In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasib...In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it.展开更多
[Objective] To establish the traceability mechanism of agricultural products safety, and the application of promote domestic based software in the supervision area of agricultural products quality and safety. [Method]...[Objective] To establish the traceability mechanism of agricultural products safety, and the application of promote domestic based software in the supervision area of agricultural products quality and safety. [Method] Through the analysis on the circulation characteristics of agricultural products, like fruits, vegetables, livestock and poultry, the agricultural products quality safety management and traceability query business component libraries were designed. Based on the run-time-supporting environment provided by domestic based software, traceability management system of agricultural products quality and safety was constructed. [Result] The traceability management system provided the information interaction and comprehensive management platform of agricultural product quality and safety based on domestic based software for the government, enterprises and consumers. [Conclusion] Through the application demonstration, the quality control and information traceability of full circulation of agricultural products was achieved effective and reliably, and the management level of agricultural products quality and safety was improved.展开更多
网络时代的到来,网络操作系统的普及使很多具有一般计算机操作基础的用户也可以尝试使用网络操作系统,来简单配置自己的小型服务器。为了安全高效的使用Windows Server 2003这个网络操作系统,用户可以通过域和活动目录、管理用户和...网络时代的到来,网络操作系统的普及使很多具有一般计算机操作基础的用户也可以尝试使用网络操作系统,来简单配置自己的小型服务器。为了安全高效的使用Windows Server 2003这个网络操作系统,用户可以通过域和活动目录、管理用户和组及组策略、管理文件系统、网络服务等等的配置来提高网络操作系统的安全性和有效性。展开更多
AIM: To clarify the usefulness of the self-expanding metallic stents (SEMS) in the management of acute proximal colon obstruction due to colon carcinoma before curative surgery.METHODS: Eighty-one colon (proximal to s...AIM: To clarify the usefulness of the self-expanding metallic stents (SEMS) in the management of acute proximal colon obstruction due to colon carcinoma before curative surgery.METHODS: Eighty-one colon (proximal to spleen flex) carcinoma patients (47 males and 34 females,aged 18-94 years,mean = 66.2 years) treated between September 2004 and June 2010 for acute colon obstruction were enrolled to this study,and their clinical and radiological features were reviewed.After a cleaning enema was administered,urgent colonoscopy was performed.Subsequently,endoscopic decompression using SEMS placement was attempted.RESULTS: Endoscopic decompression using SEMS placement was technically successful in 78 (96.3%) of 81 patients.Three patients’ symptoms could not be relieved after SEMS placement and emergent operation was performed 1 d later.The site of obstruction was transverse colon in 18 patients,the hepatic flex in 42,and the ascending colon in 21.Following adequate cleansing of the colon,patients’ abdominal girth was decreased from 88 ± 3 cm before drainage to 72 ± 6 cm 7 d later,and one-stage surgery after 8 ± 1 d (range,7-10 d) was performed.No anastomotic leakage or postoperative stenosis occurred after operation.CONCLUSION: SEMS placement is effective and safe in the management of acute proximal colon obstruction due to colon carcinoma,and is considered as a bridged method before curative surgery.展开更多
Microseismic monitoring technology has become an important technique to assess stability of rock mass in metal mines.Due to the special characteristics of underground metal mines in China,including the high tectonic s...Microseismic monitoring technology has become an important technique to assess stability of rock mass in metal mines.Due to the special characteristics of underground metal mines in China,including the high tectonic stress,irregular shape and existence of ore body,and complex mining methods,the application of microseismic technology is more diverse in China compared to other countries,and is more challenging than in other underground structures such as tunnels,hydropower stations and coal mines.Apart from assessing rock mass stability and ground pressure hazards induced by mining process,blasting,water inrush and large scale goaf,microseismic technology is also used to monitor illegal mining,and track personnel location during rescue work.Moreover,microseismic data have been used to optimize mining parameters in some metal mines.The technology is increasingly used to investigate cracking mechanism in the design of rock mass supports.In this paper,the application,research development and related achievements of microseismic technology in underground metal mines in China are summarized.By considering underground mines from the perspective of informatization,automation and intelligentization,future studies should focus on intelligent microseismic data processing method,e.g.,signal identification of microseismic and precise location algorithm,and on the research and development of microseismic equipment.In addition,integrated monitoring and collaborative analysis for rock mass response caused by mining disturbance will have good prospects for future development.展开更多
