893 resultados para Critical infrastructures. Fault Tree. Dependability. Framework. Industrialenvironments
Resumo:
The modelling of critical infrastructures (CIs) is an important issue that needs to be properly addressed, for several reasons. It is a basic support for making decisions about operation and risk reduction. It might help in understanding high-level states at the system-of-systems layer, which are not ready evident to the organisations that manage the lower level technical systems. Moreover, it is also indispensable for setting a common reference between operator and authorities, for agreeing on the incident scenarios that might affect those infrastructures. So far, critical infrastructures have been modelled ad-hoc, on the basis of knowledge and practice derived from less complex systems. As there is no theoretical framework, most of these efforts proceed without clear guides and goals and using informally defined schemas based mostly on boxes and arrows. Different CIs (electricity grid, telecommunications networks, emergency support, etc) have been modelled using particular schemas that were not directly translatable from one CI to another. If there is a desire to build a science of CIs it is because there are some observable commonalities that different CIs share. Up until now, however, those commonalities were not adequately compiled or categorized, so building models of CIs that are rooted on such commonalities was not possible. This report explores the issue of which elements underlie every CI and how those elements can be used to develop a modelling language that will enable CI modelling and, subsequently, analysis of CI interactions, with a special focus on resilience
Resumo:
Smart Grids are a new trend of electric power distribution, the future of current systems. These networks are continually being introduced in order to improve the reliability of systems, providing alternatives to energy supply and cost savings. Faced with increasing electric power grids complexity, the energy demand and the introduction of alternative sources to energy generation, all components of system require a fully integration in order to achieve high reliability and availability levels (dependability). The systematization of a Smart Grid from the Fault Tree formalism enable the quantitative evaluation of dependability of a specific scenario. In this work, a methodology for dependability evaluation of Smart Grids is proposed. A study of case is described in order to validate the proposal. With the use of this methodology, it is possible to estimate during the early design phase the reliability, availability of Smart Grid beyond to identify the critical points from the failure and repair distributions of components.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-08
Resumo:
Critical infrastructures are based on complex systems that provide vital services to the nation. The complexities of the interconnected networks, each managed by individual organisations, if not properly secured, could offer vulnerabilities that threaten other organisations’ systems that depend on their services. This thesis argues that the awareness of interdependencies among critical sectors needs to be increased. Managing and securing critical infrastructure is not isolated responsibility of a government or an individual organisation. There is a need for a strong collaboration among critical service providers of public and private organisations in protecting critical information infrastructure. Cyber exercises have been incorporated in national cyber security strategies as part of critical information infrastructure protection. However, organising a cyber exercise involved multi sectors is challenging due to the diversity of participants’ background, working environments and incidents response policies. How well the lessons learned from the cyber exercise and how it can be transferred to the participating organisations is still a looming question. In order to understand the implications of cyber exercises on what participants have learnt and how it benefits participants’ organisation, a Cyber Exercise Post Assessment (CEPA) framework was proposed in this research. The CEPA framework consists of two parts. The first part aims to investigate the lessons learnt by participants from a cyber exercise using the four levels of the Kirkpatrick Training Model to identify their perceptions on reaction, learning, behaviour and results of the exercise. The second part investigates the Organisation Cyber Resilience (OCR) of participating sectors. The framework was used to study the impact of the cyber exercise called X Maya in Malaysia. Data collected through interviews with X Maya 5 participants were coded and categorised based on four levels according to the Kirkpatrick Training Model, while online surveys distributed to ten Critical National Information Infrastructure (CNII) sectors participated in the exercise. The survey used the C-Suite Executive Checklist developed by World Economic Forum in 2012. To ensure the suitability of the tool used to investigate the OCR, a reliability test conducted on the survey items showed high internal consistency results. Finally, individual OCR scores were used to develop the OCR Maturity Model to provide the organisation cyber resilience perspectives of the ten CNII sectors.
