The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, the continuing happened engineer disasters and accidents cause enormous economic losses and negative social influence. As a result, the risk control problem of major public construction projects was paid much attention. The public construction projects are relate to the public life quality and the common security benefits, so risks become the most important control elements. Effective...
In this paper we present a causal artificial intelligence design (CAID) theory that borrows notions from classical philosophy for modeling intelligent agents. Principles introduced by this theory are used for extending a goal-driven BDI architecture and implementing what we call causal agent. This architecture incorporates causal formalisms like Pearl's Do calculus and C+ which are adapted to Semantic...
It is the primary responsibility of the airline pilot to safely complete a flight plan and safely land the airplane. This task can become very difficult in the face of an onboard emergency. One of the challenging tasks faced by the pilots in case of an emergency is the determination of an appropriate landing site as well as the development of a safe trajectory to reach that site. An Automated Planning...
In order to reduce the tremendous loss brought about by the overwhelming nature disasters on power supply system, the establishment of a certain amount of distributed generation systems at different level load nodes is taken into account in this paper. A multi-objective mathematical model considering construction investment, network loss as well as network deferred cost is proposed, and a type of...
Existing literature suggests that human error is directly linked to the majority of industrial incidents and accidents. The increasing use of computers and software in safety-critical systems makes systems more integrated and dependent and this can increase the risk if barrier integrity is reduced. This paper demonstrates how the Human Factors Assessment and Classification System (HFACS) can be applied...
To solve the question of guaranteeing the safety of a system with a complex structure and tight couplings, a new method of optimal allocation exploiting the dynamical planning theory is presented. Two key factors that can affect system safety, i.e., accident loss and accident rate are analyzed. Then, to measure comprehensively requirements of system safety, accident safety level is defined based on...
This paper provides an improved search algorithm for optimal route planning by rebuilding the search area in intelligent transport system. The theory foundation is that the classical Dijsktra algorithm has not any directional feature during searching the optimal path, and the bidirectional Dijsktra has its own limit. Based on the analysis of the two algorithms, the new improved algorithm proposed...
With the fast development of transportation at sea, establishing vessel traffic services (VTS) is reaching a new high tide in order to more effectively guarantee vessel traffic safety, protect maritime environment and increase traffic efficiency. Formal safety assessment (FSA) has been considered a powerful tool that can help ensure that limited resources are allocated scientifically for these purposes...
This paper presents an ontology for emergency event model based on decision support (DSE2M). The model is recommended as a means to solve problems of how to describe basic characteristics of each phase in an emergency, and decide to take corresponding actions to deal with it according to the characteristics. To obtain satisfactory solutions and detailed actions, DSE2M is stratified into five levels:...
According to the real situation that the traffic safety factors hadn't been considered during the process of urban traffic planning in China, the paper starts with analyzing the routine working procedure of urban traffic planning, then finds out the cut-in points of traffic safety factors incorporated into the traffic planning. Based on the above analysis some problems which are possibly met during...
This article proposes the concept of complete identity theft, which is possible in the time of electronic commerce of biometric identification. Through the analysis of existing level of identification and its characteristics, this article proposes that there should be the relevant emergency response plan for electronic commerce of biometric identification, and also proposes the framework of biometric...
System safety and performance could be degraded by human errors seriously. An approach for human error identification and description during the man-machine interaction process is presented. Firstly, a generic framework for identification and analysis of cognitive errors is designed, and a approach for classifying human errors is built. A general taxonomy of human errors is given in this approach...
A critical infrastructure (CI) consists of those physical and information technology facilities, networks, services and assets which, if disrupted or destroyed, have a serious impact on the health, safety, security or economic well-being of citizens or the effective functioning of governments. Nowadays, the operation controls of these infrastructures have been computerized and have gradually become...
This position paper proposes a research agenda for the field of security testing. It gives a critical account of the state of the art as seen by a practitioner and identifies questions that research failed to answer so far, or failed to answer in such a way that it would have had an impact in the real world. Three categories of research problems are proposed: theory of vulnerabilities, theory of security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.