In recent years improper allocation of safety input has prevailed in coal mines in China, which resulted in the frequent accidents in coal mining operation. A comprehensive assessment of the input efficiency of coal m...In recent years improper allocation of safety input has prevailed in coal mines in China, which resulted in the frequent accidents in coal mining operation. A comprehensive assessment of the input efficiency of coal mine safety should lead to improved efficiency in the use of funds and management resources. This helps government and enterprise managers better understand how safety inputs are used and to optimize allocation of resources. Study on coal mine's efficiency assessment of safety input was con- ducted in this paper. A C^2R model with non-Archimedean infinitesimal vector based on output is established after consideration of the input characteristics and the model properties. An assessment of an operating mine was done using a specific set of input and output criteria. It is found that the safety input was efficient in 2002 and 2005 and was weakly efficient in 2003. However, the efficiency was relatively low in both 2001 and 2004. The safety input resources can be optimized and adjusted by means of projection theory. Such analysis shows that, on average in 2001 and 2004, 45% of the expended funds could have been saved. Likewise, 10% of the safety management and technical staff could have been eliminated and working hours devoted to safety could have been reduced by 12%. These conditions could have Riven the same results.展开更多
A monitoring system is an important guarantee of safety in a production mine. However, not all monitoring substations pass the electrical fast transient/burst (EFT/B) immunity test and the explosion-proof test simul...A monitoring system is an important guarantee of safety in a production mine. However, not all monitoring substations pass the electrical fast transient/burst (EFT/B) immunity test and the explosion-proof test simultaneously. To enhance the immunity, the values of capacitance and inductance should be increased, which are actually limited by coal mine explosion-proof standards. Hence, for the first time, an active filter was applied in an electromagnetic interference (EMI) output filter. As a result, the interference within 30 MHz clearly weakened, but the frequency spectrum had a wide range. An EMI input filter and ferrite beads were adopted to restrain higher frequency interference. An output interference spectrogram of the substation was obtained with an analyzer. The results indicate that the improved complex filtering markedly help to control interference. With the support of improved complex filtering and other enhancing immunity means about I/O ports, the substation managed to pass both the EFT/B immunity test and the explosion-proof test synchronously. We conclude that improved complex filtering is of vital importance in enhancing the electromagnetic compatibilitv (EMC) of the coal mine monitoring system.展开更多
China has to raise agricultural productivity in its limited and shrinking farmland to guarantee food security for its huge and ever-growing population. Sustainable soil nutrient management is of paramount importance t...China has to raise agricultural productivity in its limited and shrinking farmland to guarantee food security for its huge and ever-growing population. Sustainable soil nutrient management is of paramount importance to the world's most populous country. Critical challenges the country is facing in sustaining soil fertility and in alleviating the hazardous impact of intensive fertilizer use are discussed in this paper. It is emphatically pointed out that national strategies as well as area-specific action plans with respect to scientific nutrient management are urgently needed to balance productivity and sustainability in the future. Relevant proposals for addressing those challenges are also presented.展开更多
In this paper,we propose a new approach for rational secret sharing in game theoretic settings.The trusted center is eliminated in the secret reconstruction phase.Every player doesn’t know current round is real round...In this paper,we propose a new approach for rational secret sharing in game theoretic settings.The trusted center is eliminated in the secret reconstruction phase.Every player doesn’t know current round is real round or fake round.The gain of following the protocol is more than the gain of deviating,so rational player has an incentive to abide the protocol.Finally,every player can obtain the secret fairly.Our scheme is verifiable and any player’s cheating can not work.Furthermore the proposed scheme is immune to backward induction and satisfies resilient equilibrium.No player of the coalition C can do better,even if the whole coalition C cheats.Our scheme can withstand the conspiracy attack with at most m-1 players.展开更多
