CN102622668A - Risk early warning method based on technological processes - Google Patents

Risk early warning method based on technological processes Download PDF

Info

Publication number
CN102622668A
CN102622668A CN2012100319287A CN201210031928A CN102622668A CN 102622668 A CN102622668 A CN 102622668A CN 2012100319287 A CN2012100319287 A CN 2012100319287A CN 201210031928 A CN201210031928 A CN 201210031928A CN 102622668 A CN102622668 A CN 102622668A
Authority
CN
China
Prior art keywords
risk
risk point
relevant
severity
point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100319287A
Other languages
Chinese (zh)
Other versions
CN102622668B (en
Inventor
谭显春
宋志勇
池宏
舒晓秋
许保光
王军
祁明亮
杨明
邵雪焱
孟予希
高敏刚
李孟格
谌爱群
马力
程龙信
石彪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
INSTITUTE OF POLICY AND MANAGEMENT CHINESE ACADEMY OF SCIENCES
Air China Ltd
Original Assignee
INSTITUTE OF POLICY AND MANAGEMENT CHINESE ACADEMY OF SCIENCES
Air China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by INSTITUTE OF POLICY AND MANAGEMENT CHINESE ACADEMY OF SCIENCES, Air China Ltd filed Critical INSTITUTE OF POLICY AND MANAGEMENT CHINESE ACADEMY OF SCIENCES
Priority to CN201210031928.7A priority Critical patent/CN102622668B/en
Publication of CN102622668A publication Critical patent/CN102622668A/en
Application granted granted Critical
Publication of CN102622668B publication Critical patent/CN102622668B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a risk early warning method based on technological processes, which belongs to the field of risk early warning. The risk early warning method includes: A, obtaining information of each business processing joint of a business processing technological process of an operation control system, finding out various business processing joints with safety risks according to the information, and correspondingly setting up various technological process risk points; B, finding out various relevant risk points capable of triggering monitored potential unsafe events from the technological process risk points, building a risk conduction path model according to the relevant risk points and the potential unsafe events, and obtaining severity level of the potential unsafe events and gathered data information of unsafe information of the relevant risk points; C, estimating the relevant risk points to determine severity level according to the risk conduction path model, the severity level of the potential unsafe events and the gathered data information; and D, early warning via the operation control system when the severity degree of the risk points reaches or exceeds preset severity level. The method can timely early warn according to the severity degree of the risk points in the determined technological processes.

