Towards Process Safety 4.0 in the Factory of the Future

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The rapid development of new technologies in the industry of the future implies a major evolution in the industrial safety measures needed to be met, such as societal requirements.

Towards Process Safety 4.0 in the Factory of the Future presents the concept of Safety 4.0 from the point of view of process safety, occupational safety and health, as well as systems’ cyber security. Numerous examples illustrate the different approaches of the identified methods and techniques of Safety 4.0. Their concepts, paradigms, structural bases, couplings, complexities and flaws are systematically analyzed. This comprehensive approach to Safety 4.0 is aimed at the wide variety of actors working in the industry of the future.

Author(s): André Laurent
Series: Chemical Engineering Series
Publisher: Wiley-ISTE
Year: 2023

Language: English
Pages: 212
City: London

Cover
Title Page
Copyright Page
Contents
Foreword
Preface
List of Notations
Chapter 1. The Industrial Revolution 4.0
1.1. A history of industrial revolutions
1.2. Defining the factory of the future
1.3. Technology used in Industry 4.0
1.3.1. Disruptive technology
1.3.2. Technologies used for communication and interconnection
1.3.3. Data management technology
1.4. Attempts at structuring technologies
1.5. Conclusion
Chapter 2. The Concept of Safety 4.0
2.1. Context and definition
2.2. The history of the evolution of safety
2.3. Safety framework
Chapter 3. Occupational Safety and Health
3.1. Impact of Industry 4.0 work conditions
3.2. Definitions
3.3. OSH versus process safety
3.4. OSH assessment of occupational hazards
3.4.1. Regulations, norms and unique document
3.4.2. Inventory of risk analysis techniques and methods
3.4.3. Applicability of risk analysis methods to OSH
Chapter 4. Process Safety and Cybersecurity
4.1. Reviewing risk analysis methods in process safety: example of the bow-tie method
4.2. Risk-evaluation matrix in process safety
4.3. Risk analysis methods for industrial information systems: example of the EBIOS and attack tree method
4.4. Cybersecurity risk-assessment matrix
4.5. Coordinating risk analysis methods
4.6. Reconciling process safety and cybersecurity methods
4.6.1. Preliminary risk analysis and preliminary cyber-risk analysis
4.6.2. HAZOP, CHAZOP and Cyber HAZOP methods
4.6.3. Bow-tie graph and cyber bow-tie
4.6.4. LOPA and Cyber LOPA methods
4.6.5. The integrated, simultaneous ATBT method
4.7. Concatenation of matrices
4.8. Reasoned use of risk matrices
Chapter 5. Examples: Safety 4.0 and Processes
5.1. Distillation column control
5.2. Attempt to classify the applications of a digital twin in the field of Safety 4.0
5.2.1. Potential of a digital twin for Safety 4.0
5.2.2. Proposal for a classification framework
5.3. Modernization of a pilot installation of an ejector pump
5.4. Model for developing a digital twin to prevent OSH in the process industry
5.4.1. Description of the model
5.4.2. Implementing the model
5.4.3. Conclusion
5.5. Custom manufacture of food product by project development
5.6. Impact of the design of a cyberphysical system on an industrial process
5.6.1. Choosing the problem to be studied
5.6.2. Design principle for the cyberphysical system
5.7. Principle for redesigning a process in a cyberphysical production system
5.8. Systematic integrated approach to improve the processing of contaminated sediments
5.8.1. The Novosol® process
5.8.2. The sociotechnical Novosol® system
5.8.3. Conclusion
5.9. Digitalization to benefit safety management
5.9.1. Improvement in the quality of technical risk assessment and modeling the impact of cumulative risks
5.9.2. Providing a real-time view of the actual state of critical equipment and their impact on the risks
5.10. Detection of deviations in the functioning of a heat exchanger through an artificial neural network
5.11. RFID applied to the prevention of occupational hazards
5.11.1. Fields of application of RFID technology
5.11.2. RFID applied to occupational safety and health
5.12. How RFID contributes to industrial engineering safety
5.13. Exploring the idea of a socially safe and sustainable workplace for an Operator 4.0
5.14. Industry 4.0 challenges related to safety and the environment in the leather industry
5.15. Safety 4.0: metrics and performance indicators
5.15.1. Impact or lagging indicator
5.15.2. Activity or leading indicator
5.15.3. Some recommended examples of performance indicators for process safety
5.15.4. Examples of the application of safety performance indicators
Chapter 6. Intensification and Inherent Safety: Myth or Reality?
6.1. A review of essential elements in process intensification
6.2. Some examples of process intensification
6.2.1. The reduction principle in support of the risk management
6.2.2. Areas of interest for using microstructured reactors
6.2.3. Transposition of an exothermic reaction in an intensified, continuous heat exchanger
6.2.4. Pilot demonstration of IMPULSE for the production of sulfur trioxide through the oxidation of sulfur dioxide by air
6.2.5. Synthesis of ionic liquids by alkylation in a microstructured reactor
6.2.6. Developing an intensified process for the industrial synthesis of methanol from carbon dioxide
6.2.7. Feasibility of intensifying the production of vinyl acetate monomer
6.2.8. The microstructured reactor with catalytic walls: accelerator of the performance of a conventional tubular reactor
6.2.9. Generic example of direct gaseous fluorination of a liquid hydrocarbon
6.3. An attempt to rationalize intensification equipment
6.4. Concept and application of a general methodological framework for the synthesis and design of processes that integrate intensification
6.5. Reality or myth? Safety 4.0 in intensification processes
6.5.1. A few assessment tools
6.5.2. Examples of safety versus intensification conflicts
6.5.3. Vigilance when putting into practice the risk analysis methods based on the use of digital data
Conclusion
References
Index
EULA