期刊文献+
共找到52篇文章
< 1 2 3 >
每页显示 20 50 100
露天煤矿安全风险评估设计与实践
1
作者 王满仓 《中文科技期刊数据库(全文版)工程技术》 2021年第11期485-487,共3页
在当前露天煤矿安全风险评估设计与实践的作业过程中,相关企业领导人需要形成全员风险把控意识,其次采取全新的风险评估管理形式,对于潜在的风险落实分类管理和重点管理的工作。其次,企业还需要对风险安全等级进行细致的划分和管控,建... 在当前露天煤矿安全风险评估设计与实践的作业过程中,相关企业领导人需要形成全员风险把控意识,其次采取全新的风险评估管理形式,对于潜在的风险落实分类管理和重点管理的工作。其次,企业还需要对风险安全等级进行细致的划分和管控,建立立体化、多方面的风险管理工作格局。本文简要对当前露天煤矿安全风险评估设计与实践进行分析和探讨,并且给出相应的见解。 展开更多
关键词 露天煤矿 全安风险 评估
下载PDF
Research Progress on Biological Risks of Agricultural GM Laboratory
2
作者 杨君 杨德礼 《Agricultural Science & Technology》 CAS 2010年第9期105-108,共4页
The paper summarizes the research status on biological risks of agricultural GM laboratory and the risk factors of bio-safety in GM crops laboratory,and then proposes corresponding safety management suggestions.
关键词 GM crops LABORATORY RISK Bio-safety
下载PDF
Research on Optimization of Component Stock
3
作者 王海霞 汤文成 钟秉林 《Journal of Southeast University(English Edition)》 EI CAS 1999年第1期101-105,共5页
A set of model is established to optimize BSW Company’s component stock. By analyzing the company’s current part stock condition in terms of the occupation of capitals in the precondition of continuous production, i... A set of model is established to optimize BSW Company’s component stock. By analyzing the company’s current part stock condition in terms of the occupation of capitals in the precondition of continuous production, it describes how to control the purchase parameters of import parts. The model describes how to adjust slightly product output sequence and how to control the components’ purchase parameters: purchasing risk time and purchase order quantity. Then simulation is developed to illustrate the model. 展开更多
关键词 stock control purchase time fence purchasing risk time safety stock quantity economic order quantity
下载PDF
A RISK ASSESSMENT METHOD OF THE WIRELESS NETWORK SECURITY 被引量:13
4
作者 Zhao Dongmei Wang Changguang Ma Jianfeng 《Journal of Electronics(China)》 2007年第3期428-432,共5页
The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method ... The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation. 展开更多
关键词 Wireless network Risk assessment Analytic Hierarchy Process (AHP) method Fuzzy logical method
下载PDF
Rough Outlier Detection Based Security Risk Analysis Methodology 被引量:13
5
作者 Li Qianmu Li Jia 《China Communications》 SCIE CSCD 2012年第7期14-21,共8页
Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor networ... Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor network system may fail and the evaluation of the severity of the damage caused by the failure. In this paper, we devise a methodology of Rough Outlier Detection (ROD) for the detection of security-based risk factor, which originates from violations of attack requirements (namely, attack risks). The methodology elaborates dimension reduction method to analyze the attack risk probability from high dimensional and nonlinear data set, and combines it with rough redundancy reduction and the distance measurement of kernel function which is obtained using the ROD. In this way, it is possible to determine the risky scenarios, and the analysis feedback can be used to improve the sensor network system design. We illustrate the methodology in the DARPA case set study using step-by-step approach and then prove that the method is effective in lowering the rate of false alarm. 展开更多
关键词 rough outlier risk analysis dimensionality reduction
下载PDF
Risk management modeling and its application in maritime safety 被引量:4
6
作者 秦庭荣 陈伟炯 曾祥堃 《Journal of Marine Science and Application》 2008年第4期286-291,共6页
Quantified risk assessment(QRA) needs mathematicization of risk theory.However,attention has been paid almost exclusively to applications of assessment methods,which has led to neglect of research into fundamental the... Quantified risk assessment(QRA) needs mathematicization of risk theory.However,attention has been paid almost exclusively to applications of assessment methods,which has led to neglect of research into fundamental theories,such as the relationships among risk,safety,danger,and so on.In order to solve this problem,as a first step,fundamental theoretical relationships about risk and risk management were analyzed for this paper in the light of mathematics,and then illustrated with some charts.Second,man-machine-environment-management(MMEM) theory was introduced into risk theory to analyze some properties of risk.On the basis of this,a three-dimensional model of risk management was established that includes:a goal dimension;a management dimension;an operation dimension.This goal management operation(GMO) model was explained and then emphasis was laid on the discussion of the risk flowchart(operation dimension),which lays the groundwork for further study of risk management and qualitative and quantitative assessment.Next,the relationship between Formal Safety Assessment(FSA) and Risk Management was researched.This revealed that the FSA method,which the international maritime organization(IMO) is actively spreading,comes from Risk Management theory.Finally,conclusion were made about how to apply this risk management method to concrete fields efficiently and conveniently,as well as areas where further research is required. 展开更多
