The paper summarizes the research status on biological risks of agricultural GM laboratory and the risk factors of bio-safety in GM crops laboratory,and then proposes corresponding safety management suggestions.
A set of model is established to optimize BSW Company’s component stock. By analyzing the company’s current part stock condition in terms of the occupation of capitals in the precondition of continuous production, i...A set of model is established to optimize BSW Company’s component stock. By analyzing the company’s current part stock condition in terms of the occupation of capitals in the precondition of continuous production, it describes how to control the purchase parameters of import parts. The model describes how to adjust slightly product output sequence and how to control the components’ purchase parameters: purchasing risk time and purchase order quantity. Then simulation is developed to illustrate the model.展开更多
The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium lev...The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium levels of self-protection and insurance coverage under the non- cooperative condition are compared with socially optimal solutions, and the associated coordination mechanisms are proposed. The results show that self-protection investment increases in response to an increase in potential loss when the interdependent risk is small; the interdependent risk of security investments often induce firms to underinvest in security relative to the socially efficient level by ignoring marginal external costs or benefits conferred on others. A subsidy on self-protection investment from the government can help coordinate a firm's risk management decision and, thereby, improve individual security level and overall social welfare.展开更多
The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method ...The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation.展开更多
Quantified risk assessment(QRA) needs mathematicization of risk theory.However,attention has been paid almost exclusively to applications of assessment methods,which has led to neglect of research into fundamental the...Quantified risk assessment(QRA) needs mathematicization of risk theory.However,attention has been paid almost exclusively to applications of assessment methods,which has led to neglect of research into fundamental theories,such as the relationships among risk,safety,danger,and so on.In order to solve this problem,as a first step,fundamental theoretical relationships about risk and risk management were analyzed for this paper in the light of mathematics,and then illustrated with some charts.Second,man-machine-environment-management(MMEM) theory was introduced into risk theory to analyze some properties of risk.On the basis of this,a three-dimensional model of risk management was established that includes:a goal dimension;a management dimension;an operation dimension.This goal management operation(GMO) model was explained and then emphasis was laid on the discussion of the risk flowchart(operation dimension),which lays the groundwork for further study of risk management and qualitative and quantitative assessment.Next,the relationship between Formal Safety Assessment(FSA) and Risk Management was researched.This revealed that the FSA method,which the international maritime organization(IMO) is actively spreading,comes from Risk Management theory.Finally,conclusion were made about how to apply this risk management method to concrete fields efficiently and conveniently,as well as areas where further research is required.展开更多
Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor networ...Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor network system may fail and the evaluation of the severity of the damage caused by the failure. In this paper, we devise a methodology of Rough Outlier Detection (ROD) for the detection of security-based risk factor, which originates from violations of attack requirements (namely, attack risks). The methodology elaborates dimension reduction method to analyze the attack risk probability from high dimensional and nonlinear data set, and combines it with rough redundancy reduction and the distance measurement of kernel function which is obtained using the ROD. In this way, it is possible to determine the risky scenarios, and the analysis feedback can be used to improve the sensor network system design. We illustrate the methodology in the DARPA case set study using step-by-step approach and then prove that the method is effective in lowering the rate of false alarm.展开更多
Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are in...Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks.展开更多