Resumo:
Portugal, having responsibilities at European level, needs to ensure compliance with European standards, particularly with regard to the European Security Plan for Critical Infrastructures. National critical infrastructures should be a focus of attention with regard to the management of public risks, since these represent "a set of services that are essential to the functioning of the country and the functioning of the forces that ensure national defense." (Soares, 2008) This contribution on national critical infrastructures (CI) has the essential objective of clarifying the development of the strategy adopted by Portugal in pursuit of the security of these fundamental infrastructures. The goal lies not only through producing a descriptive document, but also carry a brief confrontation between the legal framework related to these subjects and the reality in which the Critical Infrastructure Operators and the National Civil Protection Authority (ANPC) operate. It is intended, in this sense, to understand the development of the project for the national security program of critical infrastructures and what effects of its measures on operators. As for the methodology, we followed a methodological strategy, where we combine the literature with data obtained through semi-structured interviews. Portugal, being a geographically peripheral country and having no record of incidents capable of causing major contingencies in key services for the normal development of society, does not have a structured and regulator plan that substantiates the need for operators responsible for CI to invest in security. This same approach is expected at the State level, believing that even though this theme has be widely explored by international institutions, Portugal has not yet tried to give the attention it deserves. Without the existence of an institution and a regulatory system, CI operators can become less available to comply with the legal framework.
Resumo:
The thesis studies the representations of different elements of contemporary work as present in Knowledge Management (KM). KM is approached as management discourse that is seen to affect and influence managerial practices in organizations. As representatives of KM discourse four journal articles are analyzed, using the methodology of Critical Discourse Analysis and the framework of Critical Management Studies, with a special emphasis on the question of structure and agency. The results of the analysis reveal that structural elements such as information technology and organizational structures are strongly present in the most influential KM representations, making their improvement also a desirable course of action for managers. In contrast agentic properties are not in a central role, they are subjugated to structural constraints of varying kind and degree. The thesis claims that one such constraint is KM discourse itself, influencing managerial and organizational choices and decision making. The thesis concludes that the way human beings are represented, studied and treated in management studies such as KM needs to be re-examined. Pro gradu-tutkielmassa analysoidaan työhön ja sen tekijään liittyviä representaatioita Tietojohtamisen kirjallisuudessa. Tietojohtamista tarkastellaan liikkeenjohdollisena diskurssina, jolla nähdään olevan vaikutus organisaatioiden päätöksentekoon ja toimintaan. Tutkielmassa analysoidaan neljä Tietojohtamisen tieteellistä artikkelia, käyttäen metodina kriittistä diskurssianalyysiä. Tutkielman viitekehyksenä on kriittinen liikkeenjohdon tutkimus. Lisäksi työssä pohditaan kysymystä rakenteen ja toimijan välisestä vuorovaikutuksesta. Tutkielman analyysi paljastaa, että tietojohtamisen vaikutusvaltaisimmat representaatiot painottavat rakenteellisia tekijöitä, kuten informaatioteknologiaa ja organisaatiorakenteita. Tämän seurauksena mm. panostukset em. tekijöihin nähdään organisaatioissa toivottavana toimintana. Vastaavasti representaatiot jotka painottavat yksilöitä ja toimintaa ovat em. tekijöille alisteisessa asemassa. Tapaa, jolla yksilöitä kuvataan ja käsitellään Tietojohtamisen diskurssissa, tulisikin laajentaa ja monipuolistaa.
