应急预案制定中的评估问题研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
突发事件的频繁出现使得突发事件应急管理逐渐引起社会的广泛关注,在突发事件应急管理体系中,应急预案是其中重要的一部分。应急预案是应对可能发生的突发事件,为保证迅速有效的开展应急救援行动、降低事故损失而制定的有关计划或者方案。当前国家、各级政府部门以及企业等已经制定很多应急预案,但是这些应急预案还存在如下一些问题:可操作性差;各个应对部门之间的领导关系以及行为逻辑顺序不明确;缺乏有效的保障机制;风险分析和脆弱性分析不足;对资源布局的定期评估不足等,这就无法保证应急预案顺利实施并达到预期效果。当前关于应急预案的研究很多,但是对应急预案评估问题的研究相对较少。通过对应急预案评估问题进行研究可以发现应急预案中存在的问题,提高应急预案处置的有效程度,使得应急预案可以更有效的应对突发事件以减少损失,达到制定应急预案的目的。对应急预案进行评估,一方面是对应急预案进行综合评估,另一方面是针对效果不理想的应急预案分析其存在的问题,并针对问题的根源进行有效处理。其中,脆弱性评估和资源布局评估是应急预案评估中的两个重点问题,如果在应急预案制定过程中脆弱性评估不足,则难以找到地区脆弱性所在并加以特殊应对,最终导致因脆弱性较强而损失较大;而在处置过程中出现资源不足或者调度不力等情况则与资源布局关系密切,需要事先确定资源布局并评估其合理性。这两个问题同时也是难点问题,因为影响脆弱性的因素很多,针对不同突发事件,各个地区的脆弱性是不同的;而资源布局的评估效果也与评估的标准相关,不同的评估标准能够得到不同的评估结果。本文主要从以下几个方面开展研究工作:
     第一,应急预案的评估研究,一方面针对已经制定的应急预案从其实施前后进行分析。在应急预案制定后并未实施时,根据应急预案的制定情况,从其编制原则、构成要素、内容和操作性等角度构建指标体系,对其进行前评估;在应急预案实施后,借鉴项目管理中的后评估理论,建立后评估指标体系对应急预案实施后的情况进行评估,并将前评估和后评估的结果相结合,把应急预案实施中的问题反映到应急预案的制定过程中,实现对应急预案的动态评估,并对应急预案进行及时修正,进而探索一条制定有效应急预案的途径。另一方面,使用网络计划方法来描述应急预案的实施过程,分析操作过程的合理性以及实施过程中可能出现的问题及原因,并在网络计划的基础上分析关键路线。与此同时,针对突发事件处置过程中资源经常无法满足的情况,引进资源保障率的概念,分析资源供给量与需求量的关系,通过研究各个步骤的资源保障率分析应急预案的整体保障情况,以资源保障程度来近似表示对事件的控制程度,近似评估应急预案的有效程度。
     第二,城市脆弱性的评估研究,脆弱性评估是应急预案编制过程中的重要步骤,在应急预案编制前可以通过脆弱性评估分析地区针对某种突发事件的隐患以及敏感情况,而在编制过程中可以通过脆弱性评估对脆弱性强的地区加强应对措施,保障地区安全。脆弱性是承载体面临突发事件所表现出的抵御能力和应对能力,从承载体的易受攻击程度、敏感程度、应对能力和恢复能力四个方面来分析承载体对突发事件的脆弱性,并以洪水灾害为例,给出较为详细的影响指标,可以为针对各种不同的灾害或者突发事件的脆弱性分析提供参考,并在此基础上,简要提出几种脆弱性评估可用的方法。
     第三,资源布局的评估研究,由于地区对应急资源的需求可能随时间发生变化,因此在应急预案制定过程中,评估已有资源布局对地区需求的保障程度就显得十分重要。本文从两个方面对已有的资源布局进行评估:一方面评估已有的资源布局是否能够满足时间需求以及数量需求,即在国家规定的时间内,是否所有发生突发事件的地点都能够得到及时救助,并且救助所需的资源数量得到满足,若经常不能满足需求则需要进行调整;另一方面,构造一个基于时间、资源供给和需求的损失函数,用于评估给定资源布局下可能出现的各个级别突发事件对地区造成的损失。在此基础上对损失值较大时的资源布局建立优化模型进行调整。以上两方面评估和调整都考虑到了增加或者减少应急服务点的个数以及增加应急服务点的资源量,是集选址和资源配置于一体的模型。最后还给出了一个针对存在传染效应突发事件的资源布局模型
     在论文的最后部分,对以上工作进行总结,并对未来研究进行展望。
Emergency management has been given wide attention because emergencies appear frequently. Management of emergency plans is one of the most important parts in emergency management system. The emergency plan is a kind of plan or project to deal with possible emergency and develop succor quickly and efficiently to decrease the emergency loss. Nowadays, our country and local governments, even enterprises have made emergency plans. But there are still some problems in emergency plans, such as poor operability, unclear leadership and action sequence, loss of guarantee mechanism, lack of risk and vulnerability evaluation, insufficiency of resource distribution etc. The problems above may cause undesired results. There is much research on emergency plans while research on evaluation of emergency plans is limited. With evaluation of emergency plans, the flaw of emergency plans can be found and corrected to improve the effect. The emergency plans would be evaluated comprehensively and the root of problems can be found. Vulnerability and resource distribution evaluation are important in emergency plans evaluation. Without sufficient vulnerability evaluation, the areas with strong vulnerability would not get special treatment and may cause more losses. Without periodic resource distribution evaluation, the resource supply may not satisfy the demand of emergency. Vulnerability and resource distribution evaluation are also complicated. There are many factors that influence vulnerability and different area has different vulnerability analysis. Besides, as far as the evaluation of resource location and allocation, there are different standards. This dissertation studied three important peoblems.