The key issues studied focused on underground coal mining and included (1) prevention of explosions in sealed areas,(2) better emergency preparedness and re- sponse,(3) improvement of miners' ability to escape,(4)...The key issues studied focused on underground coal mining and included (1) prevention of explosions in sealed areas,(2) better emergency preparedness and re- sponse,(3) improvement of miners' ability to escape,(4) better protection of miners before and after a fire or explosion,(5) improved provision of oxygen,and (6) development and implementation of more robust post-incident communication.The U.S.Congress passed the Mine Improvement and New Emergency Response Act of 2006,which mandated new laws to address the issues.Concurrent with investigations and congressional deliberations, the National Mining Association formed the independent Mine Safety Technology and Training Commission to study the state-of-the-art relative to technology and training that could address the vulnerabilities exposed by the mine disasters.As discussed,the report outlined persistent vulnerabilities linked with significant hazards in underground coal mines, and made recommendations to provide a path for addressing them.Overall the commis- sion report made 75 recommendations in the areas of risk-based design and management, communications technology,emergency response and mine rescue procedures,training for preparedness,and escape and protection strategies.In its deliberations,the commis- sion importantly noted that mine safety in the U.S.needs to follow a new paradigm for en- suring mine safety and developing a culture of prevention that supports safe production at the business core.In the commission's viewpoint,the bottom line in protecting coal miners is not only adopting a culture of prevention but also systematically pursuing mitigation of significant risks.展开更多
Background The objective of this study was to assess the clinical safety and efficacy of vena cava filter (VCF) placement, with particular emphasis on the incidence and risk factors of inferior vena cava thrombosis ...Background The objective of this study was to assess the clinical safety and efficacy of vena cava filter (VCF) placement, with particular emphasis on the incidence and risk factors of inferior vena cava thrombosis (VCT) after VCF placement. Methods Clinical data of patients with venous thromboembolism (VTE), with or without placement of VCF, were analyzed in a retrospective single-center audit of medical records from January 2005 to June 2009. The collected data included demographics, procedural details, filter type, indications, and complications. Results A total of 168 cases of VTE (82 with VCF; 86 without VCF) were examined. Over a median follow-up of 24.2 months, VCT occurred in 18 of 82 patients with VCFs (11 males, 7 females, mean age 55.4 years). In 86 patients without VCFs, VCT occurred in only 6 individuals (4 males, 2 females) during the study period. VCT was observed more frequently in patients fitted with VCFs than in those without VCFs (22% vs. 7.0%). Conclusions The incidence of VCT in patients with VTE after VCF implantation was 22% approximately. Anticoagulation therapy should be continued for all patients with VCF placement, unless there is a specific contraindication. Almost all instances of VCT in patients with VCF implants in our study occurred after stopping anticoagulation treatment. The use of VCFs is increasing, and more trials are needed to confirm their benefit and accurately assess their safety.展开更多
The paper defines the Safety Capacity of Chemical Industrial Park(SCCIP) from the perspective of acceptable regional risk. For the purpose of exploring the evaluation model for the SCCIP, a method based on quantitativ...The paper defines the Safety Capacity of Chemical Industrial Park(SCCIP) from the perspective of acceptable regional risk. For the purpose of exploring the evaluation model for the SCCIP, a method based on quantitative risk assessment was adopted for evaluating transport risk and to confirm reasonable safety transport capacity of chemical industrial park, and then by combining with the safety storage capacity, a SCCIP evaluation model was put forward. The SCCIP was decided by the smaller one between the largest safety storage capacity and the maximum safety transport capacity, or else, the regional risk of the park will exceed the acceptable level.The developed method was applied to a chemical industrial park in Guangdong province to obtain the maximum safety transport capacity and the SCCIP. The results can be realized in the regional risk control of the park effectively.展开更多
As an abstract study conception,most researches of ecological security generally are macro-scale theoretical study with a regional,national or global perspective.Micro-scale research mainly concentrates on ecological ...As an abstract study conception,most researches of ecological security generally are macro-scale theoretical study with a regional,national or global perspective.Micro-scale research mainly concentrates on ecological risk,ecosystem health and ecosystem safety.In order to assess regional ecological security and to accomplish the transition from micro-scale to macro-scale research,a Driving-Function-State-Output-Respond model framework(DFSOR model) is put forward in this paper according to the analyses on regional population,society,economy,re-sources,environment and ecological risks.In empirical research an index system is set out to evaluate ecological se-curity of land use.The DFSOR model comprises f ive group of indicators:(1) driving indicators,which include social population pressure and economic pressure;(2) function indicators,which include human function,hydrodynamic function,wind function and gravity function;(3) state indicators,which include soil resources,water resources and land use/land cover;(4) output indicators,which include production output and ecological risk output;(5) response indicators,which are composed of all sorts of policies and measures for improving production of ecosystem.The method and procedure for ecological security evaluation is put forward based on DFSOR model as well.In the case study,Yanchi,the ecotone between agriculture and animal husbandry,is chosen for the study.An index system is built to evaluate ecological security based on the evaluation of regional ecological risks which including sandif ica-tion,water erosion,soil salinization,soil pollution and shortage of water.The comprehensive evaluation result shows the regional ecological security index of land use in the research area increase obviously.But it is still in the state of low-graded danger.展开更多
