期刊文献+
共找到73篇文章
< 1 2 4 >
每页显示 20 50 100
深基坑施工安全风险分析与控制措施研究
1
作者 徐曾武 付绍强 孔灵 《水利水电施工》 2024年第3期154-160,共7页
在现代城市建设中,越来越多的高层建筑和道路需要在复杂的城市环境中建造,这就需要对深基坑施工安全进行更加严格的控制和管理。本文结合以往工程经验,围绕复杂环境下深基坑施工安全风险分析与控制措施进行研究。
关键词 复杂环境 深基坑施工 安全风 控制措施
下载PDF
边缘智能的配网现场作业安全风险管控
2
作者 宋继伟 邵可欣 +2 位作者 梁鑫 杨尧 陈绍瑞 《中文科技期刊数据库(文摘版)工程技术》 2022年第10期163-166,共4页
随着边缘智能的发展,智能配网作业逐步成为配网作业安全风险管控的重要手段。在配网现场作业中,当作业人员需要跨越安全警戒线进行带电作业时,可以通过智能终端将现场作业状况通过智能终端传送到边缘计算平台实现实时采集。同时,根据实... 随着边缘智能的发展,智能配网作业逐步成为配网作业安全风险管控的重要手段。在配网现场作业中,当作业人员需要跨越安全警戒线进行带电作业时,可以通过智能终端将现场作业状况通过智能终端传送到边缘计算平台实现实时采集。同时,根据实时情况可以判断作业人员是否有误操作的风险。如果存在误操作,可将异常情况及时反馈给运维人员进行处理;如果存在误操作,可直接发送报警信息或通过智能终端进行报警提醒、紧急停送电等操作。智能终端将实时记录作业人员位置信息及现场运行状况信息,并利用网络传输给运维人员,通过智能终端可实现对作业人员现场进行视频巡视确认或状态反馈,保障现场作业安全有序开展。智能终端的数据可被云端存储、分析与管理,从而实现高效、便捷、安全地完成作业过程。未来将继续以智能终端为载体,以设备监测技术为支撑,应用智能分析技术,结合边缘计算平台进行智能化管理、智能化运维业务平台进行智能化分析和智能化管理。 展开更多
关键词 边缘智能 配网作业 安全风
下载PDF
浅析计算机网络安全及风险防范措施
3
作者 张效强 《中国电子商务》 2009年第8期51-51,共1页
随着技术的发展和社会的进步,计算机网络与人们的工作和生活联系越来越密切。但网络在给人们带来便利的同时,暴露出的安全隐患也不容忽视。本文分析了计算机网络面临的威胁形式,提出了网络风险防范措施。
关键词 计算机 网络安全风 险防范
下载PDF
福建省人民政府关于进一步加强煤矿安全工作的意见
4
《福建省人民政府公报》 2005年第14期5-8,共4页
漳州、泉州、三明、南平、龙岩市人民政府,省直有关单位: 煤炭是我省能源的主体,是经济发展的重要保证,我省年需要量约4000多万吨,省产煤炭约占一半,其中:省属煤矿占30%,地方乡镇煤矿占70%。2004年我省煤矿共发生各类事故80起,死亡100人... 漳州、泉州、三明、南平、龙岩市人民政府,省直有关单位: 煤炭是我省能源的主体,是经济发展的重要保证,我省年需要量约4000多万吨,省产煤炭约占一半,其中:省属煤矿占30%,地方乡镇煤矿占70%。2004年我省煤矿共发生各类事故80起,死亡100人,与上年同比,事故起数减少17起,下降了17.5%,死亡人数减少9人,下降了8.25%。煤炭行业是高危行业,我省煤炭赋存条件差、断层褶皱多、煤层薄、顶板破碎、水患较严重、煤矿规模小、办矿起点低,这些都增加了我省煤矿安全管理的难度,煤矿安全生产形势仍很严峻。 展开更多
关键词 煤矿安全 乡镇煤矿 省直有关单位 安全监察机构 煤炭行业管理 赋存条件 安全监管局 国有煤矿 安全风
下载PDF
Research Progress on Biological Risks of Agricultural GM Laboratory
5
作者 杨君 杨德礼 《Agricultural Science & Technology》 CAS 2010年第9期105-108,共4页
The paper summarizes the research status on biological risks of agricultural GM laboratory and the risk factors of bio-safety in GM crops laboratory,and then proposes corresponding safety management suggestions.