     The first problem was the evaluation of emergency plans. On the one hand, a comprehensive index system based on making principles, components, contents and operability to evaluate the efficiency of emergency plans before they are executed was proposed. And another index system based on the past- evaluation theory in project management to evaluate the emergency plans after they are carried into execution was also proposed. The two evaluations can be combined to reflect the problems in the course of execution to the course of making emergency plans. And then this research implements the dynamic evaluation of emergency plans and corrects the emergency plans in time to explore a way to make effective emergency plans. On the other hand, the operation process of emergency plans can be expressed with network. And based on the network, we can analyze the rationality of process and critical path of network. Due to the usual unsatisfied resource demand, the concept of rate of resource guarantee was introduced to analyze the relationship of resource demand and supply. The analysis of effect of emergency plans was based on the rate of resource guarantee of each step. The rate of resource guarantee was used to express the effect of emergency plans approximately.
     The second problem is evaluation of the city vulnerability. Evaluation of the city vulnerability is an important step in making emergency plans. Making vulnerability evaluation and analyzing the weakness and sensitivity of the region when making emergency plans can enforce the Countermeasures to guarantee the region security. Vulnerability is the resistance of system to emergency or hazard. Vulnerability can be expressed by susceptibility, sensitivity, the capacity to cope and resilience. More detailed index of flood disaster was given to give reference for vulnerability analysis of different kinds of emergencies. Several evaluation methods were also proposed here.
     The third problem is evaluation of the current resource location and allocation. It is necessary to evaluate the availability of resources based on current resource distribution because resource demand will change along with time. The current distribution can be evaluated from two aspects. On the one hand, the time requirement and quantity requirement should be satisfied. The former means the emergency can get help in the time the government ordered, the latter means the quantity of resource required can arrived in time. If either of the requirements can not be satisfied, the current distribution should be adjusted. On the other hand, a loss function based on time, resource supply and demand was constructed to evaluate the loss under a given resource distribution when different degrees of emergencies would occur. An optimization model was developed to adjust the current resource location and allocation when the loss was not accepted. The way of adjusting the current distribution was adding or closing some facilities and adding resource. The models combined location and allocation. At last, a resource location and allocation model of emergencies with infection was given.
     At the end of this paper, conclusion and prospect were given.
     This work was supported by National Science Foundation of China under grant Nos. 70671098 and the Doctoral Student Paper Fund of Beijing Municipal Science and Technology Commission (ZZ0709).
引文
毕星,翟丽.2000.项目管理[M].复旦大学出版社.
    曹立,吴明辉,应晶.2004.基于网格的城市应急联动中心方案设计研究[J].计算机应用研究,(10):61-63.
    丹尼斯,洛克著,姚冀,贺广勋,张维红译.2002项目管理[M].桂林:广西师范大学出版社.
