There is tremendous growth in the use of Geographic Information Systems(GIS), Global Positioning Systems (GPS), Remote Sensing, Satellite Communication, andModeling & Simulation techniques.These tools and techniqu...There is tremendous growth in the use of Geographic Information Systems(GIS), Global Positioning Systems (GPS), Remote Sensing, Satellite Communication, andModeling & Simulation techniques.These tools and techniques helps significantly in characterizinginfrastructure, risk area and disaster zones, planning and implementation ofhazards reduction measures etc.Communication satellites becomes vital for providingemergency communication and timely relief measures.Integration of space technologyinputs into natural disaster monitoring and mitigation mechanisms is critical for hazard reduction.This paper mainly focused on all the issues described above.Major emphasis hadbeen given to the recent developments in information & communication technology enabledtools and their applications in mining industries for safe mining operations with increasedproductivity.展开更多
The mine ventilation and safety is one of the most important factors to influence on the coal production.More attention has been paid to manage safety information in scientific, efficient, and real-time way. Therefore...The mine ventilation and safety is one of the most important factors to influence on the coal production.More attention has been paid to manage safety information in scientific, efficient, and real-time way. Therefore, it is important to develop a practical mine safety assurance information system (CSAIS). Based on analyzing the actual management mode for ventilation and safety on mine, the paper studies the structure and function of the mine safety assurance information system based on GIS in detail. Moreover, it also suggests some applications and solutions. By combining with the practical situation, the paper realizes the whole function of the present system.展开更多
The quality and safety crisis of agricultural products on the one hand is the crisis of harm of agricultural products,and on the other hand is the crisis of information dissemination. This paper analyzed the character...The quality and safety crisis of agricultural products on the one hand is the crisis of harm of agricultural products,and on the other hand is the crisis of information dissemination. This paper analyzed the characteristics of content of the quality and safety crisis information of tropical agricultural products. On the basis of these characteristics,it came up with strategies and recommendations for solving the problems of quality and safety of tropical agricultural products,including establishing the emergency response system for quality and safety crisis of tropical agricultural products,bringing into play the social responsibilities of scientific research institutions,and bringing into play authoritative effect of scientific experts.展开更多
The present study aims to propose the method for the quantitative evaluation of safety concerning evacuation routes in case of earthquake disasters in urban areas using ACO (Ant Colony Optimization) algorithm and G...The present study aims to propose the method for the quantitative evaluation of safety concerning evacuation routes in case of earthquake disasters in urban areas using ACO (Ant Colony Optimization) algorithm and GIS (Geographic Information Systems). Regarding the safety evaluation method, firstly, the similarity in safety was focused on while taking into consideration road blockage probability, and after classifying roads by means of the hierarchical cluster analysis, the congestion rates of evacuation routes using ACO simulations were estimated. Based on these results, the multiple evacuation routes extracted were visualized on digital maps by means of GIS, and its safety was evaluated. Furthermore, the selection of safe evacuation routes between evacuation sites, for cases when the possibility of large-scale evacuation after an earthquake disaster is high, is made possible. As the safety evaluation method is based on public information, by obtaining the same geographic information as the present study, it is effective in other areas regardless of whether the information is of the past and future. Therefore, in addition to spatial reproducibility, the safety evaluation method also has high temporal reproducibility. Because safety evaluations are conducted on evacuation routes based on quantified data, highly safe evacuation routes that are selected have been quantitatively evaluated, and thus serve as an effective indicator when selecting evacuation routes.展开更多
The aim of the research was to evaluate overall quality of introduction of hazard analysis and critical control points (HACCP) prerequisites and HACCP procedures in catering sector in Latvia to reveal common problem...The aim of the research was to evaluate overall quality of introduction of hazard analysis and critical control points (HACCP) prerequisites and HACCP procedures in catering sector in Latvia to reveal common problems that can provoke food-borne infection outbreaks. Certain quantitative indicators were defined and analyzed to conclude about characteristic trends related to implementation of food safety legislation. The state's monitoring data on surveillance of catering establishments were used. Fulfillment of legislative requirements in about 6,000 catering establishments was evaluated during time period of 2004-2009. The results of investigation were