The mathematical physics model of mine methane and coal dust explosion propagation was established in the research,by using continuous phase,combustion,par- ticulate equations of mathematical physics.Based upon the da...The mathematical physics model of mine methane and coal dust explosion propagation was established in the research,by using continuous phase,combustion,par- ticulate equations of mathematical physics.Based upon the data from mine methane drainage roadway explosion,and mine methane and coal dust explosion propagation ex- perimental studies,the numerical emulator system of mine methane and coal dust explo- sion software was developed by using prevalent flow simulation platform,which can be used to simulate the explosion accidents process effectively.In addition,the system can also be used to determine whether coal dust involved in the explosion,and to simulate accurately the transition from deflagration to detonation in methane explosion,propagation velocity of explosion shock,attenuation pattern,and affected area of explosion.展开更多
By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is p...By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree: SKDC, LKH, and OFF. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best. The security problem of the new scheme is analyzed. This new scheme provides backward and forward security, i.e.. newly admitted group members cannot read previous multicast messages and evicted members cannot read future multicast messages, even with collusion by many arbitrarily evicted members.展开更多
The key issues studied focused on underground coal mining and included (1) prevention of explosions in sealed areas,(2) better emergency preparedness and re- sponse,(3) improvement of miners' ability to escape,(4)...The key issues studied focused on underground coal mining and included (1) prevention of explosions in sealed areas,(2) better emergency preparedness and re- sponse,(3) improvement of miners' ability to escape,(4) better protection of miners before and after a fire or explosion,(5) improved provision of oxygen,and (6) development and implementation of more robust post-incident communication.The U.S.Congress passed the Mine Improvement and New Emergency Response Act of 2006,which mandated new laws to address the issues.Concurrent with investigations and congressional deliberations, the National Mining Association formed the independent Mine Safety Technology and Training Commission to study the state-of-the-art relative to technology and training that could address the vulnerabilities exposed by the mine disasters.As discussed,the report outlined persistent vulnerabilities linked with significant hazards in underground coal mines, and made recommendations to provide a path for addressing them.Overall the commis- sion report made 75 recommendations in the areas of risk-based design and management, communications technology,emergency response and mine rescue procedures,training for preparedness,and escape and protection strategies.In its deliberations,the commis- sion importantly noted that mine safety in the U.S.needs to follow a new paradigm for en- suring mine safety and developing a culture of prevention that supports safe production at the business core.In the commission's viewpoint,the bottom line in protecting coal miners is not only adopting a culture of prevention but also systematically pursuing mitigation of significant risks.展开更多
This article proposes a water inrush mechanism of progressive intrusion of pressure water up into the coal floor aquiclude according to injection tests and observations. A numerical model and a criterion of water inru...This article proposes a water inrush mechanism of progressive intrusion of pressure water up into the coal floor aquiclude according to injection tests and observations. A numerical model and a criterion of water inrush are established based on the mechanism. The theory is succesSfully used in predictions of water inrush.展开更多
Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference be...Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference between sub-systems and the lag in management skills has been a bottle neck for improving productivity of the system. Based on the fact that the traditional tools for safety analysis have been insufficient to evaluate systematically and dynamically the safety risks, this paper tries to create a virtual reality tool consisting of human, machine and mines, using Pro/E and the 3D MAX software in order to evaluate visually the operations of typical mining equipment, such as the bucket wheel excavator (BWE), the shovel, the truck and the dragline. Within this virtual world, the behavior of the system, such as interaction, interference and potential risk can be replayed and reviewed visually. The objective of the study is to identify the critical safety issues of the system and to provide a convenient and powerful tool for safety training and safety management.展开更多