Description

Method for prewarning risk based on flow process
Technical field
The present invention relates to the Risk-warning field, relate in particular to a kind of method for prewarning risk based on flow process.
Background technology
In the present air line, operation control center is that flight production ensures department, and groundwork is that the flight operation information is compiled, processes, analyzes, makes a strategic decision and issues.Operation control system by operation control center is handled the key business flow process of flight, like dispatch clearance flow process etc.But in the handled flow process of operation control system, have strong relevance between the business operation of each service processing node, the risk conducting problem is more outstanding, and each service processing node all can become a risk point, thus potential dangerous incident after touch.And present operation control system does not have and in the processing operation flow, has the some of risk or certain several service processing node to the risk of a certain potential dangerous incident when higher; When promptly be prone to triggering this potential dangerous incident; In time carry out early warning; Thereby avoid causing this dangerous incident, avoid accident to take place.
Summary of the invention
The purpose of embodiment of the present invention provides a kind of method for prewarning risk based on flow process; Solve the operation control system that uses in the present air line; Can't find out the risky service processing node that possibly cause follow-up dangerous incident in its business processing flow and in time carry out early warning, cause the problem of follow-up easy initiation serious accident.
The present invention realizes through following technical proposals:
Embodiment of the present invention provides a kind of method for prewarning risk based on flow process, may further comprise the steps:
Steps A; Obtain the information of each included service processing node of business processing flow that operation control system carries out; Find out each service processing node that has security risk in the said information, set up risk point as the flow process risk point corresponding to each service processing node of finding out;
Step B; From the corresponding potential dangerous incident of said business processing flow; Selected potential dangerous incident of being monitored; From the flow process risk point, find out the relevant risk point that can trigger this potential dangerous incident,, and obtain the combined data information of the non-safety information of each relevant risk point of said risk conducting path model in serious grade and the certain hour section of said potential dangerous incident according to each relevant risk point and said potential dangerous event establishment risk conducting path model;
Step C assesses each relevant risk point according to the serious grade and the said combined data information of said risk conducting path model of setting up and the said potential dangerous incident obtained, confirms the order of severity of each relevant risk point;
Step D if the order of severity of relevant risk point meets or exceeds preset serious grade, then to said operation control system output early warning information, carries out early warning by said operation control system according to said early warning information.
Embodiment of the present invention also provides a kind of method for prewarning risk based on flow process, may further comprise the steps:
Steps A; Obtain the information of each included service processing node of business processing flow that operation control system carries out; Find out each service processing node that has security risk in the said information, set up risk point as the flow process risk point corresponding to each service processing node of finding out;
Step B; From the corresponding potential dangerous incident of said business processing flow; Selected a kind of potential dangerous incident; From said flow process risk point, find out each relevant risk point that can trigger this potential dangerous incident,, and obtain the combined data information of the non-safety information of each relevant risk point of said risk conducting path model in serious grade and the certain hour section of said potential dangerous incident according to each relevant risk point and said potential dangerous event establishment risk conducting path model;
Step C assesses each relevant risk point according to the serious grade and the said combined data information of said risk conducting path model of setting up and the said potential dangerous incident obtained, confirms the comprehensive order of severity of each relevant risk point;
Step D; Repeat above-mentioned steps B, the comprehensive order of severity of C all risk points in drawing said flow process risk point under the different potential dangerous incident of same serious grade, calculate the comprehensive order of severity of the overall situation of each risk point based on the order of severity of each risk point;
Step e if the comprehensive order of severity of the overall situation of risk point meets or exceeds the preset order of severity, then to said operation control system output early warning information, is carried out early warning by said operation control system according to said early warning information.
Technical scheme by the invention described above provides can be found out; The method for prewarning risk that embodiment of the present invention provides; The business processing flow performed according to operation control system; Find out the flow process risk point in each service processing node in the business processing flow, according to the potential dangerous incident of monitoring, from the flow process risk point, obtain each relevant risk point relevant and set up risk conducting path model again with this potential dangerous incident; And obtain in the certain hour section with the combined data of the non-safety information of each relevant risk spot correlation and combine the serious grade of potential dangerous incident; Serious grade and combined data information through risk conducting path model of setting up and the potential dangerous incident of obtaining are assessed each relevant risk point, confirm the order of severity of each relevant risk point, thereby according to the order of severity of each relevant risk point; In time, carry out early warning according to said early warning information by operation control system to said operation control system output early warning information.The order of severity of each the relevant risk point under the serious grade of the potential dangerous incident that this method is monitored through being evaluated at; Which risk point of early warning accurately has the greater risk of this potential dangerous incident of triggering; Thereby utilize operation control system to carry out timely early warning; Effectively avoid the higher risk point of serious grade to cause dangerous incident, caused the problem of security incident.
Description of drawings
In order to be illustrated more clearly in the technical scheme of the embodiment of the invention; The accompanying drawing of required use is done to introduce simply in will describing embodiment below; Obviously, the accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skill in the art; Under the prerequisite of not paying creative work, can also obtain other accompanying drawings according to these accompanying drawings.
The method for prewarning risk process flow diagram that Fig. 1 provides for the embodiment of the invention;
Another process flow diagram of method for prewarning risk that Fig. 2 provides for the embodiment of the invention;
The overall flow figure of the operation control system that Fig. 3 provides for the embodiment of the invention;
The risk conduction network diagram that Fig. 4 provides for the embodiment of the invention to low on fuel;
The adjacency matrix synoptic diagram that Fig. 5 provides for the embodiment of the invention;
Fig. 6 analyzes synoptic diagram for the risk conduction of the risk point that the embodiment of the invention provides;
The conduction mode that Fig. 7 provides for the embodiment of the invention is an individual paths series model synoptic diagram;
The synoptic diagram of the risk conduction mode situation 1 that Fig. 8 provides for the embodiment of the invention;
The risk conduction mode that Fig. 9 provides for the embodiment of the invention is another synoptic diagram of individual paths series model;
The risk conduction mode that Figure 10 provides for the embodiment of the invention is a multipath conduction mode synoptic diagram;
The risk conduction mode that Figure 11 provides for the embodiment of the invention is the conduction mode synoptic diagram that contains common path;
The risk conduction mode that Figure 12 provides for the embodiment of the invention is another conduction mode synoptic diagram that contains common path;
The risk conduction mode that Figure 13 provides for the embodiment of the invention is the another conduction mode synoptic diagram that contains common path;
The non-safety information frequency statistical graph of low on fuel in the method for prewarning risk that Figure 14 provides for the embodiment of the invention;
Figure 15 is the synoptic diagram of individual paths series model for the method for prewarning risk risk conduction mode that the embodiment of the invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is carried out clear, intactly description, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on embodiments of the invention, those of ordinary skills belong to protection scope of the present invention not making the every other embodiment that is obtained under the creative work prerequisite.
To combine accompanying drawing that the embodiment of the invention is done to describe in detail further below.
First embodiment
The embodiment of the invention provides a kind of method for prewarning risk based on flow process; Can be used in the operation control system; Can carry out timely Risk-warning to the risk point of the corresponding easy initiation security incident of the business processing flow of operation control; Avoid security incident to take place, as shown in Figure 1, this method may further comprise the steps:
Steps A; Obtain the information of each included service processing node of business processing flow that operation control system carries out; Find out each service processing node that has security risk in the said information, set up risk point as the flow process risk point corresponding to each service processing node of finding out;
Above-mentioned steps A specifically may further comprise the steps:
Steps A 1 is obtained the information of each included service processing node of business processing flow that operation control system carries out;
Steps A 2 is found out each service processing node that comprises non-safety information in the said information, sets up risk point as the flow process risk point corresponding to each service processing node of finding out.
Step B; From the corresponding potential dangerous incident of said business processing flow; Selected potential dangerous incident of being monitored; From the flow process risk point, find out the relevant risk point that can trigger this potential dangerous incident,, and obtain the combined data information of the non-safety information of each relevant risk point of said risk conducting path model in serious grade and the certain hour section of said potential dangerous incident according to each relevant risk point and said potential dangerous event establishment risk conducting path model;
Among the above-mentioned steps B, specifically comprise according to each relevant risk point and said potential dangerous event establishment risk conducting path model:
Step B1 confirms pairing each service processing node of each relevant risk point;
Step B2 finds out each corresponding service processing node of each relevant risk point conducts to said potential dangerous incident in business processing flow incidence relation;
Step B3 is connected to each relevant risk point by said incidence relation and forms risk conducting path model after the said potential dangerous incident.
Among the above-mentioned steps B; The combined data information of obtaining the non-safety information of each relevant risk point of said risk conducting path model in the certain hour section specifically comprises: each relevant risk point in the certain hour section during as the risk source of triggering said potential dangerous incident the frequency of its non-safety information and each relevant risk point it conducts discovery number of times of next non-safety information to other risk point during as middle the risk point that triggers said potential dangerous incident in the certain hour section.This combined data information also comprises:
The frequency in the frequency of each relevant risk point non-safety information relevant with said potential dangerous incident in the certain hour section, each relevant risk point risk source of the said potential dangerous incident of conduct triggering in the certain hour section and each relevant risk point are as the frequency of the middle risk point in each risk source of triggering said potential dangerous incident.
Step C assesses each relevant risk point according to the serious grade and the said combined data information of said risk conducting path model of setting up and the said potential dangerous incident obtained, confirms the order of severity of each relevant risk point;
Above-mentioned steps C specifically comprises:
Step C1 from each relevant risk point of the said risk conducting path model set up, finds out the conducting path that conducts to said potential dangerous incident as the risk point in risk source through middle risk point; And the frequency that obtains the non-safety information in risk source in the said combined data information with each in the middle of the discovery number of times of risk point non-safety information that other risk point conduction is come;
Step C2; The frequency of the conducting path that finds according to step C1, the non-safety information in risk source and in the middle of each risk point to the discovery number of times of the non-safety information of other risk point conduction; And the serious grade of said potential dangerous incident; The independent order of severity of risk point in the middle of calculating through following assessment models one, assessment models one is:
min A i k Σ i Σ j I ( i , j ) ( A i k - A j k ) 2
Figure BDA0000135449980000033
In the above-mentioned model; δ is the adjustment parameter; The minimal difference of representing two adjacent middle risk point degrees of risk; The partial ordering relation that risk point satisfies in the middle of formula (1) expression, all middle risk point contribution degree sums equal the constraint condition of the serious grade of potential dangerous incident on conducting path of formula (2) expression, and A is the serious grade of said potential dangerous incident;
Step C3, the independent order of severity of the middle risk point that obtains according to step C2 calculates the independent order of severity B in risk source through following assessment models two k, assessment models two is:
B k = h 1 k n k H 1 k + · · · + h i k n k H i k + · · · + h r n k H r k
= h 1 k n k * 0 + · · · + h i k n k * ( A 1 k + · · · + A i - 1 k ) + · · · + h r k n k A
In the above-mentioned model two, n kFor the frequency of the non-safety information of risk source k, promptly with the non-safety information frequency of risk point k as the risk source;
Figure BDA0000135449980000043
Be the number of times that non-safety information is found by risk point 1 place operation, the actual generation of risk source k this moment, the degree of risk of risk source k does H 1 k = 0 ;
Figure BDA0000135449980000045
Be the number of times that non-safety information is found by the operation of risk point i place, this moment, the degree of risk of risk source k did H i k = A 1 k + · · · + A i - 1 k ;
