Loading…
State-based modelling in hazard identification
The signed directed graph (SDG) is the most commonly used type of model for automated hazard identification in chemical plants. Although SDG models are efficient in simulating the plant, they have some weaknesses, which are discussed here in relation to typical process industry examples. Ways to tac...
Saved in:
Main Authors: | Stephen A. McCoy, Dingfeng Zhou, Paul Chung |
---|---|
Format: | Default Article |
Published: |
2006
|
Subjects: | |
Online Access: | https://hdl.handle.net/2134/2337 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Loading…
An automated system for batch hazard and operability studies
by: Claire Palmer, et al.
Published: (2009)
by: Claire Palmer, et al.
Published: (2009)
Loading…
Computer-aided hazard identification of batch operations
by: Claire Palmer
Published: (2022)
by: Claire Palmer
Published: (2022)
Loading…
Combining qualitative and quantitative reasoning to support hazard identification by computer
by: Stephen A. McCoy
Published: (1999)
by: Stephen A. McCoy
Published: (1999)
Loading…
Articulated pose identification with sparse point features
by: Baihua Li, et al.
Published: (2004)
by: Baihua Li, et al.
Published: (2004)
Loading…
A heuristic distributed task allocation method for multivehicle multitask problems and its application to search and rescue scenario
by: Wanqing Zhao, et al.
Published: (2015)
by: Wanqing Zhao, et al.
Published: (2015)
Loading…
Representations of commonsense knowledge / Ernest Davis.
by: Davis, Ernest
Published: (1990)
by: Davis, Ernest
Published: (1990)
Loading…
Cyber-physical system security for networked industrial processes
by: Shuang Huang, et al.
Published: (2015)
by: Shuang Huang, et al.
Published: (2015)
Loading…
Hazards in advising autonomy: incorporating hazard modelling with system dynamics into the aerospace safety assessment process for UAS
by: C.G. Downes, et al.
Published: (2011)
by: C.G. Downes, et al.
Published: (2011)
Loading…
The negotiation game
by: Syeda Fatima, et al.
Published: (2014)
by: Syeda Fatima, et al.
Published: (2014)
Loading…
Sequential auctions for common value objects with budget constrained bidders
by: Syeda Fatima, et al.
Published: (2010)
by: Syeda Fatima, et al.
Published: (2010)
Loading…
Multiexposure and multifocus image fusion with multidimensional camera shake compensation
by: Alexis Lluis Gomez, et al.
Published: (2013)
by: Alexis Lluis Gomez, et al.
Published: (2013)
Loading…
Human object annotation for surveillance video forensics
by: Fraz Fraz, et al.
Published: (2013)
by: Fraz Fraz, et al.
Published: (2013)
Loading…
Eye movements of large populations: I implementation and performance of an autonomous public eye tracker
by: David S. Wooding, et al.
Published: (2002)
by: David S. Wooding, et al.
Published: (2002)
Loading…
Correction to: Leveraging cloud computing for the semantic web: review and trends
by: Oluwasegun Adedugbe, et al.
Published: (2020)
by: Oluwasegun Adedugbe, et al.
Published: (2020)
Loading…
A multi-domain ontology on healthy ageing for the characterization of older adults status and behaviour
by: Alfonso Mastropietro, et al.
Published: (2021)
by: Alfonso Mastropietro, et al.
Published: (2021)
Loading…
TAGA: Tabu Asexual Genetic Algorithm embedded in a filter/filter feature selection approach for high-dimensional data
by: Sadegh Salesi, et al.
Published: (2021)
by: Sadegh Salesi, et al.
Published: (2021)
Loading…
Addressing robustness in time-critical, distributed, task allocation algorithms
by: Amanda Whitbrook, et al.
Published: (2018)
by: Amanda Whitbrook, et al.
Published: (2018)
Loading…
Intelligent computational techniques and virtual environment for understanding cerebral visual impairment patients
by: Yahya Q.I. Al-Fadhili
Published: (2018)
by: Yahya Q.I. Al-Fadhili
Published: (2018)
Loading…
Compact and fast underwater segmentation network for autonomous underwater vehicles
by: Jiangtao Wang, et al.
Published: (2021)
by: Jiangtao Wang, et al.
Published: (2021)
Loading…
Power shrinkage—curvelet domain image denoising using a new scale-dependent shrinkage function
by: Oussama Kadri, et al.