obtained with help of statistical analyses using MS Excel computer program. The results of the research suggest that most of catering establishments (e.g., 83.6% during 2009) meet the hygiene requirements only partly. Non-conformities regarding HACCP-based self-control procedures were fixed during 49.2% of inspections. The research reveals characteristic shortcomings that are established from year to year, e.g., improper hygiene of premises (established during 30%-40% of inspections, depending on the year), poor hygiene of technological equipment (established during 27%-37% of inspections), poor personnel hygiene (established during 11%-22% of inspections), inadequate competence of food service personnel (established during 10%-35% of inspections), as well as non-observance of cleaning-disinfection procedures and technological parameters for food processing (established during 11%-25% of inspections, depending on the year). Actual shortcomings can lead to both the direct and the indirect cross-contamination of food. On the base of the research, it was concluded that further detailed assessment of potential food safety risks is relevant to establish risk-based monitoring activities in catering sector.展开更多
The thesis researches the safety infonnation and control system (SICS) design principle and introduces engineering application in CPR1000 nuclear power station in China. The SICS provides sufficient control and moni...The thesis researches the safety infonnation and control system (SICS) design principle and introduces engineering application in CPR1000 nuclear power station in China. The SICS provides sufficient control and monitoring means to bring and maintain the plant in a safe state as a backup of main computerized control mean (MCM), in any plant conditions that are probable during a planed or unplanned unavailability of the MCM. The successful engineering applications of SICS in different digital I&C system platform are introduced in the paper. The thesis gives the research conclusion for new general SICS of digital I&C system.展开更多
Food safety and hygiene practices require a multisectoral approach including food, water, sanitation, waste management, transport, education, trade, policies and programs that enable safe food preparation, storage and...Food safety and hygiene practices require a multisectoral approach including food, water, sanitation, waste management, transport, education, trade, policies and programs that enable safe food preparation, storage and service. Unsafe food can cause illness keeping people from achieving their full potential and death. This was a descriptive study that uses a mixed method approach to derive insights into the characteristics of food vendors related to demography, knowledge, practices, infrastructure, compliance and recommendation for a policymaking framework. Using the Lemeshows’ sample size formula, 473 vendors from formal (restaurants) and informal (cookri-baffa/table top) sites were interviewed and observed. We found from discussions that respondents had a good understanding on how to keep food safe. However, observed practices were poor 93% handled food with their bare hands, 83% did not cover their hair, and 76% did not wear an apron whilst handling, preparing or serving food, 61% did not keep their finger nails clean or short and 57% did not wash their hand before preparing or serving food. Over half (51%) had access to a toilet but 32% reported their use required payment and emphasized their poor condition/inadequate management. Nearly half (47%) of the vending sites did not have a handwashing facility, with soap and water available. Only 7% reported having any authority oversight of food safety. Food safety and hygiene practices in most cookri shops and restaurants was ‘poor’ with very limited surveillance system in place by competent authorities for compliance of food operators. Hand washing, clean surroundings, and covered food were the most common and emphasized practices to mitigate the risks associated with unsafe food.展开更多
Bioinformatics research institutes or centers have made their debut in China in recent years. However, their capacity and academic build-up are not satisfactory. In order to keep abreast with the advanced internationa...Bioinformatics research institutes or centers have made their debut in China in recent years. However, their capacity and academic build-up are not satisfactory. In order to keep abreast with the advanced international level in terms of scholarship, a well-known Chinese scientist has called on the central authorities to set up a national biomedical information center. Duplicate construction of bioinformatics institutions would be a waste of scarce resources,展开更多
The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed...The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed online survey techniques. Altogether, 710 questionnaires (Google forms) were developed, and operationalized. The main respondents included 566 medical students, and 143 medical staff from Mbarara University of Science and Technology (MUST), and Kampala International University (KIU), accordingly. Using SPSS, the main statistical analysis tools employed include frequency distribution summary, and Chi-square (x<sup>2</sup>) test. According to the frequency distribution summary, 27% to 42% of the respondents within categorical divides acknowledged occurrence of medical information breaches due to SM usage. Notably, higher levels of the breaches were reported among male students (64%), age-group 18 to 35 years (68%), and WhatsApp users (63%). On the other hand, Chi-square results showed significant levels (p p > 0.05) between medical institutions and medical information breaches. Overall, the vulnerable areas of the breaches identified would serve as important reference points in the process of rationalizing SM usage in medical institutions. Nevertheless, further studies could focus on identification of the key SM usage factors associated with medical information breaches in medical institutions in Uganda.展开更多
