Next Article in Journal
Combined Potential of Quarry Waste Fines and Eggshells for the Hydrothermal Synthesis of Tobermorite at Varying Cement Content
Previous Article in Journal
Impact of Bioethanol Concentration in Gasoline on SI Engine Sustainability
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Dynamic Security Assessment Method for Ironmaking Plants Based on Cloud-Edge Collaboration in Reconstructed Networks

1
School of Electronic and Information Engineering, University of Science and Technology Liaoning, Anshan 114051, China
2
Computing and Networking Convergence Innovation Laboratory, Liaoning Communications Administration, Shenyang 110036, China
*
Author to whom correspondence should be addressed.
Sustainability 2024, 16(6), 2399; https://doi.org/10.3390/su16062399
Submission received: 10 January 2024 / Revised: 9 February 2024 / Accepted: 13 February 2024 / Published: 14 March 2024

Abstract

:
Security assessment of ironmaking plants is one of the crucial means to promote their sustainable development. However, the disparate nature of subsystems within these plants, along with network inconsistencies and isolated data, obstruct a thorough and timely security assessment. At the same time, it is impossible to achieve the sustainable development goals of reducing the adverse impact of safety on the environment, ensuring economic benefits and the health of employees. This study addresses the complexities of heterogeneous networks, disparate systems, and segregated data that are prevalent in traditional ironmaking plants; and a method to reconstruct the plant’s network and execute security assessments is proposed. This method involves coupling existing systems with new ones to create comprehensive data and resource pools by aggregating information from diverse sources. Subsequently, employing multiple regression models and optimized neural network models at the edge and central cloud facilitates dynamic assessment of security concerns. This method enables concurrent consideration of both regional and overall security analysis and decision-making within the plant. Through simulation testing of 27 functionalized module indicator datasets over the preceding 12 months at a specific ironmaking plant, the efficacy of the proposed theoretical methods and technological approaches in constructing security systems for ironmaking plants is substantiated.

1. Introduction

As an important industrial facility, ironmaking plants consume a lot of resources in the production process and have an impact on the environment. Security assessment not only involves personnel safety, but also focuses on equipment operation, chemical use, and waste treatment. Through reasonable security assessment and management, the risk of interruption to production can be reduced, the loss and cost can be reduced, and the continuity and stability of production can be ensured. At the same time, the negative impact on the environment can be minimized, the waste of resources can be reduced, and the sustainable development of the environment can be protected. In addition, a safe working environment can improve employee productivity, reduce the incidence of work-related injuries and occupational diseases, and ensure the health and safety of employees; thus, there is a positive impact on the sustainable development of enterprises. However, heterogeneous networks, disparate systems, and segregated data within ironmaking plant networks pose significant challenges to security assessments. Consequently, there is an urgent need to surmount the impediments posed by the independent isolation of network systems and data in these plants, and to build an integrated IIoT fusion scheme for a comprehensive evaluation of regional and overall plant security issues. Nonetheless, the prevailing research indicates constraints in the current methods of security assessment in these plants.
Despite some progress in recent years in developing dynamic safety assessment methods for ironmaking plants, existing research still faces significant limitations that, from a scientific perspective, urgently need to be addressed through more in-depth and comprehensive studies. These limitations primarily include insufficient assessment indicators, oversimplified method designs, and relatively subjective assessment results. For instance, the research conducted by Jianhou Gan et al. [1] introduced an intelligent monitoring network for coking processes based on Internet of Things (IoT) technology in Zigbee mesh cluster networks, which focused mainly on forming a perception layer network. Although this study provided a new perspective for monitoring the coking process, it was mainly limited to the construction of the perception layer and failed to consider a multidimensional set of safety assessment indicators comprehensively, resulting in a less comprehensive assessment system. In their study, Liu Wei et al. [2] focused on safety factors in iron transportation, and devised a comprehensive iron transport behavior safety monitoring system. While this system made progress in enhancing safety monitoring for specific production processes, its design was still confined to specific production processes and failed to establish an integrated safety architecture, limiting its application in the full process of safety assessment of iron manufacturing. Zhu Junjie et al. [3] proposed an emergency prevention and control system based on neural networks, utilizing Keras deep learning models for facial recognition, which significantly improved the level of enterprise in emergency prevention and control. However, although the system performed well in emergency situations, it was overly specialized for regular safety assessment and management, especially in evaluating safety performance in dynamic and complex environments; this overlooked the dynamic and systemic nature of the safety assessment process. In summary, while previous works have provided valuable perspectives and technical support for the safety assessment of ironmaking plants, they still lack a comprehensive, in-depth, and integrated safety assessment system, especially in the face of increasingly complex production environments and variable safety threats. Therefore, this paper aims to overcome these limitations in existing research by developing a dynamic safety assessment method for ironmaking plants based on cloud-edge collaboration. This offers a more comprehensive, profound, and dynamic safety assessment framework.
These studies demonstrate the innovative use of IoT and AI technologies in enhancing the security of ironmaking plants. However, their designs often focus narrowly on individual production areas without integrating a broader, enterprise-wide industrial IoT framework. This lack of a unified approach highlights a gap in current research, particularly the absence of a robust IoT architecture foundational for comprehensive security assessments. Furthermore, existing studies on security assessment in ironmaking plants show limitations. For instance, Shirali et al. [4] explored the interplay between security spending and operational performance but did not offer a method for real-time security evaluation. Nazaripour et al. [5] developed a Customized Predictive Risk Index (CPRI) to forecast accidents from 350 unsafe observations, providing valuable insights into accident prediction but not encompassing overall security assessment. Wu Qibing et al. [6] proposed a security assessment model focusing on the impact of various factors on security, utilizing the Analytic Hierarchy Process (AHP) for determining the weight of indicators. However, this approach’s credibility is undermined by its limited indicators and simplistic evaluation methodology. Miao Xiaoyu et al. [7] introduced an early warning model for security production, employing a detailed hazard assessment for major risks in the industry and fuzzy logic for result interpretation; yet the subjective nature of its outcomes persists. Lastly, Wang Biao et al. [8] offered a dynamic security risk assessment model that identifies and evaluates risks dynamically within industrial enterprises. Although this marks a step forward, it still requires advancements in data processing for comprehensive security analysis. These findings indicate a pressing need for a more integrated, dynamic, and technologically sophisticated approach to security assessment in the ironmaking industry, addressing the current research’s limitations and the subjective nature of existing evaluation methods. Although this model captures dynamic security situations in enterprises, there is room for improvement in computer data processing principles.
Overall, the construction of ironmaking plant security systems has undergone three developmental stages: architecture, single-system design, and whole-system design. However, there is currently no mature construction scheme for overall design. The deficiency in security assessment research in ironmaking plants lies in the scarcity, lack of specificity, overly simplistic design, and the relatively subjective nature of assessment results; this necessitates more in-depth research.
To address these deficiencies, this study proposes a cloud-edge collaboration reconstructed network method for dynamic security assessment evaluation in ironmaking plants. This method involves edge intelligence upgrades, coupling of decomposed functionalized modules, and other means to reconstruct the ironmaking plant’s network infrastructure, forming a new cloud-edge system. At the edge, leveraging heterogeneous network data enables comprehensive analysis and processing, designing multivariate regression analysis models suitable for the actual security conditions in ironmaking plants, effectively addressing security issues encountered by various subsystems. At the central cloud, employing particle swarm optimized BP neural networks facilitates assessing and monitoring security situations. Compared to existing research, this method significantly enhances comprehensive and timely security monitoring and evaluation in ironmaking plants, holding substantial importance for accident prevention and security emergency responses.