Coal and gas outburst is a complicated dynamic phenomenon in coal mines, Multi-factor Pattern Recognition is based on the relevant data obtained from research achievements of Geo-dynamic Division, With the help of spa...Coal and gas outburst is a complicated dynamic phenomenon in coal mines, Multi-factor Pattern Recognition is based on the relevant data obtained from research achievements of Geo-dynamic Division, With the help of spatial data management, the Neuron Network and Cluster algorithm are applied to predict the danger probability of coal and gas outburst in each cell of coal mining district. So a coal-mining district can be divided into three areas: dangerous area, minatory area, and safe area. This achievement has been successfully applied for regional prediction of coal and gas outburst in Hualnan mining area in China.展开更多
Analyzed the main problems which were found in current conditions and prob- lems of informationization in coal enterprises.It clarified how to achieve informationization in coal mine and put forward a general configur...Analyzed the main problems which were found in current conditions and prob- lems of informationization in coal enterprises.It clarified how to achieve informationization in coal mine and put forward a general configuration of informationization construction in which informationization in coal enterprises was divided into two parts: informationization of safety production and informationization of management.Planned a platform of inte- grated management of informationization in coal enterprises.Ultimately,it has brought forward that an overall integrated digital mine is the way to achieve the goal of informa- tionization in coal enterprises,which can promote the application of automation,digitaliza- tion,networking,informaitionization to intellectualization.At the same time,the competi- tiveness of enterprises can be improved entirely,and new type of coal industry can be supported by information technology.展开更多
Quantified risk assessment(QRA) needs mathematicization of risk theory.However,attention has been paid almost exclusively to applications of assessment methods,which has led to neglect of research into fundamental the...Quantified risk assessment(QRA) needs mathematicization of risk theory.However,attention has been paid almost exclusively to applications of assessment methods,which has led to neglect of research into fundamental theories,such as the relationships among risk,safety,danger,and so on.In order to solve this problem,as a first step,fundamental theoretical relationships about risk and risk management were analyzed for this paper in the light of mathematics,and then illustrated with some charts.Second,man-machine-environment-management(MMEM) theory was introduced into risk theory to analyze some properties of risk.On the basis of this,a three-dimensional model of risk management was established that includes:a goal dimension;a management dimension;an operation dimension.This goal management operation(GMO) model was explained and then emphasis was laid on the discussion of the risk flowchart(operation dimension),which lays the groundwork for further study of risk management and qualitative and quantitative assessment.Next,the relationship between Formal Safety Assessment(FSA) and Risk Management was researched.This revealed that the FSA method,which the international maritime organization(IMO) is actively spreading,comes from Risk Management theory.Finally,conclusion were made about how to apply this risk management method to concrete fields efficiently and conveniently,as well as areas where further research is required.展开更多
文摘In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it.
基金Supported by Common Chips and Basic Software Products(2010ZX01045-001-004-3)~~
文摘[Objective] To establish the traceability mechanism of agricultural products safety, and the application of promote domestic based software in the supervision area of agricultural products quality and safety. [Method] Through the analysis on the circulation characteristics of agricultural products, like fruits, vegetables, livestock and poultry, the agricultural products quality safety management and traceability query business component libraries were designed. Based on the run-time-supporting environment provided by domestic based software, traceability management system of agricultural products quality and safety was constructed. [Result] The traceability management system provided the information interaction and comprehensive management platform of agricultural product quality and safety based on domestic based software for the government, enterprises and consumers. [Conclusion] Through the application demonstration, the quality control and information traceability of full circulation of agricultural products was achieved effective and reliably, and the management level of agricultural products quality and safety was improved.
