Most planned developments in a catchment for control of excess water using a culvert, bridge or dam spillway are located at a site in a stream where there are no discharge measurements. Even though, for gauged catchme...Most planned developments in a catchment for control of excess water using a culvert, bridge or dam spillway are located at a site in a stream where there are no discharge measurements. Even though, for gauged catchments a number of established flood frequency models and rainfall-runoff models do exist, for ungauged catchments mostly regional flood frequency and event-based rainfall-runoff models are used, which depend on regional parameters. In this paper, a regional approach for design floods is presented and risk implication for design of drainage structures assessed. A case study in light of the above has been considered at four ungauged sites in the Limpopo Drainage Basin in north-eastern Botswana.展开更多
An overview of the GeoSafe 2016 Symposium topic is provided using the example of large concrete dams for purposes of illustration.It is essential that the risks associated with large dams be evaluated rigorously and m...An overview of the GeoSafe 2016 Symposium topic is provided using the example of large concrete dams for purposes of illustration.It is essential that the risks associated with large dams be evaluated rigorously and managed proactively at all stages of their lives so that the risk of failure remains As Low As Reasonably Practicable(ALARP).Rock engineering features of large concrete dams that require particular attention,assessment and monitoring during the investigation,design,construction,initial filling,inservice operation,and subsequent repair and upgrade stages of the lives of concrete dams are identified and illustrated by examples from recorded experiences.A number of major concrete dam failures,including that of the St.Francis dam,California,U.S.A.,in 1928,have led to significant developments in rock mechanics and rock engineering knowledge and techniques,as well as in dam design and review processes.More recent advances include a range of analytical,numerical modelling,probabilistic,reliability,failure mode and risk assessment approaches.展开更多
The study was carried out exclusively in Ghana to explore the approaches employed by consultants in risk assessment at the design phase of projects in Ghana. One hundred and fourteen (114) consultants were selected ou...The study was carried out exclusively in Ghana to explore the approaches employed by consultants in risk assessment at the design phase of projects in Ghana. One hundred and fourteen (114) consultants were selected out of a population of one hundred and eighty six (186) from three main professional associations in Ghana made up of the Ghana Institute of Architects, Ghana Institution of Engineers and the Ghana Institution of Surveyors (Quantity Surveying Division) practicing in Ghana for the study. Both primary and secondary data were collected. A descriptive survey was also used to observe and describe the presence, frequency or absence of characteristics of a phenomenon as it naturally occurred, in order to gain additional information. A questionnaire was also designed to collect data from the architects, engineers and quantity surveyors. The data was analyzed using Statistical Package for the Social Scientists (SPSS) 17.0. Descriptive and inferential statistics, such as frequency tables, percentages and cross tabulations were used in the data analysis and summaries. Simple tests of associations were undertaken by using Chi square and Cramer’s V statistics to compare relationships between variables. Again, relative importance index was also used to analyze some of the data by computing to deduce their rankings. The relative importance index was used to analyze some of the data by computing to deduce their rankings. The research revealed that majority of consultants had an average knowledge of risk management. Based on the findings it was recommended that consultants undergo advanced training in risk assessment. It was therefore suggested that consultancy firms should develop a set of laid down procedures for consultants to use in risk assessment in order that the use of intuition employed by majority is lessened. The challenges observed in risk assessment and the remedial steps suggested curtailing the detrimental effects of risks would be of wide importance to many developing economies.展开更多
This paper introduces a web-based application that enables engineers or designers to identify risks during the conceptual phase of a product design. This software application was developed based on the Risk in Early D...This paper introduces a web-based application that enables engineers or designers to identify risks during the conceptual phase of a product design. This software application was developed based on the Risk in Early Design (RED) method developed by Author, Stone, and Tumer. The RED method demonstrates that risks can be identified in the early phase of product design by relating recorded historical failure information to product functions. Based on the concept of RED theory and current industry needs, the goals of a web-based RED application were defined. These goals are the intended benefits or functionalities that the web-based RED application would provide. In addition, a multi-level evaluation framework was adopted to determine how well the application meets the needs of various organizations. As part of the evaluation, a questionnaire was developed and administered to a sample industrial and academic user group. The results of the evaluation indicate that the web-based RED software application meets many of the goals to help an organization in performing product risk analysis.展开更多
