CN103353917B - The methods of risk assessment of safety precaution network internal fixtion protection object and system - Google Patents

The methods of risk assessment of safety precaution network internal fixtion protection object and system Download PDF

Info

Publication number
CN103353917B
CN103353917B CN201310141016.XA CN201310141016A CN103353917B CN 103353917 B CN103353917 B CN 103353917B CN 201310141016 A CN201310141016 A CN 201310141016A CN 103353917 B CN103353917 B CN 103353917B
Authority
CN
China
Prior art keywords
protection
security
node
risk
protection node
Prior art date
Application number
CN201310141016.XA
Other languages
Chinese (zh)
Other versions
CN103353917A (en
Inventor
胡瑞敏
吕海涛
陈军
李红阳
陈华锋
何政
王亦民
郭熹
Original Assignee
武汉大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 武汉大学 filed Critical 武汉大学
Priority to CN201310141016.XA priority Critical patent/CN103353917B/en
Publication of CN103353917A publication Critical patent/CN103353917A/en
Application granted granted Critical
Publication of CN103353917B publication Critical patent/CN103353917B/en

Links

Abstract

The invention discloses a kind of methods of risk assessment and system of safety precaution network internal fixtion protection object, belong to technical field of security protection.Present system comprises: data acquisition module, is used for obtaining security protection node location in security system, the protection radius of security protection node and protection object position; Data preprocessing module, is used for being normalized data; Protection object risk evaluation module, is used for decaying based on the barrier propterty of protection object and the physical distance of security protection node, the protection radius of security protection node and security protection node, obtains the risk assessment value of protection object.The present invention can help security system managerial personnel to understand the value-at-risk of protection object in zone of protection, can become a kind of technical support that public safety system is built, instruct the construction of security system.

Description

The methods of risk assessment of safety precaution network internal fixtion protection object and system

Technical field

The invention belongs to technical field of security protection, particularly relate to a kind of methods of risk assessment and system of safety precaution network internal fixtion protection object of multiple security protection node.

Background technology

Along with rapid development of economy, improving constantly of living standards of the people, various social safety problem also starts constantly to gush.In the face of severe security situation, China's building security crime prevention system is as the important measures safeguarding social public security, security system is as the important technological platform of public safety system, positive effect is achieved in social security prevention and control, but also expose some problems: only pay attention to system Construction, ignore protection object, cause some security system because design defect, there is safety precaution leak, the safety precaution effect of system can not be made to play completely, make the protection object in safety precaution network still on the line, these problems all govern the development of security system.

At present, the main scoring method of management science that adopts carries out risk measurement to protection object in zone of protection both at home and abroad, namely by setting up risk assessment index to certain protection object, utilize analytical hierarchy process to obtain the weight of these indexs, then draw by index weighted scoring the degree of risk that protection object is current.This assessment from management science angle has certain scientific meaning, but because of structure index system with to all inevitable artificial subjective factor of index system marking, so objectively qualitative assessment can not be given to the risk of protection object; And be mostly build up later after-action review in security system based on the methods of risk assessment of management, the installation guideline in early stage of security system is had little significance.Therefore in the urgent need to a kind of early stage in security system construction and later stage all objective quantitative assessment can be carried out to the risk of protection object in its zone of protection, thus can Timeliness coverage security system build and problem in application process in time solution.

Summary of the invention

The object of this invention is to provide a kind of methods of risk assessment and system of safety precaution network internal fixtion protection object, objective metric can be carried out, to reach scientific forecasting, the effectively prevention and control of protection object risk and efficient emergent object to the risk of the fixed protection object of diverse location in the zone of protection of safety precaution network.

In order to achieve the above object, technical scheme of the present invention is as follows:

A methods of risk assessment for safety precaution network internal fixtion protection object, comprises step:

Step 1, protection object position in security protection node location, the protection radius of security protection node and the zone of protection of security system S in acquisition security system S;

Step 2, is normalized pre-service respectively to the Various types of data obtained;

Step 3, the barrier propterty based on the physical distance of security protection node in protection object and security system S, the protection radius of security protection node and security protection node decays, and obtains the risk assessment value of protection object.

