scholarly journals Explosion risk assessment model for underground mine atmosphere

2016 ◽  
Vol 35 (1) ◽  
pp. 21-35 ◽  
Author(s):  
Jianwei Cheng ◽  
Xixi Zhang ◽  
Apurna Ghosh

In the coal mining industry, explosions or mine fires present the most hazardous safety threats for coal miners or mine rescue members. Hence, the determination of the mine atmosphere explosibility and its evolution are critical for the success of mine rescues or controlling the severity of a mine accident. However, although there are numbers of methods which can be used to identify the explosibility, none of them could well indicate the change to the explosion risk time evolution. The reason is that the underground sealed atmospheric compositions are so complicated and their dynamical changes are also affected by various influence factors. There is no one method that could well handle all such considerations. Therefore, accurately knowing the mine atmospheric status is still a complicated problem for mining engineers. Method of analyzing the explosion safety margin for an underground sealed atmosphere is urgently desired. This article is going to propose a series of theoretical explosion risk assessment models to fully analyze the evolution of explosion risk in an underground mine atmosphere. Models are based on characteristics of the Coward explosibility diagram with combining mathematical analyzing approaches to address following problems: (1) for an “not-explosive” atmosphere, judging the evolution of explosion risk and estimating the change-of-state time span from “not-explosive” to “explosive” and (2) for an “explosive” atmosphere, estimating the “critical” time span of moving out of explosive zone and stating the best risk mitigation strategy. Such research efforts could not only help mine operators understand the explosibility risk of a sealed mine atmosphere but also provide a useful tool to wisely control explosive atmosphere away from any dangers. In order to demonstrate research findings, case studies for derived models are shown and are also used to instruct readers how to apply them. The results provide useful information for effectively controlling an explosive underground sealed atmosphere.

Author(s):  
Lorna Harron ◽  
Rick Barlow ◽  
Ted Farquhar

Increasing concerns and attention to pipeline safety have engaged pipeline companies and regulatory agencies to extend their approaches to pipeline integrity. The implementation of High Consequence Areas (HCAs) has in particular had an impact on the development of integrity management protocols (IMPs) for pipelines. These IMPs can require that a risk based assessment of integrity issues be applied to specific HCA risk factors. This paper addresses the development of an operational risk assessment approach for pipeline leak detection requirements for HCAs. A detailed risk assessment algorithm that includes 25 risk variables and 28 consequence variables was developed for application to all HCA areas. The significant likelihood and consequence factors were chosen through discussions with the Leak Detection Risk Assessment Model Working Group and subject matter experts throughout Enbridge. The leak detection algorithm focuses on sections of pipe from flow meter to flow meter, as these are the locations that impact the leak detection system used by Enbridge. Each section of pipe is evaluated for likelihood, consequence and risk. When a high or medium risk area has been identified, an evaluation of potential Preventive and Mitigative (P&M) measures will be undertaken. A P & M Matrix has been developed to identify potential mitigation strategies to be considered for higher risk variables, called risk drivers, in the model. The matrix has been developed to identify potential risk mitigation strategies to consider for each variable used in the HCA Leak Detection Risk Assessment. The purpose of the matrix is to guide the user to consider actions identified for variables that drive the risk for the particular location. Upon review of the matrix, the user determines feasibility of the risk mitigation strategies being considered to identify an action. The paper will describe the consultative process that was used to workshop the development of this algorithm. Included in this description is how the process addressed various methods of leak detection across a wide variety of pipelines. The paper closes with “development challenges” and future steps in applying operation risk assessment techniques to mainline leak detection risk management.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 525 ◽  
Author(s):  
Dejan V. Petrović ◽  
Miloš Tanasijević ◽  
Saša Stojadinović ◽  
Jelena Ivaz ◽  
Pavle Stojković

The main goal of this research was the development of an algorithm for the implementation of negative risk parameters in a synthesis model for a risk level assessment for a specific machine used in the mining industry. Fuzzy sets and fuzzy logic theory, in combination with statistical methods, were applied to analyze the time picture state of the observed machine. Fuzzy logic is presented through fuzzy proposition and a fuzzy composition module. Using these tools, the symmetric position of the fuzzy sets with regard to class was used, and the symmetric fuzzy inference approach was used in an outcome calculation. The main benefit of the proposed model is being able to use numerical and linguistic data in a risk assessment model. The proposed risk assessment model, using fuzzy logic conclusions and min–max composition, was used on a mobile crushing machine. The results indicated that the risk level of the mobile crushing machine was in the “high” category, which means that it is necessary to introduce maintenance policies based on this high risk. The proposed risk assessment model is useful for any engineering system.


2020 ◽  
Vol 10 (2) ◽  
Author(s):  
Mohd Nizam Zakaria ◽  
Nur Azaliah Abu Bakar ◽  
Hafiza Abas ◽  
Noor Hafizah Hassan

The Internet of Things (IoT) has become a prevalent technology in the IT industry. One of the industries that can benefit extensively in this technology is healthcare. However, the healthcare IoT is still under debate with several studies suggesting it is lack of interoperability, security, and too much complexity. Even more, the risk involved in deploying it is still enormous. Many traditional risk assessment models are unable to provide a specific IoT risk guideline and specification, especially in the healthcare area. Thus, it is essential to understand the full extent of the IoT risk and how to manage its risk in the healthcare area. The risk management models, such as NIST SP 800-30, ISO/IEC 27005, OCTAVE, CRAMM, and EBIOS, which are among the leading and widely used in many areas and healthcare fields, have also been described. Besides, this paper includes a review of three IoT risk assessment models that are based on ABA-IDS, Deep Learning, and AHP-SVM. Based on the review analysis, we proposed a new enhanced healthcare IoT risk assessment model, which aims to provide a real-time monitoring and mitigating risks that incorporate the NIST SP 800-30 framework, ABA-IDS, and CNN deep learning. This shall constitute a better classification of each risk identified to find the best risk mitigation plan.