Given the public concern over the safety of genetically modified (GM) technology and products, the article elaborated the safety regulatory and administration on agricultural GMOs in China. China has made a set of l...Given the public concern over the safety of genetically modified (GM) technology and products, the article elaborated the safety regulatory and administration on agricultural GMOs in China. China has made a set of laws and regulations of GMO safety management and confirmed competent authorities with clear-cut responsibilities. According to the laws and regulations, GMO products before entering markets have to pass through safety evaluation, get production and processing permission and be labeled correctly. For the importation of GM products, China has set up an import approval system. In addition, China has established technical supportive systems, including safety evaluation specifications, trial specifications and criteria specifications. The existing regulatory system supervises and regulates all activities and work related to agri- cultural GMOs in China.展开更多
The traceability system can effectively reduce the food safety risks, however, it is confronted with various problems during its implementation. In this context, the paper carries out a case study of consumers in Weif...The traceability system can effectively reduce the food safety risks, however, it is confronted with various problems during its implementation. In this context, the paper carries out a case study of consumers in Weifang, Shandong Province, and studies their willingness to pay the traceable pork with different quality information. The results indicate that, the consumers show high expectations towards the introduction of traceability system, and they tend to buy the traceable pork only with breeding and slaughter information; their behaviors of purchase are greatly influenced by the following factors: the consumers education, age, income, attention on food safety and whether there are pregnant family members, etc..展开更多
The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the developm...The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the development of wireless communication security and safety technology.This paper introduces the concept of wireless endogenous security from the following four aspects.First,we sorts out the endogenous security problems faced by the current wireless communications system,and then analyzes the endogenous security and safety attributes of the wireless channel.After that,the endogenous security and safety structure of the wireless communications system is given,and finally the applications of the existing wireless communication endogenous security and safety functions are listed.展开更多
Safety assessment of offshore platforms is an urgent task. Such assessments are now focusing on the structure, maintenance, and retirement of a platform. Some methods employed have many shortcomings. For example, they...Safety assessment of offshore platforms is an urgent task. Such assessments are now focusing on the structure, maintenance, and retirement of a platform. Some methods employed have many shortcomings. For example, they cannot make the reliability adequately explicable. Therefore, a mathematical tool, the unascertained measure, was introduced. First, the basic knowledge of the unascertained sets was introduced briefly. Second, the unascertained measure was defined and credible identification was set up. The method has been introduced into the fields for safety assessment of a jacket loadout procedure. Engineering practices showed that it can complete the safety assessment systematically and scientifically without any assumption. The work should have significance in theory and practice for offshore engineering.展开更多
In order to optimise the safety of underground rock engineering construction and the long-term security of the resultant facilities, it is necessary to have a knowledge of the likely hazards. These risks or hazards fa...In order to optimise the safety of underground rock engineering construction and the long-term security of the resultant facilities, it is necessary to have a knowledge of the likely hazards. These risks or hazards fall into the four categories of 'known beforehand and relatively easily addressed', 'known beforehand and not easily addressed', 'not known beforehand and relatively easily addressed', and 'not known beforehand and not easily addressed'. This paper describes how these four types of hazard can be incorporated into a design methodology approach, including the process by which the relevant mechanical rock mass parameters can be recognised for modelling and hence predictive purposes. In particular, there is emphasis on the fact that information and judgement are the keys to safety——whether the hazards are known or unknown before construction proceeds.展开更多
