Articles with "criticality analysis" as a keyword



P-graph approach to criticality analysis in integrated bioenergy systems

Sign Up to like & get
recommendations!
Published in 2017 at "Clean Technologies and Environmental Policy"

DOI: 10.1007/s10098-017-1368-3

Abstract: The use of integrated bioenergy systems (IBS) is a prospective solution to address the emergent global demand for clean energy. The sustainability of IBS compared to stand-alone biomass processing facilities is achieved through integration of… read more here.

Keywords: risk; criticality analysis; bioenergy systems; graph approach ... See more keywords

Criticality Analysis for Network Utilities Asset Management

Sign Up to like & get
recommendations!
Published in 2019 at "IFAC-PapersOnLine"

DOI: 10.1016/j.ifacol.2019.11.511

Abstract: Abstract The proposed work describes the main part of asset criticality analysis for Distribution Network Services Providers (DNSP), also known as Network Utilities, the severity-value factors definition. The methodology is based on the risk-based evaluation… read more here.

Keywords: network utilities; methodology; network; asset ... See more keywords

Monte Carlo criticality analysis of random media under bounded fluctuation driven by normal noise

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Nuclear Science and Technology"

DOI: 10.1080/00223131.2018.1483846

Abstract: ABSTRACT In Monte Carlo criticality analysis under material distribution uncertainty, it is necessary to evaluate the response of neutron effective multiplication factor (keff) to the space-dependent random fluctuation of volume fractions within a prescribed bounded… read more here.

Keywords: carlo criticality; criticality analysis; monte carlo; fluctuation ... See more keywords

Log Poisoning Attacks in IoT: Methodologies, Evasion, Detection, Mitigation, and Criticality Analysis

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3438383

Abstract: Log poisoning is a cyber-attack where adversaries manipulate systems’ log files to conceal their activities or execute malicious codes. This paper thoroughly examines log poisoning attacks, focusing on demonstrating methodologies applied to prevalent Internet of… read more here.

Keywords: poisoning attacks; log poisoning; criticality analysis; log ... See more keywords