Study on Model of Risks Assessment of Standard Operation in Rural Power Network
|
|
- Phebe Martin
- 7 years ago
- Views:
Transcription
1 Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang , Chna 2 Tao Yang, Correspondng author, College of Informaton and Electrcl Engneerng, Shenyang Agrculture Unversty, Shenyang , Chna { Qngj L, xmusyau@hotmal.com, Tao Yang, yangtaosx@yahoo.com.cn } Abstract. Operaton rsk s the prmary rsk to rural power company, and t s also an mportant part of securty rsk management. The paper establshes a model to assessed rsks of standard operaton n rural power network, based on Job Rsk Analyss (LEC). The example and applcaton of the model n rural power network securty rsk management system shows that t can realze the real-tme assessment of standard operaton rsk, the model use s smple and the assessment result s accurate. Ths study has mportant reference value to practcal applcaton of rural power securty rsk assessment. Key words: Model of rsks assessment, Standard operaton, Rural power network, LEC 1 Introducton Securty rsk assessment management s an mportant part of modern busness management and t also s an effectve means to ensure producton safety. In recent years, rural power companes are carryng out rsk assessment based on ts own contents and standards of rsks assessment. In these standards, some are cyclcal; others are real-tme. But they do not gve a clear and workable approach to acheve real-tme assessment that combne wth the standard operatng. Hazard dentfcaton and control measure s the core of real-tme assessment, and the model s the key to acheve real-tme evaluaton for standard operatng. Ths paper proposes an assessment model that s based on method Job Rsk Analyss (LEC) and has been mproved and perfected, so that t can be a good combnaton wth the rsk level of securty rsk assessment. The model can quantfy the hazard level and the effect of preventon measures, and then calculate the rsk level of ths operaton. Based on these remnders and descrptons of varous rsk factors leadng to the lkelhood and severty of accdents, operators can effectvely prevent accdents.
2 2 Background and platform 2.1 Background Securty rsk assessment management has been wdely used n fnance, nsurance and other ndustres. In November 2008, based on drawng and absorbng the nternatonal advanced management concepts and methods of securty, State Grd Corporaton arranged and compled The Securty Rsk Assessment Norm to Power Supply Enterprses and Supply Enterprse Securty Rsk Identfcaton and Preventon Operatons Manual. From the standpont of the company producton safety condtons, qualty of personnel, scene management, general management, the systematc assessment of enterprse securty management, the norm that manly prevents personal njury and man-made accdents evaluates enterprse securty rsk ratng and gudes enterprse to carry out securty management. The rsk calculaton formula of securty rsk assessment: Scorng rate = Σ the actual score of tems havng been checked / Σ total score of all the tems Table 1. Rsk ratng of securty rsk assessment scorng rate x x >x >x >x 0.4 x<0.4 rsk ratng Securty controlled Low rsk Medum rsk Hgh rsk Out of control 2.2 Platform In order to carry out securty rsk assessment management quckly, ChangChun Suburb Branch Company develop the "securty rsk assessment management system". The system development objectve s to acheve securty rsk assessment scentfc, convenent n the applcaton, relable, cost-savng effect, and provde comprehensve statstcal data to decson-makng to polcy-makers. The system s desgned and realzed by ASP.NET2.0 technques as well as the SQL 2000 back-stage database based on the hgher prevalence WINDOWS platform. System assessment s dvded nto two parts: real-tme assessment and perodc assessment. Perodc assessment s entrely based on The Securty Rsk Assessment Norm to Power Supply Enterprses ; real-tme assessment combnng wth standardzed operaton s a good complement to perodc assessment. Real-tme assessment model based on LEC method been mproved and perfected can quantfy the hazard level and mpact of control measures, and then calculate the rsk level of ths operaton and effectvely prevent accdents.