2. Materials and Methods

2.1. Ironmaking Plant Dynamic Security Assessment System Design

Traditional Ironmaking Plant System and Network Reconstruction

Traditional ironmaking plants revolve around blast furnaces and encompass multiple associated systems such as the blast furnace system, feeding and loading system, pulverized coal injection, air supply system, iron slag treatment system, gas dust removal system, slag treatment, and gas dust removing, among others [9]. However, control systems within these traditional plants operate in a relatively dispersed and independent manner, and lack interactive information and behavioral influence. This disjointedness presents a challenge to allowing these systems to effectively collaborate. Concurrently, data pertaining to the ”people” component, which includes both management and operational staff; the “things” component, covering equipment, products, and infrastructure; and the “environment” component, addressing both the production and natural environments, have not been consolidated with the pertinent data associated with the ironmaking production system. As a result, comprehensively assessing overall security based on the various system operations within existing ironmaking production becomes intricate. Figure 1 depicts a simplified diagram of the traditional ironmaking production process.
Construction methods, standards, and technology implementation in traditional ironmaking plants vary, leading to a network characterized by heterogeneous integration and ubiquity. To integrate heterogeneous networks and multiple-source heterogeneous data, network reconstruction involves the following steps:
Step 1: Construction of an intelligent monitoring and security warning wireless sensor network. In the ironmaking plant dynamic security assessment system, the sensor network covers critical areas of the ironmaking plant to monitor temperature, pressure, humidity, gas concentrations, and other essential parameters. These sensors collect and transmit real-time data, aiding in understanding the factory’s operational status promptly. In case of potential security risks, they rapidly issue alerts, enabling immediate countermeasures to be taken. This sensor network not only monitors equipment operation and identifies normal functioning but also provides historical data records [10], facilitating post-event analysis and tracing, and effectively preventing potential faults and accidents. The wireless sensor network is composed of a 5G Radcap network, Zigbee network, Bluetooth network, and Wifi network. Each network terminal is connected to the data collection (DC) gateway, and further connected to the multisource heterogeneous fusion monitoring platform of the central cloud through the IoT gateway, as shown in Figure 2.
Step 2: Pooling of systems and device data collection through IoT gateways. In traditional ironmaking production processes, the fixed hardware leads to the formation of fixed production patterns within systems [11]. Constructing new systems by mobilizing hardware resources becomes challenging and fails to meet diverse requirements. Leveraging wireless sensor networks, hardware resources of various functionalized modules are decoupled from the original fixed system through IoT gateways or protocol bridging. These resources are integrated into the plant’s equipment resource pool via gateways or established protocols, and controlled and combined uniformly by the central cloud server. This enables the fusion of heterogeneous devices in the plant and provides flexibility in hardware deployment. The integrated hardware resources form a “hardware resource pool”, enabling application construction on the resource pool and facilitating dynamic hardware resource allocation.
The hardware systems in the device pool can be controlled and implemented by intelligent Industrial Control Systems (ICS) under edge cloud nodes of various subsystems based on the plant’s security status. Automatic notifications are triggered when the system detects signs of abnormalities or declining equipment performance. In case of a security incident in the ironmaking plant, without affecting production operations, the system flexibly coordinates the original functionalized modules, reconfiguring a targeted ironmaking plant security accident response system in a coordinated manner.
Data collection is critical for the construction of the dynamic security assessment system [12]. Terminal sensors of the system collect three types of data: equipment status (ES), measurement data (MD), and operation data (OD). These foundational data are generated by sensors of wireless networks integrated by gateway devices. The gateway simultaneously collects data from various physically connected functionalized modules and requires monitoring during the equipment production process. These data include equipment operating time, start–stop frequency, and equipment status; as well as temperature, humidity, gas concentrations, and other fundamental measurement data. Periodically, the gateway reads, processes, stores, and displays data at set time intervals. This is depicted in Figure 3.
The security status data of all functionalized modules and equipment in the ironmaking plant are processed by the data acquisition gateway, and the data are uniformly uploaded to the cloud platform through the Message Queuing Telemetry Transport (MQTT) interface protocol of the Internet of Things gateway. Data visualization occurs through the monitoring display page of the cloud platform and is stored in the central cloud backend server, forming a vast “data pool”. This “data pool” provides local access at the edge, enabling mathematical model analysis to explore correlations and patterns hidden in the data, enhancing localized security within the ironmaking plant. Simultaneously, at the central cloud, it serves as the data source for artificial neural network models, forming the basis for an overall security assessment of the ironmaking plant. For instance, in the case of an electric motor, this study collects measurement data including current, voltage, temperature; and operational data such as operating time and start–stop frequency, and real-time data on the motor’s status. Based on fuzzy algorithms or expert learning methods, a score is assessed to reflect the equipment’s security condition, yielding a single output indicative of the overall motor security. Finally, this derived data is encapsulated and uploaded to the cloud platform. Thus, on the cloud platform, instead of raw data such as voltage, current, start–stop counts, or operational statuses, what we obtain is a sole data point directly reflecting the equipment’s security status. By monitoring equipment, personnel, and environmental statuses via gateways and wireless sensor networks, the IoT system can identify signs of possible equipment failures, and predict potential faults in advance, avoiding sudden security incidents. This method is data-driven, relying on a large amount of historical performance and real-time monitoring data. It not only reduces the likelihood of security incidents but also enhances equipment availability, enabling the ironmaking plant to operate more safely and steadily.
Step 3: Construction of a multisource heterogeneous network dynamic security assessment system. Traditional security management systems focus solely on parameters closely related to the ironmaking plant’s production process. The safety dynamic perception assessment system, as described in this paper for the ironmaking plant area, is specifically designed to surveil systems integral to the ironmaking production process. It does so by leveraging frameworks in “human resource management”, “materials and facilities management”, and “environmental management”; succinctly termed “people”, “things”, and “environment”, respectively. The system’s core aim is to accurately capture and convey state information pertinent to potential hazards. This method constructs an ironmaking plant dynamic security assessment system using technologies such as the Internet of Things, edge computing, and artificial neural networks. The system architecture is depicted in Figure 4.
Firstly, the production-related systems of the ironmaking plant, as well as the non-production-related systems, are disassembled into functionalized modules. Subsequently, through gateways, the heterogeneity among various system devices is integrated, relationships between functionalized modules are analyzed, and they are coupled with each other. Real-time data are collected from various terminals and uploaded to the central cloud, forming a pool of usable data, functionalized modules, and equipment pools. By establishing the coupling relationship between the “Iron Production Related Systems” and the “Non-Iron Production Related Systems”. Device, material, and process data from major systems are aggregated via wireless sensor networks and IoT gateways, forming a multisource heterogeneous network system.
Step 4: Construction of an integrated cloud-edge-end platform. Ironmaking production consists of the blast furnace body system and a series of auxiliary systems, characterized by a “one center, multiple subsystems” feature [13], aligning with the edge computing architecture. To alleviate substantial pressure on the central cloud server caused by the wireless sensor network uploading massive data, a distributed security perception platform with high computing speed, accurate data processing, and decisive decision-making capabilities was designed during the ironmaking plant dynamic security assessment system. This platform consists of an edge service management platform deployed in the central cloud and a Multi-Access Edge Computing (MEC) node deployed in the edge cloud. It integrates the core control parts of the original systems in the ironmaking plant production process with the new “Person”, “Things”, and “Environment” IoT systems into the newly added MEC nodes. By utilizing MEC for managing individual system nodes while integrating them into the ironmaking plant’s edge service management center in the central cloud, information among the original systems is shared and controlled.
By integrating the core control functionalities of the cloud platform into newly added edge cloud nodes to construct an edge cloud platform, a system environment composed of computation, storage, and applications is formed in the edge cloud. This setup breaks down the barriers to information sharing among various functionalized modules through interaction between edge clouds, facilitating collaborative linkage and resource sharing, enabling prompt local processing within the system [14]. The system’s design assumes a “plus” pattern, vertically achieving control of the original subsystems and interacting with the central cloud for information exchange while horizontally communicating and collaborating with peer core control subsystems. Through both vertical and horizontal interconnections, it reduces data transmission relay and processing time, decreases end-to-end latency, and eases network bandwidth pressure. On the one hand, it achieves connectivity from the end to the edge computing node and the cloud. On the other hand, MEC nodes connect with each other, breaking information exchange barriers, forming an edge information exchange network, ensuring data flow and closed-loop control [15]. MEC nodes, as intermediate links between terminal gateways and clouds, not only realize intelligent control within functionalized modules vertically but also upload data to the cloud platform for overall decision-making, providing robust support for constructing the overall security assessment system of the ironmaking plant. The cloud-edge-end three- layer architecture deployment is shown in Figure 5.