Figure BDA0000135449980000047
spread out of operation control system for non-safety information; Found beyond the operation control system or the actual generation of final potential dangerous incident; This moment risk source k degree of risk is
Figure BDA0000135449980000048
in this case; This moment, the order of severity of risk source k equaled A, and A is the serious grade of said potential dangerous incident;
n kWith
Figure BDA0000135449980000049
Between satisfy relation:
Figure BDA00001354499800000410
Step C4, the independent order of severity that above-mentioned assessment is obtained is as the order of severity of each self-corresponding each relevant risk point.
Among the above-mentioned steps C, after step C2, also comprise:
Step C20 based on the independent order of severity of each relevant risk point being assessed each the relevant risk point that obtains, carries out whole order of severity assessment to each relevant risk point, obtains the whole order of severity of each relevant risk point.Wherein, each relevant risk point being carried out whole order of severity assessment specifically comprises:
Step C201; Each relevant risk point is carried out whole order of severity assessment one by one; At first select a certain relevant risk point, from said combined data information, obtain the frequency of the middle risk point in the frequency of this relevant risk point non-safety information relevant in the certain hour section, the frequency in this relevant risk point risk source of the said potential dangerous incident of conduct triggering in the certain hour section and each risk source that the conduct of this relevant risk point triggers said potential dangerous incident with said potential dangerous incident;
Step C202; The frequency of this relevant risk point non-safety information relevant with said potential dangerous incident in the certain hour section that obtains according to step C201, this relevant risk point as the frequency in the risk source of triggering said potential dangerous incident and this relevant risk point frequency as the middle risk point in each risk source of triggering said potential dangerous incident, draw the whole order of severity r of this relevant risk point through following assessment models three calculating in the certain hour section i, assessment models three is:
r i = β i B i + Σ k = 1 m α k A i k
β i=n i/N i
α k = n i k / N i
N i = n i + Σ k = 1 m n i k
In the above-mentioned assessment models three, N iFrequency for risk point i non-safety information relevant in the certain hour section with said potential dangerous incident;
n iBe risk point i number of times as the generation of risk source in the certain hour section;
Figure BDA0000135449980000051
is the frequency of risk point i as the middle risk point of risk source k;
M is illustrated in has m risk source to take place to comprise risk point i in its conducting path of back in the certain hour section;
Step 203 repeats above-mentioned steps 201,202 until the whole order of severity of obtaining each relevant risk point.
Among the above-mentioned steps C, further comprising the steps of after step C20:
Step C21 according to the independent order of severity and the whole order of severity of each relevant risk point being assessed each the relevant risk point that obtains, carries out comprehensive order of severity assessment to each relevant risk point, obtains the comprehensive order of severity of each relevant risk point.
Saidly each relevant risk point carried out the assessment of the comprehensive order of severity specifically comprise:
Step C211; Each relevant risk point is carried out comprehensive order of severity assessment one by one; A certain relevant risk point is selected in the road, from said combined data information, obtain this relevant risk point in the certain hour section in the frequency relevant, the certain hour section with said potential dangerous incident with said potential dangerous incident the frequency of all relevant risk points;
Step C212; This relevant risk point that obtains according to step C211 in the certain hour section in the number of times relevant, the certain hour section with said potential dangerous incident with said potential dangerous incident the frequency of all relevant risk points and the whole order of severity of this risk point, calculate the comprehensive order of severity R of this relevant risk point through following assessment models four i, assessment models four is:
R i = η i r i = ( N i / Σ i N i ) r i
In the above-mentioned assessment models four, N iBe the number of times relevant of risk point i generation in the certain hour section with said latent consequences, Frequency for all relevant in certain hour section risk points with said latent consequences;
Step C213 repeats above-mentioned steps C211, C212 until the comprehensive order of severity of obtaining each relevant risk point.
Step D if the order of severity of relevant risk point meets or exceeds preset serious grade, then to said operation control system output early warning information, carries out early warning by said operation control system according to said early warning information.
Second embodiment
The embodiment of the invention also provides a kind of method for prewarning risk based on flow process; Different with said method is in this method after obtaining the comprehensive order of severity of each risk point; Confirm the comprehensive order of severity of the overall situation of each risk point again; Carry out Risk-warning according to the comprehensive order of severity of the risk point overall situation, as shown in Figure 2, this method may further comprise the steps:
Steps A is obtained the information of each included service processing node of business processing flow that operation control system carries out, finds out each service processing node that has security risk in the said information, sets up each flow process risk point corresponding to each service processing node of finding out;
Step B; From the corresponding potential dangerous incident of said business processing flow; Selected a kind of potential dangerous incident; From said flow process risk point, find out each relevant risk point that can trigger this potential dangerous incident,, and obtain the combined data information of the non-safety information of each relevant risk point of said risk conducting path model in serious grade and the certain hour section of said potential dangerous incident according to each relevant risk point and said potential dangerous event establishment risk conducting path model;
Step C assesses each relevant risk point according to the serious grade and the said combined data information of said risk conducting path model of setting up and the said potential dangerous incident obtained, confirms the comprehensive order of severity of each relevant risk point;
Step D; Repeat above-mentioned steps B, the comprehensive order of severity of C all risk points in drawing said flow process risk point under the different potential dangerous incident of same serious grade, calculate the comprehensive order of severity of the overall situation of each risk point based on the comprehensive order of severity of each risk point;
Step e if the comprehensive order of severity of the overall situation of risk point meets or exceeds the preset order of severity, then to said operation control system output early warning information, is carried out early warning by said operation control system according to said early warning information.
In the said method, step C specifically may further comprise the steps:
Step C1 from each relevant risk point of the said risk conducting path model set up, finds out the conducting path that conducts to said potential dangerous incident as the risk point in risk source through middle risk point; And the frequency that obtains the non-safety information in risk source in the said combined data information with each in the middle of the discovery number of times of risk point non-safety information that other risk point conduction is come;
Step C2; The frequency of the conducting path that finds according to step C1, the non-safety information in risk source and in the middle of each risk point to the discovery number of times of the non-safety information of other risk point conduction; And the serious grade of said potential dangerous incident; The independent order of severity of risk point in the middle of calculating through following first assessment models, first assessment models is:
min A i k Σ i Σ j I ( i , j ) ( A i k - A j k ) 2
Figure BDA0000135449980000062
In above-mentioned first assessment models; δ is the adjustment parameter; Be the inverse of all risk point sums, represent the minimal difference of two adjacent middle risk point degrees of risk, the partial ordering relation that risk point satisfies in the middle of formula (1) expression; All middle risk point contribution degree sums equal the constraint condition of the serious grade of potential dangerous incident on conducting path of formula (2) expression, and A is the serious grade of said potential dangerous incident;
Step C3, the independent order of severity of the middle risk point that obtains according to step C2 calculates the independent order of severity B in risk source through following second assessment models k, second assessment models is:
B k = h 1 k n k H 1 k + · · · + h i k n k H i k + · · · + h r n k H r k
= h 1 k n k * 0 + · · · + h i k n k * ( A 1 k + · · · + A i - 1 k ) + · · · + h r k n k A
In above-mentioned second assessment models, n kFor the frequency of the non-safety information of risk source k, promptly with the non-safety information frequency of risk point k as the risk source;
Figure BDA0000135449980000066
Be the number of times that non-safety information is found by risk point 1 place operation, the actual generation of risk source k this moment, the degree of risk of risk source k does H 1 k = 0 ;
Figure BDA0000135449980000068
Be the number of times that non-safety information is found by the operation of risk point i place, this moment, the degree of risk of risk source k did H i k = A 1 k + · · · + A i - 1 k ;
Figure BDA00001354499800000610
spread out of operation control system for non-safety information; Found beyond the operation control system or the actual generation of final potential dangerous incident; This moment risk source k degree of risk is
Figure BDA00001354499800000611
in this case; This moment, the order of severity of risk source k equaled A, and A is the serious grade of said potential dangerous incident;
n kWith
Figure BDA00001354499800000612
Between satisfy relation:
Step C4; Each relevant risk point is carried out whole order of severity assessment one by one; At first select a certain relevant risk point, from said combined data information, obtain the frequency of the middle risk point in the frequency of this relevant risk point non-safety information relevant in the certain hour section, the frequency in this relevant risk point risk source of the said potential dangerous incident of conduct triggering in the certain hour section and each risk source that the conduct of this relevant risk point triggers said potential dangerous incident with said potential dangerous incident;
Step C5; The frequency of this relevant risk point non-safety information relevant with said potential dangerous incident in the certain hour section that obtains according to step C5, this relevant risk point as the frequency in the risk source of triggering said potential dangerous incident and this relevant risk point frequency as the middle risk point in each risk source of the said potential dangerous incident of triggering, calculate the whole order of severity r of this relevant risk point through following the 3rd assessment models in the certain hour section i, the 3rd assessment models is:
r i = β i B i + Σ k = 1 m α k A i k
β i=n i/N i
α k = n i k / N i
N i = n i + Σ k = 1 m n i k
In above-mentioned the 3rd assessment models, N iFrequency for risk point i non-safety information relevant in the certain hour section with said potential dangerous incident;
n iBe risk point i number of times as the generation of risk source in the certain hour section;
is the frequency of risk point i as the middle risk point of risk source k;
Its conducting path comprised risk point i after m was illustrated in and has m risk source to take place in the certain hour section;
Step C6 repeats above-mentioned steps C4, C5 until the whole order of severity of obtaining each relevant risk point;
Step C7; Each relevant risk point is carried out comprehensive order of severity assessment one by one; Selected a certain relevant risk point obtains the frequency of all risk points that this relevant risk point is correlated with said potential dangerous incident in the number of times relevant with said potential dangerous incident, the certain hour section in the certain hour section from said combined data information;
Step C8; This relevant risk point that obtains according to step C7 in the certain hour section in the number of times relevant, the certain hour section with said potential dangerous incident with said potential dangerous incident the frequency of all relevant risk points and the whole order of severity of this risk point, calculate the comprehensive order of severity R of this relevant risk point through following the 4th assessment models i, the 4th assessment models is:
R i = η i r i = ( N i / Σ i N i ) r i
In above-mentioned the 4th assessment models, N iBe the number of times relevant of risk point i generation in the certain hour section with said latent consequences,
Figure BDA0000135449980000076
is the frequency of all risk points relevant with said latent consequences in the certain hour section;
Step C9 repeats above-mentioned steps C7, C8 until the comprehensive order of severity of obtaining each relevant risk point.
Among the step D of said method, the comprehensive order of severity of the overall situation that calculates each risk point according to the comprehensive order of severity of each risk point specifically may further comprise the steps:
Step D1; Each relevant risk point is carried out comprehensive order of severity assessment one by one; Selected a certain risk point; According to the frequency of the relevant non-safety information of the different potential dangerous incident of this risk point that obtains under the comprehensive order of severity under the different potential dangerous incident of same serious grade and this same serious grade of obtaining, calculate the comprehensive order of severity E of the overall situation of this risk point through following the 5th assessment models I, x, the 5th assessment models is:
E i , x = Σ j = 1 m π j R i , j , Wherein π j = Num j / Σ k = 1 m Num k
In above-mentioned the 5th assessment models, R I, jBe the potential dangerous incident of the j class under this severity level, the comprehensive order of severity of risk point i; X is the grade of said dangerous incident; Num jBe the frequency of non-safety information relevant with the potential dangerous incident of j class under this serious grade, m is the quantity of the potential dangerous incident that comprises under this serious grade.
Further specify below in conjunction with the method for prewarning risk of the specific embodiment of in the operation control system of aviation, using above-mentioned method for prewarning risk the embodiment of the invention.
Operation control system is that flight production ensures department, is the system that the flight operation information is compiled, processes, analyzes, makes a strategic decision and issues.In the operation control system of the airline that does not have the Risk-warning function, realize Risk-warning; Can be through existing all kinds of non-safety informations, incident, abnormal conditions and system defect in the business processing flow of operation control system; Find potential safety hazard that exists in the flow process and the risk point of being correlated with and paying close attention to; The risk point that the order of severity is reached respective degrees (can be preset with the order of severity contrast) carries out Risk-warning, avoids causing potential dangerous incident.
