首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 312 毫秒
1.
张乐  王慧敏  佟金萍 《资源科学》2014,36(2):342-350
针对干旱灾害管理中应急水资源配置问题,本文提出采取政府、企业合作储备应急水资源模式应对普遍存在的水资源供给不足情况。基于不确定的用水需求,借鉴战略库存(SES)概念,构造应急水资源的安全储备总量约束;运用经典报童模型,并引入合作激励的预支付机制,分别构建了合作与不合作下政府、企业应急水资源储备成本函数;进而以合作储备模式下政府应急水资源储备成本最小化为目标函数,构建了满足政府、企业个体理性下的应急水资源合作储备模型。以云南2010年特大干旱为例,分析了基于多情景下可变策略的政企合作储备策略优化解。本文从理论上证明了政企应急水资源合作储备模式的可行性,能够为我国干旱灾害应急管理提供一定的借鉴。  相似文献   

2.
针对干旱灾害管理中应急水资源配置问题,本文提出采取政府、企业合作储备应急水资源模式应对普遍存在的水资源供给不足情况。基于不确定的用水需求,借鉴战略库存(SES)概念,构造应急水资源的安全储备总量约束;运用经典报童模型,并引入合作激励的预支付机制,分别构建了合作与不合作下政府、企业应急水资源储备成本函数;进而以合作储备模式下政府应急水资源储备成本最小化为目标函数,构建了满足政府、企业个体理性下的应急水资源合作储备模型。以云南2010年特大干旱为例,分析了基于多情景下可变策略的政企合作储备策略优化解。本文从理论上证明了政企应急水资源合作储备模式的可行性,能够为我国干旱灾害应急管理提供一定的借鉴。  相似文献   

3.
两级应急物资储备协同预先配置优化决策研究   总被引:1,自引:0,他引:1  
《软科学》2015,(12):117-120
针对国内应急物资往往实施上下级储备统一调控的特点,构建了求解两级应急物资库存系统协同预先配置的随机混合整数规划模型。该模型利用历史数据解决了潜在灾害的不确定性,求得了突发自然灾害前两级应急物资储备仓库选址及每一选定应急物资储备库库存水平的最优解决方案,最后通过对中国西部某地区应急物资预先配置的案例研究说明了该模型的可行性及有效性。  相似文献   

4.
目前在电力企业资源管理系统、电子商务平台、电工装备智慧物联平台、电力物流服务平台和供应链运营中心("五E一中心")建设中,存在电力物资供应链数据分布相对分散、规范化和结构化程度不一等问题,影响供应链数据挖掘和能源大数据分析的准确性和有效性.从时空数据质量感知、异常数据感知、供应商信息系统标识感知等维度剖析数据感知技术在电力物资供应链数据质量管理中的应用,构建包括数据资源层、数据清洗层、数据校正层、数据分析层和可视化交互层的全面数据质量管理体系,通过基于时空相关性的多源感知数据清洗技术、基于隐藏规则挖掘的异构异常数据修复技术和基于供应商信息系统标识的全息画像认知技术,实现数据治理、问题数据自动纠错;并基于电力物资供应链生态圈全寿命周期管理发展需求,提出数据感知技术在电力物资智慧供应链延伸及拓展应用方向:从上下游对接、全链业务融合贯通及画像需求出发构建生态圈,基于多源感知能力实现信息全面互联共享,实现整个智能制造业价值链的智能应用与创新服务.  相似文献   

5.
姜霄 《科技广场》2014,(6):127-129
近年来,我国各地遭遇突发事件的频率逐渐加大,对社会稳定、人民群众生命安全和公共财产造成了极大的危害。要想降低突发事件造成的灾害损失,就必须快速有效的对这些突发事件进行应急管理。因此,本文提出从完善突发事件应急预案体系、增加应急资金投入、加强应急处置技术保障、增强应急物资储备四方面构建能使应急过程有效运行的对策体系,实现我国突发事件下应急资源的整合与优化配置,提高预防和处置突发事件的能力。  相似文献   