文摘网络时代的到来,网络操作系统的普及使很多具有一般计算机操作基础的用户也可以尝试使用网络操作系统,来简单配置自己的小型服务器。为了安全高效的使用Windows Server 2003这个网络操作系统,用户可以通过域和活动目录、管理用户和组及组策略、管理文件系统、网络服务等等的配置来提高网络操作系统的安全性和有效性。
基金Supported by Shanghai Science and Technology Committee,No.09411967100Shanghai Municipal Health Bureau,No.2007Y38
文摘AIM: To clarify the usefulness of the self-expanding metallic stents (SEMS) in the management of acute proximal colon obstruction due to colon carcinoma before curative surgery.METHODS: Eighty-one colon (proximal to spleen flex) carcinoma patients (47 males and 34 females,aged 18-94 years,mean = 66.2 years) treated between September 2004 and June 2010 for acute colon obstruction were enrolled to this study,and their clinical and radiological features were reviewed.After a cleaning enema was administered,urgent colonoscopy was performed.Subsequently,endoscopic decompression using SEMS placement was attempted.RESULTS: Endoscopic decompression using SEMS placement was technically successful in 78 (96.3%) of 81 patients.Three patients’ symptoms could not be relieved after SEMS placement and emergent operation was performed 1 d later.The site of obstruction was transverse colon in 18 patients,the hepatic flex in 42,and the ascending colon in 21.Following adequate cleansing of the colon,patients’ abdominal girth was decreased from 88 ± 3 cm before drainage to 72 ± 6 cm 7 d later,and one-stage surgery after 8 ± 1 d (range,7-10 d) was performed.No anastomotic leakage or postoperative stenosis occurred after operation.CONCLUSION: SEMS placement is effective and safe in the management of acute proximal colon obstruction due to colon carcinoma,and is considered as a bridged method before curative surgery.
基金Projects(51974059,52174142)supported by the National Natural Science Foundation of ChinaProject(2017YFC0602904)supported by the National Key Research and Development Program of ChinaProject(N180115010)supported by the Fundamental Research Funds for the Central Universities,China。
文摘Microseismic monitoring technology has become an important technique to assess stability of rock mass in metal mines.Due to the special characteristics of underground metal mines in China,including the high tectonic stress,irregular shape and existence of ore body,and complex mining methods,the application of microseismic technology is more diverse in China compared to other countries,and is more challenging than in other underground structures such as tunnels,hydropower stations and coal mines.Apart from assessing rock mass stability and ground pressure hazards induced by mining process,blasting,water inrush and large scale goaf,microseismic technology is also used to monitor illegal mining,and track personnel location during rescue work.Moreover,microseismic data have been used to optimize mining parameters in some metal mines.The technology is increasingly used to investigate cracking mechanism in the design of rock mass supports.In this paper,the application,research development and related achievements of microseismic technology in underground metal mines in China are summarized.By considering underground mines from the perspective of informatization,automation and intelligentization,future studies should focus on intelligent microseismic data processing method,e.g.,signal identification of microseismic and precise location algorithm,and on the research and development of microseismic equipment.In addition,integrated monitoring and collaborative analysis for rock mass response caused by mining disturbance will have good prospects for future development.
基金Project 70771105 supported by the National Natural Science Foundation of China
文摘In recent years improper allocation of safety input has prevailed in coal mines in China, which resulted in the frequent accidents in coal mining operation. A comprehensive assessment of the input efficiency of coal mine safety should lead to improved efficiency in the use of funds and management resources. This helps government and enterprise managers better understand how safety inputs are used and to optimize allocation of resources. Study on coal mine's efficiency assessment of safety input was con- ducted in this paper. A C^2R model with non-Archimedean infinitesimal vector based on output is established after consideration of the input characteristics and the model properties. An assessment of an operating mine was done using a specific set of input and output criteria. It is found that the safety input was efficient in 2002 and 2005 and was weakly efficient in 2003. However, the efficiency was relatively low in both 2001 and 2004. The safety input resources can be optimized and adjusted by means of projection theory. Such analysis shows that, on average in 2001 and 2004, 45% of the expended funds could have been saved. Likewise, 10% of the safety management and technical staff could have been eliminated and working hours devoted to safety could have been reduced by 12%. These conditions could have Riven the same results.
