The Application of Fuzzy Comprehensive Evaluation Method in Mine

Article Preview

Abstract:

Mine is a high-risk industry and the security will have a direct impact on its reputation, economic and employees survival. In recent years, frequent coal mine accidents have caused enormous social and economic losses. Conducted scientifically and systematically, safety can eliminate harmful risk factors, reduce the occurrence of the accident and improve the security of enterprise management level. So, it is especially important to safety evaluation for the coal industry. There are many risk factors in the production process of coal mine and the factors analysis is the premise of safety evaluation. Researchers evaluated the safety status of mine by fuzzy comprehensive evaluation measure. The study was discussed on the main five factors, including personnel of condition, environmental factors, security management, coal comprehensive conditions and emergency rescue system. Establishing eighteen single factor index layer and getting the index weight values by fuzzy analytic hierarchy. Using the expert evaluation method for the 18 single factors and drawing their membership vector. Finally, combing the evaluation index and weights, it can get a general level to a coal mine in Heilongjiang by fuzzy comprehensive evaluation. Finally, analyzing the practical of this method and give some advises to these analysis results.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

757-761

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] J. Joy. Occupational safety risk management in Australian mining. Vol. 4 (2004), p.314.

Google Scholar

[2] Li Zhihong, Niu Baojiang: Shanxi Coal. (2008), p.80.

Google Scholar

[3] B.N. singh: Coal International. Vol. 5 (2003), p.26.

Google Scholar

[4] Jiang Deyi, Zhang Chuanyan, Xi Shenggang: Mining safety and environmental protection. Vol. 2 (2008), p.58.

Google Scholar

[5] Xu Mangui, Liang Nianxing, Bao Yintan: Journal of Xi'an University of Science and Technology. Vol. 2 (2013), p.136.

Google Scholar