The Application of the Thought of Controlling of Source Dangers on the Analysis and Discussion of Coal Mine Hazards Management

Article Preview

Abstract:

This paper analyzes the dialectical relationship between the hazards and risks to find out the common things of ways and methods to control them and then analyze and discuss several classification of sources of danger to propose specific ways and methods to management of coal hazards. On this basis, we design and develop appropriate management system of coal hazards, in order to achieve effective management of risks.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 524-527)

Pages:

3202-3205

Citation:

Online since:

May 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zhaowei Wang and Honglu Yu.The dialectical relationship on the hazards and risks. Modernization of coal mine.2006(4)

Google Scholar

[2] Pengcheng Sui,Zhibao Chen. Security Principles [M].Beijing:Chemical Industry Press, 2005, 4

Google Scholar

[3] JinBo, Zhibao Chen. Systems Security Engineering [M].Northeast Institute of Technology Press,(1992)

Google Scholar

[4] Tianshui Chen,Hongxia Li. The frequent coal mine accidents from the theory of three sources of danger [J].China Safety Science Journal,2007,17(1):10-15

Google Scholar

[5] Tianshui Chen,Hongxia Li. A few humble opinion on the third type of hazard and dangerous source. Scientific theory and practice of security [A]. Beijing Institute Of Technology Press, 2005:11~15

Google Scholar

[6] Tianshui Chen. The third category of hazard identification and control [D]. Beijing: Beijing Institute Of Technology [D],2001.7

Google Scholar

[7] Guochuan Zhang,Yufeng Guo. Hazards and control measures of coal production and technology management in the "three violations" [J].ZhongZhou Coal. 2007. (3).92-93.

Google Scholar

[8] Deren Zhan. How to reduce the "three violations" phenomenon in the coal mine.Security. 2007.(11).42-45.

Google Scholar