关键词 risk flowchar safety assessment GMO model MMEM theory QRA
下载PDF
Improving mine safety technology and training in the U.S.recommendations of the Mine Safety Technology and Training Commission 被引量:4
7
作者 GRAYSON R. Larry 《Journal of Coal Science & Engineering(China)》 2008年第3期425-431,共7页
The key issues studied focused on underground coal mining and included (1) prevention of explosions in sealed areas,(2) better emergency preparedness and re- sponse,(3) improvement of miners' ability to escape,(4)... The key issues studied focused on underground coal mining and included (1) prevention of explosions in sealed areas,(2) better emergency preparedness and re- sponse,(3) improvement of miners' ability to escape,(4) better protection of miners before and after a fire or explosion,(5) improved provision of oxygen,and (6) development and implementation of more robust post-incident communication.The U.S.Congress passed the Mine Improvement and New Emergency Response Act of 2006,which mandated new laws to address the issues.Concurrent with investigations and congressional deliberations, the National Mining Association formed the independent Mine Safety Technology and Training Commission to study the state-of-the-art relative to technology and training that could address the vulnerabilities exposed by the mine disasters.As discussed,the report outlined persistent vulnerabilities linked with significant hazards in underground coal mines, and made recommendations to provide a path for addressing them.Overall the commis- sion report made 75 recommendations in the areas of risk-based design and management, communications technology,emergency response and mine rescue procedures,training for preparedness,and escape and protection strategies.In its deliberations,the commis- sion importantly noted that mine safety in the U.S.needs to follow a new paradigm for en- suring mine safety and developing a culture of prevention that supports safe production at the business core.In the commission's viewpoint,the bottom line in protecting coal miners is not only adopting a culture of prevention but also systematically pursuing mitigation of significant risks. 展开更多
关键词 mine safety mine disasters new safety paradigm risk management
下载PDF
Vena cava thrombosis after vena cava filter placement: Incidence and risk factors 被引量:7
8
作者 Ya-Juan Guo Jun Feng Tian-Rong Qu Yan Qu Ya-Min Liu Yu-Shun Zhang Hong-Yan Tian Ai-Qun Ma 《Journal of Geriatric Cardiology》 SCIE CAS CSCD 2011年第2期99-103,共5页
Background The objective of this study was to assess the clinical safety and efficacy of vena cava filter (VCF) placement, with particular emphasis on the incidence and risk factors of inferior vena cava thrombosis ... Background The objective of this study was to assess the clinical safety and efficacy of vena cava filter (VCF) placement, with particular emphasis on the incidence and risk factors of inferior vena cava thrombosis (VCT) after VCF placement. Methods Clinical data of patients with venous thromboembolism (VTE), with or without placement of VCF, were analyzed in a retrospective single-center audit of medical records from January 2005 to June 2009. The collected data included demographics, procedural details, filter type, indications, and complications. Results A total of 168 cases of VTE (82 with VCF; 86 without VCF) were examined. Over a median follow-up of 24.2 months, VCT occurred in 18 of 82 patients with VCFs (11 males, 7 females, mean age 55.4 years). In 86 patients without VCFs, VCT occurred in only 6 individuals (4 males, 2 females) during the study period. VCT was observed more frequently in patients fitted with VCFs than in those without VCFs (22% vs. 7.0%). Conclusions The incidence of VCT in patients with VTE after VCF implantation was 22% approximately. Anticoagulation therapy should be continued for all patients with VCF placement, unless there is a specific contraindication. Almost all instances of VCT in patients with VCF implants in our study occurred after stopping anticoagulation treatment. The use of VCFs is increasing, and more trials are needed to confirm their benefit and accurately assess their safety. 展开更多