Above-mentioned steps 3 comprises step further:

3-1 is according to security protection node s in protection object p and security system S iphysical distance d (s i, p), security protection node s iprotection radius r iand the barrier propterty decay of security protection node, obtain each security protection node s in security system S respectively iprotection object p be there is to the row protection probability of emergency event wherein, α ifor security protection node s ibarrier propterty attenuation parameter, according to security protection node s isetting working time of place security system S, i=1,2 ..., n, n are the quantity of security protection node in security system S;

3-2 is according to security protection node s in security system S iprotection object p be there is to the protection probability P r (s of emergency event i, p), obtain the probability of protection object p in the zone of protection of security system S n is the quantity of security protection node in security system S;

3-3 is according to the probability of protection object p in the zone of protection of security system S obtain risk assessment value Risk (the p)=1-Pr (S, p) of protection object p.

Above-mentioned barrier propterty attenuation parameter wherein, T is security protection node s itotal life cycle of place security system, the i.e. time that can normally run of security protection node, exceed its total life cycle when the time that security protection node uses, security protection node can not normally run; T is security protection node s ithe working time of place security system.

The methods of risk assessment of safety precaution network internal fixtion protection object of the present invention also comprises step: exported with the form of 2 d plane picture or 3 dimensional drawing in the protection object position in the position of security protection node in security system S, zone of protection and protection object risk assessment value.

A risk evaluating system for safety precaution network internal fixtion protection object, comprising:

Data acquisition module, to be used for obtaining in security system S protection object position in security protection node location, the protection radius of security protection node and the zone of protection of security system S;

Data preprocessing module, is used for being normalized pre-service respectively to the Various types of data obtained;

Protection object risk evaluation module, is used for decaying based on the barrier propterty of the physical distance of security protection node in protection object and security system S, the protection radius of security protection node and security protection node, obtains the risk assessment value of protection object.

Above-mentioned protection object risk evaluation module comprises submodule further:

First submodule, is used for according to security protection node s in protection object p and security system S iphysical distance d (s i, p), security protection node s iprotection radius r iand the barrier propterty decay of security protection node, obtain each security protection node s in security system S respectively iprotection object p be there is to the row protection probability of emergency event wherein, α ifor security protection node s ibarrier propterty attenuation parameter, according to security protection node s isetting working time of place security system S, i=1,2 ..., n, n are the quantity of security protection node in security system S;

Second submodule, is used for according to security protection node s in security system S iprotection object p be there is to the protection probability P r (s of emergency event i, p), obtain the probability of protection object p in the zone of protection of security system S n is the quantity of security protection node in security system S;

3rd submodule, is used for according to the probability of protection object p in the zone of protection of security system S obtain risk assessment value Risk (the p)=1-Pr (S, p) of protection object p.

Above-mentioned barrier propterty attenuation parameter wherein, T is security protection node s itotal life cycle of place security system, the i.e. time that can normally run of security protection node, exceed its total life cycle when the time that security protection node uses, security system can not normally be run; T is security protection node s ithe working time of place security system.

The risk evaluating system of above-mentioned safety precaution network internal fixtion protection object also comprises module:

Display translation module, is used for protection object position in the zone of protection of the protection radius of security protection node location, security protection node in security system S, security system S and protection object risk assessment value to export with the form of 2 d plane picture or 3 dimensional drawing.

Compare with the existing protection object methods of risk assessment based on management science method, the present invention has following remarkable advantage:

(1) because the present invention considers that the protection radius of security protection node, protection object and the factor such as the physical distance of security protection node and the barrier propterty decay of security protection node are on the impact of protection object degree of protection; therefore, the present invention can carry out objective, qualitative assessment to the risk of protection object in zone of protection.

(2) no matter at security system early construction, or after having built, the present invention all can be adopted to carry out risk assessment to the protection object in security system zone of protection, thus can also solve in time by Timeliness coverage security system Problems existing.Especially the protection object risk evaluation result of the security system of early construction, has great directive significance to the construction of security system.

Accompanying drawing explanation

Fig. 1 is that the one of the risk evaluating system of protection object of the present invention is specifically schemed;

The protection object two dimension risk distribution figure that Fig. 2 obtains for specific embodiment;

The three-dimensional risk distribution figure of protection object that Fig. 3 obtains for specific embodiment.

Embodiment

The method that traditional employing management science method method carries out quantitative risk assessment to protection object is as follows:

For security protection node s, the barrier propterty index of its key is A 1, A 2, A 3..., A n, index weights corresponding to barrier propterty index is w 1 , w 2 , w 3 , · · · , w n ( ∀ w i ∈ [ 0,1 ] i = 1,2 , · · · , n ) , And Σ i = 1 n w 1 = 1 , And it is interval to set up the tolerance representing barrier propterty height.If the marking of domain expert to every barrier propterty index is respectively a 1 , a 2 , a 3 , · · · , a n ( ∀ a i ∈ [ 0,1 ] i = 1,2 , · · · , n ) , Then build following barrier propterty assessment models:

P(s)=[w 1,w 2,w 3,…,w n]×[a 1,a 2,a 3,…,a n] T

The tolerance being worth the barrier propterty residing for P (s) is according to the observation interval, obtains the barrier propterty height of security protection node, is assessed the risk of protection object in zone of protection by barrier propterty height.

