173,872 research outputs found

    Brandteknisk riskvärdering, Akademiska Barnsjukhuset I Uppsala

    Get PDF
    This report is a fire safety evaluation of Uppsala University Children’s hospital which is the largest part of the course Fire safety evaluation VBR054 at Lund University. The report is focused on identifying the current risks. This was accomplished by using various computer programs, experiments and hand calculations. Different measures were developed in order to minimize the risks

    Integrated scalar and vector method for fire risk assessment of lifecycle construction

    Get PDF
    Los incendios son uno de los principales riesgos en el ámbito constructivo. Consecuencias como pérdidas materiales, interrupción de actividad o daños personales hacen que la evaluación del riesgo de incendio y el conocimiento del comportamiento de la construcción ante el fuego sean imprescindibles a la hora de disminuir la probabilidad de ocurrencia, prevenir efectos y minimizar consecuencias. Actualmente existen un conjunto de métodos convencionales (escalares) que cuantifican el nivel de riesgo y aportan diferentes medidas de protección. Además se encuentran en desarrollo métodos (vectoriales) de Modelado y Simulación Computacional que aportan información multidimensional. El presente trabajo establece un modelo para la integración de métodos escalares y vectoriales para conocer el desarrollo y evolución del incendio junto al nivel de riesgo no solo en la etapa de diseño de la instalación, sino en su ciclo de vida facilitando las tareas de ingenieros de proyectos y técnicos de prevención de riesgos laborales.Fire is one the main risks in the construction sector. Consequences as material losses, stoppage and possible personal damages cause the fire risk assessment and knowledge of building behaviour in fire situation are essential to prevent and minimize the consequences. Currently there are sets of conventional scalar methods that quantify the risk level and provide different protection standards. At the same time, procedures for Modelling and Computer Simulation of Fire based on vector methods are under development, which provide multidimensional information about the fire. The aim of this work is to establish an integration model of design and assessment with scalar and vector technics for increase the knowledge about the fire risk (both development and evolution processes), supply full information on the development of fire in all lifecycle stage’s installation. This model will support the task of Project Manager and Experts in prevention of occupational Risks

    After the Fire is Out

    Get PDF
    Even before firefighters have left a burn site, a second wave of specialists is deployed. Their task: to assess the burn site; determine the level of risk to life, property, and ecological resources; and determine quickly the most effective postfire treatments for emergency stabilization and initial rehabilitation of the site. For the past 13 years, the Joint Fire Science Program (JFSP) has funded research on this critical phase of work, which often goes unnoticed after the fire is out. With support from the JFSP, scientists have made great strides in improving the tools available to assess postfire risks and evaluate the effects of available treatments, such as erosion barriers and postfire seeding. The suite of tools includes syntheses that recap the latest research findings and improved computer models to facilitate assessment of risks and threats after wildfires. These tools can help managers choose the best treatments to implement postfire stabilization and rehabilitation. This digest presents a synopsis that will help postfire team specialists and land resource managers respond with confidence to the aftermath of wildfire

    After the Fire is Out

    Get PDF
    Even before firefighters have left a burn site, a second wave of specialists is deployed. Their task: to assess the burn site; determine the level of risk to life, property, and ecological resources; and determine quickly the most effective postfire treatments for emergency stabilization and initial rehabilitation of the site. For the past 13 years, the Joint Fire Science Program (JFSP) has funded research on this critical phase of work, which often goes unnoticed after the fire is out. With support from the JFSP, scientists have made great strides in improving the tools available to assess postfire risks and evaluate the effects of available treatments, such as erosion barriers and postfire seeding. The suite of tools includes syntheses that recap the latest research findings and improved computer models to facilitate assessment of risks and threats after wildfires. These tools can help managers choose the best treatments to implement postfire stabilization and rehabilitation. This digest presents a synopsis that will help postfire team specialists and land resource managers respond with confidence to the aftermath of wildfire

    Interdependent Security: The Case of Identical Agents

    Get PDF
    Do firms have adequate incentives to invest in anti-terrorism mechanisms? This paper develops a framework for addressing this issue when the security choices by one agent affect the risks faced by others. We utilize the airline security problem to illustrate how the incentive by one airline to invest in baggage checking is affected by the decisions made by others. Specifically if an airline believes that others will not invest in security systems it has much less economic incentive to do so on its own. Private sector mechanisms such as insurance and liability will not necessarily lead to an efficient outcome. To induce adoption of security measures one must turn to regulation, taxation or institutional coordinating mechanisms such as industry associations. We compare the airline security example with problems having a similar structure (i.e., computer security and fire protection) as well as those with different structures (i.e., theft protection and vaccinations). The paper concludes with suggestions for future research.

