首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 203 毫秒
1.
本文根据系统工程原理和风险分级管控的方法,参考现有标准规范确定评价指标,以施工重大危险源管控为抓手,运用层次分析法构建针对城市基础设施建设运营综合服务商企业的重大危险源风险综合评价模型,确定了各风险影响因素的权重排序,服务于本企业的重大危险源风险分级管控机制。  相似文献   

2.
介绍了区域定量风险评价的基本原理和评价指标,建立了基于网格差分的风险计算模型,给出了定量风险评价的程序,开发了个人风险的计算软件,提出了区域定量风险评价方法,并在某油气库区风险评价与安全规划中实际应用。通过分析计算,给出了该区域的个人风险等值线分布图和社会风险(F-N)曲线。结果表明,由于该地区液化石油气储量大,事故后果严重,且库区离居民区较近,周边企业较多,人口密集,使得个人风险和社会风险均超出了推荐标准的要求。该方法为进行城市重大危险源的安全规划提供了基础理论和技术方法,对进行城市土地使用及其他灾害领  相似文献   

3.
易燃、易爆重大危险源辨识与风险评价是重大危险源安全管理中的一项基础性工作,实践表明,通过进行重大危险源辨识与评价,可以掌握安全生产状况,实现安全和生产的同步发展,真正落实“安全第一,预防为主”的工作方针,减少人员伤亡和财产损失。  相似文献   

4.
对国内外建筑业施工现场安全风险的研究进行了文献综述,针对目前研究的不足之处,提出了施工现场安全危险源实时监控和安全风险实时预测的示意性模型,并详细解释了该模型的含义和方法。研究将提供一种基于前馈信号的施工现场安全危险源实时监控和安全风险实时预测的方法;并通过将现有研究的视角引入到施工现场关键安全危险源的前馈信号上,为进一步的研究打下良好的理论基础。  相似文献   

5.
通过危险源辨识、风险评价和风险控制策划,消除系统中危险源或降低危险源所带来的风险,对重大危险源做到超前、预防性控制,杜绝各类重大事故的发生,达到保护职工安全与健康,提高安全管理水平,建立安全长效机制。  相似文献   

6.
文中对城市埋地钢制燃气管道开展风险评价技术研究,充分考虑钢制燃气管道安全影响因素的不确定性,建立了风险评价技术方法,并应用在厦门某中压埋地钢制燃气管道上进行风险综合评价.达到了预期的效果。  相似文献   

7.
城市环境安全已成为当前环境问题的新热点。文章在分析北京当前所存在的环境不安全因素的基础上,提出北京城市环境安全及突发重大环境灾害应急行动预案研究。内容包括:北京城市环境安全研究;北京市环境灾害综合区划研究;北京市环境灾害管理决策咨询信息系统研究;北京城市气象灾害的防御及应急救援行动预案研究;应用GIS技术进行北京森林防火的研究;北京市沙尘暴的成因及防治对策研究;北京市健康安全与卫生防疫研究;北京市地震灾害防御研究;北京城市生命线系统工程的改造、完善与建设研究;北京市突发重大环境灾害应急救援行动预案编制研究;环境灾害对北京城市经济发展的影响及有关经济问题的研究。  相似文献   

8.
在分析建筑施工企业施工特点的基础上,从两个方面进行了施工现场的危险源辨识,并进行了风险分析。通过对安全风险评价方法的比较,选用LEC法对建筑施工现场的危险源进行了评价,提出了每个级别应该采取的措施。  相似文献   

9.
实验室安全对低压电气实验室稳定发展起着至关重要的作用。危险源辨识及风险评价是实验室安全管理的核心和基础,它贯穿实验室安全运行的全过程,涉及实验室活动的所有阶段。本文通过介绍低压电气实验室的危险源辨识及风险评价方法,以期为类似现场危险源辨识及风险评价提供有益借鉴,为低压电气类实验室的安全管理工作提供参考。  相似文献   

10.
本文以北京某运输公司为工程背景,进行安全评价应用研究。通过对该运输公司在道路危险货物运输中存在的危险、有害因素以及重大危险源情况进行分析辨识,运用安全检查表、预先危险性分析等安全评价方法,确定该运输公司生产中存在的安全隐患,并提出相应整改建议,确保该运输公司的安全经营。  相似文献   

