期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
综合安全评估法(FSA)在物流安全中的应用 被引量:4
1
作者 段爱媛 《商场现代化》 北大核心 2006年第07Z期114-114,共1页
随着物流业的兴起及快速发展,物流运作中随之不断出现的安全问题受到业内的广泛关注。但是从国内外的研究现状来看,对物流安全评价方面的研究相对较少。本文通过对综合安全评估法(FSA)在物流安全中的应用研究,试图为物流安全的发展提供... 随着物流业的兴起及快速发展,物流运作中随之不断出现的安全问题受到业内的广泛关注。但是从国内外的研究现状来看,对物流安全评价方面的研究相对较少。本文通过对综合安全评估法(FSA)在物流安全中的应用研究,试图为物流安全的发展提供科学适用的安全评价工具。 展开更多
关键词 物流 安全 综合安全评估法(FSA) 风险控制 评价
下载PDF
实验步骤的半定量安全评估法在本科生实验中的应用 被引量:4
2
作者 李敏 李自卫 《实验室研究与探索》 CAS 北大核心 2018年第1期280-283,共4页
高校实验室是教学、科研的基地。实验室的安全管理是正常进行实验研究、教学的保证。而安全评估方法的掌握,并在实验过程中加以运用,能够提高本科生的安全意识,在实验中避免事故的发生,以及稳妥处理实验中发生的意外。借鉴新加坡国立大... 高校实验室是教学、科研的基地。实验室的安全管理是正常进行实验研究、教学的保证。而安全评估方法的掌握,并在实验过程中加以运用,能够提高本科生的安全意识,在实验中避免事故的发生,以及稳妥处理实验中发生的意外。借鉴新加坡国立大学基于实验步骤的半定量安全评估方法,介绍了该方法的实施步骤以及危险等级的计算方法。并以简单的化学合成实验——纳米镍颗粒的合成为具体实例,论证了在实施该方法后,危险等级降低至可以接受的程度,从而避免危险发生。论证了在本科生实验中应用该方法的可行性,为该安全评估方法在其他高校的应用提供参考。 展开更多
关键词 实验步骤 半定量 安全评估法 本科生实验
下载PDF
基于综合安全评估法的滚装船专船专运白酒槽罐车风险评估 被引量:1
3
作者 朱红 胡方 《中国水运(下半月)》 2016年第6期30-33,42,共5页
本文运用综合安全评估法(FAS)通过对人、船舶、货、环境、管理等方面的风险因子进行分析,针对白酒槽罐车在滚装船装载运输过程中可能发生的危险,通过船舶技术的改造、车辆合理的装载、运输管理的规范、应急预案的完善,使滚装船专船专运... 本文运用综合安全评估法(FAS)通过对人、船舶、货、环境、管理等方面的风险因子进行分析,针对白酒槽罐车在滚装船装载运输过程中可能发生的危险,通过船舶技术的改造、车辆合理的装载、运输管理的规范、应急预案的完善,使滚装船专船专运白酒槽罐车的风险可控。 展开更多
关键词 综合安全评估法 白酒槽罐车 风险评估
下载PDF
综合安全评估法在船舶配载中的应用 被引量:5
4
作者 沈华 李荣辉 《大连海事大学学报》 CAS CSCD 北大核心 2003年第4期28-30,共3页
介绍了综合安全评估方法的概念和整个体系的理论框架.针对如何在船舶安全配载中应用该方法,从配载危险识别、配载风险评估、风险控制方案及各种方案的费用/效益评估和决策建议等方面进行了分析和研究.研究的初步结果,对提高航运公司风... 介绍了综合安全评估方法的概念和整个体系的理论框架.针对如何在船舶安全配载中应用该方法,从配载危险识别、配载风险评估、风险控制方案及各种方案的费用/效益评估和决策建议等方面进行了分析和研究.研究的初步结果,对提高航运公司风险管理水平有积极的作用,并对进一步开展船舶配载安全管理方面的研究有参考价值. 展开更多
关键词 船舶配载 综合安全评估法 风险分析 风险控制方案 安全配载 配载危险识别
原文传递
大型电信运营业务支撑系统安全评估方法
5
作者 刘雪勇 宋汇星 《世界电信》 2004年第1期42-45,共4页
大型电信运营业务支撑系统(BOSS)有其独特的复杂性,集中化改造后,对BOSS系统的信息安全保障能力也提出了更高的要求,安全评估方面的考虑也越来越多。从管理和技术两个方面探讨了大型电信运营业务支撑系统的安全评估方法。
关键词 电信运营业务 支撑系统 安全评估法 BOSS 网络安全 安全管理 集中化改造
下载PDF
船舶机舱人-机系统的安全评估 被引量:3
6
作者 马红涛 胡以怀 《上海海运学院学报》 北大核心 2003年第3期210-212,221,共4页
介绍了一种船舶机舱人-机系统的安全评估方法,即事故概率安全评估法。它从某设备造成事故的主要因素是人还是机器这个角度对船舶机舱人-机系统安全进行评估,并进行了实例分析。可为机舱管理人员提供一个科学管理依据,以提高船舶机舱的... 介绍了一种船舶机舱人-机系统的安全评估方法,即事故概率安全评估法。它从某设备造成事故的主要因素是人还是机器这个角度对船舶机舱人-机系统安全进行评估,并进行了实例分析。可为机舱管理人员提供一个科学管理依据,以提高船舶机舱的整体安全性。 展开更多
关键词 船舶自动化 机舱 人-机系统 安全评估 事故概率安全评估法 整体安全
下载PDF
国外海洋结构物安全性评估技术
7
作者 廖又明 周叶 田超 《舰船科学技术》 北大核心 2015年第4期1-6,共6页
通过对国外海上结构物安全性评估模式、评估实例及评估动向的调研,探究国外在以海上石油/燃气作业平台、浮式机场以及浮式风力发电装置为对象的海洋结构物安全性评估理念、思路及方法。
关键词 海洋结构物 基于风险的安全评估 风险识别(HAZID) 安全案例评估 综合安全评估(FSA)
下载PDF
A novel refined dynamic model of high-speed maglev train-bridge coupled system for random vibration and running safety assessment
8
作者 MAO Jian-feng LI Dao-hang +3 位作者 YU Zhi-wu CAI Wen-feng GUO Wei ZHANG Guang-wen 《Journal of Central South University》 SCIE EI CAS CSCD 2024年第7期2532-2544,共13页
Running safety assessment and tracking irregularity parametric sensitivity analysis of high-speed maglev train-bridge system are of great concern,especially need perfect refinement models in which all properties can b... Running safety assessment and tracking irregularity parametric sensitivity analysis of high-speed maglev train-bridge system are of great concern,especially need perfect refinement models in which all properties can be well characterized based on various stochastic excitations.A three-dimensional refined spatial random vibration analysis model of high-speed maglev train-bridge coupled system is established in this paper,in which multi-source uncertainty excitation can be considered simultaneously,and the probability density evolution method(PDEM)is adopted to reveal the system-specific uncertainty dynamic characteristic.The motion equation of the maglev vehicle model is composed of multi-rigid bodies with a total 210-degrees of freedom for each vehicle,and a refined electromagnetic force-air gap model is used to account for the interaction and coupling effect between the moving train and track beam bridges,which are directly established by using finite element method.The model is proven to be applicable by comparing with Monte Carlo simulation.By applying the proposed stochastic framework to the high maglev line,the random dynamic responses of maglev vehicles running on the bridges are studied for running safety and stability assessment.Moreover,the effects of track irregularity wavelength range under different amplitude and running speeds on the coupled system are investigated.The results show that the augmentation of train speed will move backward the sensitive wavelength interval,and track irregularity amplitude influences the response remarkably in the sensitive interval. 展开更多