Resumo:
As falhas representam não conformidades nas atividades produtivas, de tal modo que pesquisas para seu controle e prevenção são, no mínimo, desejáveis. Na literatura sobre o assunto, observa-se uma gama variada de técnicas, porém, quase sempre, usadas isoladamente e, em poucos casos, no setor de serviços. Observando essa lacuna, propõe-se uma metodologia de Mapeamento de Falhas que integra diferentes abordagens que se complementam, aproveitando-se o potencial e o benefício de cada técnica para análise e controle de falhas. Para a consecução dessa proposta, efetuou-se uma pesquisa bibliográfica para conceituação e entendimento das técnicas utilizadas, um estudo e análise de integração dessas técnicas e, por fim, um exemplo real de aplicação em processo notarial de serviço, tema este ainda não explorado na literatura pertinente e, portanto, bastante auspicioso. Como resultado, observa-se uma ferramenta que permite uma visualização completa e objetiva das atividades desencadeadas pelos processos, seus pontos críticos e suas potenciais falhas, podendo ser aplicada com propriedade em empresas de prestação de serviços.
Resumo:
The competitiveness in the industrial sector is increasingly fierce. In this context, the quality of maintenance is often neglected due to the sense of urgency that arises in these companies. Thus, it becomes increasingly necessary to use tools of Reliability Centered Maintenance to assist in managing maintenance effectively and efficiently, and directing resources .This study aims to evaluate the use of the fault tree to identify critical paths in the maintenance sector in an industry. The proposal is uses the tools of Reliability Centered Maintenance (MCC) for the collection, disposal and prioritizing causes problems in the transport industry. The study has its focus on the theoretical foundation of problem solving methods and techniques to identify the root causes, using the fault tree
Resumo:
How do prevailing narratives about Native Americans, particularly in the medium of film, conspire to promote the perspective of the dominant culture? What makes the appropriation of Indigenous images so metaphorically popular? In the past hundred years, little has changed in the forms of representation favored by Hollywood. The introductory chapter elucidates the problem and outlines the scope of this study. As each subsequent chapter makes clear, the problem is as relevant today as it has been throughout the entire course of filmic history. Chapter Two analyzes representational trends and defines each decade according to its favorite stereotype. The binary of the bloodthirsty savage is just as prevalent as it was during the 1920s and 30s. The same holds true for the drunken scapegoat and the exotic maiden, which made their cinematic debuts in the 1940s and 50s. But Hollywood has added new types as well. The visionary peacemaker and environmental activist have also made an appearance within the last forty years. What matters most is not the realism of these images, but rather the purposes to which they can be put toward validating whatever concerns the majority filmmakers wish to promote. Whether naïvely or not, such representations continue to evacuate Indigenous agency to the advantage of the majority. A brief historical overview confirms this legacy. Various disciplines have sought to interrogate this problem. Chapter three investigates the field of postcolonial studies, which makes inquiry into the various ways these narratives are produced, marketed, and consumed. It also raises the key questions of for whom, and by whom, these narratives are constructed. Additional consideration is given to their value as commodities in the mass marketplace. Typically the products of a boutique-multiculturalism, their storylines are apt to promote the prevailing point of view. Critical theory provides a foundational framework for chapter four. What is the blockbuster formula and how do the instruments of capital promote it? Concepts such as culture industry and repressive tolerance examine both the function and form of the master narrative, as well as its use to control the avenues of dissent. Moreover, the public sphere and its diminishment highlight the challenges inherent in the widespread promotion of an alternative set of narratives. Nonetheless, challenges to prevailing narratives do exist, particularly in the form of Trickster narratives. Often subject to persistent misrecognition, the Trickster demonstrates a potent form of agency that undeniably dismantles the hegemony of Western cinema. The final chapter examines some of the Trickster's more subtle and obscure productions. Usually subjugated to the realm of the mystical, rather than the mythical, these misinterpreted forms have the power to speak in circles around a majority audience. Intended for an Other audience, they are coded in a language that delivers a type of direction through indirection, promoting a poignant agency all their own.