关键词 vena cava filters venous thromboembolism COMPLICATION
下载PDF
Dependence-Induced Risk: Security Metrics and Their Measurement Framework 被引量:2
9
作者 Liqiang Zhang Fei Yan +1 位作者 Bo Zhao Shouhuai Xu 《China Communications》 SCIE CSCD 2016年第11期119-128,共10页
Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are in... Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks. 展开更多
关键词 Cyberspace security security metrics exploitability surface attack conse quence risk assessment
下载PDF
Evaluation model for safety capacity of chemical industrial park based on acceptable regional risk 被引量:6
10
作者 陈国华 王树坤 谭小群 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2015年第1期121-127,共7页
The paper defines the Safety Capacity of Chemical Industrial Park(SCCIP) from the perspective of acceptable regional risk. For the purpose of exploring the evaluation model for the SCCIP, a method based on quantitativ... The paper defines the Safety Capacity of Chemical Industrial Park(SCCIP) from the perspective of acceptable regional risk. For the purpose of exploring the evaluation model for the SCCIP, a method based on quantitative risk assessment was adopted for evaluating transport risk and to confirm reasonable safety transport capacity of chemical industrial park, and then by combining with the safety storage capacity, a SCCIP evaluation model was put forward. The SCCIP was decided by the smaller one between the largest safety storage capacity and the maximum safety transport capacity, or else, the regional risk of the park will exceed the acceptable level.The developed method was applied to a chemical industrial park in Guangdong province to obtain the maximum safety transport capacity and the SCCIP. The results can be realized in the regional risk control of the park effectively. 展开更多
关键词 SCCIP Safety transport capacity Safety storage capacity Regional risk
下载PDF
Comprehensive evaluation of regional ecological security for land use:a case study of Yanchi County, Ningxia Province 被引量:2
11
作者 Li Xiaofeng Zhang Yonghua Zhang Hongye 《Ecological Economy》 2008年第4期428-439,共12页
As an abstract study conception,most researches of ecological security generally are macro-scale theoretical study with a regional,national or global perspective.Micro-scale research mainly concentrates on ecological ... As an abstract study conception,most researches of ecological security generally are macro-scale theoretical study with a regional,national or global perspective.Micro-scale research mainly concentrates on ecological risk,ecosystem health and ecosystem safety.In order to assess regional ecological security and to accomplish the transition from micro-scale to macro-scale research,a Driving-Function-State-Output-Respond model framework(DFSOR model) is put forward in this paper according to the analyses on regional population,society,economy,re-sources,environment and ecological risks.In empirical research an index system is set out to evaluate ecological se-curity of land use.The DFSOR model comprises f ive group of indicators:(1) driving indicators,which include social population pressure and economic pressure;(2) function indicators,which include human function,hydrodynamic function,wind function and gravity function;(3) state indicators,which include soil resources,water resources and land use/land cover;(4) output indicators,which include production output and ecological risk output;(5) response indicators,which are composed of all sorts of policies and measures for improving production of ecosystem.The method and procedure for ecological security evaluation is put forward based on DFSOR model as well.In the case study,Yanchi,the ecotone between agriculture and animal husbandry,is chosen for the study.An index system is built to evaluate ecological security based on the evaluation of regional ecological risks which including sandif ica-tion,water erosion,soil salinization,soil pollution and shortage of water.The comprehensive evaluation result shows the regional ecological security index of land use in the research area increase obviously.But it is still in the state of low-graded danger. 展开更多
关键词 DFSOR model Ecological risk Ecological security
下载PDF
An Air Route Planning Model of Unmanned Aerial Vehicles Under Constraints of Ground Safety 被引量:2
12
作者 HAN Peng ZHAO Yifei 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第2期298-305,共8页