关键词 GM crops LABORATORY RISK Bio-safety
下载PDF
Research on Optimization of Component Stock
6
作者 王海霞 汤文成 钟秉林 《Journal of Southeast University(English Edition)》 EI CAS 1999年第1期101-105,共5页
A set of model is established to optimize BSW Company’s component stock. By analyzing the company’s current part stock condition in terms of the occupation of capitals in the precondition of continuous production, i... A set of model is established to optimize BSW Company’s component stock. By analyzing the company’s current part stock condition in terms of the occupation of capitals in the precondition of continuous production, it describes how to control the purchase parameters of import parts. The model describes how to adjust slightly product output sequence and how to control the components’ purchase parameters: purchasing risk time and purchase order quantity. Then simulation is developed to illustrate the model. 展开更多
关键词 stock control purchase time fence purchasing risk time safety stock quantity economic order quantity
下载PDF
Optimization and coordination model of information system security investment for interdependent risk
7
作者 顾建强 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2015年第2期288-293,共6页
The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium lev... The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium levels of self-protection and insurance coverage under the non- cooperative condition are compared with socially optimal solutions, and the associated coordination mechanisms are proposed. The results show that self-protection investment increases in response to an increase in potential loss when the interdependent risk is small; the interdependent risk of security investments often induce firms to underinvest in security relative to the socially efficient level by ignoring marginal external costs or benefits conferred on others. A subsidy on self-protection investment from the government can help coordinate a firm's risk management decision and, thereby, improve individual security level and overall social welfare. 展开更多
关键词 interdependent risk cyber security insurance SELF-PROTECTION COORDINATION
下载PDF
A RISK ASSESSMENT METHOD OF THE WIRELESS NETWORK SECURITY 被引量:13
8
作者 Zhao Dongmei Wang Changguang Ma Jianfeng 《Journal of Electronics(China)》 2007年第3期428-432,共5页
The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method ... The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation. 展开更多
关键词 Wireless network Risk assessment Analytic Hierarchy Process (AHP) method Fuzzy logical method
下载PDF
Risk management modeling and its application in maritime safety 被引量:4
9
作者 秦庭荣 陈伟炯 曾祥堃 《Journal of Marine Science and Application》 2008年第4期286-291,共6页
Quantified risk assessment(QRA) needs mathematicization of risk theory.However,attention has been paid almost exclusively to applications of assessment methods,which has led to neglect of research into fundamental the... Quantified risk assessment(QRA) needs mathematicization of risk theory.However,attention has been paid almost exclusively to applications of assessment methods,which has led to neglect of research into fundamental theories,such as the relationships among risk,safety,danger,and so on.In order to solve this problem,as a first step,fundamental theoretical relationships about risk and risk management were analyzed for this paper in the light of mathematics,and then illustrated with some charts.Second,man-machine-environment-management(MMEM) theory was introduced into risk theory to analyze some properties of risk.On the basis of this,a three-dimensional model of risk management was established that includes:a goal dimension;a management dimension;an operation dimension.This goal management operation(GMO) model was explained and then emphasis was laid on the discussion of the risk flowchart(operation dimension),which lays the groundwork for further study of risk management and qualitative and quantitative assessment.Next,the relationship between Formal Safety Assessment(FSA) and Risk Management was researched.This revealed that the FSA method,which the international maritime organization(IMO) is actively spreading,comes from Risk Management theory.Finally,conclusion were made about how to apply this risk management method to concrete fields efficiently and conveniently,as well as areas where further research is required. 展开更多
关键词 risk flowchar safety assessment GMO model MMEM theory QRA
下载PDF
Rough Outlier Detection Based Security Risk Analysis Methodology 被引量:13
10
作者 Li Qianmu Li Jia 《China Communications》 SCIE CSCD 2012年第7期14-21,共8页
Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor networ... Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor network system may fail and the evaluation of the severity of the damage caused by the failure. In this paper, we devise a methodology of Rough Outlier Detection (ROD) for the detection of security-based risk factor, which originates from violations of attack requirements (namely, attack risks). The methodology elaborates dimension reduction method to analyze the attack risk probability from high dimensional and nonlinear data set, and combines it with rough redundancy reduction and the distance measurement of kernel function which is obtained using the ROD. In this way, it is possible to determine the risky scenarios, and the analysis feedback can be used to improve the sensor network system design. We illustrate the methodology in the DARPA case set study using step-by-step approach and then prove that the method is effective in lowering the rate of false alarm. 展开更多