    风险管理编写组.1994.风险管理[M].成都:西南财经大学出版社.
    樊运晓,罗云,陈庆寿.2000.承载体脆弱性评价指标中的量化方法探讨[J].灾害学,15(2):78-81.
    甘华鸣.2002.项目管理[M].中国国际广播出版社.
    郭济.2004.政府应急管理实务[M].北京:中共中央党校出版社.
    何建敏,刘春林.2005.应急管理与应急系统:选址、调度与算法[M].北京:科学出版社.
    黄诗峰.1999.洪水灾害风险分析的理论与方法研究[D]:博士.北京:中国科学院地理研究所.
    贾传亮,池宏,计雷.2005.基于多阶段灭火过程的消防资源布局模型[J].系统工程,23(9):12-15.
    计雷,池宏,陈安等.2006.突发事件应急管理[M].北京:高等教育出版社.
    金磊.1999.试论防灾预案学[J].地质勘探安全,(1):39-40.
    刘功智,刘铁民.重大事故应急预案编制指南[J].劳动保护,2004(4):25-26.
    刘彦生,杨伟.1989.双代号DCPM问题的动态规划算法.系统工程理论与实践[J].(3):6-11.
    陆立德,徐旭初.1992.防灾预案研究[J].灾害学,7(2):36-38.
    吕欣驰.2003.城市火灾等级划分和救援力量预案编制[M].公安部沈阳消防研究所.22(4):
    罗祖德.1990.灾害论[M].杭州:浙江教育出版社.276-277.
    孙颖,池宏,贾传亮.2006.路政应急管理中资源布局的混合整数规划模型[J].运筹与管理,15(5):108-111.
    商彦蕊.2000.自然灾害综合研究的新进展—脆弱性研究[J].地域研究和开发,19(2):73-77.
    佟士祺,王诺,关雷.2007.决策网络计划中决策单元结构及优化方法拓展.大连海事大学学报.33(4):65-76
    万军,汪军.2004.应急管理中的政府责任和权力综述[J].兰州学刊,(4):217-220.
    王明旭.2004.突发公共卫生事件应急管理[M].北京:军事医学科学出版社.
    魏一鸣,金菊良,杨存建,黄诗峰,陈德清.2002.洪水灾害风险管理理论[M].北京.科学出版社.
    吴宗之,刘茂.2003.重大事故应急预案分级、分类体系及其基本内容[J].中国安全科学学报,13(1).15-18.
    刑娟娟.2004.重大事故的应急救援预案编制技术[J].中国安全科学学报.14(1):57-59.
    许兆亭,孟昭威,尹燕福.2005.灭火预案编制中存在的问题及对策[J].灭火指挥与救援,24(3):333-336.
    严明疆,徐卫东.2005.地下水脆弱性评价的必要性[J].新疆地质.23(3):268-271.
    杨懋源,宋峰.对地震应急预案的科学性、可操作性和体系性的讨论[J].国际地震动态,2002(2):1-5.
    杨静,陈建明,赵红.2005.应急管理中的突发事件分类分级研究[J].管理评论.17(4):37-41.
    杨秋学,刘元珍.2000.不确定情况下DCPM的应用.太原理工大学学报.31(2):84-86
    杨旭东,孙建平,魏玉梅.2006.地下水系统脆弱性评价探讨[J].安全与环境工程,13(1):1-4.
    《运筹学》教材编写组.1990.运筹学[M].第2版.北京:清华大学出版社.
    赵红,汪亮.2004.从美国联邦应急计划看美国国家应急管理运行机制[J].项目管理技术,(1):26-30.
    赵传君.1985.风险经济学[M].哈尔滨:黑龙江教育出版社.
    赵林度.2004.基于危机资源管理的城市安全应急网络研究[J].东南大学学报(哲学社会科学版),6(4):48-51.
    赵军,刘士爱,黄旭义.2006.基于DDYGISS的城市应急联动指挥研究与实现[J].测绘科学,31(5):134-136.
    赵舒展,黄德才.2001.用遗传算法求解DCPM问题.系统工程理论方法应用.10(2):128-130.
    周治新.2006.完善应急联动系统建设有效应对突发公共事件[J].中国公共安全,(6):138-141.
    朱小奇.2004.论金融机构突发事件应急管理机制[J].求索,(7):34-36.