3 3. LEC Method 3.1 Introducton of LEC Method LEC method s also named Job Rsk Analyss. It s mathematc model as follow: D= L*E*C. (1) Value of D depends on the rsk possblty (L), the frequency (E) and the possble consequences (C). Ths assessment method s straghtforward and rsk level s clear. But the scores of LEC s determned based prmarly on experence, so the stuff who jon the assessment work must have experence and can make a far and objectve evaluaton of rsk control measures. 3.2 LEC scores and descrpton Table 2 shows the possblty of an accdent (L) and descrpton. Table 2. The possblty of an accdent (L) and descrpton score descrpton 10 Entrely possble 6 Very Lkely 3 Possble, but not often 1 completely unexpected 0.5 envsaged 0.2 Hghly unlkely 0.1 Impossble Table 3 shows frequency of exposure to hazardous (E) and descrpton. Table 3. Frequency of exposure to hazardous (E) and descrpton score descrpton 10 Contnuous 6 per day 3 Once a week, or occasonally 2 Monthly 1 Several tmes a year 0.5 Very rare Table 4 shows that accdent may result n the loss of the consequences (C) and descrpton. Table 4. Score C and descrpton
4 score descrpton 100 Dsaster, many deaths 40 Dsaster, several fataltes 15 serous, one death 7 Serous njury 3 Major accdents, dsablty 1 Small accdent, mnor njures 4. Real-tme assessment models 4.1 Assessments Model Frst, calculates the rsk value D for each hazard, and then sum total of ths assgnment as the rsk value, and prompts to the operator. There are many hazards preventon and control measures for each hazard. The score of preventon and control measures wll be multpled by the effect of e j, dvded by the total rsk value of rsk sources. Wth reference to table 1, the system reaches the safety rsk assessment rsk ratng. The mathematcal model can be descrbed by Equaton 2: n = 1 k ( e j D ( a b ) m j % + D b ) / D (2) j = 1 n = 1 Table 5 shows the value of a and b. Table 5. Relaton of a,b and D D Level of rsk a b >320 Extremely rsk ~320 Hgh rsk ~160 Sgnfcant rsk ~70 General rsk <20 Slghtly rsk The effects of a and b s that for a specfc hazard, based on level of rsk, rsk ratng of securty rsk assessment can be lmted n scope. For example, the value of D s >320, so the level of rsk s extremely rsk. For ths hazard, even f the operator take protectve measures s perfect, n the best case the rsk level of ths job s the hgh rsk. On the other hand, the level of rsk s slghtly rsk, even f the operator take no protectve measures, n the worst case the rsk level of ths job s the low rsk. Meanwhle, the models combne the level of rsk and rsk ratng of securty rsk assessment well.
5 Where m j % means the percentage level of protectve measure s control effect to a specfc hazard, and for hazard wth k- preventon measures, equaton s gven by Equaton 3: k j = 1 m j % = 1. Where k s the count of preventon measures. After that, the operator can easly score on the preventon measures to avod the uncertanty scores. Where e j means the effect of protectve effect to a specfc hazard, and e j [0,1].When a hazard wth the approprate control measures can be prevented, then the value of e j s great; else the value of e j s small. (3) 4.2 Expermental data For example,cuttng trees, the system calculate level of securty rsk based on mathematcal model. Table 6. Parameter values of cuttng trees Hazard D a b e Traffc accdent fallng Electrc shock Hurt by fallen trees The descrpton of hazards preventon measures for each hazard s no detal. Accordng by parameter values of table 6,the system Calculates scorng rate of securty rsk assessment :( ) / ( ) =0.87,Wth reference to table 1, concluson s Low rsk. Result value of 0.87 close to the 0.9 s realstc. 5. Concluson Real-tme rsk assessment plays an mportant role n the producton. The models combne LEC method and rsk ratng of securty rsk assessment well. By adjustng the value of each parameter, ther correspondng relatonshp s flexble. Wth the models, operator can vew the level of hazard rsk, and know the effect of preventon measures that wll be taken, then gan rsk level of ths job. For prmary operator, all nformaton can be warned before work, so accdents can be prevented obvously. At the same tme, large amounts of date from routne work can also serve as the bass for statstcal analyss and offer reference and decson servce to polcy makers. The value of coeffcent largely depends on experence wth professonal staff accordng to dfferent operatons, dfferent crcumstances to determne, and the fnal