基金Project 50674093 supported by the National Natural Science Foundation of China
文摘A monitoring system is an important guarantee of safety in a production mine. However, not all monitoring substations pass the electrical fast transient/burst (EFT/B) immunity test and the explosion-proof test simultaneously. To enhance the immunity, the values of capacitance and inductance should be increased, which are actually limited by coal mine explosion-proof standards. Hence, for the first time, an active filter was applied in an electromagnetic interference (EMI) output filter. As a result, the interference within 30 MHz clearly weakened, but the frequency spectrum had a wide range. An EMI input filter and ferrite beads were adopted to restrain higher frequency interference. An output interference spectrogram of the substation was obtained with an analyzer. The results indicate that the improved complex filtering markedly help to control interference. With the support of improved complex filtering and other enhancing immunity means about I/O ports, the substation managed to pass both the EFT/B immunity test and the explosion-proof test synchronously. We conclude that improved complex filtering is of vital importance in enhancing the electromagnetic compatibilitv (EMC) of the coal mine monitoring system.
基金Project supported by the Knowledge Innovation Program of Chinese Academy of Sciences (Nos. KZCX3-SW-417 and KZCX2-413).
文摘China has to raise agricultural productivity in its limited and shrinking farmland to guarantee food security for its huge and ever-growing population. Sustainable soil nutrient management is of paramount importance to the world's most populous country. Critical challenges the country is facing in sustaining soil fertility and in alleviating the hazardous impact of intensive fertilizer use are discussed in this paper. It is emphatically pointed out that national strategies as well as area-specific action plans with respect to scientific nutrient management are urgently needed to balance productivity and sustainability in the future. Relevant proposals for addressing those challenges are also presented.
基金This work was supported by the National Key Basic Research Program of China (NO. 2007CB311106), Beijing Municipal Natural Science Foundation.(No. 1102003) and Youth Science Foundation of Henan Normal University (No. 525198).
文摘In this paper,we propose a new approach for rational secret sharing in game theoretic settings.The trusted center is eliminated in the secret reconstruction phase.Every player doesn’t know current round is real round or fake round.The gain of following the protocol is more than the gain of deviating,so rational player has an incentive to abide the protocol.Finally,every player can obtain the secret fairly.Our scheme is verifiable and any player’s cheating can not work.Furthermore the proposed scheme is immune to backward induction and satisfies resilient equilibrium.No player of the coalition C can do better,even if the whole coalition C cheats.Our scheme can withstand the conspiracy attack with at most m-1 players.
文摘The mathematical physics model of mine methane and coal dust explosion propagation was established in the research,by using continuous phase,combustion,par- ticulate equations of mathematical physics.Based upon the data from mine methane drainage roadway explosion,and mine methane and coal dust explosion propagation ex- perimental studies,the numerical emulator system of mine methane and coal dust explo- sion software was developed by using prevalent flow simulation platform,which can be used to simulate the explosion accidents process effectively.In addition,the system can also be used to determine whether coal dust involved in the explosion,and to simulate accurately the transition from deflagration to detonation in methane explosion,propagation velocity of explosion shock,attenuation pattern,and affected area of explosion.
文摘By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree: SKDC, LKH, and OFF. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best. The security problem of the new scheme is analyzed. This new scheme provides backward and forward security, i.e.. newly admitted group members cannot read previous multicast messages and evicted members cannot read future multicast messages, even with collusion by many arbitrarily evicted members.
文摘The key issues studied focused on underground coal mining and included (1) prevention of explosions in sealed areas,(2) better emergency preparedness and re- sponse,(3) improvement of miners' ability to escape,(4) better protection of miners before and after a fire or explosion,(5) improved provision of oxygen,and (6) development and implementation of more robust post-incident communication.The U.S.Congress passed the Mine Improvement and New Emergency Response Act of 2006,which mandated new laws to address the issues.Concurrent with investigations and congressional deliberations, the National Mining Association formed the independent Mine Safety Technology and Training Commission to study the state-of-the-art relative to technology and training that could address the vulnerabilities exposed by the mine disasters.As discussed,the report outlined persistent vulnerabilities linked with significant hazards in underground coal mines, and made recommendations to provide a path for addressing them.Overall the commis- sion report made 75 recommendations in the areas of risk-based design and management, communications technology,emergency response and mine rescue procedures,training for preparedness,and escape and protection strategies.In its deliberations,the commis- sion importantly noted that mine safety in the U.S.needs to follow a new paradigm for en- suring mine safety and developing a culture of prevention that supports safe production at the business core.In the commission's viewpoint,the bottom line in protecting coal miners is not only adopting a culture of prevention but also systematically pursuing mitigation of significant risks.