This paper presents a methodology for automatically generating risk scenarios for dynamic reliability applications in which some dynamic characteristics(e.g.,the order,timing and magnitude of events,the value of relev...This paper presents a methodology for automatically generating risk scenarios for dynamic reliability applications in which some dynamic characteristics(e.g.,the order,timing and magnitude of events,the value of relevant process parameters and initial conditions) have a significant influence on the evolution of the system.The main idea of the methodology is:(i) making the system model "express itself" through simulation by having the model driven by an elaborated simulation engine;(ii) exploiting uniform design to pick out a small subset of representative design points from the space of relevant dynamic characteristics;(iii) for each selected design point,employing a depth-first systematic exploration strategy to cover all possible scenario branches at each branch point.A highly dynamic example adapted from the literature(a chemical batch reactor) is studied to test the effectiveness of the proposed methodology.展开更多
Security risk assessment refers to the process of identifying, analyzing, and evaluating potential security risks for an organization. An organization’s assets, personnel, and operations are protected through it as p...Security risk assessment refers to the process of identifying, analyzing, and evaluating potential security risks for an organization. An organization’s assets, personnel, and operations are protected through it as part of a comprehensive security program. Various security assessments models have been published in the literature to protect the Saudi organization’s assets, personnel, and operations. However, these models are redundant and were developed for specific purposes. Hence, the comprehensive security risk assessment model used to safeguard Saudi organizations’ assets, personnel, and operations is still omitted. Using a design science methodology, the objective of this study is to develop a comprehensive security risk assessment model called CSRAM to assess security risks in Saudi Arabian organizations based on the International Organization for Standardization and the International Electrotechnical Commission/Information security risk management (ISO/IEC 27005 ISRM) standard. CSRAM is made up of six stages: threat identification, vulnerability assessment, risk analysis, risk evaluation, risk treatment, and monitoring and review of the risk. The stages have many activities and tasks that need to be accomplished at each stage. Based on the results of the validation of the completeness of the CSRAM, we can say that the CSRAM covers the whole ISO/IEC 27005 ISRM standard, and it is complete.展开更多
This article presents a methodology to determine the risk of aircrafts lateral runway excursion during landing via mathematical risk modeling. In addition, the methodology is demonstrated by means of detailed calculat...This article presents a methodology to determine the risk of aircrafts lateral runway excursion during landing via mathematical risk modeling. In addition, the methodology is demonstrated by means of detailed calculation of the lateral runway excursion risk value during the landing of the aircraft Airbus A310-200, in view of the maximum landing weight and the appropriate range of landing velocities according to the International Civil Aviation Organization specification. Obviously, the calculation demonstrates that the developed math solutions and equations presented herein are powerful tools to evaluate the risk of lateral runway excursion of the majority of aircrafts and for any airport. The method is also applicable to assess the residual level of risk at any specific airport and its deviation compared to the recommended safety level. Consequently, the presented mathematical solutions to determine the risk rate of lateral runway excursion during landing offers airports’ operational and safety management departments a viable tool so that appropriate measurements could be adopted. Finally, it is a methodology not only to assess the risk but also to determine the appropriate runway width.展开更多
This paper describes the development of a T-year design tide hydrograph (DTH). A core innovation is that the proposed technique uses the design risk threshold and copula-based conditional risk probability to analyze...This paper describes the development of a T-year design tide hydrograph (DTH). A core innovation is that the proposed technique uses the design risk threshold and copula-based conditional risk probability to analyze the optimal combination of high waters and low waters of the DTH. A brief description of the method is presented. The in situ semi-diurnal tide data at the coast of Jiangsu Province in China are analyzed. Marginal distributions for high waters and low waters of tides are examined. Furthermore, the joint distributions, condition risk probabilities and risk thresholds of high waters and low waters are presented. Results of the DTH from the proposed method are compared with those from the traditional same-multiple enlarging design approach. It is demonstrated that the proposed method is preferable.展开更多
文摘Most planned developments in a catchment for control of excess water using a culvert, bridge or dam spillway are located at a site in a stream where there are no discharge measurements. Even though, for gauged catchments a number of established flood frequency models and rainfall-runoff models do exist, for ungauged catchments mostly regional flood frequency and event-based rainfall-runoff models are used, which depend on regional parameters. In this paper, a regional approach for design floods is presented and risk implication for design of drainage structures assessed. A case study in light of the above has been considered at four ungauged sites in the Limpopo Drainage Basin in north-eastern Botswana.