The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this pape...The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this paper,we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback.The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection.Firstly,we establish an overall evaluation indicator system that includes four primary indicators of threat information,asset,vulnerability,and management,respectively.It also includes eleven secondary indicators of system protection rate,attack detection rate,confidentiality,availability,controllability,identifiability,number of vulnerabilities,vulnerability hazard level,staff organization,enterprise grading and service continuity,respectively.Then,we build the core algorithm to enable the evaluation model,wherein a novel weighting technique is developed and a quantitative method is proposed to measure the S&R value.Moreover,in order to better supervise the performance of the proposed evaluation model,we present four novel indicators includes residual risk,continuous conformity of residual risk,head-to-tail consistency and decrease ratio,respectively.Simulation results show the advantages of the proposed model in the evaluation of information security for IoT.展开更多
Purpose: The current development of patient safety reporting systems is criticized for loss of information and low data quality due to the lack of a uniformed domain knowledge base and text processing functionality. ...Purpose: The current development of patient safety reporting systems is criticized for loss of information and low data quality due to the lack of a uniformed domain knowledge base and text processing functionality. To improve patient safety reporting, the present paper suggests an ontological representation of patient safety knowledge. Design/methodology/approach: We propose a framework for constructing an ontological knowledge base of patient safety. The present paper describes our design, implementation,and evaluation of the ontology at its initial stage. Findings: We describe the design and initial outcomes of the ontology implementation. The evaluation results demonstrate the clinical validity of the ontology by a self-developed survey measurement. Research limitations: The proposed ontology was developed and evaluated using a small number of information sources. Presently, US data are used, but they are not essential for the ultimate structure of the ontology.Practical implications: The goal of improving patient safety can be aided through investigating patient safety reports and providing actionable knowledge to clinical practitioners.As such, constructing a domain specific ontology for patient safety reports serves as a cornerstone in information collection and text mining methods.Originality/value: The use of ontologies provides abstracted representation of semantic information and enables a wealth of applications in a reporting system. Therefore, constructing such a knowledge base is recognized as a high priority in health care.展开更多
Safety analysis for liquid rocket engine has a great meaning for shortening development cycle, saving development expenditure and reducing development risk. The relationship between the structure and component of liqu...Safety analysis for liquid rocket engine has a great meaning for shortening development cycle, saving development expenditure and reducing development risk. The relationship between the structure and component of liquid rocket engine is much more complex, furthermore test data are absent in development phase. Thereby, the uncertainties exist in safety analysis for liquid rocket engine. A safety analysis model integrated with FMEA(failure mode and effect analysis) based on Bayesian networks (BN) is brought forward for liquid rocket engine, which can combine qualitative analysis with quantitative decision. The method has the advantages of fusing multi-information, saving sample amount and having high veracity. An example shows that the method is efficient.展开更多
文摘There is tremendous growth in the use of Geographic Information Systems(GIS), Global Positioning Systems (GPS), Remote Sensing, Satellite Communication, andModeling & Simulation techniques.These tools and techniques helps significantly in characterizinginfrastructure, risk area and disaster zones, planning and implementation ofhazards reduction measures etc.Communication satellites becomes vital for providingemergency communication and timely relief measures.Integration of space technologyinputs into natural disaster monitoring and mitigation mechanisms is critical for hazard reduction.This paper mainly focused on all the issues described above.Major emphasis hadbeen given to the recent developments in information & communication technology enabledtools and their applications in mining industries for safe mining operations with increasedproductivity.
基金National Natural Science Foudation of China(59904001)
文摘The mine ventilation and safety is one of the most important factors to influence on the coal production.More attention has been paid to manage safety information in scientific, efficient, and real-time way. Therefore, it is important to develop a practical mine safety assurance information system (CSAIS). Based on analyzing the actual management mode for ventilation and safety on mine, the paper studies the structure and function of the mine safety assurance information system based on GIS in detail. Moreover, it also suggests some applications and solutions. By combining with the practical situation, the paper realizes the whole function of the present system.
