The paper summarizes the research status on biological risks of agricultural GM laboratory and the risk factors of bio-safety in GM crops laboratory,and then proposes corresponding safety management suggestions.
A set of model is established to optimize BSW Company’s component stock. By analyzing the company’s current part stock condition in terms of the occupation of capitals in the precondition of continuous production, i...A set of model is established to optimize BSW Company’s component stock. By analyzing the company’s current part stock condition in terms of the occupation of capitals in the precondition of continuous production, it describes how to control the purchase parameters of import parts. The model describes how to adjust slightly product output sequence and how to control the components’ purchase parameters: purchasing risk time and purchase order quantity. Then simulation is developed to illustrate the model.展开更多
The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method ...The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation.展开更多
Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor networ...Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor network system may fail and the evaluation of the severity of the damage caused by the failure. In this paper, we devise a methodology of Rough Outlier Detection (ROD) for the detection of security-based risk factor, which originates from violations of attack requirements (namely, attack risks). The methodology elaborates dimension reduction method to analyze the attack risk probability from high dimensional and nonlinear data set, and combines it with rough redundancy reduction and the distance measurement of kernel function which is obtained using the ROD. In this way, it is possible to determine the risky scenarios, and the analysis feedback can be used to improve the sensor network system design. We illustrate the methodology in the DARPA case set study using step-by-step approach and then prove that the method is effective in lowering the rate of false alarm.展开更多
Quantified risk assessment(QRA) needs mathematicization of risk theory.However,attention has been paid almost exclusively to applications of assessment methods,which has led to neglect of research into fundamental the...Quantified risk assessment(QRA) needs mathematicization of risk theory.However,attention has been paid almost exclusively to applications of assessment methods,which has led to neglect of research into fundamental theories,such as the relationships among risk,safety,danger,and so on.In order to solve this problem,as a first step,fundamental theoretical relationships about risk and risk management were analyzed for this paper in the light of mathematics,and then illustrated with some charts.Second,man-machine-environment-management(MMEM) theory was introduced into risk theory to analyze some properties of risk.On the basis of this,a three-dimensional model of risk management was established that includes:a goal dimension;a management dimension;an operation dimension.This goal management operation(GMO) model was explained and then emphasis was laid on the discussion of the risk flowchart(operation dimension),which lays the groundwork for further study of risk management and qualitative and quantitative assessment.Next,the relationship between Formal Safety Assessment(FSA) and Risk Management was researched.This revealed that the FSA method,which the international maritime organization(IMO) is actively spreading,comes from Risk Management theory.Finally,conclusion were made about how to apply this risk management method to concrete fields efficiently and conveniently,as well as areas where further research is required.展开更多
The key issues studied focused on underground coal mining and included (1) prevention of explosions in sealed areas,(2) better emergency preparedness and re- sponse,(3) improvement of miners' ability to escape,(4)...The key issues studied focused on underground coal mining and included (1) prevention of explosions in sealed areas,(2) better emergency preparedness and re- sponse,(3) improvement of miners' ability to escape,(4) better protection of miners before and after a fire or explosion,(5) improved provision of oxygen,and (6) development and implementation of more robust post-incident communication.The U.S.Congress passed the Mine Improvement and New Emergency Response Act of 2006,which mandated new laws to address the issues.Concurrent with investigations and congressional deliberations, the National Mining Association formed the independent Mine Safety Technology and Training Commission to study the state-of-the-art relative to technology and training that could address the vulnerabilities exposed by the mine disasters.As discussed,the report outlined persistent vulnerabilities linked with significant hazards in underground coal mines, and made recommendations to provide a path for addressing them.Overall the commis- sion report made 75 recommendations in the areas of risk-based design and management, communications technology,emergency response and mine rescue procedures,training for preparedness,and escape and protection strategies.In its deliberations,the commis- sion importantly noted that mine safety in the U.S.needs to follow a new paradigm for en- suring mine safety and developing a culture of prevention that supports safe production at the business core.In the commission's viewpoint,the bottom line in protecting coal miners is not only adopting a culture of prevention but also systematically pursuing mitigation of significant risks.展开更多
