Study on Model of Risks Assessment of Standard Operation in Rural Power Network



Similar documents
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

Research on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises

A system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

IMPACT ANALYSIS OF A CELLULAR PHONE

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Research on Transformation Engineering BOM into Manufacturing BOM Based on BOP

An Alternative Way to Measure Private Equity Performance

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

Design and Development of a Security Evaluation Platform Based on International Standards

A Performance Analysis of View Maintenance Techniques for Data Warehouses

Efficient Project Portfolio as a tool for Enterprise Risk Management

Stress test for measuring insurance risks in non-life insurance

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST)

ERP Software Selection Using The Rough Set And TPOSIS Methods

3. Present value of Annuity Problems

iavenue iavenue i i i iavenue iavenue iavenue

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

Network Security Situation Evaluation Method for Distributed Denial of Service

The OC Curve of Attribute Acceptance Plans

Determination of Integrated Risk Degrees in Product Development Project

Traffic-light a stress test for life insurance provisions

SQUARE Project: Cost/Benefit Analysis Framework for Information Security Improvement Projects in Small Companies

Forecasting the Direction and Strength of Stock Market Movement

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

An Interest-Oriented Network Evolution Mechanism for Online Communities

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Lei Liu, Hua Yang Business School, Hunan University, Changsha, Hunan, P.R. China, Abstract

MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending

Improved SVM in Cloud Computing Information Mining

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

Calculating the high frequency transmission line parameters of power cables

A Secure Password-Authenticated Key Agreement Using Smart Cards

Application of an Improved BP Neural Network Model in Enterprise Network Security Forecasting

Section 5.4 Annuities, Present Value, and Amortization

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688,

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Tuition Fee Loan application notes

A Study on Secure Data Storage Strategy in Cloud Computing

Factors Affecting Outsourcing for Information Technology Services in Rural Hospitals: Theory and Evidence

Capacity-building and training

Set. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index

BERNSTEIN POLYNOMIALS

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Traffic State Estimation in the Traffic Management Center of Berlin

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

Research of Network System Reconfigurable Model Based on the Finite State Automation

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

An Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

Research Article A Time Scheduling Model of Logistics Service Supply Chain with Mass Customized Logistics Service

14.74 Lecture 5: Health (2)

Time Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters

Help is a tou ch of a button away. Telecare - keeping you safe and independent in your own home. i Personal emergency equipment

Estimating the Development Effort of Web Projects in Chile

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Credit Limit Optimization (CLO) for Credit Cards

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

Inter-Ing INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, November 2007.

Decision Tree Model for Count Data

Partner selection of cloud computing federation based on Markov chains

Optimal allocation of safety and security resources

PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS

Performance Analysis and Coding Strategy of ECOC SVMs

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

M-applications Development using High Performance Project Management Techniques

Transcription:

Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866, Chna 2 Tao Yang, Correspondng author, College of Informaton and Electrcl Engneerng, Shenyang Agrculture Unversty, Shenyang 110866, Chna { Qngj L, xmusyau@hotmal.com, Tao Yang, yangtaosx@yahoo.com.cn } Abstract. Operaton rsk s the prmary rsk to rural power company, and t s also an mportant part of securty rsk management. The paper establshes a model to assessed rsks of standard operaton n rural power network, based on Job Rsk Analyss (LEC). The example and applcaton of the model n rural power network securty rsk management system shows that t can realze the real-tme assessment of standard operaton rsk, the model use s smple and the assessment result s accurate. Ths study has mportant reference value to practcal applcaton of rural power securty rsk assessment. Key words: Model of rsks assessment, Standard operaton, Rural power network, LEC 1 Introducton Securty rsk assessment management s an mportant part of modern busness management and t also s an effectve means to ensure producton safety. In recent years, rural power companes are carryng out rsk assessment based on ts own contents and standards of rsks assessment. In these standards, some are cyclcal; others are real-tme. But they do not gve a clear and workable approach to acheve real-tme assessment that combne wth the standard operatng. Hazard dentfcaton and control measure s the core of real-tme assessment, and the model s the key to acheve real-tme evaluaton for standard operatng. Ths paper proposes an assessment model that s based on method Job Rsk Analyss (LEC) and has been mproved and perfected, so that t can be a good combnaton wth the rsk level of securty rsk assessment. The model can quantfy the hazard level and the effect of preventon measures, and then calculate the rsk level of ths operaton. Based on these remnders and descrptons of varous rsk factors leadng to the lkelhood and severty of accdents, operators can effectvely prevent accdents.