Resumo:
Traditional courses and textbooks in occupational safety emphasize rules, standards, and guidelines. This paper describes the early stage of a project to upgrade a traditional college course on fire protection by incorporating learning materials to develop the higher-level cognitive ability known as synthesis. Students will be challenged to synthesize textbook information into fault tree diagrams. The paper explains the place of synthesis in Bloom’s taxonomy of cognitive abilities and the utility of fault trees diagrams as a tool for synthesis. The intended benefits for students are: improved abilities to synthesize, a deeper understanding of fire protection practices, ability to construct fault trees for a wide range of undesired occurrences, and perhaps recognition that heavy reliance on memorization is the hard way to learn occupational safety and health.
Resumo:
El principio de Teoría de Juegos permite desarrollar modelos estocásticos de patrullaje multi-robot para proteger infraestructuras criticas. La protección de infraestructuras criticas representa un gran reto para los países al rededor del mundo, principalmente después de los ataques terroristas llevados a cabo la década pasada. En este documento el termino infraestructura hace referencia a aeropuertos, plantas nucleares u otros instalaciones. El problema de patrullaje se define como la actividad de patrullar un entorno determinado para monitorear cualquier actividad o sensar algunas variables ambientales. En esta actividad, un grupo de robots debe visitar un conjunto de puntos de interés definidos en un entorno en intervalos de tiempo irregulares con propósitos de seguridad. Los modelos de partullaje multi-robot son utilizados para resolver este problema. Hasta el momento existen trabajos que resuelven este problema utilizando diversos principios matemáticos. Los modelos de patrullaje multi-robot desarrollados en esos trabajos representan un gran avance en este campo de investigación. Sin embargo, los modelos con los mejores resultados no son viables para aplicaciones de seguridad debido a su naturaleza centralizada y determinista. Esta tesis presenta cinco modelos de patrullaje multi-robot distribuidos e impredecibles basados en modelos matemáticos de aprendizaje de Teoría de Juegos. El objetivo del desarrollo de estos modelos está en resolver los inconvenientes presentes en trabajos preliminares. Con esta finalidad, el problema de patrullaje multi-robot se formuló utilizando conceptos de Teoría de Grafos, en la cual se definieron varios juegos en cada vértice de un grafo. Los modelos de patrullaje multi-robot desarrollados en este trabajo de investigación se han validado y comparado con los mejores modelos disponibles en la literatura. Para llevar a cabo tanto la validación como la comparación se ha utilizado un simulador de patrullaje y un grupo de robots reales. Los resultados experimentales muestran que los modelos de patrullaje desarrollados en este trabajo de investigación trabajan mejor que modelos de trabajos previos en el 80% de 150 casos de estudio. Además de esto, estos modelos cuentan con varias características importantes tales como distribución, robustez, escalabilidad y dinamismo. Los avances logrados con este trabajo de investigación dan evidencia del potencial de Teoría de Juegos para desarrollar modelos de patrullaje útiles para proteger infraestructuras. ABSTRACT Game theory principle allows to developing stochastic multi-robot patrolling models to protect critical infrastructures. Critical infrastructures protection is a great concern for countries around the world, mainly due to terrorist attacks in the last decade. In this document, the term infrastructures includes airports, nuclear power plants, and many other facilities. The patrolling problem is defined as the activity of traversing a given environment to monitoring any activity or sensing some environmental variables If this activity were performed by a fleet of robots, they would have to visit some places of interest of an environment at irregular intervals of time for security purposes. This problem is solved using multi-robot patrolling models. To date, literature works have been solved this problem applying various mathematical principles.The multi-robot patrolling models developed in those works represent great advances in this field. However, the models that obtain the best results are unfeasible for security applications due to their centralized and predictable nature. This thesis presents five distributed and unpredictable multi-robot patrolling models based on mathematical learning models derived from Game Theory. These multi-robot patrolling models aim at overcoming the disadvantages of previous work. To this end, the multi-robot patrolling problem was formulated using concepts of Graph Theory to represent the environment. Several normal-form games were defined at each vertex of a graph in this formulation. The multi-robot patrolling models developed in this research work have been validated and compared with best ranked multi-robot patrolling models in the literature. Both validation and comparison were preformed by using both a patrolling simulator and real robots. Experimental results show that the multirobot patrolling models developed in this research work improve previous ones in as many as 80% of 150 cases of study. Moreover, these multi-robot patrolling models rely on several features to highlight in security applications such as distribution, robustness, scalability, and dynamism. The achievements obtained in this research work validate the potential of Game Theory to develop patrolling models to protect infrastructures.