Background The objective of this study was to assess the clinical safety and efficacy of vena cava filter (VCF) placement, with particular emphasis on the incidence and risk factors of inferior vena cava thrombosis ...Background The objective of this study was to assess the clinical safety and efficacy of vena cava filter (VCF) placement, with particular emphasis on the incidence and risk factors of inferior vena cava thrombosis (VCT) after VCF placement. Methods Clinical data of patients with venous thromboembolism (VTE), with or without placement of VCF, were analyzed in a retrospective single-center audit of medical records from January 2005 to June 2009. The collected data included demographics, procedural details, filter type, indications, and complications. Results A total of 168 cases of VTE (82 with VCF; 86 without VCF) were examined. Over a median follow-up of 24.2 months, VCT occurred in 18 of 82 patients with VCFs (11 males, 7 females, mean age 55.4 years). In 86 patients without VCFs, VCT occurred in only 6 individuals (4 males, 2 females) during the study period. VCT was observed more frequently in patients fitted with VCFs than in those without VCFs (22% vs. 7.0%). Conclusions The incidence of VCT in patients with VTE after VCF implantation was 22% approximately. Anticoagulation therapy should be continued for all patients with VCF placement, unless there is a specific contraindication. Almost all instances of VCT in patients with VCF implants in our study occurred after stopping anticoagulation treatment. The use of VCFs is increasing, and more trials are needed to confirm their benefit and accurately assess their safety.展开更多
Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are in...Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks.展开更多
The paper defines the Safety Capacity of Chemical Industrial Park(SCCIP) from the perspective of acceptable regional risk. For the purpose of exploring the evaluation model for the SCCIP, a method based on quantitativ...The paper defines the Safety Capacity of Chemical Industrial Park(SCCIP) from the perspective of acceptable regional risk. For the purpose of exploring the evaluation model for the SCCIP, a method based on quantitative risk assessment was adopted for evaluating transport risk and to confirm reasonable safety transport capacity of chemical industrial park, and then by combining with the safety storage capacity, a SCCIP evaluation model was put forward. The SCCIP was decided by the smaller one between the largest safety storage capacity and the maximum safety transport capacity, or else, the regional risk of the park will exceed the acceptable level.The developed method was applied to a chemical industrial park in Guangdong province to obtain the maximum safety transport capacity and the SCCIP. The results can be realized in the regional risk control of the park effectively.展开更多
As an abstract study conception,most researches of ecological security generally are macro-scale theoretical study with a regional,national or global perspective.Micro-scale research mainly concentrates on ecological ...As an abstract study conception,most researches of ecological security generally are macro-scale theoretical study with a regional,national or global perspective.Micro-scale research mainly concentrates on ecological risk,ecosystem health and ecosystem safety.In order to assess regional ecological security and to accomplish the transition from micro-scale to macro-scale research,a Driving-Function-State-Output-Respond model framework(DFSOR model) is put forward in this paper according to the analyses on regional population,society,economy,re-sources,environment and ecological risks.In empirical research an index system is set out to evaluate ecological se-curity of land use.The DFSOR model comprises f ive group of indicators:(1) driving indicators,which include social population pressure and economic pressure;(2) function indicators,which include human function,hydrodynamic function,wind function and gravity function;(3) state indicators,which include soil resources,water resources and land use/land cover;(4) output indicators,which include production output and ecological risk output;(5) response indicators,which are composed of all sorts of policies and measures for improving production of ecosystem.The method and procedure for ecological security evaluation is put forward based on DFSOR model as well.In the case study,Yanchi,the ecotone between agriculture and animal husbandry,is chosen for the study.An index system is built to evaluate ecological security based on the evaluation of regional ecological risks which including sandif ica-tion,water erosion,soil salinization,soil pollution and shortage of water.The comprehensive evaluation result shows the regional ecological security index of land use in the research area increase obviously.But it is still in the state of low-graded danger.展开更多
