the determination...
Along with the investment fund industry rapidly developing, the demand of public carries on the appraisal to the fund investment risk to be day by day. This article uses the risk measure method, carries on the empirical analysis of the China growth negotiable securities fund investment stock combination's risk, studies it's function in the combination risk assessment.
This article distinguishes and analyses the various supply risk, and discusses intensively a kind of important basic risk-cooperation risk from both quality and quantity sides. After discusses of corporate risk's different respects, the article estimates the supply network's cooperation risk by two different methods. One method makes use of the financial risk and loss evaluation thought, other is...
Mobile ad-hoc networks (MANET) has highly dynamic topology, open access of wireless channel and unpredictable behaviors; however, absence of effective security mechanism render MANET more vulnerable to positive attacks. Conventional assessments always require large sample data satisfy specific distribution and establish models through subjective recognition, thus lack common applicability, objectivity...
A framework for representing intermediate failure states in an assessment of abort risk during the ascent phase of a crewed space launch vehicle mission is presented. The framework refines a previously established, simulation-based risk assessment approach (Ref. 1) by improving the characterization of vehicle failure prior to the onset of final, potentially catastrophic ??loss of crew?? (LOC) hazards...
The allocation of emergency resources is an important part of emergency decision. In this article, a dynamic programming model and goal programming model of emergency resources were presented. At the same time, aiming at solving the faultiness and inflexibility, the article presents a method of making multi-stage emergency decisions based on the theory of risk analysis and repast symphony platform...
Network risk assessment is an important method to monitor and forecast the security status of the network. The risk calculation is the key step and the result is the direct reference of the risk assessment. This paper prompts a service-based risk quantitative calculation method - SRQC of NGN. SRQC method includes a service-based layered risk calculation model, the quantitative process of assets, vulnerabilities...
A conceptual framework is presented for multi-scale field/network/agent-based modeling to support human and ecological health risk assessments. This framework is based on the representation of environmental dynamics in terms of interacting networks, agents that move across different networks, fields representing spatiotemporal distributions of physical properties, rules governing constraints and interactions,...
P2P networks are self-organized and distributed. Efficient nodes risk assessment is one of the key factors for high quality resource exchanging. Most assessment methods based on trust or reputation have some remarkable drawbacks. For example, some methods impose too many restrictions to the samples, and many methods canpsilat identify the malicious recommendations, which result in that the final results...
The possibility level a is dependent on technical conditions and knowledge. Calculation of the fuzzy expected value of landfall hurricane risk along the east coast of the United States has been performed based on the interior-outer set model. Selection of an a value depends on the confidence in different groups of people, while selection of a conservative risk value or venture risk value depends on...
The methodology of visual simulation for tunnel engineering construction schedule is presented, visualization of simulation model, calculation and result of construction schedule simulation is realized, the construction simulation of tunnel engineering can be done, the resource optimization of tunnel engineering construction schedule is taken. Meanwhile, risk analysis and decision-making method of...
We are interested in understanding how high quality information management systems can improve disease prevention and screening services, particularly in the prevention of diabetes and its complications. As part of this effort, we are exploiting standards-driven distributed data collation, processing and computational technologies to deduce comparative performance of disease outcomes markers. In the...
With the development of grid technology, sensitive files and data protection become difficult tasks multi-domains. Traditional access control mechanisms are not suitable to such distributed environment. Several models and mechanisms utilize trust to assist access control decision. But few explicitly consider trust and risk as two separate factors which affect interactions between peers. In this paper,...
The existent models aiming at information security risk analysis primary startle the problem from a technical view and the real-time assessment approaches are seldom studied. The knowledge based approaches for information security risk analysis are limited in rule presentation and risk management. The bottom-up approaches fails to support effective security decision and control. Real-time assessment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.