关键词 rough outlier risk analysis dimensionality reduction
下载PDF
关于组织公路水运建设项目平安工程冠名工作的通知
11
《国家安全生产监督管理总局国家煤矿安全监察局公告》 2012年第12期47-50,共4页
交质监发[2012]639号各省、自治区、直辖市、新疆生产建设兵团交通运输厅(局、委)、安全生产监督管理局,上海市、天津市交通运输和港口管理局,天津市市政公路管理局,长江航务管理局,长江口航道管理局,中国交通建设集团有限公司:为严格... 交质监发[2012]639号各省、自治区、直辖市、新疆生产建设兵团交通运输厅(局、委)、安全生产监督管理局,上海市、天津市交通运输和港口管理局,天津市市政公路管理局,长江航务管理局,长江口航道管理局,中国交通建设集团有限公司:为严格项目安全生产责任制的目标考核,引导和激励企业加强安全生产,不断提升公路水运工程建设安全管理水平,深入推进平安工地长效机制建设,经研究。 展开更多
关键词 建设项目 公路水运 安全监管总局 质量监督局 长江航务管理局 安全管理人员 特种作业人员 施工安全风
下载PDF
Dependence-Induced Risk: Security Metrics and Their Measurement Framework 被引量:2
12
作者 Liqiang Zhang Fei Yan +1 位作者 Bo Zhao Shouhuai Xu 《China Communications》 SCIE CSCD 2016年第11期119-128,共10页
Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are in... Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks. 展开更多
关键词 Cyberspace security security metrics exploitability surface attack conse quence risk assessment
下载PDF
Improving mine safety technology and training in the U.S.recommendations of the Mine Safety Technology and Training Commission 被引量:4
13
作者 GRAYSON R. Larry 《Journal of Coal Science & Engineering(China)》 2008年第3期425-431,共7页
The key issues studied focused on underground coal mining and included (1) prevention of explosions in sealed areas,(2) better emergency preparedness and re- sponse,(3) improvement of miners' ability to escape,(4)... The key issues studied focused on underground coal mining and included (1) prevention of explosions in sealed areas,(2) better emergency preparedness and re- sponse,(3) improvement of miners' ability to escape,(4) better protection of miners before and after a fire or explosion,(5) improved provision of oxygen,and (6) development and implementation of more robust post-incident communication.The U.S.Congress passed the Mine Improvement and New Emergency Response Act of 2006,which mandated new laws to address the issues.Concurrent with investigations and congressional deliberations, the National Mining Association formed the independent Mine Safety Technology and Training Commission to study the state-of-the-art relative to technology and training that could address the vulnerabilities exposed by the mine disasters.As discussed,the report outlined persistent vulnerabilities linked with significant hazards in underground coal mines, and made recommendations to provide a path for addressing them.Overall the commis- sion report made 75 recommendations in the areas of risk-based design and management, communications technology,emergency response and mine rescue procedures,training for preparedness,and escape and protection strategies.In its deliberations,the commis- sion importantly noted that mine safety in the U.S.needs to follow a new paradigm for en- suring mine safety and developing a culture of prevention that supports safe production at the business core.In the commission's viewpoint,the bottom line in protecting coal miners is not only adopting a culture of prevention but also systematically pursuing mitigation of significant risks. 展开更多
关键词 mine safety mine disasters new safety paradigm risk management
下载PDF
Vena cava thrombosis after vena cava filter placement: Incidence and risk factors 被引量:7
14
作者 Ya-Juan Guo Jun Feng Tian-Rong Qu Yan Qu Ya-Min Liu Yu-Shun Zhang Hong-Yan Tian Ai-Qun Ma 《Journal of Geriatric Cardiology》 SCIE CAS CSCD 2011年第2期99-103,共5页
Background The objective of this study was to assess the clinical safety and efficacy of vena cava filter (VCF) placement, with particular emphasis on the incidence and risk factors of inferior vena cava thrombosis ... Background The objective of this study was to assess the clinical safety and efficacy of vena cava filter (VCF) placement, with particular emphasis on the incidence and risk factors of inferior vena cava thrombosis (VCT) after VCF placement. Methods Clinical data of patients with venous thromboembolism (VTE), with or without placement of VCF, were analyzed in a retrospective single-center audit of medical records from January 2005 to June 2009. The collected data included demographics, procedural details, filter type, indications, and complications. Results A total of 168 cases of VTE (82 with VCF; 86 without VCF) were examined. Over a median follow-up of 24.2 months, VCT occurred in 18 of 82 patients with VCFs (11 males, 7 females, mean age 55.4 years). In 86 patients without VCFs, VCT occurred in only 6 individuals (4 males, 2 females) during the study period. VCT was observed more frequently in patients fitted with VCFs than in those without VCFs (22% vs. 7.0%). Conclusions The incidence of VCT in patients with VTE after VCF implantation was 22% approximately. Anticoagulation therapy should be continued for all patients with VCF placement, unless there is a specific contraindication. Almost all instances of VCT in patients with VCF implants in our study occurred after stopping anticoagulation treatment. The use of VCFs is increasing, and more trials are needed to confirm their benefit and accurately assess their safety. 展开更多