关键词 maglev train-bridge interaction electromagnetic force-air gap model stochastic dynamic analysis running safety assessment probability density evolution method
下载PDF
制定科学选船机制 完善港口国监督 被引量:2
9
作者 孙巍 武毅峰 《中国水运》 2010年第5期34-35,共2页
本文在对现有的几种港口国监督选船机制进行分析的基础上,总结提出如何制定科学的选船机制,并将安全评估方法的基本理论和方法应用于选船工作中,尝试建立了基于风险评估和费用受益评估的选船方法。
关键词 港口国监督 选船机制综合安全评估法
下载PDF
国际建筑与环境议题论文述要
10
作者 陆伟成 《上海市建设职工大学学报(当代建设)》 1999年第2期32-33,共2页
建筑材料对环境的影响及其生命周期的评估(LCA) 为探索建筑业实施环境保护的实用工具,1994~1997年Norllie建材工业发起对建筑材料和建筑部件生命周期(LCA)的系列研究。它将建筑物在建设过程以及使用阶段向大气和水域中排放废物,攫取... 建筑材料对环境的影响及其生命周期的评估(LCA) 为探索建筑业实施环境保护的实用工具,1994~1997年Norllie建材工业发起对建筑材料和建筑部件生命周期(LCA)的系列研究。它将建筑物在建设过程以及使用阶段向大气和水域中排放废物,攫取原料、消耗能源以及建筑物的拆除及其废料处置等问题一一编排成录。 该论文采用三种不同的评估模型对上述排列的问题予以审议,并且在开发和使用的计算机模型中,以及在日常环境程序改进计划、产品开发中引入LCA。 展开更多
关键词 建筑物 环境影响评估 安全评估法
下载PDF
船舶智能靠泊过程中信息技术因素的影响与预防
11
作者 徐佳龙 崔建辉 《天津航海》 2022年第4期10-13,共4页
随着科学技术的高质量发展,现代化技术广泛应用到船舶航运中,使船舶航行日趋智能化。但对于航行中可能出现的航行安全问题,尤其在船舶在靠离泊过程中出现的问题,其安全评估仍需考虑众多因素。文章旨在通过学习和运用IMO综合安全评估法(F... 随着科学技术的高质量发展,现代化技术广泛应用到船舶航运中,使船舶航行日趋智能化。但对于航行中可能出现的航行安全问题,尤其在船舶在靠离泊过程中出现的问题,其安全评估仍需考虑众多因素。文章旨在通过学习和运用IMO综合安全评估法(FSA)重点分析船舶智能靠泊过程中信息技术因素的影响,并提出相应的预防措施。 展开更多
关键词 自动靠离泊 综合安全评估法(FSA) 智能靠泊过程 信息技术因素
下载PDF
Generalized dominance-based rough set approach to security evaluation with imprecise information 被引量:3
12
作者 Zhao Liang Xue Zhi 《High Technology Letters》 EI CAS 2010年第3期254-262,共9页
The model of grey multi-attribute group decision-making (MAGDM) is studied, in which the attribute values are grey numbers. Based on the generalized dominance-based rough set approach (G-DR- SA), a synthetic secur... The model of grey multi-attribute group decision-making (MAGDM) is studied, in which the attribute values are grey numbers. Based on the generalized dominance-based rough set approach (G-DR- SA), a synthetic security evaluation method is presented. With-the grey MAGDM security evaluation model as its foundation, the extension of technique for order performance by similarity to ideal solution (TOPSIS) integrates the evaluation of each decision-maker (DM) into a group's consensus and obtains the expected evaluation results of information system. Via the quality of sorting (QoS) of G-DRSA, the inherent information hidden in data is uncovered, and the security attribute weight and DMs' weight are rationally obtained. Taking the computer networks in a certain university as objects, the example illustrates that this method can effectively remove the bottleneck of the grey MAGDM model and has practical significance in the synthetic security evaluation. 展开更多
关键词 security evaluation grey number multi-attribute group decision-making (MAGDM) generalized dominance-based rough set approach (G-DRSA)
下载PDF
Synthetic security assessment based on variable consistency dominance-based rough set approach 被引量:3
13
作者 赵亮 Xue Zhi 《High Technology Letters》 EI CAS 2010年第4期413-421,共9页
Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain univers... Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain university as samples, this paper, with the information system security assessment model as its foundation, proposes a multi-attribute group decision-making (MAGDM) security assessment method based on a variable consistency dominance-based rough set approach (VC-DRSA). This assessment method combines VC-DRSA with the analytic hierarchy process (AHP), uncovers the inherent information hidden in data via the quality of sorting (QoS), and makes a synthetic security assessment of the information system after determining the security attribute weight. The sample findings show that this method can effectively remove the bottleneck of MAGDM, thus assuming practical significance in information system security assessment. 展开更多