文摘An overview of the GeoSafe 2016 Symposium topic is provided using the example of large concrete dams for purposes of illustration.It is essential that the risks associated with large dams be evaluated rigorously and managed proactively at all stages of their lives so that the risk of failure remains As Low As Reasonably Practicable(ALARP).Rock engineering features of large concrete dams that require particular attention,assessment and monitoring during the investigation,design,construction,initial filling,inservice operation,and subsequent repair and upgrade stages of the lives of concrete dams are identified and illustrated by examples from recorded experiences.A number of major concrete dam failures,including that of the St.Francis dam,California,U.S.A.,in 1928,have led to significant developments in rock mechanics and rock engineering knowledge and techniques,as well as in dam design and review processes.More recent advances include a range of analytical,numerical modelling,probabilistic,reliability,failure mode and risk assessment approaches.
文摘The study was carried out exclusively in Ghana to explore the approaches employed by consultants in risk assessment at the design phase of projects in Ghana. One hundred and fourteen (114) consultants were selected out of a population of one hundred and eighty six (186) from three main professional associations in Ghana made up of the Ghana Institute of Architects, Ghana Institution of Engineers and the Ghana Institution of Surveyors (Quantity Surveying Division) practicing in Ghana for the study. Both primary and secondary data were collected. A descriptive survey was also used to observe and describe the presence, frequency or absence of characteristics of a phenomenon as it naturally occurred, in order to gain additional information. A questionnaire was also designed to collect data from the architects, engineers and quantity surveyors. The data was analyzed using Statistical Package for the Social Scientists (SPSS) 17.0. Descriptive and inferential statistics, such as frequency tables, percentages and cross tabulations were used in the data analysis and summaries. Simple tests of associations were undertaken by using Chi square and Cramer’s V statistics to compare relationships between variables. Again, relative importance index was also used to analyze some of the data by computing to deduce their rankings. The relative importance index was used to analyze some of the data by computing to deduce their rankings. The research revealed that majority of consultants had an average knowledge of risk management. Based on the findings it was recommended that consultants undergo advanced training in risk assessment. It was therefore suggested that consultancy firms should develop a set of laid down procedures for consultants to use in risk assessment in order that the use of intuition employed by majority is lessened. The challenges observed in risk assessment and the remedial steps suggested curtailing the detrimental effects of risks would be of wide importance to many developing economies.
文摘This paper introduces a web-based application that enables engineers or designers to identify risks during the conceptual phase of a product design. This software application was developed based on the Risk in Early Design (RED) method developed by Author, Stone, and Tumer. The RED method demonstrates that risks can be identified in the early phase of product design by relating recorded historical failure information to product functions. Based on the concept of RED theory and current industry needs, the goals of a web-based RED application were defined. These goals are the intended benefits or functionalities that the web-based RED application would provide. In addition, a multi-level evaluation framework was adopted to determine how well the application meets the needs of various organizations. As part of the evaluation, a questionnaire was developed and administered to a sample industrial and academic user group. The results of the evaluation indicate that the web-based RED software application meets many of the goals to help an organization in performing product risk analysis.
