350 rub
Journal Information-measuring and Control Systems №8 for 2012 г.
Article in number:
The information-analytical technique of risk assessment in the problems of security management at dangerous objects
Authors:
A.I. Vaguine, N.G. Volchenkov, I.E. Kouznetsov
Abstract:
The technique described in the article provides the ability to verify the theoretical conclusions by constructing prediction and comparison with the current alleged incidents. The technique uses an approach based on factual information about the current state of objects in general. It is proposed to decompose each specific violation or deviation in the basic sequence of elementary adverse events. The probabilities of elementary adverse events show how these events are random in the current situation, and the probabilities of transition from one event to another can be judged on the real effectiveness of safety and the quality of services. In technique there is data formalization is carried out, the accumulation of which leads to the formation of sufficient statistics in order to carry out calculations of risk events, taking into account the damage to implement a more complete analysis of the security of dangerous objects, to evaluate changes on the results of corrective actions, and conduct a mathematically justified security management. This paper presents a functional diagram of the system vulnerability assessment. System vulnerability assessment can provide an analytical process and present the results of experts to assess the vulnerability, risk assessment, taking into account the damage and provide information support to the identification of crisis situations, predict their occurrence and evaluate the safety of dangerous objects. If statistical information is enough then it is possible to build a model of security of dangerous objects, which is employed to count the probabilities of influencing the final event. Modeling the network reveal previously hidden information on trends, allowing to carry out corrective measures and calculate the possible outcomes. To predict the state of the object's security controls and identifying hidden trends in the processes used simulation. The objectives are to evaluate the influence of modeling changes in external and internal parameters of the control system in the state of security and performance evaluation of preventive measures. The object of imitation are the incidents leading to the cause-effect transitions between adverse events. Implemented technique which uses a formalized information, causal event trees and Bayesian networks, can provide an analytical process and present the results of experts to assess the safety and risks, with damage taken into account . The system provides information support to the identification of crisis situations, predict their occurrence and evaluate the safety of objects and industries.
Pages: 39-43
References
  1. Агапов А.М., Вагин А.И., Кузнецов И.Е. Структура информационно-аналитической системы управления и методики оценки состояния ядерно-радиационной безопасности объектов // V Междунар. ядерный форум: «Безопасность ядерных технологий: стратегия и экономика безопасности». НОУ ИДПО «Атомпроф». 2010. С. 240-249.
  2. Программа Европейского союза TACIS для России: Вероятностная экономическая оценка риска для управления риском АЭС (BIS/00/016/010-N) // Итоговый отчет. Июль 2003 г.
  3. Kaplan, Stan New Tools for Failure and Risk Analysis. Anticipatory Failure Determination and the Theory of Scenario Structuring. Southfield, MI: Ideation International Inc..
  4. Vaguine A., Vikentiev A., Poluektov S., Mikheev V. Knowledge-based event oriented approach in control system // ICALEPCS 97. Proc. 1997.
  5. Agapov A., Buchelnikov A., Vaguine A., Vikentjev A., Mikheev V., Poluektov S. Informational and analytical route safety estimation and risk calculation system for dangerous object transportation // ICALEPCS 2005. Proc. 2005.P. 3-33.