Suppose that the barrier propterty index of security protection node s key has 6, be expressed as A 1, A 2, A 3, A 4, A 5, A 6, the weight difference 0.3,0.2,0.15,0.25,0.05,0.05 that each barrier propterty index is corresponding, the barrier propterty tolerance interval of structure is in table 1.

Table 1 barrier propterty tolerance is interval

Barrier propterty tolerance is interval Implication 0~0.5 Barrier propterty is little, and the protection object risk be in wherein is high 0.5~0.8 Barrier propterty is medium, and the object risk of its protection is medium 0.8~1 Barrier propterty is good, and the object risk of its protection is very low

6 the barrier propterty indexs of expert to security protection node s are given a mark, specifically in table 2.

Table 2 barrier propterty index is given a mark

Barrier propterty index A 1 A 2 A 3 A 4 A 5 A 6 Expert estimation 0.6 0.3 0.7 0.6 0.8 0.9

Ask the observed value P (s) of security protection node s:

P(s)=[0.3,0.2,0.15,0.25,0.05,0.05]×[0.6,0.3,0.7,0.6,0.8,0.9] T=0.58。

Because 0.5<P (s) is <0.8, can judge that the barrier propterty of protecting node s is medium according to table 1, then the risk of protecting the protection object of node s is also medium.

The above-mentioned risk evaluation result obtained based on the expert analysis mode method of management science, can be described protection object risk to a certain extent, but it is not directly perceived to describe result, and the index system used in evaluation process is difficult to the situation truly reflecting security protection node in actual environment, such as, positional information each other, positional information between protection object and security protection node cannot to be reflected between multiple security protection node, along with factors such as time variations security protection node self performance simplify.The inventive method has then considered the decay with working time of each security protection node positional information each other in safety precaution network, positional information between protection object and security protection node and security protection node self-protection performance, thus the shortcoming of said method can be evaded, realize the qualitative assessment to protection object in zone of protection.

Below in conjunction with instantiation, the invention will be further described.

Fig. 1 is a kind of concrete structure figure of risk evaluating system of the present invention, and this system comprises security protection data input module, database management module, protection object risk evaluation module and display translation module.

Step 1, obtains the protection object in security protection node, the protection radius of each security protection node and the zone of protection of security system S in security system S, and the data of acquisition is input to the security protection data input module in Fig. 1.

Suppose that the packet obtained is containing the information of 5 security protection nodes and the information of 10 protection object, specifying information is in table 3 and 4.The barrier propterty attenuation parameter setting all security protection nodes is 0.3.

Table 3 security protection node coordinate and protection radius (unit: rice)

X-coordinate Y-coordinate Protection radius Security protection node 1 25.2 10.4 7 Security protection node 2 7.6 5.8 16 Security protection node 3 24.4 7.5 11 Security protection node 4 7.3 18.4 10 Security protection node 5 27.8 14.1 18

The coordinate (unit: rice) of table 4 protection object

X-coordinate Y-coordinate Protection object 1 11.4 5.1 Protection object 2 30.2 22 Protection object 3 30.1 18.7 Protection object 4 15.2 1 Protection object 5 22.7 13.4 Protection object 6 3 6.4 Protection object 7 2.1 31.7 Protection object 8 21.2 12.4 Protection object 9 31.1 21.1 Protection object 10 37.3 6.6

Step 2, data step 1 obtained are stored in security protection node database in Fig. 1 and protection object database respectively, and are normalized pre-service respectively to the Various types of data stored.

Database management module in Fig. 1 is used for receiving the safety precaution data that security protection data input module transmits, and safety precaution data are managed, safety precaution data are stored in corresponding security protection node database and protection object database respectively according to security protection node related data and protection object related data.

Step 3, after protection object risk evaluation module reads the data in security protection node database and protection object database, barrier propterty based on the physical distance of security protection node in protection object and security system S, the protection radius of security protection node and security protection node decays, and obtains the risk assessment value of protection object.