2 Background and platform 2.1 Background Securty rsk assessment management has been wdely used n fnance, nsurance and other ndustres. In November 2008, based on drawng and absorbng the nternatonal advanced management concepts and methods of securty, State Grd Corporaton arranged and compled The Securty Rsk Assessment Norm to Power Supply Enterprses and Supply Enterprse Securty Rsk Identfcaton and Preventon Operatons Manual. From the standpont of the company producton safety condtons, qualty of personnel, scene management, general management, the systematc assessment of enterprse securty management, the norm that manly prevents personal njury and man-made accdents evaluates enterprse securty rsk ratng and gudes enterprse to carry out securty management. The rsk calculaton formula of securty rsk assessment: Scorng rate = Σ the actual score of tems havng been checked / Σ total score of all the tems Table 1. Rsk ratng of securty rsk assessment scorng rate x x 0.9 0.9>x 0.75 0.75>x 0.6 0.6>x 0.4 x<0.4 rsk ratng Securty controlled Low rsk Medum rsk Hgh rsk Out of control 2.2 Platform In order to carry out securty rsk assessment management quckly, ChangChun Suburb Branch Company develop the "securty rsk assessment management system". The system development objectve s to acheve securty rsk assessment scentfc, convenent n the applcaton, relable, cost-savng effect, and provde comprehensve statstcal data to decson-makng to polcy-makers. The system s desgned and realzed by ASP.NET2.0 technques as well as the SQL 2000 back-stage database based on the hgher prevalence WINDOWS platform. System assessment s dvded nto two parts: real-tme assessment and perodc assessment. Perodc assessment s entrely based on The Securty Rsk Assessment Norm to Power Supply Enterprses ; real-tme assessment combnng wth standardzed operaton s a good complement to perodc assessment. Real-tme assessment model based on LEC method been mproved and perfected can quantfy the hazard level and mpact of control measures, and then calculate the rsk level of ths operaton and effectvely prevent accdents.

3. LEC Method 3.1 Introducton of LEC Method LEC method s also named Job Rsk Analyss. It s mathematc model as follow: D= L*E*C. (1) Value of D depends on the rsk possblty (L), the frequency (E) and the possble consequences (C). Ths assessment method s straghtforward and rsk level s clear. But the scores of LEC s determned based prmarly on experence, so the stuff who jon the assessment work must have experence and can make a far and objectve evaluaton of rsk control measures. 3.2 LEC scores and descrpton Table 2 shows the possblty of an accdent (L) and descrpton. Table 2. The possblty of an accdent (L) and descrpton score descrpton 10 Entrely possble 6 Very Lkely 3 Possble, but not often 1 completely unexpected 0.5 envsaged 0.2 Hghly unlkely 0.1 Impossble Table 3 shows frequency of exposure to hazardous (E) and descrpton. Table 3. Frequency of exposure to hazardous (E) and descrpton score descrpton 10 Contnuous 6 per day 3 Once a week, or occasonally 2 Monthly 1 Several tmes a year 0.5 Very rare Table 4 shows that accdent may result n the loss of the consequences (C) and descrpton. Table 4. Score C and descrpton