2.2. Establishment of Security Assessment Index System

Ensuring security within the factory area is imperative to preempt security incidents within the ironmaking plant [16]. Beyond averting conventional security issues associated with production equipment, it is vital to proactively mitigate potential hazards arising from personnel and materials to prevent their escalation into accidents [17]. In this study, the “Dynamic Safety Risk Assessment Model for Industrial Enterprises” [8] was adopted and appropriately modified within the framework of a novel system developed to tackle the dynamic safety assessment issues prevalent in ironmaking facilities. A comprehensive safety assessment indicator system was constructed, enabling the identification and specification of entities requiring evaluation, along with their pertinent evaluation metrics. Through the extraction of safety-related state data pertaining to these entities from the data repository, a thorough analysis was performed to assess potential hazards and the nature of their impact on the overall system safety. The culmination of this process was the formulation of a detailed safety analysis table, as delineated in Table 1.
In order to eliminate the influence of the scale between the indicators, the raw data need to be normalized so that the indicators are in the same order of magnitude to facilitate comprehensive comparative evaluation. The formula is as follows:
R j = R j m i n R j m a x R j m i n R j
where R j is the j th indicator value, m i n R j and m a x R j are the minimum and maximum values of the j th indicator respectively and a raw value R j is mapped to the value R j in the interval [0, 1] by max-min normalization.
The subsequent step involves calculating the following risk assessment indicators based on the data from the security analysis table:
  • Calculate the equipment hazard factor k 1
Equipment hazard factor calculation formula:
k 1 = N u m b e r   o f   e q u i p m e n t   d e f e c t s × 5 %
2.
Calculate the environmental hazard factor k 2
Environmental hazard factor calculation formula.
k 2 = N u m b e r   o f   e n v i r o n m e n t a l   d e f e c t s × 5 %
3.
Judgment of the substance hazard factor k 3 ,
Referring to the “Industrial Enterprise Dynamic Security Risk Assessment Model” [8] we list the substance risk factors were divided into five categories: A, B, C, D, and E, and the evaluation is shown in Table 2.
4.
Unsafe people behavior k 4
5.
Number of personnel k 5
6.
Duration of hazardous exposure E
7.
Security management level C 1
8.
System’s automatic control risk capability C 2
9.
Computation of the intrinsic security level h s , which encompasses the efficacy in averting accidents at their source through diverse means. The assessment evaluates intrinsic security levels from three perspectives: primarily, people as pivotal in achieving intrinsic security within an enterprise; secondly, things as the guarantor of intrinsic security; and lastly, the environment as a driver for intrinsic security within an enterprise. This multidimensional evaluation of security intrinsic levels is depicted in Figure 6 and Figure 7.
According to the risk points of the intrinsic safety level, the combinations of safety levels are then listed out, as in Table 3.

2.3. Overall Process of Dynamic Security Assessment System

The production processes within the ironmaking plants encompass various hazardous factors spanning high temperatures, high pressures, toxicity, and harmfulness; thus, multiple extensive hazard sources are engendered [18].