For the protection object 8 in table 4, describe the acquisition process of its risk assessment value in detail:

(1) Euclidean distance of 5 security protection nodes in protection object 8 and table 1 is calculated respectively:

d ( s 1 , p 8 ) = ( 25.2 - 21.2 ) 2 + ( 10.4 - 12.4 ) 2 = 4.47

d ( s 2 , p 8 ) = ( 7.6 - 21.2 ) 2 + ( 5.8 - 12.4 ) 2 = 15.11

d ( s 3 , p 8 ) = ( 24 . 4 - 21.2 ) 2 + ( 7.5 - 12.4 ) 2 = 5.85 ;

d ( s 4 , p 8 ) = ( 7.3 - 21.2 ) 2 + ( 18.4 - 12.4 ) 2 = 15.13

d ( s 5 , p 8 ) = ( 27.8 - 21.2 ) 2 + ( 14.1 - 12.4 ) 2 = 6.81

Wherein, d (s 1, p 8), d (s 2, p 8), d (s 3, p 8), d (s 4, p 8), d (s 5, p 8) be respectively the Euclidean distance of protection object 8 and the security protection node 1 in table 3, security protection node 2, security protection node 3, security protection node 4, security protection node 5.

(2) obtain the protection probability that emergency event occurs protection object 8 each security protection node, α ifor the barrier propterty attenuation parameter of security protection node.

The barrier propterty of security protection node is along with decaying the working time of security system, and the present invention, when assessing the risk of protection object, considers the decay of security protection node barrier propterty, and proposes the barrier propterty attenuation parameter of security protection node wherein, T is security protection node s itotal life cycle of place security system, the i.e. time that can normally run of security protection node, exceed its total life cycle when the time that security protection node uses, security system can not normally be run; T is security protection node s ithe working time of place security system.In this concrete enforcement, suppose that total life cycle of security protection node place security system is 1800 days, this security system has been run and has been employed 540 days, then, and and the barrier propterty attenuation parameter of each security protection node &alpha; i = 540 1800 = 0.3 .

Because, d (s 1, p 8)=4.47 < 7, so, Pr (s 1, p 8)=e -0.3*4.47=0.26111;

Because, d (s 2, p 8)=15.11 < 16, so, Pr (s 2, p 8)=e -0.3*15.11=0.01041;

Because, d (s 3, p 8)=5.85 < 11, so, Pr (s 3, p 8)=e -0.3*5.85=0.17291;

Because, d (s 4, p 8)=15.13 > 10, so, Pr (s 4, p 8)=0;

Because, d (s 5, p 8)=6.81 < 18, so, Pr (s 5, p 8)=e -0.3*6.81=0.12960.

Above-mentioned Pr (s 1, p 8), Pr (s 2, p 8), Pr (s 3, p 8), Pr (s 4, p 8), Pr (s 5, p 8) be respectively the protection probability of security protection node 1 in table 3, security protection node 2, security protection node 3, security protection node 4, security protection node 5 pairs of protection object 8.

(3) according to Pr (s 1, p 8), Pr (s 2, p 8), Pr (s 3, p 8), Pr (s 4, p 8), Pr (s 5, p 8) obtain the value-at-risk Risk (p of protection object 8 8):

Risk(p 8)=1-[Pr(s 1,p 8)+Pr(s 2,p 8)+Pr(s 3,p 8)+Pr(s 5,p 8)]=0.42587。

If value-at-risk Risk (p)≤0 of gained protection object, then make Risk (p)=0.

Protection object value-at-risk is larger, shows that the degree of risk of protection object is larger.

The computing method of all the other the protection object value-at-risks in table 4 are the same, do not enumerate at this.In table 4, the concrete value-at-risk of each protection object is in table 5.

Table 5 protection object value-at-risk

Title Value-at-risk Protection object 1 0.686733 Protection object 2 0.930477 Protection object 3 0.78413 Protection object 4 0.908295 Protection object 5 0.324378 Protection object 6 0.750825 Protection object 7 1 Protection object 8 0.425873 Protection object 9 0.900201 Protection object 10 0.973761

Step 4, adopts the display translation module output guard object risk distribution figure in Fig. 1.

In order to the degree of risk of each protection object in safety precaution network more intuitively can be obtained, the value-at-risk output of the relevant information of security protection node and protection object can be generated protection object two dimension risk distribution figure on two dimensional surface, see Fig. 2, in figure, the position coordinates horizontal, ordinate is respectively security protection node and protection object, box indicating protection object, asterisk represents security protection node.Also the value-at-risk output of the relevant information of security protection node and protection object can be generated the three-dimensional risk distribution figure of protection object on three-dimensional planar, see Fig. 3, in figure, the position coordinates horizontal, ordinate is respectively security protection node and protection object, box indicating protection object, asterisk represents security protection node.