As being example as potential dangerous incident with " with low on fuel " in the dispatch clearance flow process of operation control system core business treatment scheme, the method for prewarning risk of the embodiment of the invention is described, specifically undertaken by following step:
Step 1 is confirmed the risk point that exists in dispatch clearance workflow and the flow process;
Step 2; According to from possible potential dangerous incident; The potential dangerous incident (low on fuel) of selected preparation monitoring; From risk point, find out the relevant risk point that can trigger this potential dangerous incident,, and obtain the combined data information of the non-safety information of each relevant risk point of said risk conducting path model in serious grade and the certain hour section of said potential dangerous incident according to each relevant risk point and said potential dangerous event establishment risk conducting path model; As collect the corresponding non-safety information of each risk point, according to information analysis non-safety information of collecting and risk point frequency etc.;
Step 3 to the relative order of severity assessment of each risk point, is confirmed the order of severity of each risk point;
Step 4 is carried out Risk-warning according to the order of severity of risk point.
In the above-mentioned steps 1; Can go out each business processing flow according to the dispatch flow process combing of letting pass; Combing goes out detailed dispatch clearance flow process the rules and regulations that mainly to be the routine work flow process of letting pass from dispatch and CAAC, CA let pass to dispatch, and concrete flow process is as shown in Figure 3.
From the dispatch clearance flow process that obtains, find out each risk point; Confirming of risk point can be to combine dispatch clearance flow process; Confirm which operation link is a weak link in the dispatch clearance flow process; Which kind of unsafe condition (also can with reference to dispatch staff related work experience in the past) can take place, and risk point is to the mistake that possibly the occur description of (comprising that human error and other external factor cause mistake).
From dispatch clearance flow process shown in Figure 3, confirmed 42 the flow process risk points (seeing table 1) in the dispatch clearance process, wherein, each flow process risk point has following attribute:
1. the risk point numbering is given unique numbering to each risk point, to distinguish other risk points.
2. risk point type: the dispatch flow process of letting pass is divided into nine aspects, is respectively the unit information processing, the seaworthiness information processing; Weather information is handled, and navigational intelligence is handled, and Computer flight plan is made; Dispatch is let pass, the explanation of letting pass, the monitoring of letting pass; Installations and facilities and working environment are to confirm according to the phase process of dispatch clearance flow process, thus these risk points corresponding corresponding dispatch clearance flow process; Risk point shows in system just can have two kinds of forms: first kind of form is with tabular form, and with all risk point centralized displaying, second kind of form is that risk point is presented at the operational phase corresponding on the flow process.
3. risk point content: specifically describe the contingent error message of this risk point.
4. possibly trigger main body: promptly which department or post can cause this risk point to take place.
5. risk point is explained: risk point is described content and triggered the explanation that main body triggers risk point mechanism, and if found the consequence that possibly cause by later operation link after the risk point generation.
Each flow process risk point to confirming can be safeguarded according to different time sections; The content that is risk point can change because of the change of the adjustment of flow process or working environment to some extent; Therefore; Maintenance to risk point mainly is particular content and an association attributes of revising risk point, adds new flow process risk point.
Each flow process risk point of table 1 dispatch clearance flow process
Figure BDA0000135449980000091
Figure BDA0000135449980000101
Figure BDA0000135449980000111
Figure BDA0000135449980000131
Confirm each flow process risk point of dispatch clearance flow process in step 1 after; Carry out step 2; Confirm that at first the potential dangerous incident of preparing to monitor (is a latent consequences; For describing conveniently, the back all is called latent consequences with potential dangerous incident), every kind of latent consequences all has corresponding serious grade (seeing Table 2);
Table 2 CA aviation safety management system handbook risk causes consequence seriousness evaluation criterion
Figure BDA0000135449980000132
Specifically, the corresponding serious grade of latent consequences mainly shows following four aspects:
(1) the general safety level of operation control system can be described with possibility and severity of consequence that limited type of dangerous incident takes place.
(2) for the dangerous incident that consequence takes place; Has definite consequence; Though playing concrete non-safety information consequence for each can not be identical, the actual order of severity or the loss that brings are also variant, and the non-safety information that can have similar consequence is classified as one type; Like " low on fuel ", and confirm its unique seriousness grade.This seriousness grade that just requires to confirm can contain this type of consequence takes place.
(3) in time found by subsequent operation for risk; Do not cause the non-safety information of serious consequence; Can't directly go to estimate this incident and can cause much influences, if therefore need do not found the possible consequence that to bring from such risk by subsequent operation to the normal operation of flight from incident itself; And these type of wrong possibility two aspects of subsequent operation discovery are estimated; Just the seriousness with latent consequences is standard, weighs " distance " of this non-safety information to the generation of latent consequences, confirms its real order of severity.In the actual motion of flight, really take place and all kinds of dangerous incident that the has serious consequences part that only occupies the minority, it is a large amount of that what exist is to produce risk; But by the timely non-safety information of finding of subsequent operation; Because this type of information does not produce actual loss, thereby does not often cause enough attention, yet; According to " iceberg is theoretical " in the safety engineering, the dangerous incident that floats on the iceberg is the external manifestation of a large amount of potential safety hazards (not producing the non-safety information of consequence).Because this type of non-safety information produces on dispatch clearance flow process; Therefore can judge under certain precondition according to the internal logic of flow process; This non-safety information is not if can be caused the incident generation of which kind of type and the serious grade of latent consequences by timely discovery.
Above-mentioned explanation on the base confirms that the corresponding serious grade of preparing to monitor of latent consequences " low on fuel " is 5 grades (specifically seeing Table 3), and other latent consequences can be with reference to above-mentioned explanation corresponding to different serious grades.
The serious grade that table 3 latent consequences and latent consequences are corresponding
Sequence number Title Latent consequences is described Serious grade
Consequence
1 Low on fuel Aircraft is less than in oil mass under the situation of regulation and takes off 5 grades
Consequence
2 ...... ...... ......
...... ...... ......
Consequence n ...... ...... ......
From the flow process risk point that above-mentioned steps 1 obtains; Definite each risk point that can cause latent consequences for " low on fuel " forms the risk conducting path network corresponding to the latent consequences of " low on fuel " according to each the flow process risk point that obtains, and its risk conducting path is as shown in Figure 4; Elliptical section is divided the expression risk point among Fig. 4; Numerical portion is represented corresponding risk point numbering, the rectangle part consequence that expresses possibility, and each single sub path among Fig. 4 is all represented one by risk source (risk point that promptly triggers first) the risk conducting path to possible consequence; Square frame partly is the explanation to the path among Fig. 4, is the note to the path mechanism.Because each risk point all has and a plurality ofly possibly trigger main body; But can find out as long as after confirming the risk source and finding risk point from Fig. 4; Just can confirm from this risk source the risk conducting path of risk point to the end, for example the risk source is that risk point 8 (meteorological data is inaccurate, imperfect or fail in time to transmit) discovery risk point is a risk point 14, and so final intercurrent risk point must be risk point 9 (analysis to meteorological data is inaccurate) and risk point 10 (failing to make correct clearance makes a strategic decision); Risk point in the middle of just can confirming according to risk source and discovery risk point like this; Thereby when information gathering, can reduce input information as far as possible, thereby raise the efficiency.
Can confirm that from the risk conducting path that Fig. 4 provides this path network is actually a directed acyclic graph, therefore can utilize adjacency matrix to represent corresponding to " low on fuel " latent consequences.
Adjacency matrix is a kind of method that in computing machine, concerns between the statement figure summit, and the essence of adjacency matrix is to utilize bi-values 0 or 1 to represent whether to exist between two nodes the forward-backward correlation relation.As establish adjacency matrix G=<v, E>Be digraph, wherein a V=<v 1, V 2..., V n>, being the digraph vertex set, the adjacency matrix of G is a n * n matrix with following relation:
a Ij = 1 < v i , v j > &Element; E ( G ) 0 Else , Wherein<v i, v j>Expression is the i directed edge of j to the limit from the summit.A digraph with shown in Figure 5 is an example, and its corresponding adjacency matrix is shown in the following formula (3.1).As the adjacency matrix that can the digraph that the risk conducting path of " low on fuel " latent consequences is corresponding converts to is expressed as being similar to the sample table of expression.
0 1 1 0 0 0 0 1 0 0 0 1 0 0 0 0 - - - ( 3.1 )
Table 4 adjacency matrix is corresponding to each risk point sample table
Figure BDA0000135449980000152
As seen from the above description, the risk conducting path network of every kind of latent consequences all corresponding corresponding adjacency matrix.
Confirmed to be each risk point of " low on fuel " through above-mentioned steps 2, and the risk conduction network that forms of each risk point, and can represent the risk conducting path confirmed through the form of adjacency matrix corresponding to latent consequences.
After above-mentioned steps 2 is confirmed the risk conducting path to the latent consequences of " low on fuel "; Carry out the processing of step 3; Each risk point order of severity is assessed; Can be according to investigating the non-safety information of collecting in the time period, to the latent consequences of being monitored, draw the relative order of severity (order of severity of risk point is meant the mistake that produces on certain operating process influence degree to dispatch clearance flow process) of each risk point through corresponding calculated with mathematical model.
Concrete assessment can be undertaken by following step:
(1) with the risk conducting path network of the latent consequences of " low on fuel ", representes with adjacency matrix;
(2) will investigate in the time period non-safety information and gather and obtain combined data, wherein every non-safety information comprises following essential information: 1. risk source, trigger the risk point that this non-safety information takes place; 2. find risk point, because of in time finding risk, and avoid the risk point that takes place; 3. latent consequences and seriousness grade thereof;
(3) be directed against the latent consequences of being monitored, the comprehensive order of severity of each risk point in the time period is investigated in assessment, and the contrast through to the comprehensive order of severity of each risk point that obtains can realize the high risk point of the order of severity is carried out early warning.
When being assessed, the order of severity of risk point need consider the problem of risk conduction; Owing to can influence subsequent operation through flow process after a certain risk point of dispatch clearance flow process takes place; If not possessing the debugging ability to this mistake or possess the debugging ability but fail, the subsequent operation flow process do not find; The capital has influence on the correctness of operation, and then influences the normal operation of flight.Therefore assess the order of severity of a risk point, consider the influence of dispatch clearance flow process, promptly will assess based on the conduction of risk from this risk point.
For the arbitrary risk point in the dispatch clearance flow process, it has two kinds of situations, and the one, because the external factor beyond this risk point oneself factor or the operation control system causes this risk point to take place, on the risk conducting path, show as the risk source; The 2nd, risk point in the middle of at this moment this risk point shows as on the risk conducting path takes place owing to this risk point takes place to cause other risk points (risk points of other operations relevant with this operation).These two kinds of situations; To be two kinds of different risk types; First kind of situation is meant because operating personnel's the human factor or the generation of the dangerous incident that external factor causes are a kind of in addition because the order of severity that associative operation goes wrong and causes this risk point to take place on the flow process is as shown in Figure 6.Therefore need assess from this two aspect when assessing the order of severity of risk point.As can beappreciated from fig. 6, risk conduction network is actually the abstract representation to operation flow, therefore in fact just is based on the risk point seriousness assessment of flow process based on the assessment of the risk point order of severity of risk conduction network.
The risk conductive process has following four characteristics:
(1) on a risk conducting path, the risk conduction is " risk amplification " process: the risk of a last node impels the risk point of next node to take place through influencing next node, and the possibility that makes the net result incident take place increases.Therefore between the risk point that points relationship is arranged on the conducting path, the order of severity of follow-up risk point is greater than the order of severity of preorder risk point.
(2) angle that whether takes place from latent consequences; The risk conduction is " risk decay " process: operation has certain debugging ability to preorder in operation follow-up on the flow process; This risk of performance is tackled when conducting to a certain operating process on risk conduction aspect, therefore when the order of severity of assessment risk point, not only need consider the influence to other risk points; Also need consider the interdiction capability of flow to this type of mistake; After a certain risk point took place, the interdiction capability of subsequent operation flow process was high more, and then this risk point is seriously just relatively low.