With the rapid growth of the number and flight time of unmanned aerial vehicles(UAVs),safety accidents caused by UAVs flight risk is increasing gradually.Safe air route planning is an effective means to reduce the ope...With the rapid growth of the number and flight time of unmanned aerial vehicles(UAVs),safety accidents caused by UAVs flight risk is increasing gradually.Safe air route planning is an effective means to reduce the operational risk of UAVs at the strategic level.The optimal air route planning model based on ground risk assessment is presented by considering the safety cost of UAV air route.Through the rasterization of the ground surface under the air route,the safety factor of each grid is defined with the probability of fatality on the ground per flight hour as the quantitative index.The air route safety cost function is constructed based on the safety factor of each grid.Then,the total cost function considering both air route safety and flight distance is established.The expected function of the ant colony algorithm is rebuilt and used as the algorithm to plan the air routes.The effectiveness of the new air route planning model is verified through the logistical distribution scenario on urban airspace.The results indicate that the new air route planning model considering safety factor can greatly improve the overall safety of air route under small increase of the total flight time.展开更多
Gradual shift has been observed lately of dam safety procedures from the conventional technical based towards a wider scope of risk management procedure based on risk analysis. The new approach considers the likelihoo...Gradual shift has been observed lately of dam safety procedures from the conventional technical based towards a wider scope of risk management procedure based on risk analysis. The new approach considers the likelihood level of occurrence of a multitude of hazards and the magnitude of the resulting possible consequences in case of failure using rational cause and effect arguments. Most dam owners are shifting towards the use of the new risk based procedures; and even governments themselves are moving towards formalizing the new trend. Legislations in the United States were promulgated [1] after serious dam failures and the adoption of stringent levels of scrutiny led such federal dam owners to pioneer in this field and in developing the concepts and methods required. The comer stone in risk analysis is the definition of the potential modes that may lead to failure and assessment of the likelihood levels of their occurrence and possible category of the consequences which, after thorough evaluation, will shape the decision making. This type of analysis was applied to Mosul Dam as a case study and resulted in definite recommendations.展开更多
Endoscopic ultrasonography (EUS) has gained wide acceptance as an important, minimally invasive diagnostic tool in gastroenterology, pulmonology, visceral surgery and oncology. This review focuses on data regarding ri...Endoscopic ultrasonography (EUS) has gained wide acceptance as an important, minimally invasive diagnostic tool in gastroenterology, pulmonology, visceral surgery and oncology. This review focuses on data regarding risks and complications of non-interventional diagnostic EUS and EUS-guided fine-needle biopsy (EUS-FNB). Measures to improve the safety of EUS und EUS-FNB will be discussed. Due to the specific mechanical properties of echoendoscopes in EUS, there is a low but noteworthy risk of perforation. To minimize this risk, endoscopists should be familiar with the specific features of their equipment and their patients' specific anatomical situations (e.g., tumor stenosis, diverticula). Most diagnostic EUS complications occur during EUS-FNB. Pain, acute pancreatitis, infection and bleeding are the primary adverse effects, occurring in 1% to 2% ofpatients. Only a few cases of needle tract seeding and peritoneal dissemination have been reported. The mortality associated with EUS and EUS-FNB is 0.02%. The risks associated with EUS-FNB are affected by endoscopist experience and target lesion. EUS-FNB of cystic lesions is associated with an increased risk of infection and hemorrhage. Peri-interventional antibiotics are recommended to prevent cyst infection. Adequate education and training, as well consideration of contraindications, are essential to minimize the risks of EUS and EUS-FNB. Restricting EUS-FNB only to patients in whom the cytopathological results may be expected to change the course of management is the best way of reducing the number of complications.展开更多
The new type of risk management is process management. First, the hazardsources are identified before coal mine accidents occur, and then the pre-control measureand information monitoring method based on classifying t...The new type of risk management is process management. First, the hazardsources are identified before coal mine accidents occur, and then the pre-control measureand information monitoring method based on classifying the hidden hazard sources aregiven. Lastly, the risk pre-alarm and risk control method are confirmed, the managementstandard and management measure are used to eliminate the hidden hazard sources. Inthis study, an evaluation system is built to evaluate the result of risk management.展开更多
The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how t...The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how technology and financial innovation transformed the mortgage loan from a local security into a premier global security traded worldwide. It examines the fundamental flaws of this process and why it does not work in regards to mortgage lending and the re-securitization products that were created through financial innovation. The findings show that regulation was unable to keep pace with financial innovation, which created an environment where actors in the financial service sector were able to behave geographically irresponsibly by using information asymmetries to their advantage by par- ticipating in moral hazard activities and engaging in other immoral and unethical business practices that were centered around localized geography, which ultimately contributed to the global financial crisis. It also examines the roll of financial innovation in regard to the Lehman Brothers Mini-Bond in Hung and its role as a driving force behind China's newly emerging shadow banking sector. It concludes with a policy recommendation and its implication for China's continued economic development.展开更多