关键词 multi-attribute group decision-making (MAGDM) security assessment variable consistency dominance-based rough set approach (VC-DRSA)
下载PDF
Risk based security assessment of power system using generalized regression neural network with feature extraction 被引量:2
14
作者 M. Marsadek A. Mohamed 《Journal of Central South University》 SCIE EI CAS 2013年第2期466-479,共14页
A comprehensive risk based security assessment which includes low voltage, line overload and voltage collapse was presented using a relatively new neural network technique called as the generalized regression neural n... A comprehensive risk based security assessment which includes low voltage, line overload and voltage collapse was presented using a relatively new neural network technique called as the generalized regression neural network (GRNN) with incorporation of feature extraction method using principle component analysis. In the risk based security assessment formulation, the failure rate associated to weather condition of each line was used to compute the probability of line outage for a given weather condition and the extent of security violation was represented by a severity function. For low voltage and line overload, continuous severity function was considered due to its ability to zoom in into the effect of near violating contingency. New severity function for voltage collapse using the voltage collapse prediction index was proposed. To reduce the computational burden, a new contingency screening method was proposed using the risk factor so as to select the critical line outages. The risk based security assessment method using GRNN was implemented on a large scale 87-bus power system and the results show that the risk prediction results obtained using GRNN with the incorporation of principal component analysis give better performance in terms of accuracy. 展开更多
关键词 generalized regression neural network line overload low voltage principle component analysis risk index voltagecollapse
下载PDF
A RISK ASSESSMENT METHOD OF THE WIRELESS NETWORK SECURITY 被引量:13
15
作者 Zhao Dongmei Wang Changguang Ma Jianfeng 《Journal of Electronics(China)》 2007年第3期428-432,共5页
The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method ... The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation. 展开更多
关键词 Wireless network Risk assessment Analytic Hierarchy Process (AHP) method Fuzzy logical method
下载PDF
Synthetic security assessment for incomplete interval-valued information system 被引量:1
16
作者 赵亮 Xue Zhi 《High Technology Letters》 EI CAS 2012年第2期160-166,共7页
In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group dec... In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group decision- making (MAGDM) security assessment method based on the technique for order performance by similarity to ideal solution (TOPSIS). For IllS with preference information, combining with dominance-based rough set approach (DRSA), the effect of incomplete interval-valued information on decision results is discussed. For the imprecise judgment matrices, the security attribute weight can be obtained using Gibbs sampling. A numerical example shows that the proposed method can acquire some valuable knowledge hidden in the incomplete interval-valued information. The effectiveness of the proposed method in the synthetic security assessment for IIIS is verified. 展开更多
关键词 security assessment incomplete interval-valued information system(IIIS) multi-attribute group decision-making(MAGDM) technique for order performance by similarity to ideal solution(TOPSIS) dominance- based rough set approach(DRSA) Gibbs sampling
下载PDF
Safety Evaluation Method of Evacuation Routes in Areas in Case of Earthquake Disasters Using Ant Optimization Algorithm and Geographic Information Systems
