Inicio  /  POWER  /  Vol: 149 Núm: 4 Par: 0 (2005)  /  Artículo
ARTÍCULO
TITULO

OPERATIONS & MAINTENANCE - Thanks for the memories: Capturing expert knowledge - Vital knowledge is disappearing as the workforce ages and exits power plant doors. Learn how to preserve critical tacit knowledge before it''s too late

Resumen

No disponible

 Artículos similares

       
 
Weining Zhang, Minghua Hu, Jianan Yin, Haobin Li and Jinghan Du    
Airspace sectorization is a powerful means to balance the increasing air traffic flow and limited airspace resources, which is related to the efficiency and safety of operations. In order to divide sectors reasonably, a multi-objective optimization frame... ver más
Revista: Aerospace

 
Paraskevas Koukaras, Dimitrios Rousidis and Christos Tjortjis    
The identification and analysis of sentiment polarity in microblog data has drawn increased attention. Researchers and practitioners attempt to extract knowledge by evaluating public sentiment in response to global events. This study aimed to evaluate pu... ver más
Revista: Informatics

 
Chao Liu, Buhong Wang, Zhen Wang, Jiwei Tian, Peng Luo and Yong Yang    
With the development of the air traffic management system (ATM), the cyber threat for ATM is becoming more and more serious. The recognition of ATM cyber threat entities is an important task, which can help ATM security experts quickly and accurately rec... ver más
Revista: Aerospace

 
Alexandr Anatolyevich Olenev, Igor Anatolyevich Kalmykov, Vladimir Petrovich Pashintsev, Nikita Konstantinovich Chistousov, Daniil Vyacheslavovich Dukhovnyj and Natalya Igorevna Kalmykova    
Low-orbit satellite internet (LOSI) expands the scope of the Industrial Internet of Things (IIoT) in the oil and gas industry (OGI) to include areas of the Far North. However, due to the large length of the communication channel, the number of threats an... ver más
Revista: Information

 
Almetwally M. Mostafa, Alaa Altheneyan, Abeer Alnuaim and Aseel Alhadlaq    
A computer system generates logs to record all relevant operational data about the system and all operations performed in such systems. System log examination is crucial in the identification of network- and system-level assaults. In comparison to establ... ver más
Revista: Applied Sciences