Gradual shift has been observed lately of dam safety procedures from the conventional technical based towards a wider scope of risk management procedure based on risk analysis. The new approach considers the likelihoo...Gradual shift has been observed lately of dam safety procedures from the conventional technical based towards a wider scope of risk management procedure based on risk analysis. The new approach considers the likelihood level of occurrence of a multitude of hazards and the magnitude of the resulting possible consequences in case of failure using rational cause and effect arguments. Most dam owners are shifting towards the use of the new risk based procedures; and even governments themselves are moving towards formalizing the new trend. Legislations in the United States were promulgated [1] after serious dam failures and the adoption of stringent levels of scrutiny led such federal dam owners to pioneer in this field and in developing the concepts and methods required. The comer stone in risk analysis is the definition of the potential modes that may lead to failure and assessment of the likelihood levels of their occurrence and possible category of the consequences which, after thorough evaluation, will shape the decision making. This type of analysis was applied to Mosul Dam as a case study and resulted in definite recommendations.展开更多
The solutions widely used at present for calculating complicated mine ventilation networks are ones in which resistance of the branches and characteristic parameters of the fans are taken as basic input data. But it i...The solutions widely used at present for calculating complicated mine ventilation networks are ones in which resistance of the branches and characteristic parameters of the fans are taken as basic input data. But it is time and energy consuming to obtain the branch resistance values. A new solution is developed in this paper in which the branch resistance values are obtained through measuring and evaluating the airflow of the whole ventilation network. Theoretical analysis is made of the establishment of a linear equation series with branch resistance as unknown numbers, an equation series for which one, and only one, result of solutions exists. This solution is programmed in C language and passed on a personal computer. The programmed solution programmed proves of practical use, as demonstrated by specific examples. Being different from other solutions, the method takes the branch airflow and fan working points as basic input data, and the present solution is of greater advantage for calculating ventilation networks of mines in operation.展开更多
The new type of risk management is process management. First, the hazardsources are identified before coal mine accidents occur, and then the pre-control measureand information monitoring method based on classifying t...The new type of risk management is process management. First, the hazardsources are identified before coal mine accidents occur, and then the pre-control measureand information monitoring method based on classifying the hidden hazard sources aregiven. Lastly, the risk pre-alarm and risk control method are confirmed, the managementstandard and management measure are used to eliminate the hidden hazard sources. Inthis study, an evaluation system is built to evaluate the result of risk management.展开更多
With the rapid growth of the number and flight time of unmanned aerial vehicles(UAVs),safety accidents caused by UAVs flight risk is increasing gradually.Safe air route planning is an effective means to reduce the ope...With the rapid growth of the number and flight time of unmanned aerial vehicles(UAVs),safety accidents caused by UAVs flight risk is increasing gradually.Safe air route planning is an effective means to reduce the operational risk of UAVs at the strategic level.The optimal air route planning model based on ground risk assessment is presented by considering the safety cost of UAV air route.Through the rasterization of the ground surface under the air route,the safety factor of each grid is defined with the probability of fatality on the ground per flight hour as the quantitative index.The air route safety cost function is constructed based on the safety factor of each grid.Then,the total cost function considering both air route safety and flight distance is established.The expected function of the ant colony algorithm is rebuilt and used as the algorithm to plan the air routes.The effectiveness of the new air route planning model is verified through the logistical distribution scenario on urban airspace.The results indicate that the new air route planning model considering safety factor can greatly improve the overall safety of air route under small increase of the total flight time.展开更多
基金Supported by the National Basic Research Program of China(973Program)(2010CB126100)Fundamental Research Funds forthe Central Universities~~
文摘The paper summarizes the research status on biological risks of agricultural GM laboratory and the risk factors of bio-safety in GM crops laboratory,and then proposes corresponding safety management suggestions.