Published: (2019)
by: Oussama Kadri, et al.
Published: (2019)
Loading…
A perceptually validated model for surface depth hallucination
by: Mashhuda Glencross, et al.
Published: (2008)
by: Mashhuda Glencross, et al.
Published: (2008)
Loading…
Matlab code: From Modulated Hebbian Plasticity to Simple Behavior Learning through Noise and Weight Saturation
by: Andrea Soltoggio
Published: (2017)
by: Andrea Soltoggio
Published: (2017)
Loading…
On the isometries between Z(pk) and Zpk
by: Ana Salagean
Published: (1999)
by: Ana Salagean
Published: (1999)
Loading…
Mean shift based gradient vector flow for image segmentation
by: Huiyu Zhou, et al.
Published: (2013)
by: Huiyu Zhou, et al.
Published: (2013)
Loading…
Unmanned aerial vehicle-based hazardous materials response: Information-theoretic hazardous source search and reconstruction
by: Michael Hutchinson, et al.
Published: (2019)
by: Michael Hutchinson, et al.
Published: (2019)
Loading…
Computing optimal coalition structures in polynomial time
by: Syeda Fatima, et al.
Published: (2018)
by: Syeda Fatima, et al.
Published: (2018)
Loading…
Majority bargaining for resource division
by: Syeda Fatima, et al.
Published: (2016)
by: Syeda Fatima, et al.
Published: (2016)
Loading…
Neural correlates of cognitive load while playing an emergency simulation game: a functional near-infrared spectroscopy (fNIRS) study
by: Natalia Sevcenko, et al.
Published: (2022)
by: Natalia Sevcenko, et al.
Published: (2022)
Loading…
Opening up the culture black box in community technology design
by: Amalia Sabiescu, et al.
Published: (2019)
by: Amalia Sabiescu, et al.
Published: (2019)
Loading…
“Born digital” shedding light into the darkness of digital culture
by: Larry Stapleton, et al.
Published: (2022)
by: Larry Stapleton, et al.
Published: (2022)
Loading…
A differential privacy mechanism that accounts for network effects for crowdsourcing systems
by: Y Luo, et al.
Published: (2020)
by: Y Luo, et al.
Published: (2020)
Loading…
Distributed multi-robot source term estimation with coverage control and information theoretic based coordination
by: Rohit Nanavati, et al.
Published: (2024)
by: Rohit Nanavati, et al.
Published: (2024)
Loading…
CrossBind: Collaborative cross-modal identification of protein nucleic-acid-binding residues
by: Linglin Jing, et al.
Published: (2024)
by: Linglin Jing, et al.
Published: (2024)
Loading…
Cross-task and cross-participant classification of cognitive load in an emergency simulation game
by: Tobias Appel, et al.
Published: (2021)
by: Tobias Appel, et al.
Published: (2021)
Loading…
Tracking human pose with multiple activity models
by: John Darby, et al.
Published: (2010)
by: John Darby, et al.
Published: (2010)
Loading…
Perceptually validated cross-renderer analytical BRDF parameter remapping
by: Dar'ya Guarnera, et al.
Published: (2018)
by: Dar'ya Guarnera, et al.
Published: (2018)
Loading…
Estimating skeletal muscle fascicle curvature from B-mode ultrasound image sequences
by: John Darby, et al.
Published: (2013)
by: John Darby, et al.
Published: (2013)
Loading…
Zerotree-based stereoscopic video CODEC
by: S. Thanapirom, et al.
Published: (2005)
by: S. Thanapirom, et al.
Published: (2005)
Loading…
On solving word equations using SAT
by: Joel Day, et al.
Published: (2019)
by: Joel Day, et al.
Published: (2019)
Loading…
k-spectra of weakly-c-balanced words
by: Joel Day, et al.
Published: (2019)
by: Joel Day, et al.
Published: (2019)
Similar Items
-
An automated system for batch hazard and operability studies
by: Claire Palmer, et al.
Published: (2009) -
Computer-aided hazard identification of batch operations
by: Claire Palmer
Published: (2022) -
Combining qualitative and quantitative reasoning to support hazard identification by computer
by: Stephen A. McCoy
Published: (1999) -
Articulated pose identification with sparse point features
by: Baihua Li, et al.
Published: (2004) -
A heuristic distributed task allocation method for multivehicle multitask problems and its application to search and rescue scenario
by: Wanqing Zhao, et al.
Published: (2015)