The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article discusses aspects of the implementation and audit of the risk management system, implemented on the basis of modern standards for the enterprises of the oil and gas industry. Shows several practical examples of the implementation of the risk management process in the PDCA cycle proposed IMS model which contains all the basic entities to perform the audits (criteria, metrics, finding etc...
This paper presents a model predictive control (MPC) approach to control a steering angle in an autonomous vehicle. In designing an automated driving control algorithm, probable risky driving situations should be considered to ensure vehicle safety. In order to guarantee safety to the possible change of traffic situation surrounding the subject vehicle, probabilistic future states of surrounding vehicles...
ERP systems are complex software systems that organizations use to manage their resources. From the beginning of ERP system life cycle to its end it faces lots of risks that have to be identified and appropriate measures should be taken to reduce or avoid these risks throughout project life cycle. The ERP system risk expands to all major risk dimensions majorly six which are 1) control & plan...
This article sets out from the angle of systemic risk assessment, identification and control. Based on the deep research on coupling warning technology of multi-source information in weighty disasters, combined index system of weighty gas disasters in coal mines has been established, and the method of abnormal risk positioning of time and space combined with control chart and histogram has been put...
Based on the engineering practice of the large-scale mining shaft construction projects and at owner's comprehensive risk management, we have successfully developed a practical and operational risk management system for the large mining shaft construction projects, including risk identification and risk analysis, risk assessment, risk response, risk monitoring and controlling. After that, combined...
The smooth operation of virtual enterprise to obtain the expected profits, they must avoid the risks successfully, and virtual enterprise risk management system is an important guarantee of risk aversion. In view of its characteristics of distribution, dynamic complexity, the virtual enterprise risk management system is developed based on Web and multi-agent technology. Not only to meet the Distributed...
The risk management issue of shield tunneling has attracted full attention for these years, but the current methods of risk identification and risk management cannot meet the safety requirements. This paper addresses the complexity of shield tunneling construction as well as the uncertainty of the underground environment, and then a new Logical Arrangement Risk Evaluation (LARE) method and an improved...
The primary purpose of this paper is to demonstrate that a range of proposed government actions can and often should be evaluated in a way that includes their effects on personal freedoms. This is illustrated in the case of efforts directed toward recreational boating safety in the United States, and evolves from a multi-year study to recommend the composition of an appropriate risk management system...
The prerequisites of human behavior and performance research need innovative methods for the collection of human factors data. Data generated from experimental investigations of human performance in pedestrian situations have some instinctive drawbacks such as the obvious deviation from the natural pedestrian behaviors. Real-time pedestrian dynamic data obtained from on-site pedestrian flow monitoring...
With its ever growing industrialization and urbanization, China's oil demand has been increasing rapidly. In order to alleviate the conflict of domestic demand and resources shortage, nowadays China has to develop and utilize the oil resources overseas. This paper presents the design of risk management system on overseas oil development and utilization based on MapXtreme & C# tools, including...
Many busy shopping districts have emerged with the rapid development of the Chinese economy. This project will help us develop a pedestrian flow prediction and risk management system (hardware and software) that may apply to many other shopping districts.
Chinese enterprises overseas mergers and acquisitions (M&As) are conducted in the market context, focusing on the capital operation with the final purpose to increase the value of the enterprises, which determines that risk management system (RMS) should be based on the market to manage the value and be directed by capital. The managing process of M&A risks by RMS is dynamic, during which...
When the financial crisis have happened in 2008, in the economy scholars it causes a large number of research about the Causes, process, form and results of financial crisis, as well as reflects on the development of real estate, banking and other industries, and discusses largely the financial sector how to develop, to avoid risks and recovery the global economic as soon as possible after the crisis...
Based on advanced ZigBee and GPRS technology, which collects and transmits data, risk evaluation system of gas pipelines network realize the real time risk analysis and management. This paper introduces the methods of wireless data transmission, gives the architecture of software platform, discusses a processing method for real-time data, and analyzes risk assessment and evaluation model. This has...
The purpose of this paper is to create risk management system that multi-agent patrols for maintaining security. We consider that maintaining security is equal to relieving uncertainty. Therefore, we formulate uncertainty of places needed to maintain security by the entropy in an information theory. We call these places ??check point i(i=1,2,??,n)??. Agents patrol and observe check point's condition...
PCCP is usually used throughout many water and wastewater utilities as critical mains with high flow rates, sudden failures can have significant negative consequences. The world has experienced a number of failures of prestressing concrete cylinder pipe (PCCP) lines and as a result during the past ten years, much attention has been focused on reliably assessing the condition of PCCP mains. In this...
With more and more increasingly significant attention has paid to operational risk, it is urgent for the banks to find some suitable approaches to measure and manage their operational risk. An operational risk management system (ORMS) is set up, which based on case-based reasoning (CBR) methods. The frame of operational risk management system is presented. Some key techniques associated with the CBR...
It is important issue for the study of method of the project risk assessment. The quantitative method is used to resolve construction project risk assessment in this paper. Firstly, the study of project risk management and risk assessment is made a review. Secondly, the project risk management systematic framework is constructed, which include five purchases: risk identification, risk assessment,...
Improving a risk management system can be difficult because there is no easy, objective way to calculate the effectiveness of the overall system. This problem is especially difficult for organizations that are at the highest level in the CMMI process model, as it requires continuous process improvement. Continuous improvement of the risk management process area is difficult when one does not know...
Both business continuity management (BCM) and risk management (RM) processes are very important to current organizations. The former ensures that the organizations have the ability to limit losses in the events of severe contingencies or disasters. The latter helps organizations identify potential security incidents and adopt cost-effective countermeasures to the incidents. However, current risk management...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.