A comprehensive risk based security assessment which includes low voltage, line overload and voltage collapse was presented using a relatively new neural network technique called as the generalized regression neural n...A comprehensive risk based security assessment which includes low voltage, line overload and voltage collapse was presented using a relatively new neural network technique called as the generalized regression neural network (GRNN) with incorporation of feature extraction method using principle component analysis. In the risk based security assessment formulation, the failure rate associated to weather condition of each line was used to compute the probability of line outage for a given weather condition and the extent of security violation was represented by a severity function. For low voltage and line overload, continuous severity function was considered due to its ability to zoom in into the effect of near violating contingency. New severity function for voltage collapse using the voltage collapse prediction index was proposed. To reduce the computational burden, a new contingency screening method was proposed using the risk factor so as to select the critical line outages. The risk based security assessment method using GRNN was implemented on a large scale 87-bus power system and the results show that the risk prediction results obtained using GRNN with the incorporation of principal component analysis give better performance in terms of accuracy.展开更多
The loss of life risk evaluation model for dam break is built in this paper.By using an improved Monte Carlo method,the overtopping probability induced by concurrent flood and wind is calculated,and the Latin Hypercub...The loss of life risk evaluation model for dam break is built in this paper.By using an improved Monte Carlo method,the overtopping probability induced by concurrent flood and wind is calculated,and the Latin Hypercube Sampling is used to generate random numbers.The Graham method is used to calculate the loss of life resulting from dam failure.With Dongwushi reservoir located at Hebei Province taken as an example,the overtopping probability induced by concurrent flood and wind is calculated as 4.77×10-6.Los...展开更多
Due to rapidly development of information systems, risk and security issues have increased and became a phenomenon that concerns every organization, without considering the size of it. To achieve desired results, mana...Due to rapidly development of information systems, risk and security issues have increased and became a phenomenon that concerns every organization, without considering the size of it. To achieve desired results, managers have to implement methods of evaluating and mitigating risk as part of a process well elaborated. Security risk management helps managers to better control the business practices and improve the business process. An effective risk management process is based on a successful IT security program. This doesn't mean that the main goal of an organization's risk management process is to protect its IT assets, but to protect the organization and its ability to perform their missions. During this process, managers have to take into consideration risks that can affect the organization and apply the most suitable measures to minimize their impact. The most important task is choosing the best suited method for analyzing the existing risk properly. Several methods have been developed, being classified in quantitative and qualitative approaches of evaluating risk. The purpose of this paper is to present the advantages and disadvantages of each approach taking current needs and opportunities into consideration.展开更多
The year 2016 marked the 25th anniversary of the end of the Cold War and the 15th anniversary of the 9/11 attack. Though international relations are constantly adjusted, the world is by no means more stable and orderl...The year 2016 marked the 25th anniversary of the end of the Cold War and the 15th anniversary of the 9/11 attack. Though international relations are constantly adjusted, the world is by no means more stable and orderly. International order reshaping triggered by the 2008 financial crisis is deepening, with chaos of various kinds popping up here and there. In the sociopolitical field, the"Trump phenomenon"and Brexit indicate serious weakening of the authority of traditional political systems and elites. In major country relations and international security, the world is witnessing the rise of emerging countries and the and fall of the West, fiercer US-Russia and Sino-US wrestling of strategic significance, and greater global and regional security risks. In global governance, while adjustment of UN-centered global governance is laboring along, national rivalries touch core issues, making global governance more urgent.展开更多
基金Supported by the National Basic Research Program of China(973Program)(2010CB126100)Fundamental Research Funds forthe Central Universities~~
文摘The paper summarizes the research status on biological risks of agricultural GM laboratory and the risk factors of bio-safety in GM crops laboratory,and then proposes corresponding safety management suggestions.