关键词 vena cava filters venous thromboembolism COMPLICATION
下载PDF
Evaluation model for safety capacity of chemical industrial park based on acceptable regional risk 被引量:6
15
作者 陈国华 王树坤 谭小群 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2015年第1期121-127,共7页
The paper defines the Safety Capacity of Chemical Industrial Park(SCCIP) from the perspective of acceptable regional risk. For the purpose of exploring the evaluation model for the SCCIP, a method based on quantitativ... The paper defines the Safety Capacity of Chemical Industrial Park(SCCIP) from the perspective of acceptable regional risk. For the purpose of exploring the evaluation model for the SCCIP, a method based on quantitative risk assessment was adopted for evaluating transport risk and to confirm reasonable safety transport capacity of chemical industrial park, and then by combining with the safety storage capacity, a SCCIP evaluation model was put forward. The SCCIP was decided by the smaller one between the largest safety storage capacity and the maximum safety transport capacity, or else, the regional risk of the park will exceed the acceptable level.The developed method was applied to a chemical industrial park in Guangdong province to obtain the maximum safety transport capacity and the SCCIP. The results can be realized in the regional risk control of the park effectively. 展开更多
关键词 SCCIP Safety transport capacity Safety storage capacity Regional risk
下载PDF
Comprehensive evaluation of regional ecological security for land use:a case study of Yanchi County, Ningxia Province 被引量:2
16
作者 Li Xiaofeng Zhang Yonghua Zhang Hongye 《Ecological Economy》 2008年第4期428-439,共12页
As an abstract study conception,most researches of ecological security generally are macro-scale theoretical study with a regional,national or global perspective.Micro-scale research mainly concentrates on ecological ... As an abstract study conception,most researches of ecological security generally are macro-scale theoretical study with a regional,national or global perspective.Micro-scale research mainly concentrates on ecological risk,ecosystem health and ecosystem safety.In order to assess regional ecological security and to accomplish the transition from micro-scale to macro-scale research,a Driving-Function-State-Output-Respond model framework(DFSOR model) is put forward in this paper according to the analyses on regional population,society,economy,re-sources,environment and ecological risks.In empirical research an index system is set out to evaluate ecological se-curity of land use.The DFSOR model comprises f ive group of indicators:(1) driving indicators,which include social population pressure and economic pressure;(2) function indicators,which include human function,hydrodynamic function,wind function and gravity function;(3) state indicators,which include soil resources,water resources and land use/land cover;(4) output indicators,which include production output and ecological risk output;(5) response indicators,which are composed of all sorts of policies and measures for improving production of ecosystem.The method and procedure for ecological security evaluation is put forward based on DFSOR model as well.In the case study,Yanchi,the ecotone between agriculture and animal husbandry,is chosen for the study.An index system is built to evaluate ecological security based on the evaluation of regional ecological risks which including sandif ica-tion,water erosion,soil salinization,soil pollution and shortage of water.The comprehensive evaluation result shows the regional ecological security index of land use in the research area increase obviously.But it is still in the state of low-graded danger. 展开更多
关键词 DFSOR model Ecological risk Ecological security
下载PDF
Risk Management Concepts in Dam Safety Evaluation: Mosul Dam as a Case Study 被引量:3
17
作者 Nasrat Adamo Nadhir Al-Ansari +2 位作者 Jan Laue Sven Knutsson Varoujan Sissakian 《Journal of Civil Engineering and Architecture》 2017年第7期635-652,共18页