2.3.1. Security Perception Process

During the routine operational phase within the ironmaking plant, the security assessment system, leveraging data alterations across diverse subsystems, generates instantaneous risk assessments through mathematical models deployed at the edge cloud and artificial neural network models operating at the central cloud. This iterative process continually disseminates warning notifications or emergency directives. The specific operational sequence involves:
Step 1: Real-time surveillance by IoT gateways encompassing functionalized modules across various subsystems to verify the equipment status, measurement data and operation data. Anomalies trigger alarms, leading to localized interventions. Under normal circumstances, local security assessments are conducted to ascertain the security status of functionalized modules.
Step 2: If deemed safe, data are transmitted to the multisource heterogeneous convergence monitoring platform and the security assessment platform. Conversely, if considered unsafe, data are relayed to the respective subsystem’s MEC to evaluate its impact on subsystem security.
Step 3: Subsystem MEC analysis determines the security impact. If no adverse impact is discerned, localized interventions are triggered; otherwise, data are transferred to the edge service management platform for assessment of the factory’s overall security.
Step 4: Evaluation by the edge service management platform concludes non-impact on security or potential impact; corresponding localized interventions or security assessments ensue.
Step 5: The security assessment platform determines emergency control necessity. If warranted, it disseminates security emergency operation strategies to the edge service management platform, which then allocates specific measures to subsystem MECs. Subsequently, the ICS module is scheduled for execution based on received security emergency strategies.
Step 6: Post-execution, the system resumes monitoring the status, measurement data, and operational parameters of each terminal. The comprehensive system perception and evaluation process are depicted in Figure 8.

2.3.2. Security Assessment Process

Dynamic security assessment within the factory area necessitates comprehensive data fusion processing of pertinent events, entailing the identification of correlations across temporal, spatial, and procedural dimensions. The assessment process can be delineated into several pivotal steps (as delineated in Figure 9).
Step 1: Decomposition of objects and checklist formulation. The overarching system is segmented into subsystems, with a comprehensive checklist developed for each, to ascertain the requisite depth and scope of analysis.
Step 2: Data preprocessing and readiness. Upon aggregating an extensive dataset, pertinent information is extracted concerning the primary systems of the ironmaking process, alongside data from the human–material–environment nexus within the ironworks. These crucial data, which are integral to the safety protocols of the ironworks, are subjected to rigorous preprocessing to ensure their readiness for in-depth analysis.
Step 3: Deployment of analytical engines. Employing a suite of analytical tools, including anomaly detection, event analysis, correlation, and metadata analysis engines, the analysis synthesizes empirical data with industry-specific accident trends to evaluate system impacts and potential risks, facilitating scenario prediction through analogical reasoning.
Step 4: Identification of hazard sources and safety analysis compilation. Leveraging signal analysis methodologies, subsystem models, diagnostic rules for equipment, and fault data annotation, the framework identifies potential hazards that might precipitate system failures, material damages, or personal injuries. Through algorithmic processing, it delineates accident archetypes, extracts anomalies/metadata pertinent to safety incidents within the ironworks, and compiles a detailed safety analysis report.
Step 5: Safety evaluation and diagnosis via a dual-level cloud-edge assessment framework. This phase entails the execution of safety assessments and diagnostic procedures, culminating in the formulation of evaluative outcomes, through a nuanced cloud-edge safety assessment model.
Step 6: Categorization of fault types and prioritization for remedial action. This entails the enumeration and classification of fault types based on their potential impact on the system, followed by a stratification according to severity, to facilitate a prioritized approach towards mitigation and prompt resolution.
Step 7: Industrial control system (ICS) scheduling reflective of safety awareness and alert levels, accompanied by the implementation of emergency safety interventions. This final step involves the strategic scheduling of ICS operations, grounded in an acute awareness of safety and predefined alert thresholds, with a proactive stance towards the enactment of emergency safety measures.

2.4. Ironmaking Plant Edge Security Assessment Model Design

2.4.1. Construction of the Ironmaking Plant Edge Security Assessment Model

A multivariate regression analysis method is employed at the periphery of the ironmaking plant to select pertinent independent variables and establish a regression model. The principal steps are as follows.
1. Determination of independent and dependent variables: Independent variables encompass the count of equipment hazard factor, environmental hazard factor, substance hazard factor, unsafe people behavior, number of personnel, duration of hazardous exposure, security management level, system’s automatic control risk capability. The dependent variable is the “Comprehensive Security Index at the Ironmaking Plant Edge”.
2. Data collection and preprocessing: Relevant data are sourced from the system’s “data pool” and undergo preprocessing operations such as data cleansing, filling missing values, and handling exceptional data points.
3. Model fitting: A regression equation is formulated, employing regression analysis methods, assuming a sample of ‘ n ’.
The independent variable of the ‘ i ’-th sample is X i = x 1 , x 2 . . . , x p   and the dependent variable is Y i . The regression equation can be expressed as:
Y i = β 0 + β 1 x 1 + β 2 x 2 + . . . β p x p + ε i
Here, β 0 , β 1 , β 2 , , β p represents the regression coefficients. ‘ P ’ in the regression equation refers to the number of independent variables. ε i  is the error term, assumed to conform to a normal distribution and be independently and identically distributed.
4. Model evaluation: The least squares method is used for estimating model parameters. Regularization techniques are applied to prevent overfitting. Model performance is gauged using cross-validation and Mean Squared Error (MSE) to ascertain predictive capabilities.
5. Model application: The established multivariate regression model is deployed for prediction and decision-making in the edge cloud. This includes assessing the security status of managed areas at the edge and taking measures to mitigate hazardous accidents within specific time frames.

