فهرست مطالب

Reliability, Risk and Safety: Theory and Application - Volume:6 Issue: 2, Sep 2023

International Journal of Reliability, Risk and Safety: Theory and Application
Volume:6 Issue: 2, Sep 2023

  • تاریخ انتشار: 1402/06/28
  • تعداد عناوین: 12
  • Moaiad Mohseni * Pages 1-13
    This research paper comprehensively analyzes the advantages of integrating energy storage resources into an energy management system, highlighting how it can significantly improve profitability and overall energy quality. One of the key benefits is the ability to regulate charging and discharging cycles, which helps prolong the service life of storage devices. In addition, the study delves into the influence of consumer behavior and the Internet of Things (IoT) on energy storage charge management, identifying important insights for enhancing efficiency. The optimization process for this investigation utilizes the YALMIP and MOSEK toolboxes, ensuring rigorous and accurate results. The experimentation is conducted on an IEEE standard 33-bus network, offering a robust foundation for real-world applications. The research outcomes demonstrate remarkable enhancements in both technical and economic parameters, including energy storage resources. By harnessing the potential of energy storage, businesses and industries can achieve greater cost savings and operational efficiencies. Furthermore, the paper considers the longevity of storage resources, comprehensively comparing results. This factor is crucial in determining such systems' long-term benefits and sustainability. In conclusion, the study underscores the immense advantages that IoT technology brings to energy management and its positive impact on consumers. By leveraging IoT capabilities and integrating energy storage resources intelligently, optimal consumption management can be achieved, leading to a more sustainable and efficient energy ecosystem.
    Keywords: Internet of Things, Energy management, electrical energy storage, Consumer Behavior, distributed generation
  • Hamid Babakpour, Fatemeh Karimi Organi * Pages 15-20
    Industrial operations in high H2S gas wells can cause serious environmental, financial & health consequences. Risk management is important, especially when the world is at war with the SARS-COV-2 pandemic; we should have stronger boundaries to protect lives. One of the common methods is the hierarchy method. In this study, by combining this method and designing a new correlation to calculate static bottom hole pressure at gas wells, we tried to have strong risk management with the final goal of replacing the industrial operation. In the past, time-consuming and imprecise trial and error methods& expensive operations were used to calculate static bottom-hole pressure for gas wells. So, a general equation was modified based on field observations to obtain more accurate static bottom-hole pressure predictions. For this purpose, a unique adjustable parameter, based on the history matching of wells, has been proposed for each reservoir. The accuracy of this equation was investigated in three Iranian gas reservoir information. Good agreement was obtained between the field observations and this proposed equation. The precision of this method depends on field data, and with increasing numbers of field tests, the model becomes more accurate.
    Keywords: H2S gas wells, hierarchy method, Risk Management, SARS-COV 2 pandemic, Operational risk, Second Development
  • Sedigheh Heydari * Pages 21-26
    The expansion of the use of information has caused communication and closeness between different cultures and their influence on each other, so it can be said that culture is now full of more information than in previous periods. Therefore, information technology has affected cultural values in such a way that even they have been exposed to the challenge of transformation and fundamental cultural changes from the security aspect. On the other hand, with the growth of various research in the field of cyber security and facing a kind of dispersion of information in this field, it is very important to conduct combined research that presents the extracts of the research conducted in this subject systematically and scientifically. The current research aims to quantitatively combine the results of research conducted in the field of cyber security with an emphasis on the human circle and, by using a meta-analysis method and comprehensive meta-analysis software (CMA2), examines the number of 81 articles. In fact, the statistical population of the research is all articles on cyber security that have been published in the last 3 years in reliable domestic and foreign scientific databases. The result of the meta-analysis of 75 variables shows that it covers 5 main variables. Among them, the variables of awareness, culture and infrastructure impact cyber security most. Most research has been done with descriptive-analytical, documentary and secondary analysis methods. The effect size results showed that the variables of awareness (with an effect size of 0.68), culture (with an effect size of 0.61) and infrastructure (with an effect size of 0.42) had the greatest impact on cyber security in the reviewed studies.
    Keywords: Meta-analysis, Cyber Security, Human circle, effect size
  • Ali Bahrami Nejat, Mohammad Nadjafi, Hossein Shahverdi * Pages 27-35
    The main goal of this article is to analyze the sensitivity and find the most effective property among structural properties that have the most significant impact on the flutter velocity of a composite wing. For this purpose, the corresponding Aeroelastic equations of a composite wing have been derived using the Euler-Bernoulli beam model and discretized by the Galerkin method. Based on Jones's unsteady aerodynamic model, aerodynamic loads have been incorporated into the aeroelastic model. Then, flutter velocity was determined through eigenvalue analysis of the obtained aeroelastic equations. The Flutter velocity changes with a specific interval of each input. With the help of reverse engineering, the effects of structural properties (including material properties and effective stiffness) and their sensitivity were determined. The results show that the Torsional Effective Stiffness has the most significant effect and high sensitivity on flutter velocity. In this work, other parameters (including flow properties, wing geometry, and airfoil) are assumed to be unchangeable. The geometry of the wing is considered rectangular and straight.
