Spelling suggestions: "subject:"mitigation"" "subject:"mitigating""
1 |
An Analysis on Wildfire Mitigations Employed by Utilities in CaliforniaLuu, Evan 01 December 2023 (has links) (PDF)
As climate change continues to worsen, environmental effects are felt by many people around the world. In California, some of its most damaging wildfires have been found to be started by utilities. As the state continues to suffer from worsening wildfire conditions, the utilities need to implement a variety of wildfire mitigations to help reduce the risk of wildfires that can affect the state and its residents. This paper analyzes the effectiveness of four mitigations employed across three California utilities and suggests potential ways for the mitigations to be used together. The technologies evaluated are covered conductor, rapid earth fault current limiter, distribution fault analysis, and early fault detection. Each of these mitigate different failure drivers of utility lines, whether it is due to a contact from a foreign object, an equipment failure, or another driver. Because each mitigation is more effective against different drivers, a suggestion for multiple mitigations to use together is given. This also includes a path for utilities to evaluate mitigation effectiveness in a different way that may more accurately represent how many fires are stopped by the mitigations employed.
|
2 |
Outsourced Offshore Software Testing Challenges and Mitigations / Outsourced Offshore Software Testing Challenges and MitigationsPulipaka, Avinash Arepaka Sravanthi January 2014 (has links)
Software development comprises of different phases like requirements, analysis, design coding and testing. In this contemporary world of software development, development of software in globalized scenarios is prevalent and prominent. As part of different globalized scenarios this thesis magnifies the scenario of software product transfer which deals with the testing of software in the offshore location. / +919502697610 +919849674412
|
3 |
Habitat linkages and highway mitigation using spatially-explicit GIS-based modelsJones, Andrew Charles 13 December 2012 (has links)
I identified suitable locations for highway wildlife crossing mitigations across the TransCanada Highway (TCH) in the area of Mount Revelstoke and Glacier National Park (MRGNP), British Columbia. Highways fragment natural landscapes leading to habitat loss, reduced ecosystem connectivity and direct wildlife mortality though motor vehicle collisions. Grizzly bears (Ursus arctos) are vulnerable to the effects of habitat and population fragmentation. Highway wildlife crossing mitigations improve ecosystem connectivity by increasing the permeability of transportation corridors to wildlife. I identified high-quality habitat patches using a resource selection function (RSF) based on 1,703 radio telemetry locations from 59 grizzly bears. Least-cost path analysis (LCP) among habitat patches identified 6 linkage zones across the TCH. Electric circuit theory was used to generate current maps that classify linkage zones as high-volume crossing areas or tenuous linkages. Linkage zones occurred where high-quality habitat aligned with physical features conducive to cross-valley wildlife dispersal.
|
4 |
Secure satellite internet usage in high-risk areasKvant, Andreas, Johansson, Carl January 2023 (has links)
Background. In high-risk areas, a reliable and secure internet connection is not always guaranteed. If the terrestrial internet infrastructure is damaged due to armed conflicts in the area, the internet is shut down or internet traffic is monitored by antagonistic parties, satellite internet technology could be a suitable alternative for people or organizations operating in these areas. However, satellite internet comes with its own advantages and shortcomings, and if satellite internet systems are going to be used in these areas, there is a need for secure utilization of the system and awareness of possible vulnerabilities, threats, and risks of using them. Objectives. There are four main objectives of this study: (1) To identify the general threats and vulnerabilities that accompany the use of satellite internet technology in a high-risk area. (2) To assess the risks to the user's safety that may come as a consequence of the vulnerabilities being exploited or threats being realized. (3) To identify possible mitigations to the risks, and device best practices for the secure use of satellite internet technology in high-risk areas. (4) Produce a document that provides information about satellite internet technology, clarifies what vulnerabilities, threats, and risks could be present when using satellite internet in a high-risk area and how the user may assess the risk according to their own situation, the document should also provide the user with mitigations and best practices for the secure use of the satellite internet technology in order to ensure the user's safety. Methods. A structured literature review, semi-structured interviews, and multiple threat analysis methods were used to gather and evaluate the threats to satellite internet. The