2.4.2. Edge Cloud Model Parameterization and Performance Evaluation Based on Multiple Linear Regression

We utilized a multiple regression model for data collection related to security assessment in ironmaking plants and estimated model parameters using the least squares method. This method minimizes the sum of squared errors and provides reliable estimates for model parameters. During this process, the following assumptions are made:
1. Independence and identically distributed (IID) assumption: Sample data concerning ironmaking plant security are independently and randomly drawn from a population and should be identically distributed.
2. Linearity assumption: The independent variable is linearly related to the dependent variable.
3. Normality Assumption: The error term follows a normal distribution.
4. Homoscedasticity Assumption: The error term maintains constant variance.
The formula for minimizing the sum of squared residuals is represented by Equation:
m i n β 0 , β 1 , , β p i = 1 n ( y i y ^ i ) 2
where y i denotes the actual observed value, y ^ i denotes the value predicted by the model, ‘ n ’ denotes the sample size, and ‘ p ’ denotes the number of independent variables.
The multiple regression model for the ironmaking plant security perception data collection stage is given by Equation:
y ^ = β 0 + β 1 x 1 + β 2 x 2 + + β p x p + ϵ
where y ^ denotes the predicted value of the dependent variable, β 0 denotes the intercept, β 1 β 2 β P denotes the coefficient of the independent variable, x 1 x 2 x p denotes the dependent variable, and ϵ denotes the error term.
Moreover, ridge regression is employed to forestall overfitting issues. Cross-validation is utilized for model evaluation and optimization. The ridge regression objective function is represented by Equation:
J ( w ) = 1 2 n i = 1 n ( y i y ^ i ) 2 + λ | | w | | 2 2
where ‘ w ’ is the vector of regression coefficients, λ is the regularization intensity parameter, and | w | | 2 2 is the L2 paradigm square of the vector of regression coefficients.
By minimizing the objective function, the ridge regression coefficient estimation formula is given by Equation (8):
w ^ = ( X T X + λ I ) 1 X T y
where ‘ I ’ is the unit matrix. ‘ X ’ is a design matrix which contains the data of the independent variables for all the samples. Each row represents a sample and each column represents an independent variable.
Finally, K-fold cross-validation was employed to assess the model’s performance and generalizability. The parameter vector β was derived by employing the least squares method, which was applied to the multiple linear regression model.
To achieve optimal parameter estimation, the objective was to minimize the sum of squared residuals, represented as:
m i n θ | | y X θ | | 2
where ‘ X ’ represents the design matrix containing all sample features, and θ denotes the parameter vector.
The solution using the least squares method yields the closed-form solution of θ as:
θ = ( X T X ) 1 X T y
Here, ( X T X ) 1 X T signifies the pseudoinverse matrix, attainable through matrix decomposition.
Ultimately, the obtained parameter vector θ is reintegrated into the model, formulating the multiple linear regression equation:
y = θ 0 + θ 1 x 1 + θ 2 x 2 + · · ·   + θ n x n
Here, θ 0 is the intercept term, while θ 1 , θ 2 , , θ n represents the coefficients associated with independent variables. This equation predicts dependent variable values based on inputting feature values of independent variables.
This process elucidates the construction of the multiple linear regression model at the ironmaking plant’s edge. Based on the described equations, parameter estimates are derived as:
β ^ 0 = y ¯ β ^ 1 x ¯ 1 β ^ 2 x ¯ 2 β ^ 3 x ¯ 3 β ^ 4 x ¯ 4 β ^ 5 x ¯ 5 β ^ 6 x ¯ 6 β ^ 7 x ¯ 7 β ^ 8 x ¯ 8 β ^ 1 = i = 1 n ( x i 1 x ¯ 1 ) ( y i y ¯ ) i = 1 n ( x i 1 x ¯ 1 ) 2 β ^ 2 = i = 1 n ( x i 2 x ¯ 2 ) ( y i y ¯ ) i = 1 n ( x i 2 x ¯ 2 ) 2 β ^ 3 = i = 1 n ( x i 3 x ¯ 3 ) ( y i y ¯ ) i = 1 n ( x i 3 x ¯ 3 ) 2 β ^ 4 = i = 1 n ( x i 4 x ¯ 4 ) ( y i y ¯ ) i = 1 n ( x i 4 x ¯ 4 ) 2 β ^ 5 = i = 1 n ( x i 5 x ¯ 5 ) ( y i y ¯ ) i = 1 n ( x i 5 x ¯ 5 ) 2 β ^ 6 = i = 1 n ( x i 6 x ¯ 6 ) ( y i y ¯ ) i = 1 n ( x i 6 x ¯ 6 ) 2 β ^ 7 = i = 1 n ( x i 7 x ¯ 7 ) ( y i y ¯ ) i = 1 n ( x i 7 x ¯ 7 ) 2 β ^ 8 = i = 1 n ( x i 8 x ¯ 8 ) ( y i y ¯ ) i = 1 n ( x i 8 x ¯ 8 ) 2
Each β ^ j is an estimated measure of the influence of the independent variable x j on the dependent variable ‘ y ’. These coefficients are calculated by minimizing the sum of squared differences between the actual observations and the model’s predictions, known as the least squares method. Specifically:
β ^ 0 is the intercept term, representing the expected value of the dependent variable ‘ y ’ when all the independent variables x 1 , x 2 x p are zero.
β ^ 1 , β ^ 2 β ^ p are slope coefficients, representing the expected change in ‘ y ’ for each unit increase in the corresponding independent variable.
Where y ¯ is the sample mean of the dependent variable ‘ y ’, and x ¯ 1 , x ¯ 2 , x ¯ 3 , x ¯ 4 , x ¯ 5 , x ¯ 6 , x ¯ 7 , x ¯ 8 are the sample means of x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 , respectively. x ¯ i is the sample mean of the ‘ i ’-th independent variable.
This method of calculation can address potential collinearity issues in the model and provides stable coefficient estimates when there is a high degree of correlation among the independent variables. Additionally, these formulas are also used to prevent overfitting when there are few data points, ensuring the model has good predictive performance and interpretability.
Finally, leveraging the estimated parameters, the multiple regression equation forecasts the evaluation index of security incidents at the ironmaking plant.
y = β ^ 0 + β ^ 1 x 1 + β ^ 2 x 2 + β ^ 3 x 3 + β ^ 4 x 4 + β ^ 5 x 5 + β ^ 6 x 6 + β ^ 7 x 7 + β ^ 8 x 8
When provided with values for equipment and facility defects, operational environment defects, hazardous exposure duration, and unsafe human behavior, this equation computes the corresponding number of security incidents at the ironmaking plant.

2.4.3. Establishment and Optimization of a Multivariate Regression Model for Comprehensive Security at the Edge Cloud of an Ironmaking Plant