文摘This article proposes a water inrush mechanism of progressive intrusion of pressure water up into the coal floor aquiclude according to injection tests and observations. A numerical model and a criterion of water inrush are established based on the mechanism. The theory is succesSfully used in predictions of water inrush.
基金Project 2002CB412705 supported by the Major State Basic Research Development Program (973) of China
文摘Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference between sub-systems and the lag in management skills has been a bottle neck for improving productivity of the system. Based on the fact that the traditional tools for safety analysis have been insufficient to evaluate systematically and dynamically the safety risks, this paper tries to create a virtual reality tool consisting of human, machine and mines, using Pro/E and the 3D MAX software in order to evaluate visually the operations of typical mining equipment, such as the bucket wheel excavator (BWE), the shovel, the truck and the dragline. Within this virtual world, the behavior of the system, such as interaction, interference and potential risk can be replayed and reviewed visually. The objective of the study is to identify the critical safety issues of the system and to provide a convenient and powerful tool for safety training and safety management.
基金Project 2001BA803B0404 supported by National Key Technologies R&D Program of the 10th Five-Year Plan of China
文摘Coal and gas outburst is a complicated dynamic phenomenon in coal mines, Multi-factor Pattern Recognition is based on the relevant data obtained from research achievements of Geo-dynamic Division, With the help of spatial data management, the Neuron Network and Cluster algorithm are applied to predict the danger probability of coal and gas outburst in each cell of coal mining district. So a coal-mining district can be divided into three areas: dangerous area, minatory area, and safe area. This achievement has been successfully applied for regional prediction of coal and gas outburst in Hualnan mining area in China.
基金the Hi-Tech and Research Development Program of China(2005AA133070)the Electronics Information Industry Development Fund Tender Project(XDJ2-0514-27)
文摘Analyzed the main problems which were found in current conditions and prob- lems of informationization in coal enterprises.It clarified how to achieve informationization in coal mine and put forward a general configuration of informationization construction in which informationization in coal enterprises was divided into two parts: informationization of safety production and informationization of management.Planned a platform of inte- grated management of informationization in coal enterprises.Ultimately,it has brought forward that an overall integrated digital mine is the way to achieve the goal of informa- tionization in coal enterprises,which can promote the application of automation,digitaliza- tion,networking,informaitionization to intellectualization.At the same time,the competi- tiveness of enterprises can be improved entirely,and new type of coal industry can be supported by information technology.
基金Supported by the Shanghai Leading Academic Discipline Project Foundation under Grant No.T0602Supported by the Shanghai Education Commission Project Foundation under Grant No.05FZ10
文摘Quantified risk assessment(QRA) needs mathematicization of risk theory.However,attention has been paid almost exclusively to applications of assessment methods,which has led to neglect of research into fundamental theories,such as the relationships among risk,safety,danger,and so on.In order to solve this problem,as a first step,fundamental theoretical relationships about risk and risk management were analyzed for this paper in the light of mathematics,and then illustrated with some charts.Second,man-machine-environment-management(MMEM) theory was introduced into risk theory to analyze some properties of risk.On the basis of this,a three-dimensional model of risk management was established that includes:a goal dimension;a management dimension;an operation dimension.This goal management operation(GMO) model was explained and then emphasis was laid on the discussion of the risk flowchart(operation dimension),which lays the groundwork for further study of risk management and qualitative and quantitative assessment.Next,the relationship between Formal Safety Assessment(FSA) and Risk Management was researched.This revealed that the FSA method,which the international maritime organization(IMO) is actively spreading,comes from Risk Management theory.Finally,conclusion were made about how to apply this risk management method to concrete fields efficiently and conveniently,as well as areas where further research is required.