文摘A set of model is established to optimize BSW Company’s component stock. By analyzing the company’s current part stock condition in terms of the occupation of capitals in the precondition of continuous production, it describes how to control the purchase parameters of import parts. The model describes how to adjust slightly product output sequence and how to control the components’ purchase parameters: purchasing risk time and purchase order quantity. Then simulation is developed to illustrate the model.
基金the National Natural Science Foundation of China (No.60573036).
文摘The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation.
基金the Jiangsu 973 Scientific Project,the National Natural Science Foundation of China,the Jiangsu Natural Science Foundation,the Aerospace Innovation Fund,the Lianyungang Science & Technology Project
文摘Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor network system may fail and the evaluation of the severity of the damage caused by the failure. In this paper, we devise a methodology of Rough Outlier Detection (ROD) for the detection of security-based risk factor, which originates from violations of attack requirements (namely, attack risks). The methodology elaborates dimension reduction method to analyze the attack risk probability from high dimensional and nonlinear data set, and combines it with rough redundancy reduction and the distance measurement of kernel function which is obtained using the ROD. In this way, it is possible to determine the risky scenarios, and the analysis feedback can be used to improve the sensor network system design. We illustrate the methodology in the DARPA case set study using step-by-step approach and then prove that the method is effective in lowering the rate of false alarm.
基金Supported by the Shanghai Leading Academic Discipline Project Foundation under Grant No.T0602Supported by the Shanghai Education Commission Project Foundation under Grant No.05FZ10
文摘Quantified risk assessment(QRA) needs mathematicization of risk theory.However,attention has been paid almost exclusively to applications of assessment methods,which has led to neglect of research into fundamental theories,such as the relationships among risk,safety,danger,and so on.In order to solve this problem,as a first step,fundamental theoretical relationships about risk and risk management were analyzed for this paper in the light of mathematics,and then illustrated with some charts.Second,man-machine-environment-management(MMEM) theory was introduced into risk theory to analyze some properties of risk.On the basis of this,a three-dimensional model of risk management was established that includes:a goal dimension;a management dimension;an operation dimension.This goal management operation(GMO) model was explained and then emphasis was laid on the discussion of the risk flowchart(operation dimension),which lays the groundwork for further study of risk management and qualitative and quantitative assessment.Next,the relationship between Formal Safety Assessment(FSA) and Risk Management was researched.This revealed that the FSA method,which the international maritime organization(IMO) is actively spreading,comes from Risk Management theory.Finally,conclusion were made about how to apply this risk management method to concrete fields efficiently and conveniently,as well as areas where further research is required.
文摘The key issues studied focused on underground coal mining and included (1) prevention of explosions in sealed areas,(2) better emergency preparedness and re- sponse,(3) improvement of miners' ability to escape,(4) better protection of miners before and after a fire or explosion,(5) improved provision of oxygen,and (6) development and implementation of more robust post-incident communication.The U.S.Congress passed the Mine Improvement and New Emergency Response Act of 2006,which mandated new laws to address the issues.Concurrent with investigations and congressional deliberations, the National Mining Association formed the independent Mine Safety Technology and Training Commission to study the state-of-the-art relative to technology and training that could address the vulnerabilities exposed by the mine disasters.As discussed,the report outlined persistent vulnerabilities linked with significant hazards in underground coal mines, and made recommendations to provide a path for addressing them.Overall the commis- sion report made 75 recommendations in the areas of risk-based design and management, communications technology,emergency response and mine rescue procedures,training for preparedness,and escape and protection strategies.In its deliberations,the commis- sion importantly noted that mine safety in the U.S.needs to follow a new paradigm for en- suring mine safety and developing a culture of prevention that supports safe production at the business core.In the commission's viewpoint,the bottom line in protecting coal miners is not only adopting a culture of prevention but also systematically pursuing mitigation of significant risks.
