On the Safety of Fixed Offshore Structures, Failure Paths and Barriers

Author(s):  
Gerhard Ersdal

In order to ensure the safety of an offshore structure it is important to identify and maintain the barriers preventing hazardous events. Also, when monitoring the safety, the monitoring should be regarding how well these barriers are functioning, and utilise these to reassess the safety of the structure over time. The purpose of this paper is to apply a well-known method in risk assessment, Haddon’s energy and barrier model, to a new area; structural safety. The purposes of this exercise are to look at the structural safety from a risk assessment point of view, and to use this to identify and give an overview of the existing barriers. Furthermore, the purposes are to evaluate the efficiency and redundancy of these barriers, and to use this to evaluate the safety of offshore structures. This paper will analyse the safety of a fixed offshore structure through a qualitative approach. A possible event chart for a fixed offshore installation during operation in storms is established and analysed. Some of the root causes for potential structural failure are identified. These root-causes are kept on a general level, but considered in more detail than often seen in risk analysis. Hazards that are normally included in risk analysis, like boat collisions, fire, explosions, and dropped objects are not evaluated. Hazards that are evaluated are structural failure due to wave loading, fatigue damage, aging, and gross errors in design, fabrication, installation and operation. In order to identify the barriers (hazard reduction strategies, physical barriers and vulnerable target protection strategies), the different failure paths in the event chart are then analysed using Haddon’s ten preventive strategies for reducing damage from hazards. As an example a fixed offshore steel structure is used. A list of proposed barriers that influence the safety of such a fixed offshore installation are presented, and methods to measure these barriers are discussed.

2012 ◽  
Vol 538-541 ◽  
pp. 580-585
Author(s):  
Luis Horacio Martínez-Mártinez ◽  
Gustavo Mendoza-Chavez ◽  
David Joaquin Delgado-Hernandez ◽  
David De León Escobedo ◽  
Elia Mercedes Alonso Guzmán ◽  
...  

One of the responsibilities of a Civil Engineer is to make decisions regarding preservation of infrastructure; therefore, there have been established concepts such as risk and risk analysis. Risk analysis, is a methodology applied to determine and evaluate the risk magnitude. From the structural engineering point of view, it is required that any structure become secure, this means that the capacity to withstand external actions (strength) will be higher than these actions (loads). In order to determine the structural safety, it is required to define the failure of the structure that it is not strongly related with the collapse of the structure; the failure criteria needs to be fixed depending on the use of the building and the consequences associated with the interruption of services provided by the facility. The failure then, is calculated by means of a limit state function in where it is established the failure criteria; failure is reached when a specific condition (strength) is surpassed by the actions over the structure. The present work aims to propose a preliminary Finite Element Model (FEM) that represents a pier used as support for vehicular bridges. This FEM is required for the assessment of mechanical behavior of the structure that will be used for the determination of the limit state function needed for risk assessment. Most of the simulations with FEM presented in literature are very used for modeling of masonry walls, but it is not usual to model structures such as bridge piers.


2020 ◽  
Vol 55 (3) ◽  
Author(s):  
M. Di Nardo ◽  
M. Madonna ◽  
Mosè Gallo ◽  
Teresa Murino

The issues about legislation of safety management, as well as main techniques of "risk analysis and evaluation", are widely integrated in complex production environment. From an organizational and technological point of view, it’s not easy to implement these techniques in Small and Medium Enterprises. In fact, each technique does not permit a complete and exhaustive analysis and quantification of risks. Application of aforementioned methods does allow for achievement of a wide number of benefits. The aim of this paper is to critically analyse both analysis and risk assessment processes. In this paper, integration between System Dynamics and Layers of Protection Analysis technique is provided in order to enhance results of risk management. System Dynamics shows to be very effective in evaluating interaction effect of different incidental scenarios properly identified through risk analysis technique used. System Dynamics modelling permits simulation through changes in time and feedback mechanism. This approach has been validated via testing in a plastic molding plant with a scenario of risk of a massive fire.


Author(s):  
Jacek BINDA

Money is a widely accepted commodity allowing to determine the economic value of purchased goods and services and to make payments. Over the centuries, "money" has been constantly evolving. In recent times, following dynamic development of various forms of e-business, dematerialized money has emerged. However, in constantly changing conditions it is very difficult to grasp the essence of the so called e-money or cryptocurrencies. The paper tries to define Bitcoin, one of the most recognizable cryptocurrencies, and answer the question whether investing in cryptocurrencies is a serious business or a mere gambling. In search for the answers, the author reviews literature on the topic and conducts his own risk analysis based on Value at Risk measure, of selected traditional currencies and Bitcoin. The results of the analysis unambiguously show that investments in Bitcoin are burdened with definitely much higher risk. Furthermore, conclusions of the considerations clearly show that despite growing popularity of cryptocurrencies they do not fulfill the definition of both electronic money or money in general. The paper attempts to discuss selected issues related to Bitcoin cryptocurrencies from the monetary point of view but also with respect to restrictions of Bitcoin as a means of payment, investments in Bitcoin and risk assessment.