    Amr S.Elnashai.2006.Assessment of seismic vulnerability of structures[J].Journal of Constructional steel Research,62(11):1134-1147.
    Amy L.Luers.2005.The surface of Vulnerability:An analytical framework for examining environmental change[J].Global Environmental Change,15(3)214-223.
    Amy L.Luers,David B.Lobell,Leonard S.SEar,C.Lee Addams,Pamela A.Matson.2003. A method for quantifying vulnerability,applied to the agricultural system for Yaqui Valley[J],Mexico.Global Environmental Change 13(4):255-267.
    Andrew Stewart.2005.A contemporary approach to network vulnerability assessment[J].Network Security,2005(4):7-10.
    Andrew Blyth.2003.An XML-based architecture to perform data integration and data unification in vulnerability assessments[J].Information Security Technical Report,8(4):14-25.
    Andy Gray.2003.An historical perspective of software vulnerability management[J].Information Security Technical Report,8(4):34-44.
    Asad Tavakoli,Constance Lightner.2004.Implementing a mathematical model for locating EMS vehicles in Fayetteville,NC[J].Computers & Operations Research,31(9):1549-1563.
    Asit Kumar Patra.2006.Influence of wind speed profile and roughness parameters on the downwind extension of vulnerable zones during dispersion of toxic dense gases[J].Journal of Loss Prevention in the Process Industries,19(5):495-497.
    Barry Smit,Johauna Wandel.2006.Adaptation,adaptive capacity and vulnerability[J].Global Environmental Change,16(3):282-292.
    Berman O,Simchi-Levi D.1990.Conditional location problems on networks[J].Transportation Science,24:77-78.
    Betty Hearn Morrow.1999.Identifying and Mapping Community Vulnerability[J].Disaster,23(1):1-18.
    B.F.Alemaw,E.M.Shemang,T.R.Chaoka.2004.Assessment of groundwater pollution vulnerability and modeling of the Kanye Wellfield in SE Bostowana-a GIS approach[J].Physics and Chemistry of the Earth 29(15-18):1125-1128.
    Boppana V.Ramabrahmam,B.Sreenivasulu,Mangalam M.Mallikarjunan.1996.Model on-site emergency plan[J].Case study:toxic gas release from an ammonia storage terminal.J.Loss Prev.Process Ind,9(4):259-265.
    Boppana V.Ramabrahmam,G.Swaminathan.2005.Disaster management plan for chemical process industries.Case study:,investigation of release of chlorine to atmosphere[J].Journal of Loss Prevention in the Process Industries,13(1):57-62.
    Calvin D.Jaeger.2002.Vulnerability Assessment Methodology for chemical Facilities[J].Chemical Health & Society,9(6):15-19.
    Calvin D.Jaeger.2003.Chemical facility vulnerability assessment project[J].Journal of Hazardous Materials,104(1-3):207-213.
    C.S.ReVelle,H.A.Eiselt.2005.Location Analysis:A Synthesis and Survey[J].European Journal of Operational Research,165(1):1-19.
    Daanish Mustafa.2003.Reinforcing vulnerability? Disaster relief,recovery,and response to the 2001 flood in Rawalplndi,Pakistan[J].Environmental Hazards,5(3-4):71-82.
    David A.McEntire.2003.Searching for a Holistic Paradigm and Policy Guide:A Proposal for the Future of Emergency Management[J].International Journal of Emergency Management,1(3):298-308.
    David A.Moore,Brad Fuller,Michael Hazzan,J.William Jones.2007.Development of a security vulnerability assessment process for the RAMCAP chemical sector[J].Journal of Hazardous Materials,142(3):689-694.
    David Manuel-Navarrete,Jose Javier Gomez,Gilberto Gallopin.2007.Syndromes of sustainability of development for assessing the vulnerability of coupled human-environmental systems.The case ofhydrometeorological disaster in Center America and the Caribbean[J].Global Environmental change,17(2):207-217.
    Donegan HA,Pollock AJ,Taylor IR.1994.Egress Complexity of a building[J].In:Kashiwagi TL,Editor.Proceedings of Fourth International symposium on Fire Safety Science:601-612
    Drezner Z.1995.On the conditional p-median problem[J].Computers and Operational Research,22(5):525-530.