6 value needs further study, standardzaton to make assessment more objectve and reasonable. Reference 1. State Grd Corporaton: The Securty Rsk Assessment Norm to Power Supply Enterprses. Chna Electrc Power Press, Bejng (2008) 2. State Grd Corporaton: Supply Enterprse Securty Rsk Identfcaton and Preventon Operatons Manual. Chna Electrc Power Press, Bejng (2008) 3. Ge Fengshan, and MaWanquan: New Power System Securty Rsk Management System and Evaluaton Methods. Chna Electrc Power Press, Bejng (2008) 4. LI Wen-yuan: Rsk assessment of power systems: models and applcatons. IEEE Press and Wley & Sons Inc, U.S. (2005)
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationResearch on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises
3rd Internatonal Conference on Educaton, Management, Arts, Economcs and Socal Scence (ICEMAESS 2015) Research on Evaluaton of Customer Experence of B2C Ecommerce Logstcs Enterprses Yle Pe1, a, Wanxn Xue1,
More informationA system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings
A system for real-tme calculaton and montorng of energy performance and carbon emssons of RET systems and buldngs Dr PAAIOTIS PHILIMIS Dr ALESSADRO GIUSTI Dr STEPHE GARVI CE Technology Center Democratas
More informationNEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION
NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State
More informationIMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationHP Mission-Critical Services
HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to
More informationResearch on Transformation Engineering BOM into Manufacturing BOM Based on BOP
Appled Mechancs and Materals Vols 10-12 (2008) pp 99-103 Onlne avalable snce 2007/Dec/06 at wwwscentfcnet (2008) Trans Tech Publcatons, Swtzerland do:104028/wwwscentfcnet/amm10-1299 Research on Transformaton
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationIntra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error
Intra-year Cash Flow Patterns: A Smple Soluton for an Unnecessary Apprasal Error By C. Donald Wggns (Professor of Accountng and Fnance, the Unversty of North Florda), B. Perry Woodsde (Assocate Professor
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More informationDesign and Development of a Security Evaluation Platform Based on International Standards
Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School
More informationA Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
More informationEmpirical Analysis on Farmers Agriculture Insurance Purchasing. Intention of Hebei Province 1
Emprcal Analyss on Farmers Agrculture Insurance Purchasng Intenton of Hebe Provnce 1 Wenl Feng,Yue Bo,Fang Lu (Bankng School, Hebe Unversty of Economcs and Busness) (Shjazhuang,Hebe Provnce, 050061) Abstract:In
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationStress test for measuring insurance risks in non-life insurance
PROMEMORIA Datum June 01 Fnansnspektonen Författare Bengt von Bahr, Younes Elonq and Erk Elvers Stress test for measurng nsurance rsks n non-lfe nsurance Summary Ths memo descrbes stress testng of nsurance
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationResearch on Privacy Protection Approach for Cloud Computing Environments
, pp. 113-120 http://dx.do.org/10.14257/jsa.2015.9.3.11 Research on Prvacy Protecton Approach for Cloud Computng Envronments Xaohu L 1,2, Hongxng Lang 3 and Dan Ja 1 1 College of Electrcal and Informaton
More informationERP Software Selection Using The Rough Set And TPOSIS Methods
ERP Software Selecton Usng The Rough Set And TPOSIS Methods Under Fuzzy Envronment Informaton Management Department, Hunan Unversty of Fnance and Economcs, No. 139, Fengln 2nd Road, Changsha, 410205, Chna
More information3. Present value of Annuity Problems
Mathematcs of Fnance The formulae 1. A = P(1 +.n) smple nterest 2. A = P(1 + ) n compound nterest formula 3. A = P(1-.n) deprecaton straght lne 4. A = P(1 ) n compound decrease dmshng balance 5. P = -
More informationPerformance Management and Evaluation Research to University Students
