• BUSINESS & “INDUSTRY 4.0”

    Development of operational safety of the Baku-Tbilisi-Ceyhan (BTC) main pipelines, based on the improvement of methodical approaches to the study of the leakage problem

    Industry 4.0, Vol. 9 (2024), Issue 1, pg(s) 32-34

    One of the urgent problems of the main oil pipelines is to ensure safe operation of the line part, which is solved primarily by carrying out repair works on the scene of accidents identified as a result of proper monitoring. In order to choose adequate measures for warning about disasters and accidents, it is necessary to create scientific-methodical and relevant technical bases for a quantitative assessment of the risk of their detection. In these conditions, it is impossible to solve the key technical problems of the safe operation of pipelines without the use of methodology and a risk-oriented approach.
    That is why the choice of modern techniques and methods to ensure the safety of main pipelines based on risk analysis, depends on the development of scientifically based methods adapted to the given problem.
    Therefore, the aim of the research is to increase the safety of the operation of Baku-Tbilisi-Ceyhan (BTC) main pipelines, based on improving methodical approaches to the study of accidents on pipelines, in particular leakage.

  • INNOVATION POLICY AND INNOVATION MANAGEMENT

    Risk Driven Design of Technical Product

    Innovations, Vol. 11 (2023), Issue 2, pg(s) 53-55

    Technical Products that companies put on the market must be competitive and must find their way to the customer or the customer must find their way to them. In the vast majority, these are new products or innovated existing products that can offer the customer added value compared to the competition and, above all, induce in him the desire to purchase the product and not just include it in the selection of other competitive products. During the development process of these products, it is necessary to take into account the entire life cycle of the product and not only its operational functions and other operational characteristics, which is quite often neglected. There exist a lot of engineering design methodologies, methods and/or tools implemented in guidelines and standards which help engineering designers to innovate products and to reduce constructional, safety, environmental, etc. risks of Designed (future) Technical Products. Their common feature is especially high dependence on specialized experience of their users, time consuming, and their mutual both conceptual and terminological inconsistency resulting in very difficult compatibility with engineering designing itself.

  • BUSINESS & “INDUSTRY 4.0”

    Preventing potential hazards in the development of machinery

    Industry 4.0, Vol. 8 (2023), Issue 3, pg(s) 89-92

    The article focuses on the definition of industrial business risks that are associated with risk management. Following the description of the risks, the article then focuses on the elimination of the hazard or the reduction of each of the two criteria that determine the risk in question, such as the severity of the damage caused by the hazard and the likelihood that the damage will occur, separately or simultaneously, are two ways to achieve the purpose of risk reduction. The article is highly relevant to the implementation and development of technical systems and equipment.

  • NATIONAL AND INTERNATIONAL SECURITY

    Reducing the potential vulnerability of the society in case of a terrorist attack against critical infrastructure sites and facilities

    Security & Future, Vol. 5 (2021), Issue 1, pg(s) 18-20

    This article discusses the issues related to the planning of activities for ensuring the physical security of critical infrastructure sites. The critical infrastructure is considered as an important element of the national security of the country, and the cri ticality is determined by the interdependence between the individual elements and the dependence of the society on its normal functioning.

  • INFORMATION SECURITY

    Approaching a DoS attack using change and risk management methods

    Security & Future, Vol. 4 (2020), Issue 2, pg(s) 64-67

    The Information Technology security threats are emerging with each day passing by. The implementation of the technology into every field of society brings changes. Finding a way to manage these changes would be a success, and, by doing so, it would mitigate the risks they bring. Data transmission nowadays is unsecure like never before. Challenging is the way that should be found to cope with these kinds of evolutionary changes. Among the top threats in networks lies the DoS attack. It has been a long time since this kind of attack is around, but that doesn’t reduce the fact that this type of attacks is still dangerous and devastating. In order to cope with this kind of attack, we need to know how to manage risks and changes during a DoS attack. Because of this, it is very important that defensive mechanisms are implemented and integrated so that unauthorized access would be prevented from accessing your network or data. This refers to individuals and everyone else working in companies that are working in the field of IT, because at some point, we all share the same thing-devices (mobile phones, personal computers, devices at work, etc.). The base of the IT foundation is knowing how to protect yourself and your data. Due to this, we need to work hard and exploit every possible threat and attack from the inside out. Not only to reduce or mitigate the already occurred impact, but also to prevent these types of failures from happening in the future.

  • BUSINESS & “INDUSTRY 4.0”

    Information risk management in SME sector enterprises

    Industry 4.0, Vol. 5 (2020), Issue 2, pg(s) 79-83

    The article attempts to determine the level of use of methods increasing the security of information resources among the SME sector enterprises declaring the use of information security risk management methods. Research was carried out to determine the scope of use of risk management methods in the aspect of actions taken in the area of security of the intangible assets. Also the so-called “human factor” in the information protection process was taken into account. An attempt was made to determine how business entities use risk assessment in any form and how many of them use (and to what extent) the recommendations described in the ISO/IEC 27005 standard.

  • THEORETICAL FOUNDATIONS OF SECURITY

    RISK PERCEPTION BY STUDENTS: CASE OF FACULTY OF SECURITY ENGINEERING, UNIVERSTIY OF ZILINA

    Security & Future, Vol. 3 (2019), Issue 4, pg(s) 136-139

    The perception, awareness and understanding of risk by the population are important factors for the society safety, which contribute to increasing the preparedness of the population for the effects of crisis events, whether natural, industrial, economic, social, or in enterprise. The article focuses on the analysis of the need for education of students in the area of risk management and crisis management. The research groups were only students, not the population in general. The results were achieved by analysing the current state of education at the Faculty of Security Engineering – University of Žilina and a partial statistical evaluation of the questionnaire survey among students of this faculty. The results indicate that the risk perception of students is relatively low and the need for education in this field is justified.