score descrpton 100 Dsaster, many deaths 40 Dsaster, several fataltes 15 serous, one death 7 Serous njury 3 Major accdents, dsablty 1 Small accdent, mnor njures 4. Real-tme assessment models 4.1 Assessments Model Frst, calculates the rsk value D for each hazard, and then sum total of ths assgnment as the rsk value, and prompts to the operator. There are many hazards preventon and control measures for each hazard. The score of preventon and control measures wll be multpled by the effect of e j, dvded by the total rsk value of rsk sources. Wth reference to table 1, the system reaches the safety rsk assessment rsk ratng. The mathematcal model can be descrbed by Equaton 2: n = 1 k ( e j D ( a b ) m j % + D b ) / D (2) j = 1 n = 1 Table 5 shows the value of a and b. Table 5. Relaton of a,b and D D Level of rsk a b >320 Extremely rsk 0.6 0.0 160~320 Hgh rsk 0.75 0.4 70~160 Sgnfcant rsk 0.9 0.6 20~70 General rsk 0.95 0.75 <20 Slghtly rsk 1 0.85 The effects of a and b s that for a specfc hazard, based on level of rsk, rsk ratng of securty rsk assessment can be lmted n scope. For example, the value of D s >320, so the level of rsk s extremely rsk. For ths hazard, even f the operator take protectve measures s perfect, n the best case the rsk level of ths job s the hgh rsk. On the other hand, the level of rsk s slghtly rsk, even f the operator take no protectve measures, n the worst case the rsk level of ths job s the low rsk. Meanwhle, the models combne the level of rsk and rsk ratng of securty rsk assessment well.

Where m j % means the percentage level of protectve measure s control effect to a specfc hazard, and for hazard wth k- preventon measures, equaton s gven by Equaton 3: k j = 1 m j % = 1. Where k s the count of preventon measures. After that, the operator can easly score on the preventon measures to avod the uncertanty scores. Where e j means the effect of protectve effect to a specfc hazard, and e j [0,1].When a hazard wth the approprate control measures can be prevented, then the value of e j s great; else the value of e j s small. (3) 4.2 Expermental data For example,cuttng trees, the system calculate level of securty rsk based on mathematcal model. Table 6. Parameter values of cuttng trees Hazard D a b e Traffc accdent 60 0.95 0.75 0.8 fallng 84 0.9 0.6 0.8-0.9 Electrc shock 135 0.9 0.6 1 Hurt by fallen trees 90 0.9 0.6 0.8-1 The descrpton of hazards preventon measures for each hazard s no detal. Accordng by parameter values of table 6,the system Calculates scorng rate of securty rsk assessment :( 54.6+72.4+117.45+76.68 ) / ( 60+84+135+90 ) =0.87,Wth reference to table 1, concluson s Low rsk. Result value of 0.87 close to the 0.9 s realstc. 5. Concluson Real-tme rsk assessment plays an mportant role n the producton. The models combne LEC method and rsk ratng of securty rsk assessment well. By adjustng the value of each parameter, ther correspondng relatonshp s flexble. Wth the models, operator can vew the level of hazard rsk, and know the effect of preventon measures that wll be taken, then gan rsk level of ths job. For prmary operator, all nformaton can be warned before work, so accdents can be prevented obvously. At the same tme, large amounts of date from routne work can also serve as the bass for statstcal analyss and offer reference and decson servce to polcy makers. The value of coeffcent largely depends on experence wth professonal staff accordng to dfferent operatons, dfferent crcumstances to determne, and the fnal

value needs further study, standardzaton to make assessment more objectve and reasonable. Reference 1. State Grd Corporaton: The Securty Rsk Assessment Norm to Power Supply Enterprses. Chna Electrc Power Press, Bejng (2008) 2. State Grd Corporaton: Supply Enterprse Securty Rsk Identfcaton and Preventon Operatons Manual. Chna Electrc Power Press, Bejng (2008) 3. Ge Fengshan, and MaWanquan: New Power System Securty Rsk Management System and Evaluaton Methods. Chna Electrc Power Press, Bejng (2008) 4. LI Wen-yuan: Rsk assessment of power systems: models and applcatons. IEEE Press and Wley & Sons Inc, U.S. (2005)