literature review presented the previous research done, and the interviews gave some perspectives from the industry. The results were then compiled into a document which we evaluated in a workshop to determine its usability and get feedback we could use to improve it. Results. The results show that satellite internet systems are exposed to several attacks, and tracking was a discovered threat that was not mentioned in previous research. When making our example risk assessment tracking also received the highest score, due to it allowing an adversary to threaten the physical safety of a user. Conclusions. The interest in satellite internet security research seems to have recently increased. The most exposed part of the satellite internet infrastructure is the wireless communication link, especially in high-risk areas where attacks targeting the radio signal are more prevalent. User awareness was our most important mitigation against the threats found and is the core contribution of this work. / Bakgrund. Att pålitlig och säker internetuppkoppling är tillgänglig i högriskområden är inte alltid garanterat. Om den markbaserade internetinfrastrukturen skadas på grund av väpnade konflikter i området, internet stängs ned eller internettrafiken övervakas av antagoniska parter, så är satellitinternetteknologi ett lämpligt alternativ för personer eller organisationer som verkar i dessa områden. Satellitinternet har dock sina egna fördelar och nackdelar. Om dessa system ska användas i högriskområden är det av yttersta vikt att de används säkert och att användaren är medveten om vilka möjliga sårbarheter, hot och risker som ackompanjerar användningen av systemen Syfte. Det finns fyra mål med detta arbete: (1) Att identifiera de allmänna hot och sårbarheter som ackompanjerar användningen av satellitinternetteknologi i ett högriskområde. (2) Att bedöma de risker mot användarens säkerhet som kan uppstå till följd av att sårbarheterna utnyttjas eller hoten realiseras. (3) Att identifiera möjliga åtgärder för att mitigera riskerna och utveckla bästa praxis för den säkra användningen av satellitinternetteknologi i högriskområden. (4) Att producera ett dokument som tillhandahåller information om satellitinternetteknologi, klargör vilka sårbarheter, hot och risker som kan förekomma vid användning av satellitinternet i högriskområden samt hur användaren kan bedöma risken utefter sin egen situation. Dokumentet bör också ge användaren åtgärder mot risker och bästa praxis för säker användning av satellitinternetteknologi samt att säkerställa användarens säkerhet. Metoder. En strukturerad litteraturstudie, semi-strukturerade intervjuer och flera hotanalysmetoder användes för att samla in och utvärdera hoten mot satellitinternet. Litteraturstudien presenterade tidigare forskning och intervjuerna gav några perspektiv från branschen. Resultaten sammanställdes sedan i ett dokument som vi utvärderade i en workshop för att bestämma dess användbarhet och få feedback vi kunde använda för att förbättra det. Resultat. Resultaten visar att satellitinternetsystem kan utsättas för flera attacker, och spårning var ett hot vi upptäckte som inte nämnts i tidigare forskning. I vår exempelriskbedömning fick spårning också den högsta poängen, eftersom det möjliggör för en motståndare att påverka en användares fysiska säkerhet. Slutsatser. Resultaten visar att satellitinternetsystem kan utsättas för flera attacker, och spårning var ett hot vi upptäckte som inte nämnts i tidigare forskning. I vår exempelriskbedömning fick spårning också den högsta poängen, eftersom det möjliggör för en motståndare att påverka en användares fysiska säkerhet.
|
5 |
Managing Supply Chain Disruptions in Nigerian Seaport CompaniesOguche, Henry 01 January 2018 (has links)
In Nigeria, seaport companies have lost significant revenue since 2000 because of supply chain disruptions. If not mitigated, supply chain disruptions at Nigerian seaports will significantly affect organizational output and profitability. The purpose of this research was to explore strategies some seaport business leaders use to mitigate supply chain disruptions in Lagos, Nigeria. Supply chain management theory was the conceptual framework for this single case study. Data were collected using semistructured interviews with 4 participants from a Nigerian seaport company tbat adopted successful strategies to mitigate supply chain disruptions and review of company documents for methodological triangulation. Using thematic analysis, the 5 primary themes were corruption, seaport congestion, bureaucratic bottleneck, equipment failures, and employee disputes. Customer satisfaction and business profitability were 2 primary strategies the business leaders in the study used to mitigate supply chain disruptions. By implementing the strategies identified in the study, business leaders in the Nigerian seaport sector may be able to bring about positive social change by increasing business profitability. The strategies could increase employment opportunities for people in seaport cities, thereby decreasing the poverty level and leading to a better standard of living for residents.