基金Supported by Special Project of Fundamental Research Funds for Central Public Welfare Research Institutes in Chinese Academy of Tropical Agricultural Sciences(1630012015021)Project of Natural Science Foundation of Hainan Province(714282)
文摘The quality and safety crisis of agricultural products on the one hand is the crisis of harm of agricultural products,and on the other hand is the crisis of information dissemination. This paper analyzed the characteristics of content of the quality and safety crisis information of tropical agricultural products. On the basis of these characteristics,it came up with strategies and recommendations for solving the problems of quality and safety of tropical agricultural products,including establishing the emergency response system for quality and safety crisis of tropical agricultural products,bringing into play the social responsibilities of scientific research institutions,and bringing into play authoritative effect of scientific experts.
文摘The present study aims to propose the method for the quantitative evaluation of safety concerning evacuation routes in case of earthquake disasters in urban areas using ACO (Ant Colony Optimization) algorithm and GIS (Geographic Information Systems). Regarding the safety evaluation method, firstly, the similarity in safety was focused on while taking into consideration road blockage probability, and after classifying roads by means of the hierarchical cluster analysis, the congestion rates of evacuation routes using ACO simulations were estimated. Based on these results, the multiple evacuation routes extracted were visualized on digital maps by means of GIS, and its safety was evaluated. Furthermore, the selection of safe evacuation routes between evacuation sites, for cases when the possibility of large-scale evacuation after an earthquake disaster is high, is made possible. As the safety evaluation method is based on public information, by obtaining the same geographic information as the present study, it is effective in other areas regardless of whether the information is of the past and future. Therefore, in addition to spatial reproducibility, the safety evaluation method also has high temporal reproducibility. Because safety evaluations are conducted on evacuation routes based on quantified data, highly safe evacuation routes that are selected have been quantitatively evaluated, and thus serve as an effective indicator when selecting evacuation routes.
文摘The aim of the research was to evaluate overall quality of introduction of hazard analysis and critical control points (HACCP) prerequisites and HACCP procedures in catering sector in Latvia to reveal common problems that can provoke food-borne infection outbreaks. Certain quantitative indicators were defined and analyzed to conclude about characteristic trends related to implementation of food safety legislation. The state's monitoring data on surveillance of catering establishments were used. Fulfillment of legislative requirements in about 6,000 catering establishments was evaluated during time period of 2004-2009. The results of investigation were obtained with help of statistical analyses using MS Excel computer program. The results of the research suggest that most of catering establishments (e.g., 83.6% during 2009) meet the hygiene requirements only partly. Non-conformities regarding HACCP-based self-control procedures were fixed during 49.2% of inspections. The research reveals characteristic shortcomings that are established from year to year, e.g., improper hygiene of premises (established during 30%-40% of inspections, depending on the year), poor hygiene of technological equipment (established during 27%-37% of inspections), poor personnel hygiene (established during 11%-22% of inspections), inadequate competence of food service personnel (established during 10%-35% of inspections), as well as non-observance of cleaning-disinfection procedures and technological parameters for food processing (established during 11%-25% of inspections, depending on the year). Actual shortcomings can lead to both the direct and the indirect cross-contamination of food. On the base of the research, it was concluded that further detailed assessment of potential food safety risks is relevant to establish risk-based monitoring activities in catering sector.
文摘The thesis researches the safety infonnation and control system (SICS) design principle and introduces engineering application in CPR1000 nuclear power station in China. The SICS provides sufficient control and monitoring means to bring and maintain the plant in a safe state as a backup of main computerized control mean (MCM), in any plant conditions that are probable during a planed or unplanned unavailability of the MCM. The successful engineering applications of SICS in different digital I&C system platform are introduced in the paper. The thesis gives the research conclusion for new general SICS of digital I&C system.