    Dymon,U.J.2003.An Analysis of Emergency Map Symbology[J].International Journal of Emergency Management,1(3):227-237.
    Elba Urbina and Brian Wolshon.2003.National review of hurricane evacuation plans and policies:a comparison and contrast of state practices[J].Transportation Research Part A:Policy and Practice,37(3):257-275.
    Eleftherios Iakovou,Christos Douligeris.2001.An information management system for the emergency management of hurricane disasters[J].International Journal of Emergency Management,2(3/4):243-262.
    Fraser-Mitchell JN.1994.An Object- Oriented Simulation for Fire Risk Assessment.In:Kashawaga T.Editor.Proceedings of the Fourth International Symposium of Fire Safety Science:793-804.
    Fraser-Mitchell JN.1996.The lessons Learnt During the Development of CRISPII,A Monte Carlo Simulation for Fire Assessment.In:Franks C,Grayson S.editors.Proceedings of the Seventh International Fire Science and Engineering Conference.Interflam'96:631-639.
    F.R.B.Cruz,J.MacGregor Smith,R.O.Medeiros.2005.An M/G/C/C State-dependent Network Simulation Model[J].Computers & Operations Research,32(4):919-941.
    G Barbarosoglu,Y Arda.2004.A Two-stage Stochastic Programming Framework for Transportation Planning in Disaster Response[J].Journal of Operational Research Society,(55):43-53.
    Geoffrey N.Berlin,Jon C.Liebman.1974.Mathematical Analysis of Emergency Ambulance Location[J].Socio-Economic Planning Sciences,8(6):323-328.
    GI Mould.2001.Assessing Systems for Offshore Emergency Evacuation[J].Journal of the Operational Research Society,52(4):401-408.
    Glover F.1986.Future paths for integer programming and links to artificial intelligence[J].Computer s and Operations Research,13(5):533-549.
    Guulay Barbarosoglu,Linet 6zdamar,Ahmet cevik.2004.An Interactive Approach for Hierarchical Analysis of Helicopter Logistics in Disaster Rdief Operations[J].European Journal of Operational Research,140(1):118-133.
    Gwyndaf Williams,Stuart Batho,Lynne Russell.2000.Responding to urban crisis:The emergency planning response to the bombing of Manchester city centre[J].Cities,17(4):293-304.
    Iain R.Lake,Andrew A.Lovett,Kavin M.Hiscock,Mark Beston,Aidan Foley,Gisela Sunneberg,Sarah Evers,Steve Fletcher.2003.Evaluating factors influencing groundwater vulnerability to nitrate pollution:developing the potential of GIS[J].Journal of Environmental Management 68(3):315-328.
    IUGS 滑坡研究组.1997.Quantitative risk assessment for slopes and landslides the state of art,In:Cruden & Fell(eds).Landslide risk assessment.Balkema,Rotterdam.
    Jean-Lue Wybo,Harriet Lonka.2002.Emergency Management and the Information Society:how to improve the synergy[J].International Journal of Emergency Management,1(2):183-190
    John R.Z.Abela,Cristina Aydin,Randy E Auerbach.2006.Operational the "vulnerability"and "stress" components of the hopelessness theory of depression:A multi-wave longitudinal study[J].Behavior Research and Therapy,44(11):1565-1583.
    John L.Bignell,James M.LaFave,Neil M.Hawkins.2005.Seismic vulnerability assessment of wall pier supported highway bridges using nonlinear pushover analyses[J].Engineering Structures,27(14)2044-2063.
    Ketehell N,Cole SS,Webber DM.1993.The EGRESS code for Human Movement and Behavior in Emergency Evacuation[J].In:Smith RA,Diekie JF,editors.Engineering for Crowd Safety,Elsevier:361-370.
    Kisko Tin,Francis RL.1985.EVACNET+:A Computer Program to Determine Optimal Evacuation Plans[J].Fire Safety Journal,9(2):211-220.
    Kostas G.Zografos.Analytical Framework for Minimizing Freeway-Incident Response Time [J].Journal of Transportation Engineering.1993,119(4):535-549.
    Kristin L.Laidre,Mads Peter Heide-Jorgensen.2005.Arctic sea ice trends and narwhal vulnerability[J].Biological Conservation 121(4):509-517.
    Leorch AG,Boland N,Johnson El,Nemhauser GL.1996.Finding an optimal stationing policy for the US army in Europe after the force drawdown[J].Military Operations Research,2:39-51.