文摘A set of model is established to optimize BSW Company’s component stock. By analyzing the company’s current part stock condition in terms of the occupation of capitals in the precondition of continuous production, it describes how to control the purchase parameters of import parts. The model describes how to adjust slightly product output sequence and how to control the components’ purchase parameters: purchasing risk time and purchase order quantity. Then simulation is developed to illustrate the model.
基金The National Natural Science Foundation of China(No.71071033)
文摘The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium levels of self-protection and insurance coverage under the non- cooperative condition are compared with socially optimal solutions, and the associated coordination mechanisms are proposed. The results show that self-protection investment increases in response to an increase in potential loss when the interdependent risk is small; the interdependent risk of security investments often induce firms to underinvest in security relative to the socially efficient level by ignoring marginal external costs or benefits conferred on others. A subsidy on self-protection investment from the government can help coordinate a firm's risk management decision and, thereby, improve individual security level and overall social welfare.
基金the National Natural Science Foundation of China (No.60573036).
文摘The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation.
基金Supported by the Shanghai Leading Academic Discipline Project Foundation under Grant No.T0602Supported by the Shanghai Education Commission Project Foundation under Grant No.05FZ10
文摘Quantified risk assessment(QRA) needs mathematicization of risk theory.However,attention has been paid almost exclusively to applications of assessment methods,which has led to neglect of research into fundamental theories,such as the relationships among risk,safety,danger,and so on.In order to solve this problem,as a first step,fundamental theoretical relationships about risk and risk management were analyzed for this paper in the light of mathematics,and then illustrated with some charts.Second,man-machine-environment-management(MMEM) theory was introduced into risk theory to analyze some properties of risk.On the basis of this,a three-dimensional model of risk management was established that includes:a goal dimension;a management dimension;an operation dimension.This goal management operation(GMO) model was explained and then emphasis was laid on the discussion of the risk flowchart(operation dimension),which lays the groundwork for further study of risk management and qualitative and quantitative assessment.Next,the relationship between Formal Safety Assessment(FSA) and Risk Management was researched.This revealed that the FSA method,which the international maritime organization(IMO) is actively spreading,comes from Risk Management theory.Finally,conclusion were made about how to apply this risk management method to concrete fields efficiently and conveniently,as well as areas where further research is required.
基金the Jiangsu 973 Scientific Project,the National Natural Science Foundation of China,the Jiangsu Natural Science Foundation,the Aerospace Innovation Fund,the Lianyungang Science & Technology Project
文摘Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor network system may fail and the evaluation of the severity of the damage caused by the failure. In this paper, we devise a methodology of Rough Outlier Detection (ROD) for the detection of security-based risk factor, which originates from violations of attack requirements (namely, attack risks). The methodology elaborates dimension reduction method to analyze the attack risk probability from high dimensional and nonlinear data set, and combines it with rough redundancy reduction and the distance measurement of kernel function which is obtained using the ROD. In this way, it is possible to determine the risky scenarios, and the analysis feedback can be used to improve the sensor network system design. We illustrate the methodology in the DARPA case set study using step-by-step approach and then prove that the method is effective in lowering the rate of false alarm.
基金supported by Natural Science Foundation of China under award No.61303024Natural Science Foundation of Jiangsu Province under award No.BK20130372+3 种基金National 973 Program of China under award No.2014CB340600National High Tech 863 Program of China under award No.2015AA016002supported by Natural Science Foundation of China under award No.61272452supported in part by ARO Grant # W911NF-12-1-0286 and NSF Grant #1111925
文摘Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks.