With the rapid growth of the number and flight time of unmanned aerial vehicles(UAVs),safety accidents caused by UAVs flight risk is increasing gradually.Safe air route planning is an effective means to reduce the ope... With the rapid growth of the number and flight time of unmanned aerial vehicles(UAVs),safety accidents caused by UAVs flight risk is increasing gradually.Safe air route planning is an effective means to reduce the operational risk of UAVs at the strategic level.The optimal air route planning model based on ground risk assessment is presented by considering the safety cost of UAV air route.Through the rasterization of the ground surface under the air route,the safety factor of each grid is defined with the probability of fatality on the ground per flight hour as the quantitative index.The air route safety cost function is constructed based on the safety factor of each grid.Then,the total cost function considering both air route safety and flight distance is established.The expected function of the ant colony algorithm is rebuilt and used as the algorithm to plan the air routes.The effectiveness of the new air route planning model is verified through the logistical distribution scenario on urban airspace.The results indicate that the new air route planning model considering safety factor can greatly improve the overall safety of air route under small increase of the total flight time. 展开更多
关键词 air transportation unmanned aerial vehicle(UAV) air route planning safety cost ground risk assessment improved ant colony algorithm
下载PDF
Risk Management Concepts in Dam Safety Evaluation: Mosul Dam as a Case Study 被引量:3
13
作者 Nasrat Adamo Nadhir Al-Ansari +2 位作者 Jan Laue Sven Knutsson Varoujan Sissakian 《Journal of Civil Engineering and Architecture》 2017年第7期635-652,共18页
Gradual shift has been observed lately of dam safety procedures from the conventional technical based towards a wider scope of risk management procedure based on risk analysis. The new approach considers the likelihoo... Gradual shift has been observed lately of dam safety procedures from the conventional technical based towards a wider scope of risk management procedure based on risk analysis. The new approach considers the likelihood level of occurrence of a multitude of hazards and the magnitude of the resulting possible consequences in case of failure using rational cause and effect arguments. Most dam owners are shifting towards the use of the new risk based procedures; and even governments themselves are moving towards formalizing the new trend. Legislations in the United States were promulgated [1] after serious dam failures and the adoption of stringent levels of scrutiny led such federal dam owners to pioneer in this field and in developing the concepts and methods required. The comer stone in risk analysis is the definition of the potential modes that may lead to failure and assessment of the likelihood levels of their occurrence and possible category of the consequences which, after thorough evaluation, will shape the decision making. This type of analysis was applied to Mosul Dam as a case study and resulted in definite recommendations. 展开更多
关键词 Risk analysis risk management Mosul Dam Iraq
下载PDF
Diagnostic endoscopic ultrasonography:Assessment of safety and prevention of complications 被引量:33
14
作者 Christian Jenssen Maria Victoria Alvarez-Sánchez +1 位作者 Bertrand Napoléon Siegbert Faiss 《World Journal of Gastroenterology》 SCIE CAS CSCD 2012年第34期4659-4676,共18页
Endoscopic ultrasonography (EUS) has gained wide acceptance as an important, minimally invasive diagnostic tool in gastroenterology, pulmonology, visceral surgery and oncology. This review focuses on data regarding ri... Endoscopic ultrasonography (EUS) has gained wide acceptance as an important, minimally invasive diagnostic tool in gastroenterology, pulmonology, visceral surgery and oncology. This review focuses on data regarding risks and complications of non-interventional diagnostic EUS and EUS-guided fine-needle biopsy (EUS-FNB). Measures to improve the safety of EUS und EUS-FNB will be discussed. Due to the specific mechanical properties of echoendoscopes in EUS, there is a low but noteworthy risk of perforation. To minimize this risk, endoscopists should be familiar with the specific features of their equipment and their patients' specific anatomical situations (e.g., tumor stenosis, diverticula). Most diagnostic EUS complications occur during EUS-FNB. Pain, acute pancreatitis, infection and bleeding are the primary adverse effects, occurring in 1% to 2% ofpatients. Only a few cases of needle tract seeding and peritoneal dissemination have been reported. The mortality associated with EUS and EUS-FNB is 0.02%. The risks associated with EUS-FNB are affected by endoscopist experience and target lesion. EUS-FNB of cystic lesions is associated with an increased risk of infection and hemorrhage. Peri-interventional antibiotics are recommended to prevent cyst infection. Adequate education and training, as well consideration of contraindications, are essential to minimize the risks of EUS and EUS-FNB. Restricting EUS-FNB only to patients in whom the cytopathological results may be expected to change the course of management is the best way of reducing the number of complications. 展开更多