Specific embodiment described herein is only to the explanation for example of the present invention's spirit.Those skilled in the art can make various amendment or supplement or adopt similar mode to substitute to described specific embodiment, but can't depart from spirit of the present invention or surmount the scope that appended claims defines.

Claims (6)

1. a methods of risk assessment for safety precaution network internal fixtion protection object, is characterized in that, comprise step:
Step 1, protection object position in security protection node location, the protection radius of security protection node and the zone of protection of security system S in acquisition security system S;
Step 2, is normalized pre-service respectively to the Various types of data obtained;
Step 3, the barrier propterty based on the physical distance of security protection node in protection object and security system S, the protection radius of security protection node and security protection node decays, and obtain the risk assessment value of protection object, this step comprises sub-step further:
3-1 is according to security protection node s in protection object p and security system S iphysical distance d (s i, p), security protection node s iprotection radius r iand the barrier propterty decay of security protection node, obtain each security protection node s in security system S respectively iprotection object p be there is to the row protection probability of emergency event wherein, α ifor security protection node s ibarrier propterty attenuation parameter, according to security protection node s isetting working time of place security system S, i=1,2 ..., n, n are the quantity of security protection node in security system S;
3-2 is according to security protection node s in security system S iprotection object p be there is to the protection probability P r (s of emergency event i, p), obtain the probability of protection object p in the zone of protection of security system S n is the quantity of security protection node in security system S;
3-3 is according to the probability of protection object p in the zone of protection of security system S obtain risk assessment value Risk (the p)=1-Pr (S, p) of protection object p.
2. the methods of risk assessment of safety precaution network internal fixtion protection object as claimed in claim 1, is characterized in that:
Described barrier propterty attenuation parameter wherein, T is security protection node s itotal life cycle of place security system; T is security protection node s ithe working time of place security system.
3. the methods of risk assessment of safety precaution network internal fixtion protection object as claimed in claim 1, is characterized in that, also comprise step:
Protection object position in the zone of protection of the protection radius of security protection node location, security protection node in security system S, security system S and protection object risk assessment value are exported with the form of 2 d plane picture or 3 dimensional drawing.
4. a risk evaluating system for safety precaution network internal fixtion protection object, is characterized in that, comprising:
Data acquisition module, to be used for obtaining in security system S protection object position in security protection node location, the protection radius of security protection node and the zone of protection of security system S;
Data preprocessing module, is used for being normalized pre-service respectively to the Various types of data obtained;
Protection object risk evaluation module, is used for decaying based on the barrier propterty of the physical distance of security protection node in protection object and security system S, the protection radius of security protection node and security protection node, obtains the risk assessment value of protection object;
Described protection object risk evaluation module comprises submodule further:
First submodule, is used for according to security protection node s in protection object p and security system S iphysical distance d (s i, p), security protection node s iprotection radius r iand the barrier propterty decay of security protection node, obtain each security protection node s in security system S respectively iprotection object p be there is to the row protection probability of emergency event wherein, α ifor security protection node s ibarrier propterty attenuation parameter, according to security protection node s isetting working time of place security system S, i=1,2 ..., n, n are the quantity of security protection node in security system S;
Second submodule, is used for according to security protection node s in security system S iprotection object p be there is to the protection probability P r (s of emergency event i, p), obtain the probability of protection object p in the zone of protection of security system S n is the quantity of security protection node in security system S;
3rd submodule, is used for according to the probability of protection object p in the zone of protection of security system S obtain risk assessment value Risk (the p)=1-Pr (S, p) of protection object p.
5. the risk evaluating system of safety precaution network internal fixtion protection object as claimed in claim 4, is characterized in that:
Described barrier propterty attenuation parameter wherein, T is security protection node s itotal life cycle of place security system; T is security protection node s ithe working time of place security system.
6. the risk evaluating system of safety precaution network internal fixtion protection object as claimed in claim 4, is characterized in that, also comprise:
Display translation module, is used for protection object position in the zone of protection of the protection radius of security protection node location, security protection node in security system S, security system S and protection object risk assessment value to export with the form of 2 d plane picture or 3 dimensional drawing.
CN201310141016.XA 2013-04-22 2013-04-22 The methods of risk assessment of safety precaution network internal fixtion protection object and system CN103353917B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310141016.XA CN103353917B (en) 2013-04-22 2013-04-22 The methods of risk assessment of safety precaution network internal fixtion protection object and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310141016.XA CN103353917B (en) 2013-04-22 2013-04-22 The methods of risk assessment of safety precaution network internal fixtion protection object and system