文摘The key issues studied focused on underground coal mining and included (1) prevention of explosions in sealed areas,(2) better emergency preparedness and re- sponse,(3) improvement of miners' ability to escape,(4) better protection of miners before and after a fire or explosion,(5) improved provision of oxygen,and (6) development and implementation of more robust post-incident communication.The U.S.Congress passed the Mine Improvement and New Emergency Response Act of 2006,which mandated new laws to address the issues.Concurrent with investigations and congressional deliberations, the National Mining Association formed the independent Mine Safety Technology and Training Commission to study the state-of-the-art relative to technology and training that could address the vulnerabilities exposed by the mine disasters.As discussed,the report outlined persistent vulnerabilities linked with significant hazards in underground coal mines, and made recommendations to provide a path for addressing them.Overall the commis- sion report made 75 recommendations in the areas of risk-based design and management, communications technology,emergency response and mine rescue procedures,training for preparedness,and escape and protection strategies.In its deliberations,the commis- sion importantly noted that mine safety in the U.S.needs to follow a new paradigm for en- suring mine safety and developing a culture of prevention that supports safe production at the business core.In the commission's viewpoint,the bottom line in protecting coal miners is not only adopting a culture of prevention but also systematically pursuing mitigation of significant risks.
文摘Background The objective of this study was to assess the clinical safety and efficacy of vena cava filter (VCF) placement, with particular emphasis on the incidence and risk factors of inferior vena cava thrombosis (VCT) after VCF placement. Methods Clinical data of patients with venous thromboembolism (VTE), with or without placement of VCF, were analyzed in a retrospective single-center audit of medical records from January 2005 to June 2009. The collected data included demographics, procedural details, filter type, indications, and complications. Results A total of 168 cases of VTE (82 with VCF; 86 without VCF) were examined. Over a median follow-up of 24.2 months, VCT occurred in 18 of 82 patients with VCFs (11 males, 7 females, mean age 55.4 years). In 86 patients without VCFs, VCT occurred in only 6 individuals (4 males, 2 females) during the study period. VCT was observed more frequently in patients fitted with VCFs than in those without VCFs (22% vs. 7.0%). Conclusions The incidence of VCT in patients with VTE after VCF implantation was 22% approximately. Anticoagulation therapy should be continued for all patients with VCF placement, unless there is a specific contraindication. Almost all instances of VCT in patients with VCF implants in our study occurred after stopping anticoagulation treatment. The use of VCFs is increasing, and more trials are needed to confirm their benefit and accurately assess their safety.
基金Supported by the Science and Technology Department of Guangdong Province(2009A030302001)
文摘The paper defines the Safety Capacity of Chemical Industrial Park(SCCIP) from the perspective of acceptable regional risk. For the purpose of exploring the evaluation model for the SCCIP, a method based on quantitative risk assessment was adopted for evaluating transport risk and to confirm reasonable safety transport capacity of chemical industrial park, and then by combining with the safety storage capacity, a SCCIP evaluation model was put forward. The SCCIP was decided by the smaller one between the largest safety storage capacity and the maximum safety transport capacity, or else, the regional risk of the park will exceed the acceptable level.The developed method was applied to a chemical industrial park in Guangdong province to obtain the maximum safety transport capacity and the SCCIP. The results can be realized in the regional risk control of the park effectively.
基金supported by the National Key Technologies R&D Program of China during the 10th Five-Year Plan Period (Grant No. 2002BA517A114)National Key Technologies R&D Program (Grant No. 2007BAB23C03).
