[1]李春生,杜显涛. 基于网格环境下的安全隐患评估模型研究[J].计算机技术与发展,2014,24(12):142-145.
 LI Chun-sheng,DU Xian-tao. Research on Safety Hazard Assessment Model Based on Grid Environment[J].,2014,24(12):142-145.
点击复制

 基于网格环境下的安全隐患评估模型研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年12期
页码:
142-145
栏目:
安全与防范
出版日期:
2014-12-10

文章信息/Info

Title:
 Research on Safety Hazard Assessment Model Based on Grid Environment
文章编号:
1673-629X(2014)12-0142-04
作者:
 李春生杜显涛
 东北石油大学 计算机科学与技术学院
Author(s):
 LI Chun-shengDU Xian-tao
关键词:
 安全隐患评估网格环境人工自学习智能选取评估方法
Keywords:
 security risk assessmentgrid environmentartificial self-learningsmart selection assessment methods
分类号:
TP301
文献标志码:
A
摘要:
 企业的安全生产是十分重要的,而安全隐患几乎存在于任何职业和企业里。为了减少人员伤亡、伤害以及财产的损失,这就需要加大安全隐患排除力度,切实有效地为事故发生做好预防。根据以上问题,文中提出了一种安全隐患评估模型。该方法是将网格环境中的相关内容引入安全隐患评估模型中,通过初期的人工自学习阶段后,使其能智能选取评估方法对生产数据进行安全隐患的评估,进而提高安全隐患评估的工作效率。所以建立一个能有效控制危险有害因素的安全隐患评估模型是十分必要的。
Abstract:
 Enterprise safety producing is very important,and safety hazard exists in almost any career and enterprise.In order to reduce casualties,injuries and property damage,need to increase efforts to exclude security risks,effectively preventing accidents.According to the above problems,present a security risk assessment model in this paper.This method is to introduce the content about the grid environ-ment into security risks assessment model,through the artificial self-learning in the early stages,it can be smart to select assessment meth-ods for the data of production to assess security risks,thus improving the efficiency of security risk assessment.Therefore,to establish a security risk assessment model can effectively control dangerous and harmful factors is essential.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(12):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(12):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(12):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(12):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(12):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(12):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(12):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(12):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(12):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(12):47.

更新日期/Last Update: 2015-04-15