17
作者 Kayoko Yamamoto Ximing Li 《Journal of Environmental Science and Engineering(A)》 2017年第9期462-478,共17页
The present study aims to propose the method for the quantitative evaluation of safety concerning evacuation routes in case of earthquake disasters in urban areas using ACO (Ant Colony Optimization) algorithm and G... The present study aims to propose the method for the quantitative evaluation of safety concerning evacuation routes in case of earthquake disasters in urban areas using ACO (Ant Colony Optimization) algorithm and GIS (Geographic Information Systems). Regarding the safety evaluation method, firstly, the similarity in safety was focused on while taking into consideration road blockage probability, and after classifying roads by means of the hierarchical cluster analysis, the congestion rates of evacuation routes using ACO simulations were estimated. Based on these results, the multiple evacuation routes extracted were visualized on digital maps by means of GIS, and its safety was evaluated. Furthermore, the selection of safe evacuation routes between evacuation sites, for cases when the possibility of large-scale evacuation after an earthquake disaster is high, is made possible. As the safety evaluation method is based on public information, by obtaining the same geographic information as the present study, it is effective in other areas regardless of whether the information is of the past and future. Therefore, in addition to spatial reproducibility, the safety evaluation method also has high temporal reproducibility. Because safety evaluations are conducted on evacuation routes based on quantified data, highly safe evacuation routes that are selected have been quantitatively evaluated, and thus serve as an effective indicator when selecting evacuation routes. 展开更多
关键词 Large-scale evacuation evacuation route safety evaluation earthquake disaster ACO (Ant Colony Optimization) GIS (Geographic Information Systems).
下载PDF
Researches On The Network Security Evaluation Method Based Bn BP Neural Network
18
作者 Zhang Yibin Yan Zequan 《International Journal of Technology Management》 2014年第9期93-95,共3页
This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluat... This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluation method based on BP neural network, and has designed to build the evaluation model, and shows that the method is feasible through the MATLAB simulation experiments. 展开更多
关键词 BP neural network network security MODEL EVALUATION
下载PDF
A Novel Masking Scheme for SM3 Based MAC
19
作者 QU Kaige WU Liji +2 位作者 WANG An REN Yanting ZHANG Xiangmin 《China Communications》 SCIE CSCD 2015年第6期11-21,共11页
The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authen... The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authentication Code(MAC).Our scheme was implemented in hardware,which utilizes hardware oriented secure conversion techniques between boolean and arithmetic masking.Security evaluation based on SAKURA-G FPGA board has been done with 2000 power traces from 2000 random plaintexts with random plaintext masks and random key masks.It has been verified that the masked SM3 hardware implementation shows no intermediate value leakage as expected.Our masked SM3 hardware can resist first-order correlation power attack(CPA) and collision correlation attack. 展开更多
关键词 SM3 algorithm masking scheme hardware implementation power analysis boolean and arithmetic masking conversion
下载PDF
Critical Contingencies Ranking for Dynamic Security Assessment Using Neural Networks
20
作者 Gustavo Schweickardt Juan Manuel Gimenez-Alvarez 《Journal of Energy and Power Engineering》 2012年第10期1663-1672,共10页
A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the se... A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state. 展开更多
关键词 Critical contingencies dynamic security assessment neural networks.
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部