By introducing multiple regression models and interaction terms, the edge cloud constructs a more accurate model for the safety data collection stage of the ironmaking plant for the safety assessment of the ironmaking plant. This model is principally aimed at forecasting crucial variables such as the security assessment index associated with the ironmaking facility.
The target variable, designated as ‘ y ’, signifies the security assessment index attributed to the ironmaking plant. It encompasses independent variables x 1 to x 8 , which respectively correspond to equipment hazard factor, environmental hazard factor, substance hazard factor, unsafe people behavior, number of personnel, duration of hazardous exposure, security management level, system’s automatic control risk capability. ε  symbolizes the error term. The formulated edge cloud regression model is outlined as follows:
y = β 0 + β 1 x 1 + β 2 x 2 + β 3 x 3 + β 4 x 4 + β 5 x 5 + β 6 x 6 + β 7 x 7 + β 8 x 8 + ε
For this model, the resolution of the following system of equations is imperative:
y β 0 β 1 x 1 β 2 x 2 β 3 x 3 β 4 x 4 β 5 x 5 β 6 x 6 β 7 x 7 β 8 x 8 = 0 y β 0 β 1 x 1 β 2 x 2 β 3 x 3 β 4 x 4 β 5 x 5 β 6 x 6 β 7 x 7 β 8 x 8 x 1 = 0 y β 0 β 1 x 1 β 2 x 2 β 3 x 3 β 4 x 4 β 5 x 5 β 6 x 6 β 7 x 7 β 8 x 8 x 2 = 0 y β 0 β 1 x 1 β 2 x 2 β 3 x 3 β 4 x 4 β 5 x 5 β 6 x 6 β 7 x 7 β 8 x 8 x 3 = 0 y β 0 β 1 x 1 β 2 x 2 β 3 x 3 β 4 x 4 β 5 x 5 β 6 x 6 β 7 x 7 β 8 x 8 x 4 = 0 y β 0 β 1 x 1 β 2 x 2 β 3 x 3 β 4 x 4 β 5 x 5 β 6 x 6 β 7 x 7 β 8 x 8 x 5 = 0 y β 0 β 1 x 1 β 2 x 2 β 3 x 3 β 4 x 4 β 5 x 5 β 6 x 6 β 7 x 7 β 8 x 8 x 6 = 0 y β 0 β 1 x 1 β 2 x 2 β 3 x 3 β 4 x 4 β 5 x 5 β 6 x 6 β 7 x 7 β 8 x 8 x 7 = 0 y β 0 β 1 x 1 β 2 x 2 β 3 x 3 β 4 x 4 β 5 x 5 β 6 x 6 β 7 x 7 β 8 x 8 x 8 = 0
Matrices can represent this system of equations:
X β = y
where ‘ X ’ denotes the n × 9 matrix, with the initial column comprising a column vector filled with ones, representing the intercept, followed by eight columns embodying independent variables x 1 x 8 . ‘ n ’ denotes the count of observed samples, β represents the coefficient vector (9 × 1), and ‘ y ’ denotes the vector of dependent variables ( n × 1).
Employing the least squares method to solve this system of equations yields the coefficient vector as follows:
β = [ 12.725 , 0.186 , 0.134 , 0.156 , 0.017 , 0.203 , 0.223 , 0.145 , 0.116 ]
Once the coefficient vector β is determined, this model can forecast the comprehensive security index attributed to the ironmaking plant. To enhance the accuracy of predictions, augmenting the volume of data collection while continuously adjusting model parameters is essential.
Within this framework, the quantity of equipment defects, operational environment deficiencies, material imperfections, duration of exposure to hazards, incidence of unsafe practices among staff, overall workforce size, efficacy of safety management protocols, and the system’s automated control proficiency for mitigating risks profoundly influence the ironmaking plant’s overarching safety index. The predictive efficacy of the multivariate regression model hinges on the linear relationships between independent variables and the selection thereof. Consequently, comprehensive data analysis and meticulous variable selection during the model establishment phase are pivotal to ensure robust predictive and explanatory capabilities within the model.
R-squared values (R2) and Mean Squared Error (MSE) are utilized for model evaluation. R2 signifies the extent to which independent variables explicate the dependent variable, varying between 0 and 1, where values closer to 1 denote stronger explanatory power within the model. On the other hand, MSE indicates the scale of the model’s prediction error, with smaller values denoting enhanced predictive capability.
In terms of model optimization, methodologies such as cross-validation and regularization are implemented. Cross-validation assists in evaluating the model’s generalization and circumvents issues of overfitting or underfitting. Regularization techniques such as ridge regression and Lasso regression avert excessive complexity in the model, mitigating overfitting concerns.