文摘Food safety and hygiene practices require a multisectoral approach including food, water, sanitation, waste management, transport, education, trade, policies and programs that enable safe food preparation, storage and service. Unsafe food can cause illness keeping people from achieving their full potential and death. This was a descriptive study that uses a mixed method approach to derive insights into the characteristics of food vendors related to demography, knowledge, practices, infrastructure, compliance and recommendation for a policymaking framework. Using the Lemeshows’ sample size formula, 473 vendors from formal (restaurants) and informal (cookri-baffa/table top) sites were interviewed and observed. We found from discussions that respondents had a good understanding on how to keep food safe. However, observed practices were poor 93% handled food with their bare hands, 83% did not cover their hair, and 76% did not wear an apron whilst handling, preparing or serving food, 61% did not keep their finger nails clean or short and 57% did not wash their hand before preparing or serving food. Over half (51%) had access to a toilet but 32% reported their use required payment and emphasized their poor condition/inadequate management. Nearly half (47%) of the vending sites did not have a handwashing facility, with soap and water available. Only 7% reported having any authority oversight of food safety. Food safety and hygiene practices in most cookri shops and restaurants was ‘poor’ with very limited surveillance system in place by competent authorities for compliance of food operators. Hand washing, clean surroundings, and covered food were the most common and emphasized practices to mitigate the risks associated with unsafe food.
文摘Bioinformatics research institutes or centers have made their debut in China in recent years. However, their capacity and academic build-up are not satisfactory. In order to keep abreast with the advanced international level in terms of scholarship, a well-known Chinese scientist has called on the central authorities to set up a national biomedical information center. Duplicate construction of bioinformatics institutions would be a waste of scarce resources,
文摘The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed online survey techniques. Altogether, 710 questionnaires (Google forms) were developed, and operationalized. The main respondents included 566 medical students, and 143 medical staff from Mbarara University of Science and Technology (MUST), and Kampala International University (KIU), accordingly. Using SPSS, the main statistical analysis tools employed include frequency distribution summary, and Chi-square (x<sup>2</sup>) test. According to the frequency distribution summary, 27% to 42% of the respondents within categorical divides acknowledged occurrence of medical information breaches due to SM usage. Notably, higher levels of the breaches were reported among male students (64%), age-group 18 to 35 years (68%), and WhatsApp users (63%). On the other hand, Chi-square results showed significant levels (p p > 0.05) between medical institutions and medical information breaches. Overall, the vulnerable areas of the breaches identified would serve as important reference points in the process of rationalizing SM usage in medical institutions. Nevertheless, further studies could focus on identification of the key SM usage factors associated with medical information breaches in medical institutions in Uganda.
文摘Given the public concern over the safety of genetically modified (GM) technology and products, the article elaborated the safety regulatory and administration on agricultural GMOs in China. China has made a set of laws and regulations of GMO safety management and confirmed competent authorities with clear-cut responsibilities. According to the laws and regulations, GMO products before entering markets have to pass through safety evaluation, get production and processing permission and be labeled correctly. For the importation of GM products, China has set up an import approval system. In addition, China has established technical supportive systems, including safety evaluation specifications, trial specifications and criteria specifications. The existing regulatory system supervises and regulates all activities and work related to agri- cultural GMOs in China.
基金Supported by the Youth Project for Humanities and Social Sciences of Ministry of Education in 2012(12YJC630326 and 12XJJC790003)
文摘The traceability system can effectively reduce the food safety risks, however, it is confronted with various problems during its implementation. In this context, the paper carries out a case study of consumers in Weifang, Shandong Province, and studies their willingness to pay the traceable pork with different quality information. The results indicate that, the consumers show high expectations towards the introduction of traceability system, and they tend to buy the traceable pork only with breeding and slaughter information; their behaviors of purchase are greatly influenced by the following factors: the consumers education, age, income, attention on food safety and whether there are pregnant family members, etc..
基金National Natural Science Foundation of China(No.61941114 and No.61521003)Key Universities and Academic Disciplines Contruction Project。
文摘The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the development of wireless communication security and safety technology.This paper introduces the concept of wireless endogenous security from the following four aspects.First,we sorts out the endogenous security problems faced by the current wireless communications system,and then analyzes the endogenous security and safety attributes of the wireless channel.After that,the endogenous security and safety structure of the wireless communications system is given,and finally the applications of the existing wireless communication endogenous security and safety functions are listed.
