The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Micro seismic (MS) events are closely related to underground rock mass crack, which has a direct relationship with the mining activities. With MS monitoring, the active area in rock mass can be found so as to instruct the mining work and to prevent disasters such as rock fall, collapse and so on. A set of monitoring equipment is developed to monitor MS activities and to locate the MS event by time...
This paper presents a new approach for wide area dynamic monitoring of the system with many possible applications. One such application is discussed to provide real time stability controls. The new approach utilizes a substation based dynamic state estimation. The substation based dynamic state estimation uses data from relays, PMUs, meters, FDRs etc in the substation only thus avoiding all issues...
Public incidents not only lead to great loss to human life and property, but also cause psychological changes of people, which probably trigger public panic, stimulate derivative events and even produce greater disaster. Internet technology makes the transmission of information more quickly, with the negative impact even more serious. This paper analyses the causes, characteristics and response of...
The safety of students is currently a distressing topic, especially under the current situation when we are facing a severe challenge on school safety management. Therefore, it has become a common concern to find a way out on how to improve school safety in our schools. The author is engaged in the research of safe community, and has conducted some meaningful pre-researches on safe school in our country...
In this paper, we took the four critical elements of emergency warning system which was released by the United Nations as the guiding ideology. They were: risk knowledge, monitoring and warning services, dissemination and communication, response capacity.Then based on the systemic analysis for the problems which exist in emergency early warning of the current domestic large-scale highway tunnel, it...
This paper has provided a vision for the smart transmission grid from the perspective of system protection and control based on IEC 61850 standard. More and more major utilities are beginning to implement IEC61850 and several wide-area protection schemes to standardize their protection and control scheme, and minimize changes in power system frequency and/or voltages and avoid large disturbances during...
Logistics Finance is currently a new thing in china, which can promote capital flows during logistics finance business processes, it uses various financial products and services in the supply chain, and then improves efficiency of fund in supply chain. Logistics and finance combine into an innovative service, that is logistics finance which mission uses service, knowledge of supply chain and information...
The project management theory and methods were used in the construction of enterprise information based on the life cycle theory. In the implementation process of ERP project, planning, organization, management and monitoring were executed to achieve the desired objectives and effects, and create greater benefits for the enterprise depending on the principles of the overall planning and implemented...
In this paper the group behavior, awareness and mental characteristics of college students in the event of unexpected crisis were analyzed, as well as the responses to the unexpected crisis were investigated. According to these investigations, we made some suggestions on the improvement of the communication modes and the model establishment of student training during the crisis. We presented a new...
Emergency management of unconventional events is a great challenge to all levels of government. This challenge comes from the high-uncertainty, the high-destructive and high-urgency of “unconventional” and “unexpected” events, which make it difficult to deal with. According to the features and evolution mechanism of emergency, this paper constructs a preparation system of emergency. The preparation...
Safe Community growing so fast within the country and around the world, its core sense is to build cross- sectional group, resource integration, full participation and continuous improvement. This article focuses on how to establish and perfect the basic emergency management system in the model of Safe Community: First of all, analyzed the situation and the shortage of our emergency management in...
This paper presents an approach to providing better safety for adolescents playing online games. We highlight an emerging paedophile presence in online games and offer a general framework for the design of monitoring and alerting tools. Our method is to monitor and detect relationships forming with a child in online games, and alert if the relationship indicates an offline meeting with the child has...
A virtual disk encryption tool is a privacy protection tool that uses an encryption method by generating virtual disk images. It cannot mount an encrypted virtual disk without any authentication, such as key, passphrase, and etc. Thus, it can be used as an anti- forensic tool that makes difficult to process a digital forensic investigation because the content of the virtual disk cannot be identified...
Researched and developed the software system of Information Management and Decision Support System of the hidden danger troubleshooting of Coal Mine. By using the technology of collaborative software to realize fast circulation of information, dynamic tracking, rapid feedback, and closed-loop management of transaction processing for the hidden danger, and by applying the technology of data mining,...
Recently, both networking and high-performance computing technologies have dramatically advanced. As a result, scientists can access large-scale data captured by scientific measurement devices with ease. Also, recent high-performance computing technologies such as the Grid and cloud computing have allowed scientists to use huge computational power harnessed on the Internet for their analysis of scientific...
The world has fundamentally changed as the Internet has become a universal means of communication. The Web is a huge virtual space where to express individual opinions and influence any aspect of life. Internet contains a wealth of data that can be mined to detect valuable opinions, with implications even in the political arena. Nowadays the Web sources are more accessible and valuable than ever before,...
Due to an increasing amount of dam damage or break in resent years, great importance is attached to dam safety management in many countries. This paper analyzes the status of Chinese dam safety management according to the integral safety concept for dam including structural safety, dam safety monitoring, operational safety and emergency planning. Comparing with the safety management of large and medium-sized...
Whenever the question arises how a product, a personality, a technology or some other specific entity is perceived by the public, the blogosphere is a very good source of information. This is what usually interests business users from marketing or PR. Modern search services offer a rich set of tools to monitor or track the blogosphere as a whole, but the analysis with respect to a certain domain is...
Power system operation is constantly facing contingencies such as from faults and equipment outages. When the system is operating under unforeseen conditions or under unusually high stress, the system can face dynamic instability related to any of voltage stability, small-signal stability or transient stability phenomena. At Washington State University, we have been developing real-time monitoring...
The purpose of this paper is to provide a framework for disruption risks in supply chain. The stages of the disruption risks management process consist of four components including disruption risks identification, assessment, implementation and monitoring. We investigate mitigation strategies for dealing with disruption risks. The paper provides directions for future research in supply chain risk...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.