2.5. Establishment and Algorithm Design of the Ironmaking Plant Security Assessment Central Cloud Model

2.5.1. Construction Process of Particle Swarm Algorithm-Optimized Artificial Neural Network Model

The security model implemented in the ironmaking plant integrates an Artificial Neural Network (ANN) deployed within the central cloud. This ANN model, drawing from previous expertise, engages in the identification, analysis, and comprehension of various subsystems within intricate systems. Subsequently, it updates the status information of the system and undertakes an iterative process to comprehend, analyze, and formulate an overall assessment of the system’s security [19]. The system employs the gathered indicator data from the aforementioned “data pool” as inputs to the neural network and uses the resulting assessment values as anticipated outputs for training purposes. By harnessing its memory functionality, the neural network generates evaluation values when re-input with identical data, thereby reflecting the security condition of the plant, catering to predictive needs [20].
Neural network models exhibit outstanding capabilities in managing vast datasets, integrating data for comprehensive analysis, adapting to new information, and detecting anomalies, which render them exceptionally suitable for evaluating safety in the intricate settings of steel plants that involve data from multiple, diverse sources.
Initially, our consideration spanned decision trees, random forests, support vector machines, and autoregressive integrated moving average models. However, neural network models present several advantages over these alternatives:
  • Comprehensive management of large and diverse data: Neural networks are adept at processing and integrating information from a broad array of sensors and data sources, which is an essential capability for the extensive analysis of surveillance footage and sensor data in steel plant safety evaluations.
  • Automatic feature extraction: Neural networks can autonomously learn and extract high-level features from large datasets, adeptly handling complex data and patterns suitable for the analysis of images, videos, and high-dimensional sensor data.
  • Dynamic adaptation and continuous learning: Properly trained neural networks exhibit excellent generalization to unseen data, continually learning and adapting post-deployment. This ensures that, once trained, the model is well equipped to manage new and unforeseen safety risks; this is crucial for dynamically evolving industrial settings.
  • Flexibility and scalability: Neural network models can be customized and scaled to meet the intricate and variable requirements of steel plant environments.
  • Enhanced predictive power: Deep learning models are particularly effective at identifying non-linear relationships and patterns in data; this is crucial for anticipating future safety incidents and identifying potential hazards.
In conclusion, neural network models are adept at navigating the complexities and dynamics of steel plant environments, proficiently identifying and predicting safety risks. This positions them as a potent and adaptable instrument for assessing safety situations in steel plants.
Regarding the optimization of neural network weights, a fusion of the particle swarm optimization (PSO) algorithm, which is notable for its global search capabilities; and the back-propagation (BP) algorithm, which is recognized for its robust local search capabilities, is employed. This amalgamation aims to leverage their individual strengths to enhance the neural network’s generalization and learning capacities, ultimately boosting predictive accuracy [21]. The PSO algorithm, an evolutionary computing optimization algorithm, operates with ‘ n ’ particles randomly distributed in an ‘ d ’-dimensional space. The ‘ i ’-th particle’s position in the ‘ d ’-dimensional space, denoted by X i = ( x i 1 , x i 2 x i d ) , serves as an independent variable input into the fitness function. The current fitness value for f ( X i ) is derived.
The velocity of particle ‘ i ’ is symbolized as V t = ( v t 1 , v t 2 v t d ) , encompassing the particle’s position and velocity components in ‘ m ’ dimensions. P b e s t i = ( p i 1 , p i 2 p i d ) signifies the best position experienced by particle ‘ i ’, while G b e s t i = ( g i 1 , g i 2 g i d ) represents the best position encountered by the entire population. Generally, in ‘ d ’-dimensional space, the search range for particles is confined within a certain [ X M I N , X M A X ], and the velocity’s change range is constrained within predefined [− V M I N , V M A X ].
Throughout iterations, the update of particle flight speed and position ensues via individual and global best values. The formula for updating the ‘ i ’-th dimension of particle ‘ d ’ velocity is as follows:
V i d k = w V i d k 1 + c 1 r 1 ( P b e s t i X i d k 1 ) + c 2 r 2 ( G b e s t i X i d k 1 )
The formula for updating the ‘ i ’-th dimension of particle ‘ d ’ position is expressed as:
X i d k = X i d k 1 + V i d k 1
Here, ‘ w ’ represents the inertia weight, used to adjust the search range within the solution space. ‘ c 1 ’ and ‘ c 2 ’ denote acceleration constants regulating the maximum learning step size. ‘ r 1 ’ and ‘ r 2 ’ are random functions within the range [0, 1], enhancing the search’s randomness.
The neural network will undergo training for the ironmaking plant’s security-associated ‘ h ’ index using particle swarm optimization, wherein the BP error function ‘ e ’ serves as the PSO optimization function [22]. Each parameter from the optimization results will be allocated to the initial weights and thresholds of the BP neural network. Employing the PSO algorithm for optimizing the initial weights and thresholds of the neural network can accelerate convergence. Iterations within the group will focus on computing the minimum error.
Specifically, the error calculation formula will act as the optimization function for the PSO algorithm. Through group iterations, the minimum error will be determined. This minimum error will be utilized within the BP neural network as the minimum error for back-propagation, enabling the training of weights and thresholds between network layers for optimization. If the corresponding energy function (related to the activation function in the PSO algorithm) remains unchanged within a specific number of evolutionary generations, the BP algorithm will be utilized for local optimization. If the resulting energy function is lower after the BP algorithm intervention compared to the previous one, the outcomes from the BP algorithm will be considered the best position in the PSO algorithm. Otherwise, the results obtained by the BP algorithm will replace the worst position in the PSO algorithm. This iterative process continues until the specified evolutionary generation is reached. The training process of the neural network is delineated as follows:
Step 1: Network initialization occurs, assigning random numbers within the range (−1, 1) as initial values for various connection weights. An error function ‘e’ is defined, alongside the number of learning cycles ‘n’.
Step 2: ’k’ samples are randomly selected, and their corresponding outputs are utilized as the training set for the neural network, x ( k ) = x 1 ( k ) , x 2 ( k ) , , x n ( k ) , d o ( k ) = ( d 1 ( k ) , d 2 ( k ) , , d q ( k ) ) , where x ( k ) represents the input vector, and d o ( k ) signifies the expected output vector.
Step 3: Involves computing the inputs and outputs of each neuron in the hidden layer using the following formulas:
h t n ( k ) = t = 1 n w t h x t ( k ) b h , h = 1,2 , , p
h o h ( k ) = f ( h i h ( k ) ) , h = 1 , 2 ,   , p
  y i o ( k ) = h = 1 p w h o h o h ( k ) b o , o = 1,2 , , q
y o o ( k ) = f ( y i o ( k ) ) , o = 1,2 , , q
Here, h i h k represents the input to the hidden layer, h o h k is the output of the hidden layer, y i o k denotes the input to the output layer, y o o k represents the output of the output layer, w i h indicates the connection weights between the input layer and the hidden layer, b h signifies the threshold of each neuron in the hidden layer, w h o denotes the connection weights between the hidden layer and the output layer, and b o is the threshold of each neuron in the output layer. f ( x ) represents the activation function.
Step 4: Involves computing errors based on expected and actual outputs, followed by error back-propagation. The back-propagation utilizes the gradient descent method, initially computing the partial derivatives of the error function for each neuron in the output layer:
φ w h o = φ y f o γ f φ w h o
y i o ( k ) w h o = ( Σ h p w h o h o h ( k ) b o ) w h o
e y i o = ( 1 2 Σ o = 1 q ( d o ( k ) y o o ( k ) ) 2 ) y i o
e h i h ( k ) = ( 1 2 Σ o = 1 q ( d o ( k ) y o o ( k ) ) 2 ) h o h ( k ) h o h ( k ) h i h ( k )
Step 5: Involves adjusting the weights and thresholds of each connecting layer’s neurons using the error partial derivatives:
Δ w h o ( k ) = μ e w h o = μ δ o ( k ) h o h ( k )
w h o N + 1 = w h o N + ϑ δ o ( k ) h o h ( k )
Δ w i h ( k ) = μ e w i h = μ e h i h ( k ) h i h ( k ) w i h = δ h ( k ) x i ( k )
w i h N + 1 = w i h N + ϑ δ h ( k ) x i ( k )
After updating the weights and thresholds, the global error is recalculated:
E = 1 2 m k = 1 m o = 1 q ( d o ( k ) y o ( k ) ) 2
Finally, the algorithm checks if the error meets the required standard. If the error attains the predefined accuracy or the learning cycles exceed the maximum set count, the algorithm concludes; otherwise, it returns to the third step to initiate the subsequent learning cycle.

2.5.2. Simulation of Neural Network Evaluation Model

We designed a three-layer BP neural network to accomplish the dynamic security assessment of the ironmaking plant. The specific configuration includes: an input layer with 6 nodes, a hidden layer with 27 nodes, and an output layer with 2 nodes employing the Sigmoid activation function. The BP network was trained using the gradient descent with momentum and adaptive learning rate algorithm (‘traingdx’).
The PSO learning factors were set as c 1 = 1.49445 and c 2 = 1.49445. The maximum weight for the PSO algorithm was set to W S = 0.9, and the minimum weight to W e = 0.4. The PSO algorithm employed a population size of 40, and conducted 100 iterations for optimization, with a maximum optimization speed V M A X = 1 and a minimum optimization speed V M I N = −1. The particle search space was within [−5, 5]. The neural network underwent 1000 training ‘ e p o c h s ’ with a learning rate I r = 0.01 and a training goal of minimizing the error to ‘goal’ = 0.000001. The fitness curve of the particle swarm optimization BP neural network obtained through Matlab2020a software is shown in Figure 10. From the graph, we observed effective convergence in 57 iterations for the hybrid neural network model optimized by the particle swarm optimization algorithm.
Based on the aforementioned neural network model and the combined particle swarm optimization algorithm, incorporating data collected from the ironmaking plant, the training of the neural network was conducted. Figure 11 demonstrates the prediction error curve of the PSO−BP neural network.
To further validate the effectiveness of the PSO neural network in the security assessment of the ironmaking plant, this study compared the output results of the network predictions between the PSO neural network and the traditional BP neural network. The comparison of network prediction outputs is shown in Figure 12.
From Figure 10, Figure 11 and Figure 12, the experimental results confirm that, relative to the traditional BP neural network, the output results of the hybrid neural network optimized by the PSO algorithm exhibit better performance, requiring fewer iterations, demonstrating lower errors, achieving higher precision in the security perception assessment of the ironmaking plant, and yielding more favorable outcomes.
Finally, we compared the prediction errors of the two types of neural networks. As illustrated in Table 4, the particle swarm optimization (PSO) neural network demonstrates reduced mean squared errors.