(3) influence of conduction range: after some risk point takes place; Mistake takes place if for example basic information is obtained with processing links; Can impact a plurality of running node in the dispatch clearance flow process; On range, it is wider to show as the conduction range, sees that from structure more path causes the result who influences the flight operation to take place
(4) influence of multiplicity: if the number of times of a risk point generation is many more, then the order of severity of this risk point is high more.
The assessment of the risk point order of severity comprises middle risk point order of severity assessment, and the risk source order of severity is assessed.
Wherein, the middle risk point order of severity can draw through following Model Calculation:
When the assessment risk point order of severity, confirm that earlier the serious grade of latent consequences " low on fuel " is 5 grades, here with C represent this latent consequences the order of severity (similar, the serious grade of other latent consequences can be used A, B ... Expression successively).
(the risk source must be realized through making at least one risk conducting path form path the influence of final consequence according to the definition of the middle risk point order of severity; Suppose that risk point i is the node (risk point on the risk conducting path) on this paths; The risk that the middle risk point order of severity is defined as risk source k generation is transmitted to risk point i; Percentage contribution to final consequence generation takes place in risk point i; Be designated as
Figure BDA0000135449980000161
), all risk point order of severity sums are the order of severity of latent consequences on the risk conducting path.Middle risk point will satisfy risk conductive process " risk amplification " character, and therefore on this paths, the order of severity of follow-up middle risk point promptly satisfies partial ordering relation by path greater than the order of severity of risk point before this risk point.Though risk point all is because same mistake causes in fact; Under a lot of situations; Subsequent operation does not have complete debugging ability or does not have the responsibility of debugging; Therefore consider to utilize risk point order of severity difference on the same conducting path is minimised as objective function the order of severity of risk point in the middle of finding the solution.In sum, the order of severity of risk point in the middle of the following model solution capable of using:
min A i k &Sigma; i &Sigma; j I ( i , j ) ( A i k - A j k ) 2
Figure BDA0000135449980000163
Figure BDA0000135449980000164
Objective function in the above-mentioned model is that the order of severity difference quadratic sum of adjacent middle risk point is minimum; Wherein δ is the adjustment parameter; The minimal difference of representing the two adjacent middle risk point orders of severity; The partial ordering relation that risk point satisfies in the middle of formula (1) expression, all middle risk point contribution degree sums equal the constraint condition of the incident net result order of severity on formula (2) expression one paths.
In the reality, because the risk conduction mode is divided into multiple situation, the order of severity that can be directed against the risk point of different risk conduction modes is carried out evaluates calculation:
(1) the risk conduction mode with individual paths is example, and is as shown in Figure 7, and the risk source is risk point k, and the Optimization Model of the calculating of risk point was suc as formula shown in 4.3 in the middle of the order of severity of latent consequences was represented with A:
min A i [ ( A 2 k - A 1 k ) 2 + ( A 3 k - A 2 k ) 2 ]
s . t A 3 k - A 2 k &GreaterEqual; &delta; > 0 A 2 k - A 1 k &GreaterEqual; &delta; > 0 &Sigma; i = 1 3 A i k = A A i k &GreaterEqual; 0 &ForAll; i (formula 4.3)
(1.1) order of severity of individual paths series model risk conduction mode risk point is calculated, and according to whether middle risk point being arranged, is divided into two kinds of situations (situation 1 and situation 2), and is specific as follows:
(1.1.1) calculating (situation 1) of the risk source order of severity during risk point in the middle of the nothing shown in Figure 8:
On the risk conducting path shown in Figure 8 except that the risk source takes place, do not have other risk points and be triggered, under this conducting path; There is not middle risk point, the order of severity of risk point in the middle of need not calculating, the order of severity in a calculation risk source gets final product; Be after risk point k is triggered, with the operation that directly possibly influence flight, or risk has spread out of operation control system; For operation control system, this risk has exceeded the range of control of operation control system, and the order of severity in risk source equals the order of severity of latent consequences at this moment; The order of severity of supposing latent consequences is A, then the order of severity B in risk source k=A.
(1.1.2) another kind is the individual paths series model (situation 2) of risk point in the middle of the existence shown in Figure 9:
On conducting path shown in Figure 9, m centre risk point again after the k of risk source, m >=1 wherein,
The middle risk point order of severity in this conducting path can adopt following Optimization Model formula 4.4 to calculate, and the order of severity of middle risk point is the optimum solution of formula 4.4:
min A i [ ( A 2 k - A 1 k ) 2 + ( A 3 k - A 2 k ) 2 + &CenterDot; &CenterDot; &CenterDot; + ( A m k - A m - 1 k ) 2 ]
s . t A i + 1 k - A i k = &delta; &GreaterEqual; 0 i = 1 , &CenterDot; &CenterDot; &CenterDot; , m &Sigma; i = 1 m A i k = A A i k &GreaterEqual; 0 &ForAll; i (formula 4.4)
In above-mentioned formula 4.4, n kTotal degree (promptly being the non-safety information frequency in risk source) for risk source k generation with risk point k;
The number of times that
Figure BDA0000135449980000175
found by risk point 1 place operation; The actual generation of only risky source k this moment, the risk source order of severity is
Figure BDA0000135449980000176
The number of times that found by risk point 2 place operations, the risk source order of severity
Figure BDA0000135449980000178
at this moment
The number of times that found by risk point i place behaviour, the risk source order of severity
Figure BDA00001354499800001710
at this moment
Figure BDA00001354499800001711
risk has spread out of the operation control system system; By the post beyond the operation control system or department's discovery or the actual generation of final consequence; This moment, the order of severity be
Figure BDA00001354499800001712
the risk source in this case, and we just think that the order of severity of risk source k this moment has just equaled A.
n kWith
Figure BDA00001354499800001713
Satisfy following relation.
n k = &Sigma; i = 1 m , r h i k (formula 4.5)
In data gathering system, n kNeed to analyze final consequence for being directed against, risk point k can directly add up as the number of times that the risk source takes place.Interception number of times
Figure BDA0000135449980000181
can be added up according to concrete non-safety information data.
The risk source order of severity by in 4.6 pairs of risk conducting paths shown in Figure 9 of formula is calculated, and the order of severity of risk source k is formula 4.6 result calculated.
B k = h 1 k n k H 1 k + &CenterDot; &CenterDot; &CenterDot; + h i k n k H i k + &CenterDot; &CenterDot; &CenterDot; + h r n k H r k
(formula 4.6)
= h 1 k n k * 0 + &CenterDot; &CenterDot; &CenterDot; + h i k n k * ( A 1 k + &CenterDot; &CenterDot; &CenterDot; + A i - 1 k ) + &CenterDot; &CenterDot; &CenterDot; + h r k n k A
(2) the risk conducting path signal (situation 3) for mulitpath paralleling model (not containing common path) shown in Figure 10
In conducting path shown in Figure 10, there are many risk conducting paths in risk source k after taking place, and every paths all is the series model of individual paths, and does not have common path.
Adopt 4.7 pairs of middle risk point orders of severity shown in Figure 10 of following formula to calculate, the middle risk point order of severity is the optimum solution of Optimization Model formula 4.7.
min A i [ ( A 1 - A 2 ) 2 + ( A 2 - A 3 ) 2 + ( A 5 - A 4 ) 2 ]
s . t . A 3 k - A 2 k &GreaterEqual; &delta; > 0 A 2 k - A 1 k &GreaterEqual; &delta; > 0 A 5 k - A 4 k &GreaterEqual; &delta; > 0 A 1 k + A 2 k + A 3 k = A A 4 k + A 5 k = A A i k &GreaterEqual; 0 &ForAll; i (formula 4.7)
The risk source order of severity in the hearsay guiding path shown in Figure 10 is calculated; Wherein the implication of
Figure BDA0000135449980000186
representative is identical with implication under first kind of situation; When diverse location came to light, all scenario of the risk point that is shown was following after risk source k takes place:
h 1 k H 1 k = 0 h 2 k H 2 k = A 1 k h 3 k H 3 k = A 1 k + A 2 k h 4 k H 4 k = 0 h 5 k H 5 k = A 4 h r k H r k = A 4 k + A 5 k = A 1 k + A 2 k + A 3 k = A n k = &Sigma; i = 1 5 , r h i
At this moment, but risk source order of severity through type 4.8 calculate.
B k = h 1 k n k H 1 k + h 2 k n k H 2 k + h 3 k n k H 3 k + h 4 k n k H 4 k + h 5 k n k H 5 k + h r k n k H r k
(formula 4.8).
= h 1 k n k * 0 + h 2 k n k A 1 k + h 3 k n k ( A 1 k + A 2 k ) + h 4 k n k * 0 + h 5 k n k A 4 K + h r k n k A
(3) shown in Figure 11 is a kind of situation (situation 4) that contains the conduction mode of common path
On conducting path shown in Figure 11; The risk that risk source k takes place to produce can influence the generation of final consequence through mulitpath; But the risk source has only a follow-up risk point; Middle risk point can a plurality of later on follow-up risk points, in risk conducting path network, show as the risk source with tightly afterwards the limit between the risk point be the common path of many conducting paths.
The middle risk point order of severity in 4.9 pairs of conducting paths shown in Figure 11 of through type is calculated, and the middle risk point order of severity is the optimum solution of Optimization Model formula 4.9:
min A i &Sigma; i &Sigma; j I ( i , j ) ( A i k - A j k ) 2
Figure BDA0000135449980000192
s . t . A 3 k - A 2 k &GreaterEqual; &delta; > 0 A 2 k - A 1 k &GreaterEqual; &delta; > 0 A 5 k - A 4 k &GreaterEqual; &delta; > 0 A 6 k - A 2 k &GreaterEqual; &delta; > 0 A 7 k - A 6 k &GreaterEqual; &delta; > 0 A 1 k + A 2 k + A 3 k + A 4 k + A 5 k = A A 1 k + A 2 k + A 6 k + A 7 k = A A i k &GreaterEqual; 0 &ForAll; i (formula 4.9)
In the conducting path shown in Figure 11: when diverse location came to light, all scenario of the risk point that is shown was following after risk source k takes place:
h 1 k H 1 k = 0 h 2 k H 2 k = A 1 k h 3 k H 3 k = A 1 k + A 2 k h 4 k H 4 k = A 1 k + A 2 k + A 3 k h 5 k H 5 k = A 1 k + A 2 k + A 3 k + A 4 k h 6 k H 6 k = A 1 k + A 2 k h 7 k H 7 k = A 1 k + A 2 k + A 6 k h r k H r k = A 1 k + A 2 k + A 6 k + A 7 k = A n k = &Sigma; i = 0 7 , r h i
Wherein
Figure BDA0000135449980000195
expression interception number of times can be added up according to concrete non-safety information data.To risk source order of severity B kUtilize formula 4.10 to calculate.
B k = h 1 k n k H 1 k + h 2 k n k H 2 k + h 3 k n k H 3 k + h 4 k n k H 4 k + h 5 k n k H 5 k + h 6 k n k H 6 k + h 7 k n k H 7 k
= h 1 k n k * 0 + h 2 k n k A 1 k + h 3 k n k ( A 1 k + A 2 k ) + h 4 k n k ( A 1 k + A 2 k + A 3 k ) + h 5 k n k ( A 1 k + A 2 k + A 3 k + A 4 k ) (formula 4.10).
+ h 6 k n k ( A 1 k + A 2 k ) + h 7 k n k ( A 1 k + A 2 k + A 6 k ) + h r k n k A
(4) shown in Figure 12 is the another kind of situation (situation 5) that contains the conduction mode of common path
On conducting path shown in Figure 12, can influence the generation of net result after the risk source takes place through mulitpath, but the risk source there is a plurality of tight backs risk point, in the conduction network, shows as common path for not comprising risk source risk point.
The middle risk point order of severity in the conducting path of 4.11 pairs of conduction modes shown in Figure 12 of through type is calculated, and the middle risk point order of severity is the optimum solution of Optimization Model formula 4.11:
min A i &Sigma; i &Sigma; j I ( i , j ) ( A i k - A j k ) 2
Figure BDA0000135449980000202
s . t . A 3 k - A 2 k &GreaterEqual; &delta; > 0 A 2 k - A 1 k &GreaterEqual; &delta; > 0 A 5 k - A 4 k &GreaterEqual; &delta; > 0 A 6 k - A 3 k &GreaterEqual; &delta; > 0 A 6 k - A 5 k &GreaterEqual; &delta; > 0 A 7 k - A 6 k &GreaterEqual; &delta; > 0 A 4 k + A 5 k + A 6 k + A 7 k = A A 1 k + A 2 k + A 3 k + A 6 k + A 7 k = A A i k &GreaterEqual; 0 &ForAll; i (formula 4.11)
In conducting path shown in Figure 12, when diverse location came to light, all scenario of the risk point that is shown was following after risk source k takes place:
h 1 k H 1 k = 0 h 2 k H 2 k = A 1 k h 3 k H 3 k = A 1 k + A 2 k h 4 k H 4 k = 0 h 5 k H 5 k = A 4 k h 6 k H 6 k = A 1 k + A 2 k + A 3 k h 7 k H 7 k = A 1 k + A 2 k + A 3 k + A 6 k h r k H r k = A 1 k + A 2 k + A 3 k + A 6 k + A 7 k = A n k = &Sigma; i = 0 7 , r h i
At this moment, the risk source order of severity through type in the conducting path shown in Figure 12 4.12 calculates.
B k = h 1 k n k H 1 k + h 2 k n k H 2 k + h 3 k n k H 3 k + h 4 k n k H 4 k + h 5 k n k H 5 k + h 6 k n k H 6 k + h 7 k n k H 7 k + h r k n k H r k
= h 1 k n k * 0 + h 2 k n k A 1 k + h 3 k n k ( A 1 k + A 2 k ) + h 4 k n k * 0 + h 5 k n k A 4 k + h 6 k n k ( A 1 k + A 2 k + A 3 k ) (formula 4.12).
+ h 7 k n k ( A 1 k + A 2 k + A 3 k + A 6 k ) + h r k n k A
(5) shown in Figure 13 is the complicated case (situation 6) that contains the conduction mode of common path:
Risk conducting path pattern shown in Figure 13 has comprised several kinds of situations in front, and can there be a plurality of tight backs risk point in the risk source, and arbitrary middle risk point has a plurality of tight backs risk point.
The middle risk point order of severity in the conducting path of 4.13 pairs of conduction modes shown in Figure 13 of through type is calculated, and the middle risk point order of severity is the optimum solution of Optimization Model formula 4.13:
min A i &Sigma; i &Sigma; j I ( i , j ) ( A i k - A j k ) 2
Figure BDA0000135449980000212
s . t . A 3 k - A 2 k &GreaterEqual; &delta; > 0 A 2 k - A 1 k &GreaterEqual; &delta; > 0 A 5 k - A 4 k &GreaterEqual; &delta; > 0 A 3 k - A 4 k &GreaterEqual; &delta; > 0 A 6 k - A 5 k &GreaterEqual; &delta; > 0 A 7 k - A 6 k &GreaterEqual; &delta; > 0 A 4 k + A 5 k + A 6 k + A 7 k = A A 1 k + A 2 k + A 3 k + A 6 k + A 7 k = A A 4 k + A 3 k + A 6 k + A 7 k = A A i k &GreaterEqual; 0 &ForAll; i (formula 4.13)
Under conduction mode shown in Figure 13, the risk that risk source k triggers is following by the order of severity and frequency that interception shows at diverse location:
h 1 k H 1 k = 0 A 1 k h 2 k H 2 k = A 1 k h 3 k H 3 k = A 1 k + A 2 k h 4 k H 4 k = 0 h 5 k H 5 k = A 4 k h 6 k H 6 k = A 1 k + A 2 k + A 3 k h 7 k H 7 k = A 1 k + A 2 k + A 3 k + A 6 k h 7 k H r k = A 1 k + A 2 k + A 3 k + A 6 k + A 7 k = A n k = &Sigma; i = 0 7 , r h i
At this moment, the risk source order of severity is calculated through following formula 4.14.
B k = h 1 k n k H 1 k + h 2 k n k H 2 k + h 3 k n k H 3 k + h 4 k n k H 4 k + h 5 k n k H 5 k + h 6 k n k H 6 k + h 7 k n k H 7 k + h r k n k H r k
= h 1 k n k * 0 + h 2 k n k A 1 k + h 3 k n k ( A 1 k + A 2 k ) + h 4 k n k * 0 + h 5 k n k A 4 k + h 6 k n k ( A 1 k + A 2 k + A 3 k ) (formula 4.14).
+ h 7 k n k ( A 1 k + A 2 k + A 3 k + A 6 k ) + h r k n k A