    L.Jenkins.2000.Selecting Scenarios for Environmental Disaster Planning[J].European Journal of Operational Research,121(2):275-286.
    Mamnoon Jamil,Alok Baveja,Rajan Batta.1999.The Stochastic Queue Center Problem[J].Computers & Operations Research,26(14):1423-1436.
    Mafia Mavroulidou,Susan J.Hughes,Emma E.Hellawell.2004.A qualitative tool combining an interaction matrix and a GIS to map vulnerability to traffic induced air pollution[J].Journal of Environmental Management,70(4):283-289.
    Mauro Dolce,Andreas Kappos,Angelo Masi,Gregory Penelis,Marco Vona.2006.Vulnerability assessment and earthquake scenarios of the building stock of Potenza(Southern Italy)using Ialian and Greek methodologies[J].Engineering Structures,28(3):357-371.
    Michael N.Coster,Robin K.S.Hankin.2003.Risk assessment of antagonistic hazards[J].Journal of Loss Prevention in the Process Industries,16(6):545-550.
    Mohan R.Akella,Chaewon Bang,Rob Beutner,Eric M.Delmelle,Rajan Batta,Alan Blatt,Peter A.Rogerson,Glenn Wilson.2003.Evaluating the Reliability of Automated Collision Notification Systems[J].Accident Analysis & Prevention,35(3):349-360.
    Nick Brooks,W.Neil Adger,P.Mick Kelly.2005.The determinants of vulnerability and adaptive capacity at the national level and the implications for adaptation[J].Global Environmental Change,15(2):151-163.
    Oh-Sung Kwon,Amr EInashai.2006.The effect of material and ground motion uncertainty on the seismic vulnerability curves of RC structure[J].Engineering Structures,28(2):289-303
    Owen M,Galea ER,Lawrence PJ.1996.The Exodus Evaluation Model Applied to Building Evacuation scenarios.J of Fire Protection Engr,8(2):65-86.
    Ozel F.1992.Simulation modeling of human behavior in buildings[J].Simulation,58(6):377-384.
    Paola BertolazziLucio BiancoSalvatore Ricciardelli.1977.A Hypercube Queuing Model for Facility Location and Redistricting in Urban Emergency Services[J].Computers & Operations Research,4(1):1-12.
    Pon Kuban,PhD,and Heather MacKenzie-Carey,M.sc.2001.Community-Wide Vulnerability and Capacity Assessment.Ottawa.Minister of Public Works and Government services.
    Qian Wang,Rajan Batta,Joyendu Bhadury,Christopher M.Rump.2003.Budget constrained location problem with opening and closing of facilities[J].Computers & Operations Research,30(13):2047-2069.
    Qiang Gong,Rajan Batta.2007.Allocation and Reallocation of Ambulances to Casualty Clusters in a Disaster Relief Operation[J].lie Transactions,39(1):27-39.
    Raymond W.Lam M.D.,Edwin M.Tam M.D.,Lakshrni N.Yatham M.D.,I-Shin Shiah M.D.,Athanasios P.Zis M.D.2001.Seasonal depression:The dual vulnerability hypothesis revisited[J].Journal of Affective Disorders,63(1-3):123-132.
    Regina Benveniste.1985.Solving the Combined Zoning and Location Problem for Several Emergency Units[J].Journal of operational Research Society,36(5):433-450.
    Richard C.Larson.1974.A Method for Determining the Optimal Districting in Urban Emergency Services[J].Computers & Operations Research,1(I):67-95.
    Richard C.Larson,Evelyn A.Franck.1978.Evaluating Dispatching Consequences of Automatic Vehicle Location in Emergency Services[J].Computers & Operations Research,5(1):11-30.
    Robert L.Bishop,George L.Peterson and Geoffrey N.Berlin.1971.Towards a Methodology for Evaluation of Fire Protection Systems in Appalachia[J].Socio-Economic Planning Sciences,5(2):145-158.
    Robert T.Stafford.2000.Disaster Relief and Emergency Assistance Act,as amended by Public Law 106-390,October 30.
    Roger G.Johnston.2004.Adversarial safety analysis:Borrowing the methods of security vulnerability assessments[J].Journal of Safety Research,35(3):245-248.