11.
Chemical process industries (CPI) handling hazardous chemicals in bulk can be attractive targets for deliberate adversarial actions by terrorists, criminals and disgruntled employees. It is therefore imperative to have comprehensive security risk management programme including effective security risk assessment techniques. In an earlier work, it has been shown that security risk assessment can be done by conducting threat and vulnerability analysis or by developing Security Risk Factor Table (SRFT). HAZOP type vulnerability assessment sheets can be developed that are scenario based. In SRFT model, important security risk bearing factors such as location, ownership, visibility, inventory, etc., have been used. In this paper, the earlier developed SRFT model has been modified using the concepts of fuzzy logic. In the modified SRFT model, two linguistic fuzzy scales (three-point and four-point) are devised based on trapezoidal fuzzy numbers. Human subjectivity of different experts associated with previous SRFT model is tackled by mapping their scores to the newly devised fuzzy scale. Finally, the fuzzy score thus obtained is defuzzyfied to get the results. A test case of a refinery is used to explain the method and compared with the earlier work.  相似文献   

12.
The risk assessment system has been applied to the information security, energy, medical and other industries. Through the risk assessment system, it is possible to quantify the possibility of the impact or loss caused by an event before or after an event, thereby avoiding the risk or reducing the loss. However, the existing risk assessment system architecture is mostly a centralized architecture, which could lead to problems such as data leakage, tampering, and central cheating. Combined with the technology of block chain, which has the characteristics of decentralization, security and credibility, collective maintenance, and untamperability. This paper proposes a new block chain-based risk assessment system architecture and a consensus mechanism algorithm based on DPOS improvement. This architecture uses an improved consensus mechanism to achieve a safe and efficient risk assessment solving the problem of data tampering in the risk assessment process, avoiding data leakage caused by improper data storage. A convenient, safe and fast risk assessment is achieved in conjunction with the improved consensus mechanism. In addition, by comparing existing risk assessment architecture, the advantages and impacts of the new block chain-based risk assessment system architecture are analyzed.  相似文献   

13.
To address the problem of network security situation assessment in the Industrial Internet, this paper adopts the evidential reasoning (ER)algorithm and belief rule base (BRB) method to establish an assessment model. First, this paper analyzes the influencing factors of the Industrial Internet and selects evaluation indicators that contain not only quantitative data but also qualitative knowledge. Second, the evaluation indicators are fused with expert knowledge and the ER algorithm. According to the fusion results, a network security situation assessment model of the Industrial Internet based on the ER and BRB method is established, and the projection covariance matrix adaptive evolution strategy (P-CMA-ES) is used to optimize the model parameters. This method can not only utilize semiquantitative information effectively but also use more uncertain information and prevent the problem of combinatorial explosion. Moreover, it solves the problem of the uncertainty of expert knowledge and overcomes the problem of low modeling accuracy caused by insufficient data. Finally, a network security situation assessment case of the Industrial Internet is analyzed to verify the effectiveness and superiority of the method. The research results show that this method has strong applicability to the network security situation assessment of complex Industrial Internet systems. It can accurately reflect the actual network security situation of Industrial Internet systems and provide safe and reliable suggestions for network administrators to take timely countermeasures, thereby improving the risk monitoring and emergency response capabilities of the Industrial Internet.  相似文献   

14.
建设创新型城市是北京面向未来的重大战略,是实施可持续发展的重要举措。创新型城市建设对环 境保护提出了更高的要求,从理念、思路到任务、目标均有了很大变化。创新型城市必须树立生态环境优先发 展的理念,环境保护应积极参与城市经济发展决策,并为城市的生态安全建立完整、高效的生态支撑体系,并 就什么是创新型城市、创新型城市建设中环境保护的目标、任务等问题进行了讨论。  相似文献   

15.
在前期研究工作的基础上,将基于指数的微观分析和基于风险和的宏观分析相结合,提出了一种综合量化评估主流操作系统安全弱点的方法,并对Windows NT、Redhat Linux和Solaris等3大主流操作系统6个版本的1081个弱点实施了评估.该方法能够有效地分析各操作系统版本的演进对其安全性的影响,以及横向比较操作系统在不同层次、不同方面的安全状况.  相似文献   