  • TRANSPORT. SAFETY AND ECOLOGY. LOGISTICS AND MANAGEMENT

    Increased risks of impact on the environment of Poti and Kulevi sea ports

    Trans Motauto World, Vol. 4 (2019), Issue 3, pg(s) 120-121

    Based on the status of the maritime country of Georgia, we studied the increasing risks of the pollution by the ballast water and wastewater volume increase in the sea caused by the volume of freight turnover of Poti and Kulevi sea ports. For this, we conducted research in two directions: on the sensitive areas of Kulevi and Poti pipeline terminals and ships in the port. We first examined ecological parameters: namely water relative temperature, water acidity (pH) and salinity (TDS) quantitative indicators as in the stationary, also in non-stationary conditions. The results of the laboratory survey of water samples indicate that the relative temperature (t1 / t2) of Poti (t1 / t2) 0,87 acidity (pH) 8.34, salinity (TDS) 15,60 Relative temperature of turbocharging (t1 / t2) 0,87, acidity (pH) 8.37, salinity (TDS) 15,12
    Secondly, on the ships entered in the ports, we took as ballast and wastewater samples and analyzed in accordance with the legislation:
    1. Ballast water analysis from tanker “Metin K” from Kulevi, shows that increased nitrogen +6 mg / l, oilseeds +0.7 mg / l, nitrates 1,3 mg / l and nitrites- 0,35 mg / l
    2. Poti Port – N 5 Ventilation Examples of Weight Watchers Examples of Weighted Particles 4.0 mg / l, Ammonium 1,67 mg / l of ballast water analysis shows that the total amount of oil nitrogen is 0.6 mg / l, + 0.7 mg / L, nitrates 1,3 mg / ld nitrites – 0,35 mg / l.
    As a result of these two studies, based on reliability and risk theory of Kulevi, the mean value of salinity (TDS) is equal to: 10,85, for Poti port, the mean value of salinity (TDS) is equal to 12,34.
    In the theoretical and laboratory studies we have identified the risks of contamination of ports and waste water pollution.

  • Methodological approach for safety assessment in breeding and selection of sheep raised for meat

    Science. Business. Society., Vol. 4 (2019), Issue 1, pg(s) 27-30

    An analysis of the state, technology and technique of the pastoral system of sheep breeding, which is best suited to the specifics of the meat sector in sheep breeding, is made.
    The main types of hazards are classified for the main types of works and the conditions under which a methodological approach based on the methods of expert assessment is established to determine the significance of the different types of hazards for working in breeding sheep for meat and in breeding activities on farms .

  • Comparison of approaches to estimation of transition matrix for the terrorist threat Markov model

    Mathematical Modeling, Vol. 2 (2018), Issue 3, pg(s) 112-115

    Markovian models are often used in modelling a time development of random phenomena. When modelling real world scenarios it is reasonable to assume that the respective phenomena may not be time homogeneous. Based on the sociological and security research, it can be assumed that there is a link between a destabilisation of a society of a given geographical region and the acts of terrorism. This link is utilised in construction of a model for description of the intensity of a terrorist threat based on given determinants/indicators of societal stability. The model is based on the theory of discrete non-homogeneous Markov chains. The theory of generalised linear models (GLMs) is used in the estimation of the probabilities of the categorised level of the terrorist threat. In the contribution the use of different estimates of the categorised level of terrorist threat probabilities is studied. The estimates are determined by GLMs with different input parameters. The influence of the resulting estimate on the transition matrix of the non-homogeneous Markov chain is assessed. Additionally, a real world example utilising the data from Global Terrorism Database of University of Maryland and Organisation for Economical Cooperation and Development is presented.

  • TRANSPORT. SAFETY AND ECOLOGY. LOGISTICS AND MANAGEMENT

    EXPRESSION OF RISK THROUGH TARIFF POLICY IN RAIL PASSENGER TRANSPORT

    Trans Motauto World, Vol. 3 (2018), Issue 4, pg(s) 173-176

    Risk analysis is a process with a detailed identification of risks, determine their range and examines the interaction of these risks. Each process or human activity are influenced by many risks. As well as in rail transport there are many risks which hare accrue from the operation. Risk is defined as the chance that something will happen what will affect the goals and is measuring by results or estimate. We can also risk defined as the product of the likelihood of an adverse event (phenomenon) and consequences (outcomes). On one side is the risk connected with the hope of achieving a good financial results, but on the other side with the danger of business failure that brings losses. The aim of this paper is the proposal of a tariff taking into account the risk from unoccupied capacity of passenger trains. Pricing of selected risk we will eliminate this adverse event.

  • BUSINESS

    Risk assessment for the production process

    Science. Business. Society., Vol. 3 (2018), Issue 1, pg(s) 18-21

    Risk management constitutes currently one of the most important elements of the management of an enterprise, which is crucial to its security and continuous improvement. This is a several-stage process, and its implementation should systematic and principled in character. The article sets out the risk assessment for activities performed in conjunction with individual operations of a manufacturing process, and specifically, the book production process. The risk assessment was preceded by the identification of hazards to technological, transport and control operations, followed by their analysis using an indicator method. Operations have been identified, which are characterized by the highest risk, and preventive and prophylactic actions using various control measures (technical, organizational, legal, individual and collective) have been proposed. Risk assessment for a task is a primary outline for the use and implementation of risk management issues that go beyond the commercial risk assessment in an enterprise.