631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton
More informationiavenue iavenue i i i iavenue iavenue iavenue
Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both
More informationMethodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications
Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationFuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks
Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng
More informationMETHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS
METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationMINIMISING INVENTORY COSTS BY PROPERLY CHOOSING THE LEVEL OF SAFETY STOCK
ECONOMIC AND BUSINESS REVIEW VOL. No. 2 2009 09 7 09 MINIMISING INVENTORY COSTS BY PROPERLY CHOOSING THE LEVEL OF SAFETY STOCK LILJANA FERBAR TRATAR* ABSTRACT: Markets are everyday becomng ever more demandng
More informationDetermination of Integrated Risk Degrees in Product Development Project
Proceedngs of the World Congress on Engneerng and Computer Scence 009 Vol II WCECS 009, October 0-, 009, San Francsco, USA Determnaton of Integrated sk Degrees n Product Development Project D. W. Cho.,
More informationTraffic-light a stress test for life insurance provisions
MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax
More informationSQUARE Project: Cost/Benefit Analysis Framework for Information Security Improvement Projects in Small Companies
SQUARE Project: Cost/Beneft Analyss Framework for Informaton Securty Improvement Projects n Small Companes System Qualty Requrements Engneerng (SQUARE) Team Nck (Nng) Xe Nancy R. Mead, Advsor Contrbutors:
More informationAn Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems
STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationAnswer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy
4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationA Study on Security Technique of Cloud Data Processing in Electronic Commerce
Internatonal Journal of Securty and Its Applcatons, pp.283-290 http://dx.do.org/10.14257/sa.2014.8.2.29 A Study on Securty Technque of Cloud Data Processng n Electronc Commerce We Da 1, Xuefang Zhang 2
More informationLei Liu, Hua Yang Business School, Hunan University, Changsha, Hunan, P.R. China, 410082. Abstract
, pp.377-390 http://dx.do.org/10.14257/jsa.2016.10.4.34 Research on the Enterprse Performance Management Informaton System Development and Robustness Optmzaton based on Data Regresson Analyss and Mathematcal
More informationMONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS
Electronc Communcatons Commttee (ECC) wthn the European Conference of Postal and Telecommuncatons Admnstratons (CEPT) MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Athens, February 2008
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationThe Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.
Paper 1837-2014 The Use of Analytcs for Clam Fraud Detecton Roosevelt C. Mosley, Jr., FCAS, MAAA Nck Kucera Pnnacle Actuaral Resources Inc., Bloomngton, IL ABSTRACT As t has been wdely reported n the nsurance
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationBayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending
Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success
More informationImproved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
More informationRisk Model of Long-Term Production Scheduling in Open Pit Gold Mining
Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationCalculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationApplication of an Improved BP Neural Network Model in Enterprise Network Security Forecasting
161 A publcaton of VOL. 46, 15 CHEMICAL ENGINEERING TRANSACTIONS Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 15, AIDIC Servz S.r.l., ISBN 978-88-9568-37-; ISSN 83-916 The Italan Assocaton of
More informationSection 5.4 Annuities, Present Value, and Amortization
Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationObjectives How Can Pharmacy Staff Add to the Accountability of ACO s?
Objectves How Can Pharmacy Staff Add to the Accountablty of ACO s? Sandra Van Trease Group Presdent, BJC HealthCare Presdent, BJC HealthCare ACO, LLC The speaker has no conflct of nterest to declare. 1.
More informationBUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr
Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo
More informationRisk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008
Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn
More informationTuition Fee Loan application notes
Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1
More informationA Study on Secure Data Storage Strategy in Cloud Computing
Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng
More informationStudy on the Competitiveness of the Software Outsourcing Industry in Jilin Province Based on Diamond Model
Study on the Compettveness of the Software Outsourcng Industry n Jln Provnce Based on Damond Model LIU Lqn School of Busness Admnstraton, Changchun Unversty of Technology, Changchun, 130012 lulqn2002@xnhuanet.com
More informationFactors Affecting Outsourcing for Information Technology Services in Rural Hospitals: Theory and Evidence
Factors Affectng Outsourcng for Informaton Technology Servces n Rural Hosptals: Theory and Evdence Bran E. Whtacre Department of Agrcultural Economcs Oklahoma State Unversty bran.whtacre@okstate.edu J.
More informationCapacity-building and training
92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng
More informationPerformance attribution for multi-layered investment decisions
Performance attrbuton for mult-layered nvestment decsons 880 Thrd Avenue 7th Floor Ne Yor, NY 10022 212.866.9200 t 212.866.9201 f qsnvestors.com Inna Oounova Head of Strategc Asset Allocaton Portfolo Management
More informationSet. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index
ISSN (Prnt): 1694-0784 ISSN (Onlne): 1694-0814 www.ijcsi.org 236 IT outsourcng servce provder dynamc evaluaton model and algorthms based on Rough Set L Sh Sh 1,2 1 Internatonal School of Software, Wuhan
More informationScreening Tools Chart As of November 2011
Screenng Chart As of November 2011 Ths tools chart reflects the results of the fourth annual revew of screenng tools by the Center s Techncal Revew Commttee (TRC). The Center defnes screenng as follows:
More informationBERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
More informationEffective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints
Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationProduct Quality and Safety Incident Information Tracking Based on Web
Product Qualty and Safety Incdent Informaton Trackng Based on Web News 1 Yuexang Yang, 2 Correspondng Author Yyang Wang, 2 Shan Yu, 2 Jng Q, 1 Hual Ca 1 Chna Natonal Insttute of Standardzaton, Beng 100088,
More informationResearch of Network System Reconfigurable Model Based on the Finite State Automation
JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang
More informationCS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements
Lecture 3 Densty estmaton Mlos Hauskrecht mlos@cs.ptt.edu 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there
More informationA New Task Scheduling Algorithm Based on Improved Genetic Algorithm
A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng
More informationAn Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style
Internatonal Journal of Scentfc & Engneerng Research Volume 2, Issue 7, July-20 An Integrated Approach of AHP-GP and Vsualzaton for Software Archtecture Optmzaton: A case-study for selecton of archtecture
More informationOn-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com
More informationRELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT
Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE
More informationResearch Article A Time Scheduling Model of Logistics Service Supply Chain with Mass Customized Logistics Service
Hndaw Publshng Corporaton Dscrete Dynamcs n Nature and Socety Volume 01, Artcle ID 48978, 18 pages do:10.1155/01/48978 Research Artcle A Tme Schedulng Model of Logstcs Servce Supply Chan wth Mass Customzed
More information14.74 Lecture 5: Health (2)
14.74 Lecture 5: Health (2) Esther Duflo February 17, 2004 1 Possble Interventons Last tme we dscussed possble nterventons. Let s take one: provdng ron supplements to people, for example. From the data,
More informationTime Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters
Internatonal Journal of Smart Grd and Clean Energy Tme Doman smulaton of PD Propagaton n XLPE Cables Consderng Frequency Dependent Parameters We Zhang a, Jan He b, Ln Tan b, Xuejun Lv b, Hong-Je L a *
More informationHelp is a tou ch of a button away. Telecare - keeping you safe and independent in your own home. i Personal emergency equipment
Help s a tou ch of a button away Telecare - keepng you safe and ndependent n your own home Personal emergency equpment 24/7 moble response - ncludng a dgnty savng lftng servce Professonal support Welcome
More informationGeneralized Linear Models for Traffic Annuity Claims, with Application to Claims Reserving
Mathematcal Statstcs Stockholm Unversty Generalzed Lnear Models for Traffc Annuty Clams, wth Applcaton to Clams Reservng Patrca Mera Benner Examensarbete 2010:2 Postal address: Mathematcal Statstcs Dept.