6.
近些年,全国各地自然灾害频发,给人们带来了巨大的人身和财产损失,其中地震灾害应急救援工作显得十分的突出,地震救援物资保障工作已经成为了一种战备化以及科学化的工作,可以说在地震灾害中,应急物流成为了灾害管理活动的基础,因此,必须要建立一套完善的应急救援物资配置系统,才能够强化应急物资保障能力,所以,本文重点对地震灾害应急救援物资配置进行了深入的探讨和研究,揭示其在地震应急管理工作中的重要作用,为进一步提高对于各种自然灾害应急能力提供相应的理论指导。  相似文献   

7.
【目的】旨在探讨大数据驱动国家矿产资源安全战略管理现代化的内在机理,为推动中国矿产资源安全战略管理实现现代化提供参考。【方法】从全球矿产资源安全战略发展与管理现状出发,揭示中国矿产资源安全面临的形势、战略管理面对的挑战与存在的问题,梳理大数据应用于矿产资源安全管理领域的理论与实践,系统论述大数据驱动国家矿产资源安全战略管理现代化的可行性、内在逻辑、基本问题与研究框架,提出主要研究议题。【结果】大数据应用于政府管理的技术、政策、经验趋于成熟,矿产资源安全数据基础良好,大数据驱动国家矿产资源安全战略管理现代化具有可行性。大数据驱动国家矿产资源安全战略管理,可以有效推动矿产资源安全战略管理主体的多元化、决策的科学化与精准化、预警与处置的协同化,系统解决中国矿产资源安全战略管理的现实问题。利用大数据驱动国家矿产资源安全战略管理现代化,核心在于解决“造”大数据与“用”大数据两大基本问题,可以从“理论分析—技术操作—对策设计”3个层面构建研究框架。【结论】大数据驱动国家矿产资源安全战略管理现代化的研究,可以进一步从夯实大数据基础、构建新型决策系统、再造体制与机制、完善政策体系等方向展开。  相似文献   

8.
基于多源信息融合可以从宏观微观两个层次无限逼近事实真相,依此作出更为科学的食品安全应急管理决策.政府大数据治理分为汇聚、融合、应用3个阶段,基于多源信息融合,从事前预防、事中处置和事后恢复应急管理过程构建大数据多源信息融合治理框架,包括治理主体、治理信息整合与主题数据库、信息共享与交换平台、信息安全管理保障等模块,分析在多源信息融合治理框架下,从政务资源整合、共享共建平台建设到信息安全管理保障的过程和实现途径.研究表明信息融合是提高食品安全应急管理能力的核心议题,是跨组织、跨部门协作的关键;政府必须基于共建共享的理念,将合作与共享纳入食品安全应急管理体系中;安全与监控体系应贯穿政府大数据融合过程,通过技术工具和数据标准实现数据安全保障.  相似文献   

9.
[目的/意义]智慧应急需要数据驱动和情报赋能。社会诉求数据来源于公众意愿、观点和要求的表达,具备巨大潜在应急管理价值。[方法/过程]立足情报视角,采用多案例研究方法,从应急流程和应急支撑两个层面,剖析北京市、成都市、广州市3个案例城市在抗击新型冠状病毒肺炎疫情期间基于社会诉求数据的应急管理实践,探究开发社会诉求数据的情报价值运用于智慧应急管理的路径。[结果/结论]社会诉求数据经由一体化智慧采集、多层级智慧分析、全阶段智慧应用实现情报价值转化,该流程嵌入突发事件风险感知、风险评估、风险应对,由此情报流和业务流融合,实现了基于社会诉求数据的智慧应急。此外,多主体协同、大数据和智能技术主导的信息技术、多元制度为社会诉求数据智慧应急价值的实现提供支撑。案例城市基于社会诉求数据的智慧应急体系已初步形成,且构建了全主体参与、全过程治理的新型情报生产和应用模式,但社会诉求数据运用于智慧应急管理的情报资源观还有待进一步确立。  相似文献   

10.
我国技术灾害政府应急管理机制存在技术灾害应急管理的法律保障体系有待完善、技术灾害应急预警机制不健全、技术灾害应急管理联动机制缺乏、技术灾害应急管理信息系统落后、技术灾害评估与保障机制不健全等问题.应从健全技术灾害应急管理法律法规体系、健全技术灾害应急管理的预警机制、建立综合指挥协调机制、构建信息共享与发布机制、完善技术灾害评估与保障机制等方面努力完善技术灾害政府应急管理机制.  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

13.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

14.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

15.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

16.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

17.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

18.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号