According to the current working status of underground safety management and production scheduling, the importance and existed problem of underground mine radio communication were summarized, and the basic principle a...According to the current working status of underground safety management and production scheduling, the importance and existed problem of underground mine radio communication were summarized, and the basic principle and classification of leaky feeder cable were introduced and the characteristics of cable were analyzed specifically in depth, and the application model of radio communication system for underground mine safety management was put forward. Meanwhile, the research explanation of the system component, function and evaluation was provided. The discussion result indicates that communication system of underground mine safety management which is integrated two-way relay amplifier and other equipment has many communication functions, and underground mine mobile communication can be achieved well.展开更多
This paper aims to study the architectural design and planning of the Egyptian nuclear research centers. Three Egyptian nuclear research centers and the proposed nuclear research center have been studied. These center...This paper aims to study the architectural design and planning of the Egyptian nuclear research centers. Three Egyptian nuclear research centers and the proposed nuclear research center have been studied. These centers are the Nuclear Research Center in Inshas, the Hot laboratories and Waste Management Center in Inshas, the National Center for Radiation Research and Technology in Nasr City and the proposed Nuclear Research Center in North Western Coast of Egypt. Also, the paper aims to study the functions of these centers, as well as the types of their existing facilities. The paper investigates the principles and standards used in design and planning of these nuclear research centers. A comparative study has been conducted to those four nuclear research centers to evaluate the centers according to the site characteristics and the basic safety factors. The results were compared to determine the best design and planning. The proposed Nuclear Research Center in North Western Coast of Egypt proved to be the best among all with regard to design and planning, taking into consideration the radiation safety requirements. The architects are recommended to design and plan the nuclear research centers, taking into consideration the radial planning concept because it is the best with regard to radiation safety requirements.展开更多
This paper describes the design and implementation of a coal mine safety management information system based on Ajax. The whole system includes two alarm processing subsystem and management subsystem. Alarm processing...This paper describes the design and implementation of a coal mine safety management information system based on Ajax. The whole system includes two alarm processing subsystem and management subsystem. Alarm processing subsystem in the server, used to analyzed monitoring data of underground mine, judged whether it is in an abnormal state, also including the crews time recorded by RFID, so that timely alarm data is written to the database for the use of management infonlaation system; management information system adopts the three layer system structure based on B/S, the client the use of ax technology for an asynchronous request to the server, the server operation backstagc Oracle database to complete the business logic processing, and the results in XML form and return it to the client, the subsystem to the user to provide an interactive platform, users can monitor the underground state in real time, at the same time when the abnormal status, the system can timely alarm, prevent the occurrence of coal mine accidents.展开更多
With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to de...With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to deal and the lack of an effective response to the treatment process as well as on security incidents. To solve these problems, the proposed design of a unified management platform for a variety of heterogeneous network security equipment. A brief introduction for the main functions of the platform.The article proposed a traffic handling mechanisms of heterogeneous security devices, allowing the platform to support heterogeneous security devices.展开更多
One of the most important tasks of security is the quality of the project substation substation construction project management, construction project management, including project bidding and engineering, electrical e...One of the most important tasks of security is the quality of the project substation substation construction project management, construction project management, including project bidding and engineering, electrical engineering and civil construction, engineering, quality control, safety management and supervision costs control, on-site supervision over the links, these links chain, indivisible, so long as a part of the management problems, will lead the entire construction project management effectiveness be affected, so it must be every link control and management work done, in order to guarantee the quality of the entire substation, in order to make security of supply substations, electrical safety and vital interests of users are protected. In this paper, the author details the three aspects substation construction management of the project, namely the concept of substation engineering, project management and construction safety, through these three aspects, the author analyzes the construction project management substation existing problems, To solve these problems and issues proposed some measures and construction process that need attention. It launched separately from the design, schedule, quality and other aspects of security and research, and in the course of the study stressed the importance of coordination between elements of construction and construction sectors as well as cooperation between the construction, explains the importance of the project cost control.展开更多