    Is the responsibilization of the cyber security risk reasonable and judicious?

    Get PDF
    Cyber criminals appear to be plying their trade without much hindrance. Home computer users are particularly vulnerable to attack by an increasingly sophisticated and globally dispersed hacker group. The smartphone era has exacerbated the situation, offering hackers even more attack surfaces to exploit. It might not be entirely coincidental that cyber crime has mushroomed in parallel with governments pursuing a neoliberalist agenda. This agenda has a strong drive towards individualizing risk i.e. advising citizens how to take care of themselves, and then leaving them to face the consequences if they choose not to follow the advice. In effect, citizens are “responsibilized .” Whereas responsibilization is effective for some risks, the responsibilization of cyber security is, we believe, contributing to the global success of cyber attacks. There is, consequently, a case to be made for governments taking a more active role than the mere provision of advice, which is the case in many countries. We conclude with a concrete proposal for a risk regulation regime that would more effectively mitigate and ameliorate cyber risk

    Survey and brain storming studies about machines, constructions, human and environmental risk consideration in the careers of the Universidad Politécnica of Madrid

    Get PDF
    The Universidad Politécnica of Madrid (UPM) includes schools and faculties that were for engineering degrees, architecture and computer science, that are now in a quick EEES Bolonia Plan metamorphosis getting into degrees, masters and doctorate structures. They are focused towards action in machines, constructions, enterprises, that are subjected to machines, human and environment created risks. These are present in actions such as use loads, wind, snow, waves, flows, earthquakes, forces and effects in machines, vehicles behavior, chemical effects, and other environmental factors including effects of crops, cattle and beasts, forests, and varied essential economic and social disturbances. Emphasis is for authors in this session more about risks of natural origin, such as for hail, winds, snow or waves that are not exactly known a priori, but that are often considered with statistical expected distributions giving extreme values for convenient return periods. These distributions are known from measures in time, statistic of extremes and models about hazard scenarios and about responses of man made constructions or devices. In each engineering field theories were built about hazards scenarios and how to cover for important risks. Engineers must get that the systems they handle, such as vehicles, machines, firms or agro lands or forests, obtain production with enough safety for persons and with decent economic results in spite of risks. For that risks must be considered in planning, in realization and in operation, and safety margins must be taken but at a reasonable cost. That is a small level of risks will often remain, due to limitations in costs or because of due to strange hazards, and maybe they will be covered by insurance in cases such as in transport with cars, ships or aircrafts, in agro for hail, or for fire in houses or in forests. These and other decisions about quality, security for men or about business financial risks are sometimes considered with Decision Theories models, using often tools from Statistics or operational Research. The authors have done and are following field surveys about risk consideration in the careers in UPM, making deep analysis of curricula taking into account the new structures of degrees in the EEES Bolonia Plan, and they have considered the risk structures offered by diverse schools of Decision theories. That gives an aspect of the needs and uses, and recommendations about improving in the teaching about risk, that may include special subjects especially oriented for each career, school or faculty, so as to be recommended to be included into the curricula, including an elaboration and presentation format using a multi-criteria decision model

    The Implementation of Hiradc Method in Computer Laboratory

    Get PDF
    The computer laboratory of the Faculty of Public Health, Universitas Airlangga is used as a research site, measurement or scientific training for about 15,000 students. There are various types of activities which are at high risk, especially in the use of electricity, which can cause short-circuit and leads to fire. The objective of this study was to apply the Hazard Identification, Risk Assessment and Determining Control (HIRADC) methods in the computer laboratory as an effort to prevent occupational accidents and illness of the user. This study was an observational research using cross sectional design. The observation was conducted on the source of hazard and control efforts on the computer laboratory. Interview was conducted on the lecturers and administrative staff who are in charge of the computer laboratory. The results of the hazard identification indicated that there were 17 hazard sources that can cause 18 risks. Based on the risk assessment conducted on a activities practicum, there are 18 risks classified into 2 risk levels, those are 3 risks with moderate risk level and 15 risks with low risk level. The three level of moderate risks include taking off the shoes in standing position which can cause sprains, there is no first aid box and using electric current which can cause short circuit, electric shock and fire risk. The control that can be carried out by management laboratory to reduce the three moderate risk are by giving advice to taking off the shoes in sitting position, covering the socket which has risky placement by using duct tape to avoid the risk of electric shock as well as the provision of a light fire extinguisher for fire risk and the last providing first aid kits to treat the accidents that occur in the laboratory as soon as possible
    corecore