2014 ◽  
Vol 891-892 ◽  
pp. 1047-1052
Author(s):  
Ribelito F. Torregosa ◽  
Wei Ping Hu

This paper illustrates a technique that may be used to evaluate the risk of structural failure of each aircraft in a fleet when a crack has been detected in a particular member aircraft, or the risk of failure for that member has become too high. When a crack is detected, the calculated risk of failure for other aircraft in the fleet will increase significantly, and the aircraft operators need to decide which aircraft should be temporarily grounded for unscheduled inspection and which ones be allowed to fly. The proposed method applies the Bayesian inference to update the risk assessment by updating the equivalent initial flaw size distribution, which is one of the key inputs for risk analysis. To illustrate the method, a hypothetical fleet aircraft is considered and the single flight probability of failure of each aircraft in the fleet is revised after the occurrence of a failure in one fleet aircraft.


Author(s):  
Tianyu Wu ◽  
Wenliang Qiu

Sea ice crashing against offshore structures can cause strong ice-induced vibration and have a major impact on offshore structural safety and serviceability. This paper describes a numerical method for the prediction of ice-induced vibration when a vertical offshore structure is subjected to the impact of sea ice. In this approach, negative damping theory and fracture length theory are combined and, along with ice strength-stress rate curve and ice failure length, are coupled to model the internal fluctuating nature of ice load. Considering the elastic deformation of ice and the effect of non-simultaneous crushing failure of local contact between ice and structures, the present ice-induced vibration model is established, and the general features of the interaction process are captured. To verify its efficacy, the presented simulation methodology is subjected to a model test and two full-scale measurements based on referenced studies. Example calculations show good agreement with the results of the model test and full-scale measurements, which directly indicates the validity of the proposed simulation method. In addition, the numerical simulation method can be used in connection with FE programs to perform ice-induced vibration analysis of offshore structures.


2008 ◽  
Vol 35 (12) ◽  
pp. 1446-1454 ◽  
Author(s):  
M. Hossin ◽  
H. Marzouk

The main focus of this investigation is directed toward the examination of crack-spacing expressions suitable for offshore concrete structure applications. Offshore structures are unique structures that are constantly exposed to harsh environmental conditions, including exposure to seawater and sea spray. The splash zone of an offshore structure is the section of the platform that is the most exposed to both a harsh marine environment and seawater. The design of offshore structures is controlled by mandatory design codes to ensure structural safety and integrity. Most of the available expressions for crack spacing were developed for building structures using normal-strength concrete and normal concrete cover. However, offshore structures are built using high-strength concrete with a thick concrete cover. Very little information is published on the crack analysis of high-strength concrete with a thick concrete cover for offshore applications. An experimental testing program was designed to examine the effects of concrete cover and the bar spacing of normal- and high-strength concrete on crack spacing. The different code expressions are evaluated with respect to the experimental results.


Author(s):  
Devi Pratami

A project always has risks that can lead to project failure. In the project, a risk analysis is required to provide an evaluation for the project to proceed as planned. In the event of inadequate planning and ineffective control, it will result in irregularities identified as a risk to the project. This study aims to analyze the qualitative risk on Fiber Optic Installaion project in Sukabumi, West Java, Indonesia. In addition, risk assessment is undertaken on project implementation. Assessment of risk using the impact and probability to measure the impact of risk occurrence. The impacts are more detailed by classified by time impact, cost impact, quality impact, safety and security impact, proximity. The result is there are 36 risk that may occur and mostly risks are associaated by quality and safety&security impact.


2020 ◽  
Vol 2020 (8) ◽  
pp. 47-52
Author(s):  
Nataliya Kuznetsova ◽  
Tatyana Karlova ◽  
Aleksandr Bekmeshov

The work purpose consists in the efficiency increase of automated system operation for industrial enterprise resource protection at the expense of the optimization of authentication method application, in particular, biometric one. To achieve the purpose it is necessary to solve the problem of efficient joint use of modern authentication methods, particularly, a static and dynamic biometric authentication. But biometric methods are most expensive from the point of view of their realization. In this connection, within the limits of the paper there is carried out the analysis of modern methods of biological authentication from the point of view of a special order of introduction and joint use. In the paper there is shown a classification of static and dynamic methods for biometric authentication, an example of method combination in the authentication module is presented, there are considered and analyzed the latest methods, in particular, those based on DNA investigations, thermograms of a face and hands (static), gestures (dynamic). The work novelty consists in the presented diagram of authentication module operation. As a conclusion it should be noted that modern authentication systems offer the application of a complex approach: use both biometric methods and other ones for authentication in modules, in particular, based on secret knowledge and material carrier possession. The approach mentioned will allow minimizing the errors of the first and the second kinds, increasing a general level of safety.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2018 ◽  
Vol 180 ◽  
pp. 05006
Author(s):  
Zofia Wróbel

The valuation of the risk of losses makes easy the correct estimation of resulted threats as a result of atmospheric discharges and harms connected to them. Qualifying the need of lightning protection use for the object, we ought to take into account the risk R for the object and for the public services devices. In every case of examining risks we ought to fulfill: the identification of components RX forming the risk, counting the identified components of the risk RX, the entire risk R, identify the tolerated risk RT and compare the risk R with the tolerated value RT. As a result of such analysis we can come to a decision about the use of protection resources. In the report was realized the risk analysis of devices damages for a chosen object - the signal box with installed station - relaying devices of the railway traffic controlling with a computer adjustable control panel. From the realized analysis results that DEHN Risk Tool is a useful tool for the risk analysis of lightning losses in buildings, making possible the improvement of the calculations process, especially in the range of the choice of proper protection resources.


Sign in / Sign up

Export Citation Format

Share Document