Publications (2)

Publication Number Publication Date
CN103353917A CN103353917A (en) 2013-10-16
CN103353917B true CN103353917B (en) 2016-03-30

Family

ID=49310288

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310141016.XA CN103353917B (en) 2013-04-22 2013-04-22 The methods of risk assessment of safety precaution network internal fixtion protection object and system

Country Status (1)

Country Link
CN (1) CN103353917B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107330837B (en) * 2017-07-03 2019-11-12 青岛山科智汇信息科技有限公司 A kind of forest fires safety and protection system and method based on sacrifice information collection

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101751625A (en) * 2010-01-21 2010-06-23 武汉大学 Protection effectiveness evaluation system with single protection capacity
CN101763467A (en) * 2010-01-21 2010-06-30 武汉大学 Method for optimizing protection capability in safety protection system
CN101770548A (en) * 2010-01-21 2010-07-07 武汉大学 Protection efficiency evaluating system with multiple protection abilities
CN101782942A (en) * 2010-01-21 2010-07-21 武汉大学 Multi-node protection efficiency evaluation system with multiple protection capabilities
CN102495952A (en) * 2011-11-28 2012-06-13 广东电网公司电力科学研究院 Breaker risk evaluation system and risk evaluation method thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003150748A (en) * 2001-11-09 2003-05-23 Asgent Inc Risk evaluation method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101751625A (en) * 2010-01-21 2010-06-23 武汉大学 Protection effectiveness evaluation system with single protection capacity
CN101763467A (en) * 2010-01-21 2010-06-30 武汉大学 Method for optimizing protection capability in safety protection system
CN101770548A (en) * 2010-01-21 2010-07-07 武汉大学 Protection efficiency evaluating system with multiple protection abilities
CN101782942A (en) * 2010-01-21 2010-07-21 武汉大学 Multi-node protection efficiency evaluation system with multiple protection capabilities
CN102495952A (en) * 2011-11-28 2012-06-13 广东电网公司电力科学研究院 Breaker risk evaluation system and risk evaluation method thereof

Also Published As

Publication number Publication date
CN103353917A (en) 2013-10-16

Similar Documents

Publication Publication Date Title
Long et al. Nonrenewable energy, renewable energy, carbon dioxide emissions and economic growth in China from 1952 to 2012
Long et al. Spatial econometric analysis of China’s province-level industrial carbon productivity and its influencing factors
Cai et al. Road traffic noise mapping in Guangzhou using GIS and GPS
Li et al. XEarth: A 3D GIS Platform for managing massive city information
Lam et al. Environmental management system vs green specifications: How do they complement each other in the construction industry?
Harrison et al. Foundations for smarter cities
Ng Towards planning and practical understanding of the need for meteorological and climatic information in the design of high‐density cities: A case‐based study of Hong Kong
Rodrigues et al. A method for the assessment of the visual impact caused by the large-scale deployment of renewable-energy facilities
Yu et al. Analysis of factors influencing safety management for metro construction in China
Liu et al. A novel method to detect bad data injection attack in smart grid
CN103218398B (en) Intelligent substation SCL (substation configuration description language) file difference comparison method
El-Diraby et al. A domain ontology for construction concepts in urban infrastructure products
CN104518567B (en) A kind of electrical equipment state on-line tracing method
CN100438251C (en) A large electric system vulnerable line identifying method
CN104199410A (en) Bridge-structure universal acquisition control system for health monitoring
CN101950271B (en) Modeling technology-based software security test method
CN104125010B (en) A kind of method and device of Cable&#39;s Fault location
CN103001328A (en) Fault diagnosis and assessment method of intelligent substation
CN102545213B (en) System and method for managing line loss of power grid in real time
CN101882248A (en) Multi-level digital city supervision system based on 3S (GIS, Geographic Information System/GPS, Global Position System/RS, Radio Station)
Tao et al. Research on the prospects of low-carbon economic development in China based on LEAP model
Zhang et al. Green material selection for sustainability: A hybrid MCDM approach
Wang et al. Integration of BIM and GIS in sustainable built environment: A review and bibliometric analysis
CN104950187A (en) Power-grid-GIS-based lightning analysis and early warning method and system thereof
CN103177186B (en) A kind of electric loop probability of malfunction Forecasting Methodology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160330

Termination date: 20190422