Gradual shift has been observed lately of dam safety procedures from the conventional technical based towards a wider scope of risk management procedure based on risk analysis. The new approach considers the likelihoo... Gradual shift has been observed lately of dam safety procedures from the conventional technical based towards a wider scope of risk management procedure based on risk analysis. The new approach considers the likelihood level of occurrence of a multitude of hazards and the magnitude of the resulting possible consequences in case of failure using rational cause and effect arguments. Most dam owners are shifting towards the use of the new risk based procedures; and even governments themselves are moving towards formalizing the new trend. Legislations in the United States were promulgated [1] after serious dam failures and the adoption of stringent levels of scrutiny led such federal dam owners to pioneer in this field and in developing the concepts and methods required. The comer stone in risk analysis is the definition of the potential modes that may lead to failure and assessment of the likelihood levels of their occurrence and possible category of the consequences which, after thorough evaluation, will shape the decision making. This type of analysis was applied to Mosul Dam as a case study and resulted in definite recommendations. 展开更多
关键词 Risk analysis risk management Mosul Dam Iraq
下载PDF
Method of branch ariflow for calculatinga complicated mine ventilation networks 被引量:1
18
作者 刘泽功 《Journal of Coal Science & Engineering(China)》 2001年第1期64-69,共6页
The solutions widely used at present for calculating complicated mine ventilation networks are ones in which resistance of the branches and characteristic parameters of the fans are taken as basic input data. But it i... The solutions widely used at present for calculating complicated mine ventilation networks are ones in which resistance of the branches and characteristic parameters of the fans are taken as basic input data. But it is time and energy consuming to obtain the branch resistance values. A new solution is developed in this paper in which the branch resistance values are obtained through measuring and evaluating the airflow of the whole ventilation network. Theoretical analysis is made of the establishment of a linear equation series with branch resistance as unknown numbers, an equation series for which one, and only one, result of solutions exists. This solution is programmed in C language and passed on a personal computer. The programmed solution programmed proves of practical use, as demonstrated by specific examples. Being different from other solutions, the method takes the branch airflow and fan working points as basic input data, and the present solution is of greater advantage for calculating ventilation networks of mines in operation. 展开更多
关键词 air resistance MEASUREMENTS CALCULATION COMPUTERS
下载PDF
Study on the evaluation system for the coal safety management based on risk pre-control 被引量:1
19
作者 LI Xin-chun XU Hai-xia +1 位作者 WANG Pei SONG Xue-feng 《Journal of Coal Science & Engineering(China)》 2009年第1期108-112,共5页
The new type of risk management is process management. First, the hazardsources are identified before coal mine accidents occur, and then the pre-control measureand information monitoring method based on classifying t... The new type of risk management is process management. First, the hazardsources are identified before coal mine accidents occur, and then the pre-control measureand information monitoring method based on classifying the hidden hazard sources aregiven. Lastly, the risk pre-alarm and risk control method are confirmed, the managementstandard and management measure are used to eliminate the hidden hazard sources. Inthis study, an evaluation system is built to evaluate the result of risk management. 展开更多
关键词 risk pre-control coal safety management evaluation system
下载PDF
An Air Route Planning Model of Unmanned Aerial Vehicles Under Constraints of Ground Safety 被引量:2
20
作者 HAN Peng ZHAO Yifei 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第2期298-305,共8页
With the rapid growth of the number and flight time of unmanned aerial vehicles(UAVs),safety accidents caused by UAVs flight risk is increasing gradually.Safe air route planning is an effective means to reduce the ope... With the rapid growth of the number and flight time of unmanned aerial vehicles(UAVs),safety accidents caused by UAVs flight risk is increasing gradually.Safe air route planning is an effective means to reduce the operational risk of UAVs at the strategic level.The optimal air route planning model based on ground risk assessment is presented by considering the safety cost of UAV air route.Through the rasterization of the ground surface under the air route,the safety factor of each grid is defined with the probability of fatality on the ground per flight hour as the quantitative index.The air route safety cost function is constructed based on the safety factor of each grid.Then,the total cost function considering both air route safety and flight distance is established.The expected function of the ant colony algorithm is rebuilt and used as the algorithm to plan the air routes.The effectiveness of the new air route planning model is verified through the logistical distribution scenario on urban airspace.The results indicate that the new air route planning model considering safety factor can greatly improve the overall safety of air route under small increase of the total flight time. 展开更多
关键词 air transportation unmanned aerial vehicle(UAV) air route planning safety cost ground risk assessment improved ant colony algorithm
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部