文摘Background The objective of this study was to assess the clinical safety and efficacy of vena cava filter (VCF) placement, with particular emphasis on the incidence and risk factors of inferior vena cava thrombosis (VCT) after VCF placement. Methods Clinical data of patients with venous thromboembolism (VTE), with or without placement of VCF, were analyzed in a retrospective single-center audit of medical records from January 2005 to June 2009. The collected data included demographics, procedural details, filter type, indications, and complications. Results A total of 168 cases of VTE (82 with VCF; 86 without VCF) were examined. Over a median follow-up of 24.2 months, VCT occurred in 18 of 82 patients with VCFs (11 males, 7 females, mean age 55.4 years). In 86 patients without VCFs, VCT occurred in only 6 individuals (4 males, 2 females) during the study period. VCT was observed more frequently in patients fitted with VCFs than in those without VCFs (22% vs. 7.0%). Conclusions The incidence of VCT in patients with VTE after VCF implantation was 22% approximately. Anticoagulation therapy should be continued for all patients with VCF placement, unless there is a specific contraindication. Almost all instances of VCT in patients with VCF implants in our study occurred after stopping anticoagulation treatment. The use of VCFs is increasing, and more trials are needed to confirm their benefit and accurately assess their safety.
基金supported by Natural Science Foundation of China under award No.61303024Natural Science Foundation of Jiangsu Province under award No.BK20130372+3 种基金National 973 Program of China under award No.2014CB340600National High Tech 863 Program of China under award No.2015AA016002supported by Natural Science Foundation of China under award No.61272452supported in part by ARO Grant # W911NF-12-1-0286 and NSF Grant #1111925
文摘Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks.
基金Supported by the Science and Technology Department of Guangdong Province(2009A030302001)
文摘The paper defines the Safety Capacity of Chemical Industrial Park(SCCIP) from the perspective of acceptable regional risk. For the purpose of exploring the evaluation model for the SCCIP, a method based on quantitative risk assessment was adopted for evaluating transport risk and to confirm reasonable safety transport capacity of chemical industrial park, and then by combining with the safety storage capacity, a SCCIP evaluation model was put forward. The SCCIP was decided by the smaller one between the largest safety storage capacity and the maximum safety transport capacity, or else, the regional risk of the park will exceed the acceptable level.The developed method was applied to a chemical industrial park in Guangdong province to obtain the maximum safety transport capacity and the SCCIP. The results can be realized in the regional risk control of the park effectively.
基金supported by the National Key Technologies R&D Program of China during the 10th Five-Year Plan Period (Grant No. 2002BA517A114)National Key Technologies R&D Program (Grant No. 2007BAB23C03).
文摘As an abstract study conception,most researches of ecological security generally are macro-scale theoretical study with a regional,national or global perspective.Micro-scale research mainly concentrates on ecological risk,ecosystem health and ecosystem safety.In order to assess regional ecological security and to accomplish the transition from micro-scale to macro-scale research,a Driving-Function-State-Output-Respond model framework(DFSOR model) is put forward in this paper according to the analyses on regional population,society,economy,re-sources,environment and ecological risks.In empirical research an index system is set out to evaluate ecological se-curity of land use.The DFSOR model comprises f ive group of indicators:(1) driving indicators,which include social population pressure and economic pressure;(2) function indicators,which include human function,hydrodynamic function,wind function and gravity function;(3) state indicators,which include soil resources,water resources and land use/land cover;(4) output indicators,which include production output and ecological risk output;(5) response indicators,which are composed of all sorts of policies and measures for improving production of ecosystem.The method and procedure for ecological security evaluation is put forward based on DFSOR model as well.In the case study,Yanchi,the ecotone between agriculture and animal husbandry,is chosen for the study.An index system is built to evaluate ecological security based on the evaluation of regional ecological risks which including sandif ica-tion,water erosion,soil salinization,soil pollution and shortage of water.The comprehensive evaluation result shows the regional ecological security index of land use in the research area increase obviously.But it is still in the state of low-graded danger.