Obtain under the various conduction modes in aforementioned calculation; After the order of severity (being equivalent to the independent order of severity) of each risk point (risk point and risk source in the middle of comprising); Can calculate the whole order of severity of each risk point; Can (the whole order of severity of risk point is defined as: the whole order of severity of risk point is meant to take all factors into consideration investigates the order of severity after as the order of severity of risk source and middle risk point of risk point in the time period according to the definition of the whole order of severity of risk point; Be that the whole order of severity comes from two aspects, the one, the order of severity that shows as the risk source, the 2nd, as other the order of severity that middle risk point showed in risky source.Therefore the whole order of severity of risk point is the risk source order of severity of this risk point and the weighted sum of the middle risk point order of severity), utilize the whole order of severity of 4.15 pairs of risk points of following formula to calculate:
r i = &beta; i B i + &Sigma; k = 1 m &alpha; k A i k
β i=n i/N i
(formula 4.15)
&alpha; k = n i k / N i
N i = n i + &Sigma; k = 1 m n i k
In the formula 4.15, N iExpression risk point i investigates the total degree that non-safety information relevant with the target latent consequences in the time period takes place,
n i: risk point i is investigating the number of times that takes place as the risk source in the time period, can obtain through the non-safety information of collecting is added up.
Figure BDA0000135449980000224
risk point i is the frequency of the middle risk point of risk source k the most.Therefore risk point i can need add up respectively each risk source simultaneously as the middle risk point in a plurality of risks source.
M: investigating has its conducting path of generation back, m risk source to comprise risk point i, therefore
Figure BDA0000135449980000225
in the time period
Obtain the whole order of severity of each risk point in aforementioned calculation after; Can calculate the comprehensive order of severity of each risk point; Can (the comprehensive order of severity definition of risk point---risk point of consideration of multiplicity possibly have than the higher whole order of severity in the time period though investigate according to the definition of the comprehensive order of severity of risk point; If but the possibility that this risk point takes place is very little, the number of times that just takes place seldom, its comprehensive order of severity maybe can't be lower than those whole orders of severity so; But frequency; The relative possibility that promptly takes place is higher than the comprehensive order of severity of higher risk point, so the comprehensive severity of risk point is the order of severity of considering after the multiplicity that risk point takes place, representes the comprehensive order of severity of risk point i with R.), investigate the consequence type that will study to institute in the time period, the comprehensive order of severity of a certain risk point can be utilized following formula 4.16 calculating:
R i = &eta; i r i = ( N i / &Sigma; i N i ) r i (formula 4.16)
In the formula 4.16, N iBe the total degree relevant of risk point i generation in the investigation time period with this latent consequences,
Figure BDA0000135449980000227
For investigating the total degree that all relevant with this latent consequences in time period risk points take place.
Can calculate the comprehensive order of severity of each risk point of the latent consequences that is directed against " low on fuel " through above-mentioned steps 3, thereby can carry out step 4, carry out Risk-warning according to the order of severity of risk point.Specifically can sort by the comprehensive order of severity under the corresponding serious grade of the latent consequences of " low on fuel " to all relevant risk points; Thereby draw the highest risk point of the comprehensive order of severity; As the early warning risk point; Also can carry out Risk-warning to the risk point that reaches early-warning conditions according to the early-warning conditions of setting.
On the basis of above-mentioned steps 3; Can also continue the comprehensive order of severity of calculation risk point under each serious grade as required; The order of severity of risk point under consequence seriousness grade equals it under this grade; Relatively the weighted mean of the order of severity of each latent consequences with, wherein weight be the generation accounting of all latent consequences under relative this seriousness grade of this latent consequences.The example that is calculated as with the comprehensive order of severity of each risk point under 7 grades of serious grades.Suppose that the latent consequences under this rank has m, respectively to be numbered 1 to m (each latent consequences all has corresponding numbers), with E I, 7The comprehensive order of severity of expression risk point i under this severity level, R I, jBe illustrated in the j class incident under this severity level, the comprehensive order of severity of risk point i, R I, jValue in above-mentioned each step, calculate, with Num jRepresent the frequency of 7 times non-safety informations relevant of serious grade, then have with j class incident:
E i , 7 = &Sigma; j = 1 m &pi; j R i , j , Wherein &pi; j = Num j / &Sigma; k = 1 m Num k .
Can calculate the comprehensive order of severity of the overall situation of same risk point under the latent consequences of the serious grade of difference (being the comprehensive order of severity of the overall situation of risk point) through following formula.Thereby can press the ordering rule of dictionary preface according to the comprehensive order of severity of this overall situation of risk point, when comparing the sequencing of two risk points; The comprehensive order of severity that can at first under the 7th grade of seriousness rank, compare two risk points; If inequality, can confirm that then the ordering of the risk point that the comprehensive order of severity is high is forward, then need not to continue again comparison between these two risk points; If the order of severity of two risk points is identical under this rank, then compare other order of severity of next stage.And then can obtain the comprehensive ordering relatively (the low more expression ordering of value is forward more) under each risk point global state, and then also can when carrying out step 4, carry out Risk-warning through the comprehensive order of severity of the overall situation of risk point.
Following combination is described further the present invention the processing procedure of the actual early warning of latent consequences of " low on fuel ".
Latent consequences through finishing collecting is the non-safety information of " low on fuel "; Assess each risk point order of severity of " low on fuel " this latent consequences relatively; Wherein employed non-safety information is not all non-safety informations in the time span, just the non-safety information relevant with " low on fuel ".
The data is collected from certain airline's operation control system, and with the relevant non-safety information of dispatch clearance flow process, time span is 200901~200908.The latent consequences of these non-safety informations is " low on fuel ".Here " low on fuel " is meant the situation that does not meet CA's standard of fuel according to the flight fuel oil; Be not to be to be not enough to support flight to fly to reach airport of destination at the flight course intermediate fuel oil; As long as be less than more than standard of fuel a certain amount of, outside the scope that allows, all belong to low on fuel.The non-safety information that provides in operation control center of CA mainly is the description to event procedure; What the latent consequences of incident is; The risk source, these information such as discovery risk point do not provide, and project team is after analyzing data; Tentatively confirmed latent consequences each data item, it has been satisfied risk point is carried out the data demand that seriousness is analyzed for the relevant non-safety information of " low on fuel ".
From totally 51 data of 200901~200908 of collecting, the specifying information of data is seen below table 5.Different month " low on fuel " non-safety information generations distribute shown in figure 14.
Table 5 low on fuel " the non-safety information table
Figure BDA0000135449980000233
Figure BDA0000135449980000241
Figure BDA0000135449980000251
For each bar non-safety information in the last table, in risk point order of severity when assessment, need following data item: 1. latent consequences, and the 2. risk of latent consequences conduction network, with the adjacency matrix stored in form, 3. risk point is found in the risk source 4..The above-mentioned data item of every non-safety information is all definite.Revised " low on fuel " risk conducting path network is as shown in Figure 4.
The treatment step of early warning is specially:
(1) confirms " low on fuel " latent consequences as final early warning
(2) table 6 is seen in the risk source in the non-safety information of confirming to assess, and record risky source of institute and corresponding non-safety information thereof.
Table 6 risk source statistics
Figure BDA0000135449980000271
The adjacency matrix of " low on fuel " correspondence is with L N * n+1Expression (n=42 here).The corresponding serious grade of latent consequences of " low on fuel " latent consequences is 5 grades, representes its order of severity with letter C.
(3) calculate the order of severity in each risk source:
The order of severity in risk source is the order of severity performance through middle risk point, so the order of severity in calculation risk source, the order of severity of risk point in the middle of needing at first to calculate.
The calculating of the middle risk point order of severity is after definite latent consequences and risk source, from adjacency matrix, reads computation model, and then solving model, obtains the middle risk point order of severity of middle risk point under a certain risk source.With risk source 3 is example, the computation process of risk point in the middle of explaining.
(3.1) read risk point 3 and conduct sub-road network network to the risk of latent consequences:
For " low on fuel " this latent consequences, risk source 3 corresponding risk conduction subpath networks are illustrated in fig. 15 shown below.The risk source is a risk point 3, and middle risk point is followed successively by risk point 5, risk point 7 risk points 14, and latent consequences is " low on fuel ".When the risk source was risk point 3, the network that its corresponding risk conduction subpath constitutes was illustrated in fig. 15 shown below.
The computation model of risk point is as shown in the formula, adjustment parameter δ=1/42 in the middle of this moment.
min A i Z = ( A 14 3 - A 7 3 ) 2 + ( A 7 3 - A 5 3 ) 2
s . t A 7 3 - A 5 3 &GreaterEqual; &delta; A 14 3 - A 7 3 &GreaterEqual; &delta; A 5 3 + A 7 3 + A 14 3 = C A 5 3 &GreaterEqual; 0 A 7 3 &GreaterEqual; 0 A 14 3 &GreaterEqual; 0
Separate above-mentioned model, in the time of can getting risk point 3 as the risk source, the order of severity such as the following table 4.8 of risk point in the middle of each.
Table 4.8. risk source 3 each middle risk point order of severity
Figure BDA0000135449980000274
The order of severity of the risk that risk source 3 causes when different risks come to light does
H 5 3 = 0 , H 7 3 = A 5 3 = 0.3095 C , H 14 3 = A 5 3 + A 7 3 = 0.6428 C , H r 3 = C
Under other risk sources in the middle of each the computation process of risk point identical with risk source 3, the result of calculation in risky source as shown in table 7 below.
The middle risk point order of severity in each risk source of table 7
Figure BDA0000135449980000281
(4) add up the position of the discovery risk point of 3 times every non-safety informations of this risk source risk point, and the interception number of times, according to the risk source with find that risk point confirms to also have on the risk conducting path risk point in the middle of which, and add up its frequency.The risky source of institute to deserved risk intercepting position and risk point frequency statistics see Table 8 with table 9.
Table 8 is that the risk interception in each risk source distributes
Figure BDA0000135449980000282
Table 9 is the frequency statistics of risk source and each risk point
Figure BDA0000135449980000283
(4.1), calculate the order of severity in each risk source according to the computing formula of the risk source order of severity.
The computing formula of risk source 3 orders of severity is:
B 3 = h 5 3 n 3 H 5 3 + h 7 3 n 3 H 7 3 + + h 14 3 n 3 H 14 3 + h r 3 n 3 H r 3
= 1 3 * 0 + 0 * 0.3095 C + 0 * 0.6428 C + 2 3 * C = 0.6667 C
The order of severity in risky source as shown in table 10 below:
Table 10 is the risk source order of severity in each risk source
Figure BDA0000135449980000294
(4.2) calculate the whole order of severity of each risk point
According to whole order of severity computing formula; Calculate the whole order of severity of each risk point; The whole order of severity of each risk point equals the weighted sum of its risk source order of severity and the middle risk point order of severity; With risk point 19 is example (though risk point 19 is not in the risk conducting path network in risk source 3, even if the relative complex of its overall risk point is representative).28 is the total degree that risk point 19 takes place in the formula, and 21 is its frequency as the risk source, and other integers are as the frequency of the middle risk point in other risk sources.
r 19 = 21 28 B 19 + 2 28 A 19 15 + 1 28 A 19 16 + 4 28 A 19 38
= 21 28 * 0.095 C + 2 28 * 0.476 C + 1 28 * 0.476 C + 4 28 * 0.476 C = 0.190 C
The whole order of severity of other risk points is as shown in table 11.
Table 11 is the whole order of severity of each risk point and the comprehensive order of severity
Figure BDA0000135449980000297
Figure BDA0000135449980000301
(4.3) calculate the comprehensive order of severity of each risk point:
The comprehensive order of severity is on the basis of overall risk point, with the accounting of each risk point frequency as weight, the adjusted order of severity, as shown in table 12.
Several treatment steps more than the process; To " low on fuel " this latent consequences; The comprehensive order of severity of each risk point is confirmed; Because the risk point order of severity under the serious grade need can be confirmed after other latent consequences is also assessed, and does not therefore further calculate in the above-mentioned processing.
What obtain is as shown in table 12 for the comprehensive order of severity of each risk point of " low on fuel " to latent consequences.
Table 12 is each risk point order of severity assessment result of " low on fuel " for being directed against latent consequences
Figure BDA0000135449980000302
Contrast according to above-mentioned table 12; Can confirm to " low on fuel " this latent consequences; Influence in the risk point of operation control system safe condition; The order of severity of risk point 19 (information that is used to calculate flight oil mass, carrying capacity data is inaccurate) is the highest relatively, and risk point 15 (Computer flight plan system data maintenance, system management is untimely, inaccurate or method fault influences Computer flight plan and makes) takes second place.In the reality, can carry out early warning to risk point 19, risk point 15 and risk point 14 to " low on fuel " this latent consequences, thus these several risk points of emphasis monitoring.
Those skilled in the art can know; It is above-mentioned that only to carry out Risk-warning with the latent consequences of " low on fuel " be that example describes; Those skilled in the art can realize each risk point of other latent consequences is carried out Risk-warning according to thought of the present invention, repeat no more at this.
The above; Be merely the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, any technician who is familiar with the present technique field is in the technical scope that the present invention discloses; The variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claims.