More informationEstimating the Development Effort of Web Projects in Chile
Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 sochoa@dcc.uchle.cl M. Cecla Bastarrca Computer Scences Department Unversty
More informationCourse outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy
Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton
More informationCredit Limit Optimization (CLO) for Credit Cards
Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt
More informationTo manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
More informationModeling Motorcycle Insurance Rate Reduction due to Mandatory Safety Courses
Modelng Motorcycle Insurance Rate Reducton due to Mandatory Safety Courses Shujuan Huang 1 Vadveloo Jeyaraj 1 Valdez mlano 1 Garry D. Lapdus 2 1 Mathematc Department Unversty of Connectcut Storrs CT 06269
More informationRoad Construction Lead to the Issue of National Compensation
Abstract Road Constructon Lead to the Issue of Natonal Compensaton Tung-Tsan Chen 1 and Yao T. Hsu 2 The Hghway conssts of the roads used by vehcles and the other publc nfrastructure facltes around t that
More informationInter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.
Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN
More informationOxygen Saturation Measurement and Optimal Accuracy in Nair
The Applcaton of Threshold De-nosng n Moble Oxygen Saturaton Montorng Software Tang Nng and Xu Zhenzhen School of Computer Scence and Technology, Donghua Unversty, Shangha, Chna 201620 tnwysyd@126.com
More informationDecision Tree Model for Count Data
Proceedngs of the World Congress on Engneerng 2012 Vol I Decson Tree Model for Count Data Yap Bee Wah, Norashkn Nasaruddn, Wong Shaw Voon and Mohamad Alas Lazm Abstract The Posson Regresson and Negatve
More informationBig Data Analytics on Acquisition Issues of Public Healthcare
96 Int'l Conf. on Advances n Bg Data Analytcs ABDA'15 Bg Data Analytcs on Acquston Issues of Publc Healthcare A. Habo Wang 1, B. Chenhu Zhou 1, C. We Wang 1 and D. Yaquan Xu 2 1 Sanchez School of Busness,
More informationPartner selection of cloud computing federation based on Markov chains
COMPUER MODELLING & NEW ECHNOLOGIES 2014 18(12B) 590-594 Abstract Partner selecton of cloud computng federaton based on Markov chans Lang Hong 1,2, Changyuan Gao 1* 1 School of Management, Harbn Unversty
More informationMultitone Electronics Plc. delivering certainty
Multtone Electroncs Plc Multtone Electroncs Plc, Multtone House, Shortwood Copse Lane, Basngstoke, Hampshre, RG23 7NL Tel: +44 (0)1256 320292 Fax: +44 (0)1256 462 643 Emal: nfo@multtone.com Web: www.multtone.com
More informationOptimal allocation of safety and security resources
397 A publcaton of VOL. 31, 2013 CHEMICAL ENGINEERING TRANSACTIONS Guest Edtors: Eddy De Rademaeker, Bruno Fabano, Smberto Senn Buratt Copyrght 2013, AIDIC Servz S.r.l., ISBN 978-88-95608-22-8; ISSN 1974-9791
More informationAn Integrated Framework for Responsive Supply Chain Management
1 An Integrated Framework for Responsve Supply Chan Management 1 Darsht Parmar 1 Teresa Wu 1 John Fowler Tom Callarman 3 Vncent Hargaden 4 Eamonn Ambrose 1 Phlp Wolfe 1 Department of Industral Engneerng
More informationPEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS
PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS Yunhong Xu, Faculty of Management and Economcs, Kunmng Unversty of Scence and Technology,
More informationPerformance Analysis and Coding Strategy of ECOC SVMs
Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationAn Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols
Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols
More informationM-applications Development using High Performance Project Management Techniques
M-applcatons Development usng Hgh Performance Project Management Technques PAUL POCATILU, MARIUS VETRICI Economc Informatcs Department Academy of Economc Studes 6 Pata Romana, Sector, Bucharest ROMANIA
More information