关键词 Endoscopic ultrasonography Endoscopic ul-trasonography-guided fine-needle biopsy COMPLICATIONS CONTRAINDICATIONS Risk SAFETY PERFORATION BLEEDING Infection Acute pancreatitis
下载PDF
Study on the evaluation system for the coal safety management based on risk pre-control 被引量:1
15
作者 LI Xin-chun XU Hai-xia +1 位作者 WANG Pei SONG Xue-feng 《Journal of Coal Science & Engineering(China)》 2009年第1期108-112,共5页
The new type of risk management is process management. First, the hazardsources are identified before coal mine accidents occur, and then the pre-control measureand information monitoring method based on classifying t... The new type of risk management is process management. First, the hazardsources are identified before coal mine accidents occur, and then the pre-control measureand information monitoring method based on classifying the hidden hazard sources aregiven. Lastly, the risk pre-alarm and risk control method are confirmed, the managementstandard and management measure are used to eliminate the hidden hazard sources. Inthis study, an evaluation system is built to evaluate the result of risk management. 展开更多
关键词 risk pre-control coal safety management evaluation system
下载PDF
Roles of Financial Innovation and Information Technology:Lessons from US Sub-prime Mortgage Crisis and Its Implications for China 被引量:2
16
作者 James H LENZER JR Simon Xiaobin ZHAO 《Chinese Geographical Science》 SCIE CSCD 2012年第3期343-355,共13页
The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how t... The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how technology and financial innovation transformed the mortgage loan from a local security into a premier global security traded worldwide. It examines the fundamental flaws of this process and why it does not work in regards to mortgage lending and the re-securitization products that were created through financial innovation. The findings show that regulation was unable to keep pace with financial innovation, which created an environment where actors in the financial service sector were able to behave geographically irresponsibly by using information asymmetries to their advantage by par- ticipating in moral hazard activities and engaging in other immoral and unethical business practices that were centered around localized geography, which ultimately contributed to the global financial crisis. It also examines the roll of financial innovation in regard to the Lehman Brothers Mini-Bond in Hung and its role as a driving force behind China's newly emerging shadow banking sector. It concludes with a policy recommendation and its implication for China's continued economic development. 展开更多
关键词 shadow banking US sub-prime mortgage crisis financial tsunami global financial crisis wealth man- agement vehicle China asset bubble
下载PDF
Risk based security assessment of power system using generalized regression neural network with feature extraction 被引量:2
17
作者 M. Marsadek A. Mohamed 《Journal of Central South University》 SCIE EI CAS 2013年第2期466-479,共14页
A comprehensive risk based security assessment which includes low voltage, line overload and voltage collapse was presented using a relatively new neural network technique called as the generalized regression neural n... A comprehensive risk based security assessment which includes low voltage, line overload and voltage collapse was presented using a relatively new neural network technique called as the generalized regression neural network (GRNN) with incorporation of feature extraction method using principle component analysis. In the risk based security assessment formulation, the failure rate associated to weather condition of each line was used to compute the probability of line outage for a given weather condition and the extent of security violation was represented by a severity function. For low voltage and line overload, continuous severity function was considered due to its ability to zoom in into the effect of near violating contingency. New severity function for voltage collapse using the voltage collapse prediction index was proposed. To reduce the computational burden, a new contingency screening method was proposed using the risk factor so as to select the critical line outages. The risk based security assessment method using GRNN was implemented on a large scale 87-bus power system and the results show that the risk prediction results obtained using GRNN with the incorporation of principal component analysis give better performance in terms of accuracy. 展开更多