16.
A large percentage of projects suffer performance, cost, and/or schedule problems. There are many reasons why projects fail, including an inadequate approach to risk management. Inadequate approaches result when a comprehensive identification of risks is not performed at project commencement, when risk assessment fails to consider important aspects, when no subsequent follow-up is carried out for mitigation strategies adopted, when no further identification of risks during project execution is completed, or a combination of these occurs. A number of publications have dealt with different facets of risk management, but not in a comprehensive way. This article compiles the approaches applied and observed by the author based on 25 years of industry experience; these observations were synthesized and result in a procedure for dynamic risk management successfully applied to a number of projects. The use of a broad array of techniques is suggested to identify risks, which are then thoroughly analyzed. The assessment was performed using a comprehensive array of criteria. The complete set of criteria included essential ones such as aggregability factor, triggering factor, early warning, immediacy, and recoverability. The thorough assessment was done dynamically. The initial assessment enables the adoption of the most adequate mitigation strategies, which later on are dynamically validated. New risks are also detected and dealt with dynamically throughout project execution. The main contribution of this work is the synthesis of state-of-the-art knowledge into a state-of-the-practice procedure, which can be applied by engineering managers in all sectors and in all phases of project execution.  相似文献   

17.
Following the 9/11 terrorists attacks in New York a strong economical effort was made to improve and adapt aviation security, both in infrastructures as in airplanes. National and international guidelines were promptly developed with the objective of creating a security management system able to supervise the identification of risks and the definition and optimization of control measures.Risk assessment techniques are thus crucial in the above process, since an incorrect risk identification and quantification can strongly affect both the security level as the investments needed to reach it.The paper proposes a set of methodologies to qualitatively and quantitatively assess the risk in the security of civil aviation and the risk assessment process based on the threats, criticality and vulnerabilities concepts, highlighting their correlation in determining the level of risk.RAMS techniques are applied to the airport security system in order to analyze the protection equipment for critical facilities located in air-side, allowing also the estimation of the importance of the security improving measures vs. their effectiveness.  相似文献   

18.
As automobile transportation continues to increase around the world, bicyclists, pedestrians, and motorcyclists, also known as vulnerable road users (VRUs), will become more susceptible to traffic crashes, especially in countries where traffic laws are poorly enforced. Many countries, however, are employing innovative strategies to ensure that road users can more safely navigate the urban landscape. While bicyclists and motorcyclists are important road users, this paper will focus on pedestrian crash problems and solutions. Pedestrians are most at risk in urban areas due in part to the large amount of pedestrian and vehicle activity in urban areas. With this in mind, designing safe, accessible, and comprehensive facilities for pedestrians is vital to reducing pedestrian crashes. This paper will provide some insight into the magnitude of the pedestrian crash problem around the world, and will offer some lessons learned from several countries, particularly in Europe and the U.S., for improving pedestrian safety. Beginning with pedestrian safety statistics at the global, regional, and national levels, this paper will address potential countermeasures and strategies for improving pedestrian safety from an international perspective.  相似文献   

19.
安全需求导向下城市公共设施的设计研究   总被引:2,自引:2,他引:0  
方敏 《包装工程》2017,38(6):154-158
目的探索基于安全需求的城市公共设施创新设计原则。方法以工业设计思想为出发点,通过系统分析、问题归纳、用户调研、实践论证等方法,对城市公共设施的安全性设计问题进行系统研究。结论公共设施安全保障能力的缺失以及设计的相对落后,使得由于公共设施引发的安全事故频发,基于安全需求的设计可从社会公平的需求、准确与快速认知的需求、保护隐私与观测环境的需求平衡以及用户综合体验等4个方面展开,以提升社会幸福感为前提,进行城市公共设施的设计与设置。  相似文献   

20.
UTADIS方法在石油勘探风险评级中的应用   总被引:1,自引:0,他引:1  
UTA(Utility Additive)方法是建立累积效用函数模型以进行多指标评价的序数回归方法,而石油勘探开发风险的评级是一个多指标综合评价问题,基于决策者的偏好,VTADIS(Utility Additives Discriminates)方法被用于风险评级模型的构建,为企业进行风险决策提供了方法上的依靠。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号