基金supported by the National Natural Science Foundation of China (70901004)the Fundamental Research Funds for the Central Universities (YWF-10-01-A12)
文摘This paper presents a methodology for automatically generating risk scenarios for dynamic reliability applications in which some dynamic characteristics(e.g.,the order,timing and magnitude of events,the value of relevant process parameters and initial conditions) have a significant influence on the evolution of the system.The main idea of the methodology is:(i) making the system model "express itself" through simulation by having the model driven by an elaborated simulation engine;(ii) exploiting uniform design to pick out a small subset of representative design points from the space of relevant dynamic characteristics;(iii) for each selected design point,employing a depth-first systematic exploration strategy to cover all possible scenario branches at each branch point.A highly dynamic example adapted from the literature(a chemical batch reactor) is studied to test the effectiveness of the proposed methodology.
文摘Security risk assessment refers to the process of identifying, analyzing, and evaluating potential security risks for an organization. An organization’s assets, personnel, and operations are protected through it as part of a comprehensive security program. Various security assessments models have been published in the literature to protect the Saudi organization’s assets, personnel, and operations. However, these models are redundant and were developed for specific purposes. Hence, the comprehensive security risk assessment model used to safeguard Saudi organizations’ assets, personnel, and operations is still omitted. Using a design science methodology, the objective of this study is to develop a comprehensive security risk assessment model called CSRAM to assess security risks in Saudi Arabian organizations based on the International Organization for Standardization and the International Electrotechnical Commission/Information security risk management (ISO/IEC 27005 ISRM) standard. CSRAM is made up of six stages: threat identification, vulnerability assessment, risk analysis, risk evaluation, risk treatment, and monitoring and review of the risk. The stages have many activities and tasks that need to be accomplished at each stage. Based on the results of the validation of the completeness of the CSRAM, we can say that the CSRAM covers the whole ISO/IEC 27005 ISRM standard, and it is complete.
文摘This article presents a methodology to determine the risk of aircrafts lateral runway excursion during landing via mathematical risk modeling. In addition, the methodology is demonstrated by means of detailed calculation of the lateral runway excursion risk value during the landing of the aircraft Airbus A310-200, in view of the maximum landing weight and the appropriate range of landing velocities according to the International Civil Aviation Organization specification. Obviously, the calculation demonstrates that the developed math solutions and equations presented herein are powerful tools to evaluate the risk of lateral runway excursion of the majority of aircrafts and for any airport. The method is also applicable to assess the residual level of risk at any specific airport and its deviation compared to the recommended safety level. Consequently, the presented mathematical solutions to determine the risk rate of lateral runway excursion during landing offers airports’ operational and safety management departments a viable tool so that appropriate measurements could be adopted. Finally, it is a methodology not only to assess the risk but also to determine the appropriate runway width.
基金financially supported by the Ministry of Water Resources Special Funds for Scientific Research Projects of Public Welfare Industry(Grant No.201001070)Jiangsu Province Science and Technology(Grant Nos.BM2014397 and BM2016031)
文摘This paper describes the development of a T-year design tide hydrograph (DTH). A core innovation is that the proposed technique uses the design risk threshold and copula-based conditional risk probability to analyze the optimal combination of high waters and low waters of the DTH. A brief description of the method is presented. The in situ semi-diurnal tide data at the coast of Jiangsu Province in China are analyzed. Marginal distributions for high waters and low waters of tides are examined. Furthermore, the joint distributions, condition risk probabilities and risk thresholds of high waters and low waters are presented. Results of the DTH from the proposed method are compared with those from the traditional same-multiple enlarging design approach. It is demonstrated that the proposed method is preferable.