    Keywords: Wing Flutter, Composite Wing, Flutter Velocity Sensitivity Analysis, Jones aerodynamic model
  • Mohammad Hossein Moghimiesfandabadi, Mohammad Hassan Djavareshkian *, Sina Abedi Pages 37-45
    Numerous studies have demonstrated that human factors are the primary cause of deadly air incidents and accidents involving passenger flights. Human error is defined as mistakes and flaws in the way a human component of a system performs a predetermined action or refrains from performing an activity that is forbidden or that needs to be completed within a given amount of time, with a specific degree of precision, or both. Vision error, measurement units, radio communication, language, aircraft warning system design, psychological stress, pilot selection and qualification, pilot flight qualification, fatigue, aging, human performance, flight crew coordination, modifications to the Course of Cadin course, and human factors in aircraft design are the typical categories into which such errors are divided. Based on international norms and indications, the investigation's findings demonstrate that the Civil Aviation Organization's supervision in the sensitive area of ISI has been appropriately followed. This matter is significant because, since 2010, the Civil Aviation Organization has complied with its standards optimally based on international audits. This is because, among domestic experts, compliance with international standards has always been a top concern in increasing safety and productivity in this field. However, determining if this issue is sufficient to establish safety and prevent accidents is crucial. In this research, we examine the risk method for flight safety, the performance evaluation index of safety, security, and flight safety by passengers, and the most important golden tips to save from plane crashes.
    Keywords: Aircraft, Safety Management, Accidents, Solutions, Engine, Flight safety risks
  • Sedigheh Heydari * Pages 47-53
    Recently, many private companies and government organizations worldwide have been facing the problem of cyber-attacks and the risk of wireless communication technologies. Today's world is highly dependent on electronic technology, and protecting this data against cyber-attacks is challenging. The goal of cyber-attacks is to harm companies financially, and in some cases, these attacks can have military or political goals. Therefore, the present research was conducted quantitatively to analyze the evaluation of cybersecurity culture and awareness scale in 2022 among the employees of the country bank. The statistical sample was 841 employees of bank branches. The research instrument was the "Evaluation of Cybersecurity Culture and Awareness" scale (2022), and the GRM model (common model in IRT for polychotomous data analysis) was used to analyze the data. The findings showed that all 34 items in this scale have a discriminative index, awareness index, and appropriate ability level in the target sample. Also, the highest level of awareness was between +1 and +2, and the maximum total awareness was equal to 70, which showed the desirability of the entire scale level. Examining the status of bank employees in relation to the culture and awareness of cybersecurity also showed that the status of bank employees is suitable in all 6 effective factors in promoting the culture and awareness of cybersecurity. Therefore, by using this tool, it is possible to measure the level of cybersecurity culture and awareness. In line with that, the necessary training and strategies can be carried out to improve and upgrade the existing situation in public and private organizations.
    Keywords: evaluation, Cybersecurity, Culture, Awareness, Polychotomous models, Item-response theory
  • Sasan Motaghed *, Amin Mehrabi Moghaddam, Neda Moayyeri Pages 55-64
    Structures failure prevention plays a vital role in saving the lives of citizens. The Iranian Code of Practice for the seismic-resistant design of buildings, Standard No. 2800, is one of the most critical and influential Iranian codes that are revised and edited regularly. Hence, this question arises: how will these regulations affect structures' performance in future events? In this study, the performance of structures designed based on the third and fourth editions of standard No. 2800 is evaluated in operational (OP), immediate occupancy (IO), life safety (LS), and collapse prevention (CP) performance levels. The performance of structures is evaluated via two probabilistic approaches. Structural nonlinear analysis uses incremental dynamic analysis based on conditional mean spectrum-compatible records. The evaluations are carried out on three, five, and eight floors (three and five spans) intermediate moment resisting reinforced concrete structures. The results show that the seismic performance of structures in the later edition has improved compared to the previous one. However, the structures of both editions are safe at performance levels of OP, IO, and LS with a confidence level greater than 99%; the confidence level of CP performance level decreases with increasing height of structures so that the reliability of the fourth edition 8-story structures and third edition 5-story and 8-story structures is less than 90%. Therefore, it seems necessary to consider CP performance levels in seismic evaluations.
    Keywords: Reliability index performance levels, confidence level, Incremental dynamic analysis (IDA)
  • Mostafa Livani *, Mahmud Ketabi, Mohammad Davarzani Pages 65-75
    In this article, the reliability of the equipment related to the PC-7 aircrew is evaluated using the FMEA method. For this purpose, a complete review of the equipment and systems related to the PC-7 aircrew was done. Then, the potential failure modes were determined for each of the subsystems. In the following, the parameters of the RPN formula were determined by the questionnaire method and obtaining the opinions of technical experts and pilots of the PC-7 aircraft about the severity of the failure, the probability of their occurrence, and the difficulty of detecting them. Also, the risk diagram was drawn based on two main parameters, including the severity of the effect and the probability of failure. Finally, the highest RPN coefficient determined that the three electronic, engine, and airplane fuel systems have the highest RPN values and risk probability.
    Keywords: PC-7, FMEA, RPN, Reliability, Risk Diagram
  • Ashkan Kazemi *, Mohsen Kalhornia Golkar, Shakib Lajmiri Pages 77-83