基金This work is supported by the Scientific Research Project of Tianjin Education Commission(No.2019KJ128).
文摘With the rapid growth of the number and flight time of unmanned aerial vehicles(UAVs),safety accidents caused by UAVs flight risk is increasing gradually.Safe air route planning is an effective means to reduce the operational risk of UAVs at the strategic level.The optimal air route planning model based on ground risk assessment is presented by considering the safety cost of UAV air route.Through the rasterization of the ground surface under the air route,the safety factor of each grid is defined with the probability of fatality on the ground per flight hour as the quantitative index.The air route safety cost function is constructed based on the safety factor of each grid.Then,the total cost function considering both air route safety and flight distance is established.The expected function of the ant colony algorithm is rebuilt and used as the algorithm to plan the air routes.The effectiveness of the new air route planning model is verified through the logistical distribution scenario on urban airspace.The results indicate that the new air route planning model considering safety factor can greatly improve the overall safety of air route under small increase of the total flight time.
文摘Gradual shift has been observed lately of dam safety procedures from the conventional technical based towards a wider scope of risk management procedure based on risk analysis. The new approach considers the likelihood level of occurrence of a multitude of hazards and the magnitude of the resulting possible consequences in case of failure using rational cause and effect arguments. Most dam owners are shifting towards the use of the new risk based procedures; and even governments themselves are moving towards formalizing the new trend. Legislations in the United States were promulgated [1] after serious dam failures and the adoption of stringent levels of scrutiny led such federal dam owners to pioneer in this field and in developing the concepts and methods required. The comer stone in risk analysis is the definition of the potential modes that may lead to failure and assessment of the likelihood levels of their occurrence and possible category of the consequences which, after thorough evaluation, will shape the decision making. This type of analysis was applied to Mosul Dam as a case study and resulted in definite recommendations.
文摘Endoscopic ultrasonography (EUS) has gained wide acceptance as an important, minimally invasive diagnostic tool in gastroenterology, pulmonology, visceral surgery and oncology. This review focuses on data regarding risks and complications of non-interventional diagnostic EUS and EUS-guided fine-needle biopsy (EUS-FNB). Measures to improve the safety of EUS und EUS-FNB will be discussed. Due to the specific mechanical properties of echoendoscopes in EUS, there is a low but noteworthy risk of perforation. To minimize this risk, endoscopists should be familiar with the specific features of their equipment and their patients' specific anatomical situations (e.g., tumor stenosis, diverticula). Most diagnostic EUS complications occur during EUS-FNB. Pain, acute pancreatitis, infection and bleeding are the primary adverse effects, occurring in 1% to 2% ofpatients. Only a few cases of needle tract seeding and peritoneal dissemination have been reported. The mortality associated with EUS and EUS-FNB is 0.02%. The risks associated with EUS-FNB are affected by endoscopist experience and target lesion. EUS-FNB of cystic lesions is associated with an increased risk of infection and hemorrhage. Peri-interventional antibiotics are recommended to prevent cyst infection. Adequate education and training, as well consideration of contraindications, are essential to minimize the risks of EUS and EUS-FNB. Restricting EUS-FNB only to patients in whom the cytopathological results may be expected to change the course of management is the best way of reducing the number of complications.
基金Supported by the National Natural Science Foundation of China(70533050)the Eleventh Five-year Science & Technology Support Plan of China(2006BAK03B0703)the Ministry of Education Humanities and Social Science (08JA630083)
文摘The new type of risk management is process management. First, the hazardsources are identified before coal mine accidents occur, and then the pre-control measureand information monitoring method based on classifying the hidden hazard sources aregiven. Lastly, the risk pre-alarm and risk control method are confirmed, the managementstandard and management measure are used to eliminate the hidden hazard sources. Inthis study, an evaluation system is built to evaluate the result of risk management.
