Font Size: a A A

Design And Implementation Of Training Exercise Expert Pre-assessment System Security Risk

Posted on:2012-12-15Degree:MasterType:Thesis
Country:ChinaCandidate:H YouFull Text:PDF
GTID:2216330338456966Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
"People's Liberation Army Safety Ordinance" requirements, the armed forces during the equipment development, national defense construction, major exercises, and ammunition destruction of more dangerous activities such as "security risk assessment should be carried out in advance." Security risk assessment in August 2008 the army began implementation. Currently, the military training exercise content security risk assessment, indicators, based on not enough detailed and specific, assessment methods and measures is still not perfect, so that the implementation of security risk assessment by the constraints of the larger, but also to the security forces in military exercises accident prevention work to bring a hidden danger can not be ignored. To be able to quickly and accurately find the auxiliary exercise security risks that exist, indicate the direction of safety management exercise and the end result, improve the safety precautions to reduce, eliminate or avoid risks, to ensure the successful completion of the exercises, developed new and more scientific military exercises have become a security risk assessment system tasks can not be ignored.This system is based on "training and evaluation outline" requirements, based on C# and SQL Server database research and development of pre-training exercise safety risk assessment system. This main achievements are as follows:(1) System established itself as a security risk evaluation index database and database security risk countermeasures. Security Risk Assessment Indicators Database in accordance with the various safety regulations, and summarizes the experience of experts in various fields to develop, through continuous updating of data maintained, so that the data continue to be more consistent with objective reality; security risk response measures included the combat readiness level of the database conversion, remote mobility, organizational preparation and implementation of four stages of fighting a variety of security countermeasures for the management of more than 400 articles, exercises to avoid the risk can provide a reasonable response measures. Database development, can effectively solve the traditional security risk assessment often appear coarse, sparse, leakage problems. (2) In practice, the evaluation process, "He also vital," the fuzzy phenomenon abound, in the comprehensive evaluation of subjective factors, the ambiguity of the subjective factors and risk assessment of participants great level of ability, not the structure of knowledge and practical experience OK, the system-level analysis and the introduction of fuzzy comprehensive evaluation method and scientific analysis targeted to help the military determine the appropriate control measures to reduce or eliminate the risk for exercise design, and safety precautions, security management provides a strong support. For large items, complex activities, the system can play to their advantage. To solve the traditional method of safety assessment of uncertainty, the larger problem of human impact.
Keywords/Search Tags:training exercises, security, risk assessment, fuzzy comprehensive evaluation method
PDF Full Text Request
Related items