The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluat...The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security展开更多
Large leisure activities usually use large sport facilities. There is often no serious problem with people gathering, but both incomplete facilities and negligence of people security manage may court injury or death. ...Large leisure activities usually use large sport facilities. There is often no serious problem with people gathering, but both incomplete facilities and negligence of people security manage may court injury or death. The purpose of this study is to analyze crowded nodes and to improve evacuation path use Simulex models. The fastest and safest way to achieve safe egress was then well planned. For turn locations, it was found that fixing the plane angle did not significantly raise the overall exiting efficiency. However, replacing the right angle or other angles with arc angle makes overall exiting moving line more fluent. For multito single-directional converging T-junction intersections, modification of turn angle increased the movement fluency, with the higher the modified angle, the higher in fluency. However, changing to round angle did not have as significant effect as expected while gate opening width must be increased to 1.0 m before more significant effects were produced. The results showed that modifying turn angles to 60° produces better improvements.展开更多
Advanced intelligent or "smart" meters are being deployed in Asia. A result of deployment of smart meters, with associated equipment, is the electric power industry faced with new and changing threats, vulnerabiliti...Advanced intelligent or "smart" meters are being deployed in Asia. A result of deployment of smart meters, with associated equipment, is the electric power industry faced with new and changing threats, vulnerabilities and re-evaluate traditional approaches to cyber security. Protection against emerging cyber-security threats targeting smart meter infrastructures will increase risk to both the utility and customer if not addressed within initial rollouts. This paper will discuss the issues in SMI (smart meter infrastructures) deployments that pertain to cyber security. It will cover topics such as the threats to operations, infrastructure, network and people and organization and their associated risks. SMI deployments include not only the smart meter, but also the interfaces for home energy management systems as well as communication interfaces back to the utility. Utilities must recognize and anticipate the new threat landscape that can attack and compromise the meter and the associated field network collectors. They must also include threats to the WAN (wide-area-network) backhaul networks, smart meter headends, MDMS (meter data management systems) and their interfaces to CIS (customer information systems) and billing and OMS (outage management systems). Lessons learned from SMI implementations from North America, Europe and recently, Japan, will be discussed. How white-box and black-box testing techniques are applied to determine the threat impact to the SMI. Finally, organizational change risk will be discussed and how utilities have responded to re-organizing and developing a security governance structure for the SMI and other smart grid applications.展开更多
文摘According to the current working status of underground safety management and production scheduling, the importance and existed problem of underground mine radio communication were summarized, and the basic principle and classification of leaky feeder cable were introduced and the characteristics of cable were analyzed specifically in depth, and the application model of radio communication system for underground mine safety management was put forward. Meanwhile, the research explanation of the system component, function and evaluation was provided. The discussion result indicates that communication system of underground mine safety management which is integrated two-way relay amplifier and other equipment has many communication functions, and underground mine mobile communication can be achieved well.
文摘This paper aims to study the architectural design and planning of the Egyptian nuclear research centers. Three Egyptian nuclear research centers and the proposed nuclear research center have been studied. These centers are the Nuclear Research Center in Inshas, the Hot laboratories and Waste Management Center in Inshas, the National Center for Radiation Research and Technology in Nasr City and the proposed Nuclear Research Center in North Western Coast of Egypt. Also, the paper aims to study the functions of these centers, as well as the types of their existing facilities. The paper investigates the principles and standards used in design and planning of these nuclear research centers. A comparative study has been conducted to those four nuclear research centers to evaluate the centers according to the site characteristics and the basic safety factors. The results were compared to determine the best design and planning. The proposed Nuclear Research Center in North Western Coast of Egypt proved to be the best among all with regard to design and planning, taking into consideration the radiation safety requirements. The architects are recommended to design and plan the nuclear research centers, taking into consideration the radial planning concept because it is the best with regard to radiation safety requirements.