基金the National Natural Science Foundation of China (505079047)
文摘Safety assessment of offshore platforms is an urgent task. Such assessments are now focusing on the structure, maintenance, and retirement of a platform. Some methods employed have many shortcomings. For example, they cannot make the reliability adequately explicable. Therefore, a mathematical tool, the unascertained measure, was introduced. First, the basic knowledge of the unascertained sets was introduced briefly. Second, the unascertained measure was defined and credible identification was set up. The method has been introduced into the fields for safety assessment of a jacket loadout procedure. Engineering practices showed that it can complete the safety assessment systematically and scientifically without any assumption. The work should have significance in theory and practice for offshore engineering.
文摘In order to optimise the safety of underground rock engineering construction and the long-term security of the resultant facilities, it is necessary to have a knowledge of the likely hazards. These risks or hazards fall into the four categories of 'known beforehand and relatively easily addressed', 'known beforehand and not easily addressed', 'not known beforehand and relatively easily addressed', and 'not known beforehand and not easily addressed'. This paper describes how these four types of hazard can be incorporated into a design methodology approach, including the process by which the relevant mechanical rock mass parameters can be recognised for modelling and hence predictive purposes. In particular, there is emphasis on the fact that information and judgement are the keys to safety——whether the hazards are known or unknown before construction proceeds.
基金This work was supported in part by National Key R&D Program of China under Grant 2019YFB2102400in part by the BUPT Excellent Ph.D.Students Foundation under Grant CX2019117.
文摘The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this paper,we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback.The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection.Firstly,we establish an overall evaluation indicator system that includes four primary indicators of threat information,asset,vulnerability,and management,respectively.It also includes eleven secondary indicators of system protection rate,attack detection rate,confidentiality,availability,controllability,identifiability,number of vulnerabilities,vulnerability hazard level,staff organization,enterprise grading and service continuity,respectively.Then,we build the core algorithm to enable the evaluation model,wherein a novel weighting technique is developed and a quantitative method is proposed to measure the S&R value.Moreover,in order to better supervise the performance of the proposed evaluation model,we present four novel indicators includes residual risk,continuous conformity of residual risk,head-to-tail consistency and decrease ratio,respectively.Simulation results show the advantages of the proposed model in the evaluation of information security for IoT.
基金supported by a grant from AHRQ, 1R01HS022895a patient safety grant from the University of Texas system, #156374
文摘Purpose: The current development of patient safety reporting systems is criticized for loss of information and low data quality due to the lack of a uniformed domain knowledge base and text processing functionality. To improve patient safety reporting, the present paper suggests an ontological representation of patient safety knowledge. Design/methodology/approach: We propose a framework for constructing an ontological knowledge base of patient safety. The present paper describes our design, implementation,and evaluation of the ontology at its initial stage. Findings: We describe the design and initial outcomes of the ontology implementation. The evaluation results demonstrate the clinical validity of the ontology by a self-developed survey measurement. Research limitations: The proposed ontology was developed and evaluated using a small number of information sources. Presently, US data are used, but they are not essential for the ultimate structure of the ontology.Practical implications: The goal of improving patient safety can be aided through investigating patient safety reports and providing actionable knowledge to clinical practitioners.As such, constructing a domain specific ontology for patient safety reports serves as a cornerstone in information collection and text mining methods.Originality/value: The use of ontologies provides abstracted representation of semantic information and enables a wealth of applications in a reporting system. Therefore, constructing such a knowledge base is recognized as a high priority in health care.
文摘Safety analysis for liquid rocket engine has a great meaning for shortening development cycle, saving development expenditure and reducing development risk. The relationship between the structure and component of liquid rocket engine is much more complex, furthermore test data are absent in development phase. Thereby, the uncertainties exist in safety analysis for liquid rocket engine. A safety analysis model integrated with FMEA(failure mode and effect analysis) based on Bayesian networks (BN) is brought forward for liquid rocket engine, which can combine qualitative analysis with quantitative decision. The method has the advantages of fusing multi-information, saving sample amount and having high veracity. An example shows that the method is efficient.