    Ryoichi Nagai,Takashi Nagatani,Motoshige Taku Adachi.2004.Effect of exit configuration on evacuation of room without visibility[J].Physica A,343(15):712-724.
    Salif Diop.2003.Vulnerability assessments of mangroves to environmental change[J].Estuarine,Coastal and Shelf Science 58(1)1-2.
    Sarah J.Durkin,Susan J.Paxton.2002.Predictors of vulnerability to reduce body image satisfaction and psychological Wellbeing in response to exposure to idealized female media images in adolescent girls[J].Journal of Psychosomatic Research,53:995-1005.
    Saburo Ikeda.1998.Risk analysis in Japan- ten years of Sra Japan and a research agenda toward the 21st century,in:Beijing Normal University et al.Risk research and management in Asian perspective:Proceedings of the fast China-Japan conference on risk assessment and management.International Academic Publishers.
    Shams-ur Rahrnan,David K.Smith.2000.Use of Location-allocation Models in Health Service Development Planning in Developing Nations[J].European Journal of Operational Research,123(3):437.452.
    Sherali,H.D.,Subramanian,S.1999.Opportunity Cost-based Models for Traffic Incident Response Problem[J].Journal of Transportation Engineering,125(3):176-185.
    S.Menoni,F.Pergalani,M.P.Boni,V.Petrini.2002.Lifelines earthquake vulnerability assessment:a systemic approach[J].Soil Dynamics and Earthquake Engineering,22(9-12):1199-1208.
    Shams-ur Rahman,David K.Smith.2000.Use of Location-allocation Models in Health Service Development Planning in Developing Nations[J].European Journal of Operational Research,123(3):437-452.
    S.Gwynne,E.R.Galea,M.Owen,P.J.Lawrence,L.Filippidis.1999.A Review of the methodologies used in the computer simulation of evacuation from the built environment[J].Building and Environment,34(6):741-749.
    Sylvie Gourlet-Fleury,Guillaume Cornu,Sebastien Jesel,Helene Dessard,Jean-Gad Jourget,Lilian Blanc,Nicolas Picard.2005.Using models to predict recovery and assess tree species vulnerability in logged tropical forests:A case study from French Guiana[J].Forest Ecology and Management,209(1-2):69-86.
    Taylor IR.A revised Interface for Evacnet+.1996.In:Franks C,Grayson S,editors.Proceedings of Seventh International for Science and Engineering Conference,InterFlam' 96:1010-1017.
    Takahashi K,Tanaka T,Kose S.1989.An Evaluation Model for Use In fire Safety Design of Buildings[J].In:Wakamatsu T,Hasemi Y,Seizawa A,Seeger P,Pagni P,Grant C,Editors.Prideedings of the Second International Symposium on Fire Safety Science,Hemisphere:551-560.
    Williams C.1985.A.Risk management and Insurance[M].NcGraw-Hill Book Company.
    Takashi Nagatani,Ryoichi Nagal.2004.Statistical characteristics of evacuation without visibility in random walk model[J].Physica A,341(1):638-648.
    Thomas J.Cova,Justin P.Johnson.2003.A network flow model for lane-based evacuation routing[J].Transportation Research,37(7):579-604.
    T.Aoki,R.Ceravolo,A.De Stefano,C.Genovese,D.Sabia.2002.Seismic vulnerability assessment of chemical plants through probabilistic neural networks[J].Reliability Engineering and System Safety,77(3):263-268.
    Tanja Svirskis,Jyrki Korkerla,Markus Heinimaa,Jukka HUttunen,Tuula Ilonen,Terja Ristkari,Thomas McGlashan,Raino K.R.Salokangas.2005.Axis-I disorders and vulnerability to psychosis[J].Schizophrenia Research,75(2-3):439-446.
    Terje Aven.2007.A unified framework for risk and vulnerability analysis coveting both safety and security[J].Reliability Engineering and Safety,92(6):745-754.
    Yue Li,Bruce R.Ellingwood.2006.Hurricane damage to residential construction in the US:Importance of uncertainty modeling in risk assessment[J].Engineering Structures,28(7):1009-1018.
    Yi-Ming Wei,Ying Fan,Cong lu,Hsien-Tang Tsai.2004.The assessment of Vulnerability to natural disaster in China by using the DEA method[J].Environmental Impact Assessment Review,24(4):427-439.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700