文摘This paper describes the design and implementation of a coal mine safety management information system based on Ajax. The whole system includes two alarm processing subsystem and management subsystem. Alarm processing subsystem in the server, used to analyzed monitoring data of underground mine, judged whether it is in an abnormal state, also including the crews time recorded by RFID, so that timely alarm data is written to the database for the use of management infonlaation system; management information system adopts the three layer system structure based on B/S, the client the use of ax technology for an asynchronous request to the server, the server operation backstagc Oracle database to complete the business logic processing, and the results in XML form and return it to the client, the subsystem to the user to provide an interactive platform, users can monitor the underground state in real time, at the same time when the abnormal status, the system can timely alarm, prevent the occurrence of coal mine accidents.
文摘With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to deal and the lack of an effective response to the treatment process as well as on security incidents. To solve these problems, the proposed design of a unified management platform for a variety of heterogeneous network security equipment. A brief introduction for the main functions of the platform.The article proposed a traffic handling mechanisms of heterogeneous security devices, allowing the platform to support heterogeneous security devices.
文摘One of the most important tasks of security is the quality of the project substation substation construction project management, construction project management, including project bidding and engineering, electrical engineering and civil construction, engineering, quality control, safety management and supervision costs control, on-site supervision over the links, these links chain, indivisible, so long as a part of the management problems, will lead the entire construction project management effectiveness be affected, so it must be every link control and management work done, in order to guarantee the quality of the entire substation, in order to make security of supply substations, electrical safety and vital interests of users are protected. In this paper, the author details the three aspects substation construction management of the project, namely the concept of substation engineering, project management and construction safety, through these three aspects, the author analyzes the construction project management substation existing problems, To solve these problems and issues proposed some measures and construction process that need attention. It launched separately from the design, schedule, quality and other aspects of security and research, and in the course of the study stressed the importance of coordination between elements of construction and construction sectors as well as cooperation between the construction, explains the importance of the project cost control.
文摘The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security
文摘Large leisure activities usually use large sport facilities. There is often no serious problem with people gathering, but both incomplete facilities and negligence of people security manage may court injury or death. The purpose of this study is to analyze crowded nodes and to improve evacuation path use Simulex models. The fastest and safest way to achieve safe egress was then well planned. For turn locations, it was found that fixing the plane angle did not significantly raise the overall exiting efficiency. However, replacing the right angle or other angles with arc angle makes overall exiting moving line more fluent. For multito single-directional converging T-junction intersections, modification of turn angle increased the movement fluency, with the higher the modified angle, the higher in fluency. However, changing to round angle did not have as significant effect as expected while gate opening width must be increased to 1.0 m before more significant effects were produced. The results showed that modifying turn angles to 60° produces better improvements.
文摘Advanced intelligent or "smart" meters are being deployed in Asia. A result of deployment of smart meters, with associated equipment, is the electric power industry faced with new and changing threats, vulnerabilities and re-evaluate traditional approaches to cyber security. Protection against emerging cyber-security threats targeting smart meter infrastructures will increase risk to both the utility and customer if not addressed within initial rollouts. This paper will discuss the issues in SMI (smart meter infrastructures) deployments that pertain to cyber security. It will cover topics such as the threats to operations, infrastructure, network and people and organization and their associated risks. SMI deployments include not only the smart meter, but also the interfaces for home energy management systems as well as communication interfaces back to the utility. Utilities must recognize and anticipate the new threat landscape that can attack and compromise the meter and the associated field network collectors. They must also include threats to the WAN (wide-area-network) backhaul networks, smart meter headends, MDMS (meter data management systems) and their interfaces to CIS (customer information systems) and billing and OMS (outage management systems). Lessons learned from SMI implementations from North America, Europe and recently, Japan, will be discussed. How white-box and black-box testing techniques are applied to determine the threat impact to the SMI. Finally, organizational change risk will be discussed and how utilities have responded to re-organizing and developing a security governance structure for the SMI and other smart grid applications.