Claims (13)

1. the method for prewarning risk based on flow process is characterized in that, may further comprise the steps:
Steps A is obtained the information of each included service processing node of business processing flow that operation control system carries out, finds out each service processing node that has security risk in the said information, sets up each flow process risk point according to each service processing node correspondence of finding out;
Step B; From the corresponding potential dangerous incident of said business processing flow; Selected potential dangerous incident of being monitored; From the flow process risk point, find out the relevant risk point that can trigger this potential dangerous incident,, and obtain the combined data information of the non-safety information of each relevant risk point of said risk conducting path model in serious grade and the certain hour section of said potential dangerous incident according to each relevant risk point and said potential dangerous event establishment risk conducting path model;
Step C assesses each relevant risk point according to the serious grade and the said combined data information of said risk conducting path model of setting up and the said potential dangerous incident obtained, confirms the order of severity of each relevant risk point;
Step D if the order of severity of relevant risk point meets or exceeds preset serious grade, then to said operation control system output early warning information, carries out early warning by said operation control system according to said early warning information.
2. the method for prewarning risk based on flow process according to claim 1 is characterized in that, said steps A specifically comprises:
Steps A 1 is obtained the information of each included service processing node of business processing flow that operation control system carries out;
Steps A 2 is found out each service processing node that comprises non-safety information in the said information, sets up risk point as the flow process risk point corresponding to each service processing node of finding out.
3. the method for prewarning risk based on flow process according to claim 1 is characterized in that, among the said step B, specifically comprises according to each relevant risk point and said potential dangerous event establishment risk conducting path model:
Step B1 confirms pairing each service processing node of each relevant risk point;
Step B2 finds out each corresponding service processing node of each relevant risk point conducts to said potential dangerous incident in business processing flow incidence relation;
Step B3 is connected to each relevant risk point by said incidence relation and forms risk conducting path model after the said potential dangerous incident.
4. the method for prewarning risk based on flow process according to claim 1 is characterized in that, among the said step B, the combined data information of obtaining the non-safety information of each relevant risk point of said risk conducting path model in the certain hour section comprises:
Each relevant risk point in the certain hour section during as the risk source of triggering said potential dangerous incident the frequency of its non-safety information and each relevant risk point it conducts discovery number of times of next non-safety information to other risk point during as middle the risk point that triggers said potential dangerous incident in the certain hour section.
5. the method for prewarning risk based on flow process according to claim 1 is characterized in that, among the said step B, the combined data information of obtaining the non-safety information of each relevant risk point of said risk conducting path model in the certain hour section also comprises:
The frequency in the frequency of each relevant risk point non-safety information relevant with said potential dangerous incident in the certain hour section, each relevant risk point risk source of the said potential dangerous incident of conduct triggering in the certain hour section and each relevant risk point are as the frequency of the middle risk point in each risk source of triggering said potential dangerous incident.
6. the method for prewarning risk based on flow process according to claim 1 is characterized in that, said step C specifically comprises:
Step C1 from each relevant risk point of the said risk conducting path model set up, finds out the conducting path that conducts to said potential dangerous incident as the risk point in risk source through middle risk point; And the frequency that obtains the non-safety information in risk source in the said combined data information with each in the middle of the discovery number of times of risk point non-safety information that other risk point conduction is come;
Step C2; The frequency of the conducting path that finds according to step C1, the non-safety information in risk source and in the middle of each risk point to the discovery number of times of the non-safety information of other risk point conduction; And the serious grade of said potential dangerous incident; The independent order of severity of risk point in the middle of calculating through following assessment models one, assessment models one is:
min A i k &Sigma; i &Sigma; j I ( i , j ) ( A i k - A j k ) 2
Figure FDA0000135449970000022
Figure FDA0000135449970000023
In the above-mentioned model; δ is the adjustment parameter; The minimal difference of representing two adjacent middle risk point degrees of risk; The partial ordering relation that risk point satisfies in the middle of formula (1) expression, all middle risk point contribution degree sums equal the constraint condition of the serious grade of potential dangerous incident on conducting path of formula (2) expression, and A is the serious grade of said potential dangerous incident;
Step C3, the independent order of severity of the middle risk point that obtains according to step C2 calculates the independent order of severity B in risk source through following assessment models two k, assessment models two is:
B k = h 1 k n k H 1 k + &CenterDot; &CenterDot; &CenterDot; + h i k n k H i k + &CenterDot; &CenterDot; &CenterDot; + h r n k H r k
= h 1 k n k * 0 + &CenterDot; &CenterDot; &CenterDot; + h i k n k * ( A 1 k + &CenterDot; &CenterDot; &CenterDot; + A i - 1 k ) + &CenterDot; &CenterDot; &CenterDot; + h r k n k A
In the above-mentioned model two, n kFor the frequency of the non-safety information of risk source k, promptly with the non-safety information frequency of risk point k as the risk source;
is the number of times that non-safety information is found by risk point 1 place operation; The actual generation of risk source k this moment, the degree of risk of risk source k is
Figure FDA0000135449970000028
Be the number of times that non-safety information is found by the operation of risk point i place, this moment, the degree of risk of risk source k did H i k = A 1 k + &CenterDot; &CenterDot; &CenterDot; + A i - 1 k ;
Figure FDA00001354499700000210
spread out of operation control system for non-safety information; Found beyond the operation control system or the actual generation of final potential dangerous incident; This moment risk source k degree of risk is
Figure FDA00001354499700000211
in this case; This moment, the order of severity of risk source k equaled A, and A is the serious grade of said potential dangerous incident;
n kWith
Figure FDA00001354499700000212
Between satisfy relation:
Figure FDA00001354499700000213
Step C4, the independent order of severity that above-mentioned assessment is obtained is as the order of severity of each self-corresponding each relevant risk point.
7. the method for prewarning risk based on flow process according to claim 6 is characterized in that, among the said step C, after step C2, also comprises:
Step C20 based on the independent order of severity of each relevant risk point being assessed each the relevant risk point that obtains, carries out whole order of severity assessment to each relevant risk point, obtains the whole order of severity of each relevant risk point.
8. the method for prewarning risk based on flow process according to claim 7 is characterized in that, saidly each relevant risk point is carried out the assessment of the whole order of severity specifically comprises:
Step C201; Each relevant risk point is carried out whole order of severity assessment one by one; At first select a certain relevant risk point, from said combined data information, obtain the frequency of the middle risk point in the frequency of this relevant risk point non-safety information relevant in the certain hour section, the frequency in this relevant risk point risk source of the said potential dangerous incident of conduct triggering in the certain hour section and each risk source that the conduct of this relevant risk point triggers said potential dangerous incident with said potential dangerous incident;
Step C202; The frequency of this relevant risk point non-safety information relevant with said potential dangerous incident in the certain hour section that obtains according to step C201, this relevant risk point as the frequency in the risk source of triggering said potential dangerous incident and this relevant risk point frequency as the middle risk point in each risk source of triggering said potential dangerous incident, draw the whole order of severity r of this relevant risk point through following assessment models three calculating in the certain hour section i, assessment models three is:
r i = &beta; i B i + &Sigma; k = 1 m &alpha; k A i k
β i=n i/N i
&alpha; k = n i k / N i
N i = n i + &Sigma; k = 1 m n i k
In the above-mentioned assessment models three, N iFrequency for risk point i non-safety information relevant in the certain hour section with said potential dangerous incident;
n iBe risk point i number of times as the generation of risk source in the certain hour section;
is the frequency of risk point i as the middle risk point of risk source k;
M is illustrated in has m risk source to take place to comprise risk point i in its conducting path of back in the certain hour section;
Step 203 repeats above-mentioned steps 201,202 until the whole order of severity of obtaining each relevant risk point.
9. the method for prewarning risk based on flow process according to claim 7 is characterized in that, among the said step C, after step C20, also comprises:
Step C21 according to the independent order of severity and the whole order of severity of each relevant risk point being assessed each the relevant risk point that obtains, carries out comprehensive order of severity assessment to each relevant risk point, obtains the comprehensive order of severity of each relevant risk point.
10. the method for prewarning risk based on flow process according to claim 9 is characterized in that, saidly each relevant risk point is carried out the assessment of the comprehensive order of severity specifically comprises:
Step C211; Each relevant risk point is carried out comprehensive order of severity assessment one by one; Selected a certain relevant risk point obtains the frequency of all risk points that this relevant risk point is correlated with said potential dangerous incident in the frequency relevant with said potential dangerous incident, the certain hour section in the certain hour section from said combined data information;
Step C212; This relevant risk point that obtains according to step C211 in the certain hour section in the number of times relevant, the certain hour section with said potential dangerous incident with said potential dangerous incident the frequency of all relevant risk points and the whole order of severity of this risk point, calculate the comprehensive order of severity R of this relevant risk point through following assessment models four i, assessment models four is:
R i = &eta; i r i = ( N i / &Sigma; i N i ) r i
In the above-mentioned assessment models four, N iBe the number of times relevant of risk point i generation in the certain hour section with said latent consequences,
Figure FDA0000135449970000036
Frequency for all relevant in certain hour section risk points with said latent consequences;
Step C213 repeats above-mentioned steps C211, C212 until the comprehensive order of severity of obtaining each relevant risk point.
11. the method for prewarning risk based on flow process is characterized in that, may further comprise the steps:
Steps A is obtained the information of each included service processing node of business processing flow that operation control system carries out, finds out each service processing node that has security risk in the said information, corresponding each flow process risk point of setting up with each service processing node of finding out;
Step B; From the corresponding potential dangerous incident of said business processing flow; Selected a kind of potential dangerous incident; From said flow process risk point, find out each relevant risk point that can trigger this potential dangerous incident,, and obtain the combined data information of the non-safety information of each relevant risk point of said risk conducting path model in serious grade and the certain hour section of said potential dangerous incident according to each relevant risk point and said potential dangerous event establishment risk conducting path model;
Step C assesses each relevant risk point according to the serious grade and the said combined data information of said risk conducting path model of setting up and the said potential dangerous incident obtained, confirms the comprehensive order of severity of each relevant risk point;
Step D; Repeat above-mentioned steps B, the comprehensive order of severity of C all risk points in drawing said flow process risk point under the different potential dangerous incident of same serious grade, calculate the comprehensive order of severity of the overall situation of each risk point based on the order of severity of each risk point;
Step e if the comprehensive order of severity of the overall situation of risk point meets or exceeds the preset order of severity, then to said operation control system output early warning information, is carried out early warning by said operation control system according to said early warning information.
12. the method for prewarning risk based on flow process according to claim 11 is characterized in that, said step C specifically comprises:
Step C1 from each relevant risk point of the said risk conducting path model set up, finds out the conducting path that conducts to said potential dangerous incident as the risk point in risk source through middle risk point; And the frequency that obtains the non-safety information in risk source in the said combined data information with each in the middle of the discovery number of times of risk point non-safety information that other risk point conduction is come;
Step C2; The frequency of the conducting path that finds according to step C1, the non-safety information in risk source and in the middle of each risk point to the discovery number of times of the non-safety information of other risk point conduction; And the serious grade of said potential dangerous incident; The independent order of severity of risk point in the middle of calculating through following first assessment models, first assessment models is:
min A i k &Sigma; i &Sigma; j I ( i , j ) ( A i k - A j k ) 2
Figure FDA0000135449970000042
Figure FDA0000135449970000043
In above-mentioned first assessment models; δ is the adjustment parameter; Be the inverse of all risk point sums, represent the minimal difference of two adjacent middle risk point degrees of risk, the partial ordering relation that risk point satisfies in the middle of formula (1) expression; All middle risk point contribution degree sums equal the constraint condition of the serious grade of potential dangerous incident on conducting path of formula (2) expression, and A is the serious grade of said potential dangerous incident;
Step C3, the independent order of severity of the middle risk point that obtains according to step C2 calculates the independent order of severity B in risk source through following second assessment models k, second assessment models is:
B k = h 1 k n k H 1 k + &CenterDot; &CenterDot; &CenterDot; + h i k n k H i k + &CenterDot; &CenterDot; &CenterDot; + h r n k H r k
= h 1 k n k * 0 + &CenterDot; &CenterDot; &CenterDot; + h i k n k * ( A 1 k + &CenterDot; &CenterDot; &CenterDot; + A i - 1 k ) + &CenterDot; &CenterDot; &CenterDot; + h r k n k A
In above-mentioned second assessment models, n kFor the frequency of the non-safety information of risk source k, promptly with the non-safety information frequency of risk point k as the risk source;
Figure FDA0000135449970000046
Be the number of times that non-safety information is found by risk point 1 place operation, the actual generation of risk source k this moment, the degree of risk of risk source k does H 1 k = 0 ;
Be the number of times that non-safety information is found by the operation of risk point i place, this moment, the degree of risk of risk source k did H i k = A 1 k + &CenterDot; &CenterDot; &CenterDot; + A i - 1 k ;
spread out of operation control system for non-safety information; Found beyond the operation control system or the actual generation of final potential dangerous incident; This moment risk source k degree of risk is
Figure FDA00001354499700000411
in this case; This moment, the order of severity of risk source k equaled A, and A is the serious grade of said potential dangerous incident;
n kWith
Figure FDA0000135449970000051
Between satisfy relation:
Figure FDA0000135449970000052
Step C4; Each relevant risk point is carried out whole order of severity assessment one by one; Select a certain relevant risk point, from said combined data information, obtain the frequency of the middle risk point in the frequency of this relevant risk point non-safety information relevant in the certain hour section, the frequency in this relevant risk point risk source of the said potential dangerous incident of conduct triggering in the certain hour section and each risk source that the conduct of this relevant risk point triggers said potential dangerous incident with said potential dangerous incident;
Step C5; The frequency of this relevant risk point non-safety information relevant with said potential dangerous incident in the certain hour section that obtains according to step C5, this relevant risk point as the frequency in the risk source of triggering said potential dangerous incident and this relevant risk point frequency as the middle risk point in each risk source of the said potential dangerous incident of triggering, calculate the whole order of severity r of this relevant risk point through following the 3rd assessment models in the certain hour section i, the 3rd assessment models is:
r i = &beta; i B i + &Sigma; k = 1 m &alpha; k A i k
β i=n i/N i
&alpha; k = n i k / N i
N i = n i + &Sigma; k = 1 m n i k
In above-mentioned the 3rd assessment models, N iFrequency for risk point i non-safety information relevant in the certain hour section with said potential dangerous incident;
n iBe risk point i number of times as the generation of risk source in the certain hour section;
Figure FDA0000135449970000056
is the frequency of risk point i as the middle risk point of risk source k;
Its conducting path comprised risk point i after m was illustrated in and has m risk source to take place in the certain hour section;
Step C6 repeats above-mentioned steps C4, C5 until the whole order of severity of obtaining each relevant risk point;
Step C7; Each relevant risk point is carried out comprehensive order of severity assessment one by one; Selected a certain relevant risk point obtains the frequency of all risk points that this relevant risk point is correlated with said potential dangerous incident in the number of times relevant with said potential dangerous incident, the certain hour section in the certain hour section from said combined data information;
Step C8; This relevant risk point that obtains according to step C7 in the certain hour section in the number of times relevant, the certain hour section with said potential dangerous incident with said potential dangerous incident the frequency of all relevant risk points and the whole order of severity of this risk point, calculate the comprehensive order of severity R of this relevant risk point through following the 4th assessment models i, the 4th assessment models is:
R i = &eta; i r i = ( N i / &Sigma; i N i ) r i
In above-mentioned the 4th assessment models, N iBe the number of times relevant of risk point i generation in the certain hour section with said latent consequences,
Figure FDA0000135449970000058
is the frequency of all risk points relevant with said latent consequences in the certain hour section;
Step C9 repeats above-mentioned steps C7, C8 until the comprehensive order of severity of obtaining each relevant risk point.
13. the method for prewarning risk based on flow process according to claim 12 is characterized in that, among the said step D, the comprehensive order of severity of the overall situation that calculates each risk point according to the order of severity of each risk point specifically comprises:
Step D1; Each relevant risk point is carried out comprehensive order of severity assessment one by one; Selected a certain risk point; According to the frequency of the relevant non-safety information of the different potential dangerous incident of this risk point that obtains under the comprehensive order of severity under the different potential dangerous incident of same serious grade and this same serious grade of obtaining, calculate the comprehensive order of severity E of the overall situation of this risk point through following the 5th assessment models I, x, the 5th assessment models is:
E i , x = &Sigma; j = 1 m &pi; j R i , j , Wherein &pi; j = Num j / &Sigma; k = 1 m Num k
In above-mentioned the 5th assessment models, R I, jBe the potential dangerous incident of the j class under this severity level, the comprehensive order of severity of risk point i; X is the grade of said dangerous incident; Num jBe the frequency of non-safety information relevant with the potential dangerous incident of j class under this serious grade, m is the quantity of the potential dangerous incident that comprises under this serious grade.
CN201210031928.7A 2012-02-13 2012-02-13 Aviation operation control system method for prewarning risk Active CN102622668B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210031928.7A CN102622668B (en) 2012-02-13 2012-02-13 Aviation operation control system method for prewarning risk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210031928.7A CN102622668B (en) 2012-02-13 2012-02-13 Aviation operation control system method for prewarning risk