文摘As an abstract study conception,most researches of ecological security generally are macro-scale theoretical study with a regional,national or global perspective.Micro-scale research mainly concentrates on ecological risk,ecosystem health and ecosystem safety.In order to assess regional ecological security and to accomplish the transition from micro-scale to macro-scale research,a Driving-Function-State-Output-Respond model framework(DFSOR model) is put forward in this paper according to the analyses on regional population,society,economy,re-sources,environment and ecological risks.In empirical research an index system is set out to evaluate ecological se-curity of land use.The DFSOR model comprises f ive group of indicators:(1) driving indicators,which include social population pressure and economic pressure;(2) function indicators,which include human function,hydrodynamic function,wind function and gravity function;(3) state indicators,which include soil resources,water resources and land use/land cover;(4) output indicators,which include production output and ecological risk output;(5) response indicators,which are composed of all sorts of policies and measures for improving production of ecosystem.The method and procedure for ecological security evaluation is put forward based on DFSOR model as well.In the case study,Yanchi,the ecotone between agriculture and animal husbandry,is chosen for the study.An index system is built to evaluate ecological security based on the evaluation of regional ecological risks which including sandif ica-tion,water erosion,soil salinization,soil pollution and shortage of water.The comprehensive evaluation result shows the regional ecological security index of land use in the research area increase obviously.But it is still in the state of low-graded danger.
文摘Gradual shift has been observed lately of dam safety procedures from the conventional technical based towards a wider scope of risk management procedure based on risk analysis. The new approach considers the likelihood level of occurrence of a multitude of hazards and the magnitude of the resulting possible consequences in case of failure using rational cause and effect arguments. Most dam owners are shifting towards the use of the new risk based procedures; and even governments themselves are moving towards formalizing the new trend. Legislations in the United States were promulgated [1] after serious dam failures and the adoption of stringent levels of scrutiny led such federal dam owners to pioneer in this field and in developing the concepts and methods required. The comer stone in risk analysis is the definition of the potential modes that may lead to failure and assessment of the likelihood levels of their occurrence and possible category of the consequences which, after thorough evaluation, will shape the decision making. This type of analysis was applied to Mosul Dam as a case study and resulted in definite recommendations.
文摘The solutions widely used at present for calculating complicated mine ventilation networks are ones in which resistance of the branches and characteristic parameters of the fans are taken as basic input data. But it is time and energy consuming to obtain the branch resistance values. A new solution is developed in this paper in which the branch resistance values are obtained through measuring and evaluating the airflow of the whole ventilation network. Theoretical analysis is made of the establishment of a linear equation series with branch resistance as unknown numbers, an equation series for which one, and only one, result of solutions exists. This solution is programmed in C language and passed on a personal computer. The programmed solution programmed proves of practical use, as demonstrated by specific examples. Being different from other solutions, the method takes the branch airflow and fan working points as basic input data, and the present solution is of greater advantage for calculating ventilation networks of mines in operation.
基金Supported by the National Natural Science Foundation of China(70533050)the Eleventh Five-year Science & Technology Support Plan of China(2006BAK03B0703)the Ministry of Education Humanities and Social Science (08JA630083)
文摘The new type of risk management is process management. First, the hazardsources are identified before coal mine accidents occur, and then the pre-control measureand information monitoring method based on classifying the hidden hazard sources aregiven. Lastly, the risk pre-alarm and risk control method are confirmed, the managementstandard and management measure are used to eliminate the hidden hazard sources. Inthis study, an evaluation system is built to evaluate the result of risk management.
基金This work is supported by the Scientific Research Project of Tianjin Education Commission(No.2019KJ128).
文摘With the rapid growth of the number and flight time of unmanned aerial vehicles(UAVs),safety accidents caused by UAVs flight risk is increasing gradually.Safe air route planning is an effective means to reduce the operational risk of UAVs at the strategic level.The optimal air route planning model based on ground risk assessment is presented by considering the safety cost of UAV air route.Through the rasterization of the ground surface under the air route,the safety factor of each grid is defined with the probability of fatality on the ground per flight hour as the quantitative index.The air route safety cost function is constructed based on the safety factor of each grid.Then,the total cost function considering both air route safety and flight distance is established.The expected function of the ant colony algorithm is rebuilt and used as the algorithm to plan the air routes.The effectiveness of the new air route planning model is verified through the logistical distribution scenario on urban airspace.The results indicate that the new air route planning model considering safety factor can greatly improve the overall safety of air route under small increase of the total flight time.