基金Under the auspices of International Centre for China Development Studies,the University of Hong Kong
文摘The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how technology and financial innovation transformed the mortgage loan from a local security into a premier global security traded worldwide. It examines the fundamental flaws of this process and why it does not work in regards to mortgage lending and the re-securitization products that were created through financial innovation. The findings show that regulation was unable to keep pace with financial innovation, which created an environment where actors in the financial service sector were able to behave geographically irresponsibly by using information asymmetries to their advantage by par- ticipating in moral hazard activities and engaging in other immoral and unethical business practices that were centered around localized geography, which ultimately contributed to the global financial crisis. It also examines the roll of financial innovation in regard to the Lehman Brothers Mini-Bond in Hung and its role as a driving force behind China's newly emerging shadow banking sector. It concludes with a policy recommendation and its implication for China's continued economic development.
文摘A comprehensive risk based security assessment which includes low voltage, line overload and voltage collapse was presented using a relatively new neural network technique called as the generalized regression neural network (GRNN) with incorporation of feature extraction method using principle component analysis. In the risk based security assessment formulation, the failure rate associated to weather condition of each line was used to compute the probability of line outage for a given weather condition and the extent of security violation was represented by a severity function. For low voltage and line overload, continuous severity function was considered due to its ability to zoom in into the effect of near violating contingency. New severity function for voltage collapse using the voltage collapse prediction index was proposed. To reduce the computational burden, a new contingency screening method was proposed using the risk factor so as to select the critical line outages. The risk based security assessment method using GRNN was implemented on a large scale 87-bus power system and the results show that the risk prediction results obtained using GRNN with the incorporation of principal component analysis give better performance in terms of accuracy.
基金Supported by Tianjin Natural Science Foundation(No.08JCZDJC25400,No.09JCYBJC08700)Major State Basic Research Development Program of China ("973" Program,No.2007CB714101)
文摘The loss of life risk evaluation model for dam break is built in this paper.By using an improved Monte Carlo method,the overtopping probability induced by concurrent flood and wind is calculated,and the Latin Hypercube Sampling is used to generate random numbers.The Graham method is used to calculate the loss of life resulting from dam failure.With Dongwushi reservoir located at Hebei Province taken as an example,the overtopping probability induced by concurrent flood and wind is calculated as 4.77×10-6.Los...
文摘Due to rapidly development of information systems, risk and security issues have increased and became a phenomenon that concerns every organization, without considering the size of it. To achieve desired results, managers have to implement methods of evaluating and mitigating risk as part of a process well elaborated. Security risk management helps managers to better control the business practices and improve the business process. An effective risk management process is based on a successful IT security program. This doesn't mean that the main goal of an organization's risk management process is to protect its IT assets, but to protect the organization and its ability to perform their missions. During this process, managers have to take into consideration risks that can affect the organization and apply the most suitable measures to minimize their impact. The most important task is choosing the best suited method for analyzing the existing risk properly. Several methods have been developed, being classified in quantitative and qualitative approaches of evaluating risk. The purpose of this paper is to present the advantages and disadvantages of each approach taking current needs and opportunities into consideration.
文摘The year 2016 marked the 25th anniversary of the end of the Cold War and the 15th anniversary of the 9/11 attack. Though international relations are constantly adjusted, the world is by no means more stable and orderly. International order reshaping triggered by the 2008 financial crisis is deepening, with chaos of various kinds popping up here and there. In the sociopolitical field, the"Trump phenomenon"and Brexit indicate serious weakening of the authority of traditional political systems and elites. In major country relations and international security, the world is witnessing the rise of emerging countries and the and fall of the West, fiercer US-Russia and Sino-US wrestling of strategic significance, and greater global and regional security risks. In global governance, while adjustment of UN-centered global governance is laboring along, national rivalries touch core issues, making global governance more urgent.