    Security is the most basic need of any society and the most important factor for the sustainability of social life; therefore, it has been the focus of experts and theorists since the distant past. The spread of the Internet, new information and communication technologies, and the communication revolution have created a new type of virtual communication devoid of the spirit that governs real social relations. This has caused the emergence and formation of cyberspace parallel to the real world and has disrupted the equations and patterns of traditional communication, production, transfer, and consumption of information and has caused a global movement in the field of communication and transfer of content and communication messages in the fastest possible time. Therefore, as human life is mixed with the cyber revolution, cyber security has come. Cyber security is security in the infrastructure and information arteries, and creating new opportunities for jobs and countries in the environment of automation, electronic commerce, exchange, and cooperation has led to targeted production, storage, and exploitation of sensitive and vital information. In general, different aspects of citizens' lives are mixed with cyberspace, and any instability, insecurity and challenges in this space directly affect different aspects of citizens' lives, especially their security.

    Keywords: Cyber, Security, origin, Virtual Space
  • Mohammad Hossein Moghimiesfandabadi, Mohammad Djavareshkian * Pages 85-91
    Risk management and technical integrity of air systems are critical in the aviation industry. Maintenance grouping, as one of the main risk management tools in the aviation industry, refers to activities aimed at maintaining and improving the technical integrity or reducing the risk of maintaining aviation systems. Since there may be a set of equipment and parts in an air system that need maintenance or repair, optimization of maintenance grouping can improve performance and increase the safety and technical accuracy of the air system. This article will analyze and review the optimization methods of maintenance grouping in air systems. First, the importance of risk management and the technical accuracy of air systems will be examined, and then a detailed description of the maintenance grouping steps will be discussed. In the following, various optimization methods and algorithms used to improve maintenance grouping performance will be reviewed. Then, the advantages and limitations of each method will be discussed. In the end, the results of this research and its critical implications will be evaluated, and suggestions will be made to optimize maintenance grouping in air systems. The study results show that the genetic algorithm can improve resource utilization, scheduling efficiency, and cost reduction in maintenance grouping. This can significantly benefit the aviation industry, as it can help reduce costs, improve aircraft availability, and enhance safety.
    Keywords: Air systems, Risk Management, optimization, Aviation industry
  • Mostafa Abbasi Kia *, Shahram Khoshnavaz, Razieh Hashemi Alem Pages 93-105
    Tracking moving targets using mobile robots is a crucial aspect of robotics. This paper presents a novel approach for tracking a moving target in an uncertain environment with various obstacles, even when the target’s trajectory and speed are continuously changing and unknown. The proposed method utilizes reinforcement learning, a widely used technique for motion planning problems. However, applying reinforcement learning in uncertain dynamic environments poses a challenge due to the continuous state space. To address this issue, our algorithm employs an ART2 neural network for classifying the state space. Additionally, to enhance the speed of reaching the target, a point is predicted based on the target’s speed, direction, and the robot’s speed. The robot then selects its next move to approach this predicted point while avoiding contact with both static and dynamic obstacles. Simulation results demonstrate the efficiency of the algorithm, as the robot successfully reaches the target without colliding with any obstacles.
    Keywords: Target Interception, uncertain environment, Reinforcement Learning, Art2 Neural Network
  • Saeed Zare Ganjaroodi *, Hossein Khameh, Mohammadreza Kazem Farahzadi, Yaser Kasesaz, Ehsan Zarifi Pages 107-113

    Computer simulation is crucial due to the importance of estimating various parameters of a reactor in different functions. Hence, simulation codes and programs must have high credibility to perform complex calculations. SuperMC is a powerful, accurate graphic user interface Monte Carlo method-based code to simulate and model nuclear systems due to the unique features of CAREM-25 reactor, including high efficiency, complex geometry is chosen to be modeled by SuperMC and MCNPX codes to calculate neutronic and control parameters such as multiplication factor, flux and power distribution, and control rod worth. Comparing the results of the two simulations mechanism indicates the proximity of the computed values with less than a %2 difference in neutronic parameters. Also, SuperMC results show an appropriate consistency with benchmarks and references. Consequently, SuperMC can be considered an accurate, simple, and GUI Advanced program to simulate nuclear reactors.

    Keywords: SuperMC, CAREM-25, MCNPX, Neutronic, Small Modular Reactors