Publications (2)

Publication Number Publication Date
CN102622668A true CN102622668A (en) 2012-08-01
CN102622668B CN102622668B (en) 2016-03-16

Family

ID=46562573

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210031928.7A Active CN102622668B (en) 2012-02-13 2012-02-13 Aviation operation control system method for prewarning risk

Country Status (1)

Country Link
CN (1) CN102622668B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104615849A (en) * 2014-12-30 2015-05-13 中国民航大学 Flight plan evaluating system and implementation method applicable for general aviation
CN105844169A (en) * 2015-01-15 2016-08-10 中国移动通信集团安徽有限公司 Method and device for information safety metrics
CN109034602A (en) * 2018-07-23 2018-12-18 北京中泰合信管理顾问有限公司 It is a kind of using process structure as the Discussion on domestic system management method of core

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008130069A (en) * 2006-11-21 2008-06-05 Obic Business Consultants Ltd Business model of integrated information system using shared information database and basic business system
JP2009199277A (en) * 2008-02-20 2009-09-03 Satoshi Sagawa Business activity support system
CN101727627A (en) * 2009-12-16 2010-06-09 工业和信息化部电子第五研究所 Information system security risk assessment model based on combined evaluation method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008130069A (en) * 2006-11-21 2008-06-05 Obic Business Consultants Ltd Business model of integrated information system using shared information database and basic business system
JP2009199277A (en) * 2008-02-20 2009-09-03 Satoshi Sagawa Business activity support system
CN101727627A (en) * 2009-12-16 2010-06-09 工业和信息化部电子第五研究所 Information system security risk assessment model based on combined evaluation method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
文进坤: "基于风险传导模型的供应链风险评估方法研究", 《万方平台-硕士论文》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104615849A (en) * 2014-12-30 2015-05-13 中国民航大学 Flight plan evaluating system and implementation method applicable for general aviation
CN104615849B (en) * 2014-12-30 2017-07-11 中国民航大学 A kind of flight plan assessment system and implementation method suitable for General Aviation
CN105844169A (en) * 2015-01-15 2016-08-10 中国移动通信集团安徽有限公司 Method and device for information safety metrics
CN109034602A (en) * 2018-07-23 2018-12-18 北京中泰合信管理顾问有限公司 It is a kind of using process structure as the Discussion on domestic system management method of core

Also Published As

Publication number Publication date
CN102622668B (en) 2016-03-16

Similar Documents

Publication Publication Date Title
Winkler et al. Performance assessment of topologically diverse power systems subjected to hurricane events
CN112365100B (en) Disaster risk comprehensive assessment-based power grid disaster early warning and response method
US20210110319A1 (en) Framework to quantify cybersecurity risks and consequences for critical infrastructure
CN104392391A (en) Power grid running safety risk quantification method
CN102609787A (en) Flow-based risk early-warning system
CN101997709B (en) Root alarm data analysis method and system
CN103793859B (en) A kind of wind power plant operation monitoring and event integrated evaluating method
US20170103148A1 (en) System-analyzing device, analysis-model generation method, system analysis method, and system-analyzing program
CN104299116A (en) Quantitative evaluation method for security risk of operation of power network
Siew-Hong et al. Selection of optimal maintenance policy by using fuzzy multi criteria decision making method
Rehak et al. Indication of critical infrastructure resilience failure
Patriarca et al. Resilience engineering to assess risks for the air traffic management system: A new systemic method
CN102622668B (en) Aviation operation control system method for prewarning risk
Sheikhalishahi et al. An integrated approach for maintenance planning by considering human factors: Application to a petrochemical plant
Hong et al. Rail transport system vulnerability analysis and policy implementation: Past progress and future directions
Tavakoli et al. Modification of the FFTA method for calculating and analyzing the human reliability of maintenance groups in power transmission grids
Huda et al. Identifying public and experts perspectives towards large-scale solar PV system using analytic hierarchy process
Sarkar et al. Development of risk based maintenance strategy for gas turbine power system
CN114172784B (en) Network fault risk analysis method and device
Kondo et al. Process mining for alarm rationalization and fault patterns identification
CN114358539A (en) Risk-based railway operation safety identification method
Shao et al. Comprehensive assessment model on accident situations of the construction industry in China: a macro-level perspective
Mahapatra et al. Grid utility asset vulnerability assessment (GUAVA) software tool
Pant et al. Systemic resilience metrics for interdependent infrastructure networks
Hosseini Modeling and measuring resilience: applications in supplier selection and critical infrastructure

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant