• Title/Summary/Keyword: Risk Analysis Model

Search Result 2,663, Processing Time 0.041 seconds

The Explicit Treatment of Model Uncertainties in the Presence of Aleatory and Epistemic Parameter Uncertainties in Risk and Reliability Analysis

  • Ahn, Kwang-ll;Yang, Joon-Eon
    • Nuclear Engineering and Technology
    • /
    • v.35 no.1
    • /
    • pp.64-79
    • /
    • 2003
  • In the risk and reliability analysis of complex technological systems, the primary concern of formal uncertainty analysis is to understand why uncertainties arise, and to evaluate how they impact the results of the analysis. In recent times, many of the uncertainty analyses have focused on parameters of the risk and reliability analysis models, whose values are uncertain in an aleatory or an epistemic way. As the field of parametric uncertainty analysis matures, however, more attention is being paid to the explicit treatment of uncertainties that are addressed in the predictive model itself as well as the accuracy of the predictive model. The essential steps for evaluating impacts of these model uncertainties in the presence of parameter uncertainties are to determine rigorously various sources of uncertainties to be addressed in an underlying model itself and in turn model parameters, based on our state-of-knowledge and relevant evidence. Answering clearly the question of how to characterize and treat explicitly the forgoing different sources of uncertainty is particularly important for practical aspects such as risk and reliability optimization of systems as well as more transparent risk information and decision-making under various uncertainties. The main purpose of this paper is to provide practical guidance for quantitatively treating various model uncertainties that would often be encountered in the risk and reliability modeling process of complex technological systems.

A Risk Analysis Model Using VERT for R & D Project Management (R & D 프로젝트의 위험분석모형의 연구)

  • 황홍석
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.20 no.1
    • /
    • pp.85-99
    • /
    • 1995
  • Increasingly, risk analysis is becoming important ingredients in achieving the successful implementation and application in the area of the project management. The project management system is designed to manage or control the project resources on a given activity within time, cost and performance so called TPPM (Total Productive Project Management). In this research, a risk analysis model misproposed to identify potential problem areas, quantify the risks, and generated the chice of the action that can be taken to reduce the risk. In addition two analysis models are proposed : 1) risk factor model and 2) network simulation model using VERT (Venture Evaluation and Review Technique ). The objective of the remodels is to estimate the schedule, cost performance risks. These proposed quantitative models for project risk analysis are proving its value for the project managers who need to assess the risk of changes in cost, schedule, or performance. The proposed models will be used in the area of project selection, evaluation and the allocation of project resources.

  • PDF

Understanding Relationships Among Risk Factors in Container Port Operation UsingBayesian Network

  • Tsenskhuu Nyamjav;Min-Ho Ha
    • Journal of Navigation and Port Research
    • /
    • v.47 no.2
    • /
    • pp.93-99
    • /
    • 2023
  • This study aimed to determine relationships among risk factors influencing container port operation using Bayesian network. Risk factors identified from prior studies were classified into five groups: human error, machinery error, environmental risk, security risk, and natural disasters. P anel experts discussed identified risk factors to fulfil conditional probability tables of the interdependence model. The interdependence model was also validated by sensitivity analysis and provided an interrelation of factors influencing the direction of each other. Results of the interdependence model were partially in line with results from prior studies while practices in the global port industry confirmed interrelationships of risk factors. In addition, the relationship between top-ranked risk factors can provide a schematic drawing of the model. Accordingly, results of this study can expand the prior research in the Korean port industry, which may help port authorities improve risk management and reduce losses from the risk.

An Individual Risk Model and Its Uncertainty Distribution

  • Li, Ren
    • Industrial Engineering and Management Systems
    • /
    • v.12 no.1
    • /
    • pp.46-50
    • /
    • 2013
  • In insurance statistics, the sum of homogeneous insurance is often needed. The sum is called individual risk model which is a fundamental model in risk analysis for insurance. This paper first presents an individual risk model based on the uncertainty theory. Then its uncertainty distribution is provided. Finally, its arithmetic is shown by a numerical example.

Windborne debris risk analysis - Part I. Introduction and methodology

  • Lin, Ning;Vanmarcke, Erik
    • Wind and Structures
    • /
    • v.13 no.2
    • /
    • pp.191-206
    • /
    • 2010
  • Windborne debris is a major cause of structural damage during severe windstorms and hurricanes owing to its direct impact on building envelopes as well as to the 'chain reaction' failure mechanism it induces by interacting with wind pressure damage. Estimation of debris risk is an important component in evaluating wind damage risk to residential developments. A debris risk model developed by the authors enables one to analytically aggregate damage threats to a building from different types of debris originating from neighboring buildings. This model is extended herein to a general debris risk analysis methodology that is then incorporated into a vulnerability model accounting for the temporal evolution of the interaction between pressure damage and debris damage during storm passage. The current paper (Part I) introduces the debris risk analysis methodology, establishing the mathematical modeling framework. Stochastic models are proposed to estimate the probability distributions of debris trajectory parameters used in the method. It is shown that model statistics can be estimated from available information from wind-tunnel experiments and post-damage surveys. The incorporation of the methodology into vulnerability modeling is described in Part II.

