The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The most fundamental means of maintaining mechanical safety is to systematically carry out safety design and analysis in the mechanical design process. The fuzzy comprehensive evaluation method is to take the advantages of the level analytic hierarchy process and fuzzy comprehensive evaluation method. Firstly, the evaluation index system is divided into ladder level structure, calculated the index...
With the development of network security technical, the pivotal factor is not technique but the administrator and management mechanism. In the domain of information security, social engineering can get into information system by using people' s weakness, just not using the computer's leak. This method can be used in many attacking way and turn up a new important project for its study and protection...
The safety culture must be systematically built taking into account the actual piece of knowledge and experience. The safety management establishing the safety culture has three basic phases: the standard (current) management, emergency management and crisis management. With regard to a present knowledge the optimum safety of the set of infrastructures is not the set of optimum safeties of partial...
Water resource security is a globally environmental problem. This study examines three stages through which the rivers and lakes in Jianghan Plain has gone. 1) Before Holocene, merely affected by climate and Geologic structures, the lake water and river water exchanged freely. 2) In early and middle Holocene, water exchange between the lakes and rivers remained unrestrained, but the minor impact from...
The speed quick, the large volume of traffic highway has provided good convenient for the vehicles journey, but some especially heavy big accidents bring the life and property safety serious threat, the analysis on to the highway safe influence factors, pointed out the highway movement security is by essential factor constitutions and so on the human, vehicle, road, environment and management, analysis...
The deterioration of traditional environmental problems has threaten the human security in worldwide and the environmental security has come into being. Inrecent research status of environmental security, the authors put a new research concept that researching the environmental security problems in perspective of macro-security. Environmental security, considered as one of the important branches of...
Harmonious culture originates from China's classical culture and spreads to East Asia in ancient time. This culture refers to the moral ideas of “Kindheartedness”, “Harmony”, “Trustworthy”, “Gold Mean”, “Keep Friendly and Harmonious Relations in spite of Differences between People”, “Concord is highly valued”, “Peaceful Coexistence” and the like, which are the recognized principles in dealing with...
A dazzler, sometimes called an optical distracter, transmits a visually intense light, usually in a narrow beam, in order to 1) attract the attention of a person and to make them alert to other visual or audible warnings against approaching a protected asset in a threatening manner, or 2) to suppress the actions of noncompliant persons (continued advance or aiming of weapons) by obscuring their vision...
In this paper, we propose a new multi-expert decision-making method based on induced OWA operators for coal mine safety evaluation. Aggregation operators are crucial to decision-makers when they make decisions. The Ordered Weighted Aggregation (OWA) is the most common operator to aggregate the arguments that are the exact numerical values. However, the decision-makers may have vague knowledge about...
Accident is originated by hidden danger. Discovering and removing hidden dangers is one main approach to prevent and control accidents. This paper collected and analyzed the information of hidden dangers from multiple coal mines. On that basis, we put forward concepts of hidden danger information and standard database of hidden danger information, introduced the structure and build flow chart of standard...
In recent years, the problem of the frequent accidents in the SMEs has been a community-wide focus, which is rooted in the market failure caused by the seriously underestimated of the value of human life, Thus leading to the SME owners' lack of power and pressure in safety input. So assessing the value of human life is of great significant, also is a basic perspective for analysis of production safety...
The occurrence of accident be understood as mutations in a qualitative change caused by a continuous change of some of the parameters within the system. The system from security state into the state is actually a mutation phenomenon. The paper applies the Catastrophe theory and system analysis method of the accident causation, establishes the spire catastrophe model. By analysing the model, indicates...
Ecological Security Assessment is a new field in Sustainable Development study. In order to curb the deterioration of the ecological environment, we should conduct timely researches on the comprehensive evaluation of ecological security, which is recognized as the most powerful method to protect the regional economy effectively. Based on the sequence data of 1987, 2000 and 2005, the study takes Hebei...
Animal intrusion detection is a major application in human habitats like institutions and agricultural fields to ensure safety and security to the life and assets of human. In this paper, a new image processing method is proposed to detect the presence of animals using Line Model Approach based on their skeletons. In this new frame work, the simple Background subtraction followed by a fast Star Skeletonization...
Network connectivity in coalition environments has increased markedly in recent times. This has coincided with a shift in military thinking toward Network Enabled Capability (NEC). Together, these have produced the concept of the NEC System of Systems (NEC SoS), where many systems are interconnected to produce a military capability. This paper takes a holistic view of the NEC SoS to include Un-Manned...
In the guidance of the thoughts from fire safety engineering and according to the kinetic mechanism of the occurrence and development of fire and the technological principle of fire prevention and control, this paper preliminarily studies the application of fire risk evaluation method in the fire safety engineering of an underground construction. By determining fire security goal, performance criterion...
Today's building automation shifts from simple applications like controlling illumination and temperature towards complex applications like the observation of buildings for safety and security reasons or increasing the occupants' comfort. Complex applications require more and more sensory information. Existing approaches of sensor data processing cannot cope with these demands. In this article, we...
The aim of this paper is to highlight the central role of the human in aviation security. This means that appropriate competencies are essential for this service to achieve its objective of protecting civil aviation from illegal acts. However, with the advent of automation, and coupled with enhanced awareness to costs, competency requirements have changed significantly. This paper also seeks to identify...
Automatic people detection and tracking is a very essential task of video surveillance systems. It can improve a system's performance in important fields such as security, safety, human activity monitoring etc. In this paper we present a novel approach for people detection and 3D tracking. Our method is based on a human upper body 3D model and a likelihood function to evaluate its presence in a certain...
Safety is one of the key problems people concern about most not only at present but also in the future. Currently there are many hidden troubles threatening safety. Particularly, the safety problems in coal mines are very serious and in great need of management and control, because they not only influence humanpsilas increasing demand for energy, but also affect severely environment. Hence, itpsilas...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.