|
6 |
Product-as-a-Service: An accelerator to create an environmentally sustainable closed loop supply chain : (Multiple interview study from a retailer’s perspective)Tamerus, Saskia, Koers, Lisanne, Steffens, Solveigh January 2022 (has links)
Abstract Purpose: The purpose of the research was to define Product-Service-System (PSS) and Product-as-a- Service (PaaS), identify the challenges and match mitigations with them when closing the supply chain from a B2C retailer’s perspective. The following three research questions were defined: RQ1: How are Product-Service-System and Product-as-a-Service defined and related to the environmental sustainability context? RQ2: What are the challenges that B2C-retailers with a Product-as-a-Service model encounter in regard to closing their supply chain loop? RQ3: How can the closed loop supply chain related challenges that B2C-retailers encounter be mitigated to unfold the environmentally sustainable potential of PaaS business models? Methodology: A systematic literature review was used for defining PaaS and PSS with an environmentally sustainable focus. The second part of the research is based on a qualitative research method with the use of an interview study setup where 2 industry experts and 4 PaaS companies from the fashion, furniture, mobility and whitegoods industries were interviewed. The empirical data was collected using six semi-structured interviews over zoom. Findings: Both PSS and PaaS are focused on providing the product with a service. The biggest difference between PSS and PaaS is that the former is seen as a paradigm shift with regards to linear models whereas the latter is seen as a practical business model to transform a linear system. Based on the intended use, PSS and PaaS are both not inherently more sustainable than linear business models. The standardised definition was further used and integrated for the development of the framework which displays the challenges and mitigations of different levels for an environmentally sustainable PaaS model. The final framework displays 25 challenges. To those challenges, 24 mitigations could be connected. Furthermore, there were 16 challenges that had not been cross validated and a total of 19 challenges that could not be matched with any mitigation. Those unmatched challenges show the need for further research in this area. Contributions/value: The contribution that this thesis brings to existing literature is threefold. First, PSS and PaaS are defined and related to environmental sustainability, solving the fragmentation that was caused in prior research. Secondly, the challenges found widen the scope of existing knowledge about PSS and PaaS in a CLSC. Thirdly, mitigation horizons were elaborated on in this research, giving practical handlebars to managers for overcoming challenges in the B2C PaaS field and theoretical insights for matching challenges and mitigations. Additionally, this thesis points out possibilities for future research, with which we hope to motivate other researchers to shed light on under-researched areas. Keywords: Product-as-a-Service (PaaS) - Product-Service-System (PSS) - Servitization - B2C Retailer - Circular Economy - Circular Business Model - Environmental Sustainability - Challenges - Mitigations - Closed Loop Supply Chain
|
7 |
Student Mobility: Former Students’ Perspectives and Mitigation StrategiesRamirez, Sarah J. 28 July 2022 (has links)
No description available.
|
8 |
Smart connected homes : concepts, risks, and challengesBugeja, Joseph January 2018 (has links)
The growth and presence of heterogeneous connected devices inside the home have the potential to provide increased efficiency and quality of life to the residents. Simultaneously, these devices tend to be Internet-connected and continuously monitor, collect, and transmit data about the residents and their daily lifestyle activities. Such data can be of a sensitive nature, such as camera feeds, voice commands, physiological data, and more. This data allows for the implementation of services, personalization support, and benefits offered by smart home technologies. Alas, there has been a rift of security and privacy attacks on connected home devices that compromise the security, safety, and privacy of the occupants. In this thesis, we provide a comprehensive description of the smart connected home ecosystem in terms of its assets, architecture, functionality, and capabilities. Especially, we focus on the data being collected by smart home devices. Such description and organization are necessary as a precursor to perform a rigorous security and privacy analysis of the smart home. Additionally, we seek to identify threat agents, risks, challenges, and propose some mitigation approaches suitable for home environments. Identifying these is core to characterize what is at stake, and to gain insights into what is required to build more robust, resilient, secure, and privacy-preserving smart home systems. Overall, we propose new concepts, models, and methods serving as a foundation for conducting deeper research work in particular linked to smart connected homes. In particular, we propose a taxonomy of devices; classification of data collected by smart connected homes; threat agent model for the smart connected home; and identify challenges, risks, and propose some mitigation approaches. / <p>Note: The papers are not included in the fulltext online.</p>
|
Page generated in 0.0993 seconds