Evaluation of Overtopping Risks of Levee by using Reliability Analysis (신뢰성 해석에 의한 제방의 월류 위험도 산정)

  • Lee, Cheol-Eung;Park, Dong-Heon;Shim, Jae-Wook
    • Journal of Industrial Technology
    • /
    • v.29 no.A
    • /
    • pp.101-110
    • /
    • 2009
  • Due to frequent occurrence of a localized torrential downpour caused by global warming and change of outflow tendency caused by rapid urbanization and industrialization, risk analysis must be carried out in levee design with uncertainty. In this study, reliability analysis was introduced to quantitatively evaluate the overtopping risk of levee by the uncertainty. First of all, breaking function was established as a function of flood stage and height of levee. All variables of breaking function were considered as random variables following any distribution functions, and the risk was defined as the possibility that the flood stage is formed higher than height of levee. The risk evaluation model was developed with AFDA (Approximate Full Distribution Approach). The flood stage computed by 2-D numerical model FESWMS-2DH was used as input data for the model of levee risk evaluation. Risk for levee submergence were quantitatively presented for levee of Wol-Song-Cheon.

  • PDF

Development of the Risk Assessment Model for Railway Level-Crossing Accidents by Using The ETA and FTA (ETA 및 FTA를 이용한 철도 건널목사고 위험도 평가 모델 개발에 대한 연구)

  • Kim, Min-Su;Wang, Jong-Bae;Park, Chan-Woo;Cho, Yeon-Ok
    • Journal of the Korean Society for Railway
    • /
    • v.12 no.6
    • /
    • pp.936-943
    • /
    • 2009
  • In this study, a risk assessment model based on the ETA (Event Tree Analysis) and FTA (Fault Tree Analysis) is developed according to the procedure of hazard analysis and risk assessment in order to estimate the risk quantitatively. The FTA technique is applied to estimate the branch probability (frequency) and the ETA technique is applied to estimate the consequence for each branch path on the ET (Event Tree). A risk assessment model is developed by the combination of those ETA and FTA. In addition, the reliability and the validity of the risk assessment model are verified by comparing the risk estimated through the developed model with the actual equivalent fatality.

A Study on Cost Risk Estimation applying Joint Cost-Schedule Probability Distribution Model (비용과 일정의 결합확률 분포를 적용한 위험비용추정에 관한 연구)

  • Kim, Dong-Kyu;Kang, Sung-Jin;Han, Gyu-Sik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.5
    • /
    • pp.850-858
    • /
    • 2011
  • The risk analysis plays an important role in weapon system acquisition project due to uncertainties in the acquisition process. But in domestic, studies on risk analysis are insufficient and risk cost is not included in acquisition budget in policy. Therefore, in this study, we suggest a method that measures risk or success probability of project using the stochastic model. In particular, in order to calculate the success probability, we apply the joint probability distribution model of cost and schedule that are critical factors influencing the project risk. And also we verify the applicability of this model in Korean defence industry environment through case studies.

A Risk Management Model for Efficient Domestic Information Technology Security (효율적 국내 정보기술 보안을 위한 위험관리 모형)

  • Ahn, Choon-soo;Cho, Sung-Ku
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.28 no.1
    • /
    • pp.44-56
    • /
    • 2002
  • For the risk analysis and risk assessment techniques to be effectively applied to the field of information technology (IT) security, it is necessary that the required activities and specific techniques to be applied and their order of applications are to be determined through a proper risk management model. If the adopted risk management model does not match with the characteristics of host organization, an inefficient management of security would be resulted. In this paper, a risk management model which can be well adapted to Korean domestic IT environments is proposed for an efficient security management of IT. The structure and flow of the existing IT-related risk management models are compared and analysed, and their common and/or strong characteristics are extracted and incorporated in the proposed model in the light of typical threat types observed in Korean IT environments.

A Research on Information Security Risk-based Antecedents Influencing Electronic Commerce User's Trust (전자상거래 사용자의 신뢰에 영향을 미치는 정보보안위험 기반의 선행요인 연구)

  • Kim, Jong-Ki;Lee, Dong-Ho
    • Asia pacific journal of information systems
    • /
    • v.15 no.2
    • /
    • pp.65-96
    • /
    • 2005
  • It is generally believed that, compared to traditional commerce, Electronic Commerce(EC) is more difficult to gain and sustain customers. One of the major reasons that customers do not use EC is lack of trust. Previous researches on the EC user's trust suggested that risk is an antecedent of trust and the concept of trust is highly related to risk. This study proposed a combined model in which includes the factors based on generic information security risk analysis methodology and trust factors in EC. The objectives of this study are follows; first, investigating the relationship between trust and risk that are antecedent factors of purchase intention, and second, examining the validity of information security risk analysis approach in EC environment. Based on the survey results of 143 MBA students statistical analysis showed that factors like threats and controls were significantly related to risk, but assets did not have statistically significant relationship with risk. Controls and knowledge of EC had meaningful effect on user's trust. This study found that risk analysis methodology which is generally used at organizational level is practically useful at user level on EC environment. In conclusion, the results of this study would be applied to generic situation of information security for analyzing and managing the risk. Besides, this study emphasized that EC vendors need to pay more attention to the information security risk to gain customer's trust.