2015 ◽  
Vol 744-746 ◽  
pp. 570-573
Author(s):  
Wei Zhan ◽  
Hao Lin ◽  
Zhi Lei Li

Based on the investigation of soil slope in Zhejiang province, the main influence factors of soil slope stability were analyzed and the risk assessment indexes of soil slop were selected. Then the risk assessment model of soil slope was established by the method of analytic hierarchy process according to the importance of each index. The security risk assessment system of soil slope was obtained finally. The research result has important reference for the soil slope management.


2013 ◽  
Vol 387 ◽  
pp. 341-344 ◽  
Author(s):  
Hao Lin Cui ◽  
Xu Sheng Gan ◽  
Ya Rong Wu ◽  
Hai Long Gao

In order to improve the safety level of aircraft anti-collision, an anti-collision risk assessment methods based on Relevance Vector Machine (RVM) is proposed. First, RVM learning under Bayesian framework is introduced as well as its basic principle and modeling process, and then on the basis of system point of view an anti-collision risk assessment index system is established, finally, on this basis, RVM assessment model for aircraft anti-collision risk is constructed. It can adaptively adjust the weights of influence factors without analyzing the relationship between various factors in the system. Examples show that, for anti-collision risk assessment, RVM has a novel structure and convenient application, and the result can reflect the actual safety situation.


2014 ◽  
Vol 664 ◽  
pp. 185-190
Author(s):  
Hao Lan ◽  
Jia Jun Li ◽  
Jing Nan Zhang

As heating transportation technology is widely used in waxy crude pipelines, elements that affect flow safety in pipeline transportation are uncertain and have wave property, thus impacting safety margin variation of the heater. This text proposes an assessment method for direct-heater performance of waxy crude pipeline station and establishes the risk assessment model for heater techniques based on waxy crude flow safety, to technically support safe and efficient waxy crude transportation.


2010 ◽  
Vol 151 (34) ◽  
pp. 1365-1374 ◽  
Author(s):  
Marianna Dávid ◽  
Hajna Losonczy ◽  
Miklós Udvardy ◽  
Zoltán Boda ◽  
György Blaskó ◽  
...  

A kórházban kezelt sebészeti és belgyógyászati betegekben jelentős a vénásthromboembolia-rizikó. Profilaxis nélkül, a műtét típusától függően, a sebészeti beavatkozások kapcsán a betegek 15–60%-ában alakul ki mélyvénás trombózis vagy tüdőembólia, és az utóbbi ma is vezető kórházi halálok. Bár a vénás thromboemboliát leggyakrabban a közelmúltban végzett műtéttel vagy traumával hozzák kapcsolatba, a szimptómás thromboemboliás események 50–70%-a és a fatális tüdőembóliák 70–80%-a nem a sebészeti betegekben alakul ki. Nemzetközi és hazai felmérések alapján a nagy kockázattal rendelkező sebészeti betegek többsége megkapja a szükséges trombózisprofilaxist. Azonban profilaxis nélkül marad a rizikóval rendelkező belgyógyászati betegek jelentős része, a konszenzuson alapuló nemzetközi és hazai irányelvi ajánlások ellenére. A belgyógyászati betegek körében növelni kell a profilaxisban részesülők arányát és el kell érni, hogy trombózisrizikó esetén a betegek megkapják a hatásos megelőzést. A beteg trombóziskockázatának felmérése fontos eszköze a vénás thromboembolia által veszélyeztetett betegek felderítésének, megkönnyíti a döntést a profilaxis elrendeléséről és javítja az irányelvi ajánlások betartását. A trombózisveszély megállapításakor, ha nem ellenjavallt, profilaxist kell alkalmazni. „A thromboemboliák kockázatának csökkentése és kezelése” című, 4. magyar antithromboticus irányelv felhívja a figyelmet a vénástrombózis-rizikó felmérésének szükségességére, és elsőként tartalmazza a kórházban fekvő belgyógyászati és sebészeti betegek kockázati kérdőívét. Ismertetjük a kockázatbecslő kérdőíveket és áttekintjük a kérdőívekben szereplő rizikófaktorokra vonatkozó bizonyítékokon alapuló adatokat.


Author(s):  
C.K. Lakshminarayan ◽  
S. Pabbisetty ◽  
O. Adams ◽  
F. Pires ◽  
M. Thomas ◽  
...  

Abstract This paper deals with the basic concepts of Signature Analysis and the application of statistical models for its implementation. It develops a scheme for computing sample sizes when the failures are random. It also introduces statistical models that comprehend correlations among failures that fail due to the same failure mechanism. The idea of correlation is important because semiconductor chips are processed in batches. Also any risk assessment model should comprehend correlations over time. The statistical models developed will provide the required sample sizes for the Failure Analysis lab to state "We are A% confident that B% of future parts will fail due to the same signature." The paper provides tables and graphs for the evaluation of such a risk assessment. The implementation of Signature Analysis will achieve the dual objective of improved customer satisfaction and reduced cycle time. This paper will also highlight it's applicability as well as the essential elements that need to be in place for it to be effective. Different examples have been illustrated of how the concept is being used by Failure Analysis Operations (FA) and Customer Quality and Reliability Engineering groups.


2013 ◽  
Vol 19 (3) ◽  
pp. 521-527 ◽  
Author(s):  
Song YANG ◽  
Shuqin WU ◽  
Ningqiu LI ◽  
Cunbin SHI ◽  
Guocheng DENG ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document