关键词 generalized regression neural network line overload low voltage principle component analysis risk index voltagecollapse
下载PDF
Theory and Application of Loss of Life Risk Analysis for Dam Break 被引量:2
18
作者 孙月峰 钟登华 +1 位作者 李明超 李颖 《Transactions of Tianjin University》 EI CAS 2010年第5期383-387,共5页
The loss of life risk evaluation model for dam break is built in this paper.By using an improved Monte Carlo method,the overtopping probability induced by concurrent flood and wind is calculated,and the Latin Hypercub... The loss of life risk evaluation model for dam break is built in this paper.By using an improved Monte Carlo method,the overtopping probability induced by concurrent flood and wind is calculated,and the Latin Hypercube Sampling is used to generate random numbers.The Graham method is used to calculate the loss of life resulting from dam failure.With Dongwushi reservoir located at Hebei Province taken as an example,the overtopping probability induced by concurrent flood and wind is calculated as 4.77×10-6.Los... 展开更多
关键词 overtopping probability loss of life risk risk assessment dam safety management
下载PDF
Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches
19
作者 Stroie Elena Ramona 《Chinese Business Review》 2011年第12期1106-1110,共5页
Due to rapidly development of information systems, risk and security issues have increased and became a phenomenon that concerns every organization, without considering the size of it. To achieve desired results, mana... Due to rapidly development of information systems, risk and security issues have increased and became a phenomenon that concerns every organization, without considering the size of it. To achieve desired results, managers have to implement methods of evaluating and mitigating risk as part of a process well elaborated. Security risk management helps managers to better control the business practices and improve the business process. An effective risk management process is based on a successful IT security program. This doesn't mean that the main goal of an organization's risk management process is to protect its IT assets, but to protect the organization and its ability to perform their missions. During this process, managers have to take into consideration risks that can affect the organization and apply the most suitable measures to minimize their impact. The most important task is choosing the best suited method for analyzing the existing risk properly. Several methods have been developed, being classified in quantitative and qualitative approaches of evaluating risk. The purpose of this paper is to present the advantages and disadvantages of each approach taking current needs and opportunities into consideration. 展开更多
关键词 risk management risk analysis risk assessment quantitative approach qualitative approach
下载PDF
A More Turbulent and Troubled World
20
作者 Wang Honggang 《Contemporary International Relations》 2017年第2期1-15,共15页
The year 2016 marked the 25th anniversary of the end of the Cold War and the 15th anniversary of the 9/11 attack. Though international relations are constantly adjusted, the world is by no means more stable and orderl... The year 2016 marked the 25th anniversary of the end of the Cold War and the 15th anniversary of the 9/11 attack. Though international relations are constantly adjusted, the world is by no means more stable and orderly. International order reshaping triggered by the 2008 financial crisis is deepening, with chaos of various kinds popping up here and there. In the sociopolitical field, the"Trump phenomenon"and Brexit indicate serious weakening of the authority of traditional political systems and elites. In major country relations and international security, the world is witnessing the rise of emerging countries and the and fall of the West, fiercer US-Russia and Sino-US wrestling of strategic significance, and greater global and regional security risks. In global governance, while adjustment of UN-centered global governance is laboring along, national rivalries touch core issues, making global governance more urgent. 展开更多
关键词 Global governance political chaos social chaos major country relations
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部