Resumo:
Operators can become confused while diagnosing faults in process plant while in operation. This may prevent remedial actions being taken before hazardous consequences can occur. The work in this thesis proposes a method to aid plant operators in systematically finding the causes of any fault in the process plant. A computer aided fault diagnosis package has been developed for use on the widely available IBM PC compatible microcomputer. The program displays a coloured diagram of a fault tree on the VDU of the microcomputer, so that the operator can see the link between the fault and its causes. The consequences of the fault and the causes of the fault are also shown to provide a warning of what may happen if the fault is not remedied. The cause and effect data needed by the package are obtained from a hazard and operability (HAZOP) study on the process plant. The result of the HAZOP study is recorded as cause and symptom equations which are translated into a data structure and stored in the computer as a file for the package to access. Probability values are assigned to the events that constitute the basic causes of any deviation. From these probability values, the a priori probabilities of occurrence of other events are evaluated. A top-down recursive algorithm, called TDRA, for evaluating the probability of every event in a fault tree has been developed. From the a priori probabilities, the conditional probabilities of the causes of the fault are then evaluated using Bayes' conditional probability theorem. The posteriori probability values could then be used by the operators to check in an orderly manner the cause of the fault. The package has been tested using the results of a HAZOP study on a pilot distillation plant. The results from the test show how easy it is to trace the chain of events that leads to the primary cause of a fault. This method could be applied in a real process environment.
Resumo:
The initial aim of this research was to investigate the application of expert Systems, or Knowledge Base Systems technology to the automated synthesis of Hazard and Operability Studies. Due to the generic nature of Fault Analysis problems and the way in which Knowledge Base Systems work, this goal has evolved into a consideration of automated support for Fault Analysis in general, covering HAZOP, Fault Tree Analysis, FMEA and Fault Diagnosis in the Process Industries. This thesis described a proposed architecture for such an Expert System. The purpose of the System is to produce a descriptive model of faults and fault propagation from a description of the physical structure of the plant. From these descriptive models, the desired Fault Analysis may be produced. The way in which this is done reflects the complexity of the problem which, in principle, encompasses the whole of the discipline of Process Engineering. An attempt is made to incorporate the perceived method that an expert uses to solve the problem; keywords, heuristics and guidelines from techniques such as HAZOP and Fault Tree Synthesis are used. In a truly Expert System, the performance of the system is strongly dependent on the high quality of the knowledge that is incorporated. This expert knowledge takes the form of heuristics or rules of thumb which are used in problem solving. This research has shown that, for the application of fault analysis heuristics, it is necessary to have a representation of the details of fault propagation within a process. This helps to ensure the robustness of the system - a gradual rather than abrupt degradation at the boundaries of the domain knowledge.
Resumo:
The EU-funded project UAN - Underwater Acoustic Network aims at conceiving, developing and testing at sea an innovative and operational concept for integrating in a unique communication system submerged, surface and aerial sensors with the objective of protecting off-shore and coastline critical infrastructures. A crucial aspect of the project consisted in the use of autonomous underwater vehicles (AUVs) as mobile nodes in the underwater acoustic communication network. In particular, AUVs have the role of adapting the network geometry to the variation of the acoustic channel. This paper reports on the project concept and vision as well as on the progress of its various development phases. The recent at-sea successes that have been demonstrated within the UAN framework are detailed and results of the final UAN project demonstration, UAN11, held in the May of 2011, are reported. The UAN network was in operation for five continuous days with up to five nodes, of which three of them were mobile nodes. © IFAC.