3. Results

3.1. Evaluation of Comprehensive Safety Model for Edge Cloud Part of Ironmaking Plant

This model was finally utilized to predict new data for assessing the comprehensive security index of the ironmaking plant. The least squares method was applied to solve the equation represented as follows:
β = ( X T X ) 1 X T y
Here, β represents a column vector encompassing the intercept and coefficients of independent variables, ‘ X ’ denotes the design matrix, and ‘ y ’ signifies the column vector of dependent variables.
Based on the data we have collected, we can construct ‘ X ’ and ‘ y ’ and use the NumPy library in Python3.6 to perform matrix calculations to solve for the coefficients of the model. See Appendix A for detailed procedures.
In this representation, the first item represents the intercept, while the subsequent eight items signify the coefficients of independent variables. These coefficients can be substituted into the model to derive the final regression model for the edge-side comprehensive security index:
Edge-side comprehensive security index = 9.998 + 0.241 × equipment hazard factor + 0.277 × environmental hazard factor + 0.221 × substance hazard factor + 0.384 × duration of hazardous exposure − 1.081 × unsafe human behavior − 0.334 × number of personnel + 0.336 × security management level − 0.270 × system’s automatic control risk capability.
This regression model incorporates eight independent variables and is suitable for evaluating the comprehensive security index of the ironmaking plant’s edge cloud management area. Through this regression model, we gain deeper insights into variable relationships and leverage it for predicting and analyzing future data, thereby offering substantial support for decision-making.
This model can be employed to evaluate the comprehensive security production index of the ironmaking plant’s edge cloud based on diverse indicators. Focused on accident indicators (preventive, occurrence, or accident equivalent), the security production index incorporates data from the past 12 months of the ironmaking plant’s edge-side coverage area into the regression model. Analytical calculations are conducted as necessary to scientifically evaluate and analyze security production trends. The mathematical representation for the security production index is:
Y = ( R 1 / R 0 ) × 100
where, ‘ Y ’ denotes the vertical comparative index (year-on-year index), reflecting the continuous improvement level of security production (accidents) in the company or local region. ‘R’ signifies the industry security production characteristic index or comprehensive index; ‘ R 1 ’ represents the index for the current year, and ‘ R 0 ’ symbolizes the reference (comparative) index (previous year index, base year index, or average index of the last ‘n’ years).
Moreover, this model is instrumental in analyzing the extent of impact that various indicators have on the comprehensive security index of the ironmaking plant’s edge cloud, thereby identifying the indicators with the most significant impact on security index; thus a scientific basis for ironmaking plant security management is provided.

3.2. Application of Optimized Neural Network Algorithm in Security Assessment of Central Cloud in Ironmaking Plant

3.2.1. Application of Optimized Neural Network

The dynamic security assessment by the central cloud of the ironmaking plant mandates comprehensive consideration of data collected from various terminal gateways and the interrelation between the ironmaking process system and the “People”, “Things”, and “Environment” systems. This study extracted security data from the designed data pool for various segments and functionalized modules within a year and employed statistical methods to analyze these security data to statistically determine the number of hazard modes occurring in various systems throughout the year. It identified equipment and material defect counts using the equipment defect analysis method. The operational environment defect count was determined by statistical analysis of data collected from the environment system within the people, things, and environment systems, extracting equipment log information to calculate the hazard exposure duration.
Calculate the hazard index ‘h’ for each functionalized module according to formula:
h = h s ( 1 + k 1 ) ( 1 + k 2 ) ( 1 + k 3 ) ( 1 + k 4 ) ( 1 + k 5 )
After calculation, the risk assessment indicators for each system are shown in the Table 5.
1. Input layer: The input layer encompasses eight indicators: equipment hazard factor, environmental hazard factor, substance hazard factor, unsafe people behavior, number of personnel, duration of hazardous exposure, security management level, system’s automatic control risk capability, with a node count of 8. An input matrix of 8 rows and 297 columns was constructed by truncating the eight classes of indicators for 27 functionalized modules per month, forming the neural network training set, as depicted in Table 6.
The calculated hazard index ‘h’ was transformed into a numerical matrix of 1 row and 297 columns, serving as the expected output for the neural network training set, as depicted in Table 7.
The data for the 27 functionalized modules in the 12th month were utilized as the test set for testing, as illustrated in Table 8.
Due to the different dimensions of the constructed training and test sets, normalization was performed to ensure data consistency, normalizing each indicator data within the range of (0, 1).
2. Hidden layer: To ensure accuracy in training and shorten training time, the number of neurons in the hidden layer was chosen as 16, with the activation function between neurons selected as the ‘Sigmoid’ function.
f x = 1 1 + e x
The training was set for 1000 epochs, with a learning rate of 0.01 and a target minimum error of 0.000001.
3. Output layer: The neural network output resulted in a hazard index ‘h’ for 27 functionalized modules, with a dimension of 1. The output numerical matrix scale ranged between (0, 1), necessitating reverse normalization to obtain data for the system’s hazard index ‘h’.
Upon training and testing the neural network, real-time hazard index ‘h’ for each functionalized module can be obtained. However, the hazard index of each functionalized module alone cannot serve as a basis for evaluating the system’s security level. Further calculations are necessary to reflect the overall system’s security condition. Nonetheless, the application of neural networks streamlines the processing of a large volume of collected indicator data into hazard index data reflecting functionalized modules, facilitating subsequent overall system security perception.
Algorithmically computed, the hazard indices for 27 functionalized-modules in the test set for the 12th month are displayed in Table 9.

3.2.2. Implementation of Security Assessment in the Ironmaking Plant

Step 1: Calculating the overall system hazard index ‘H’.
Predicted hazard indices ‘h’ from the neural network cannot independently serve as a basis for evaluating the system’s security level. To further assess the system’s security level, the hazard index ‘H’ needs computation according to the following formula:
H = i = 1 N h i n i / i = 1 N E i n i
where h i is the hazard index for functionalized modules, n i is the number of functionalized modules, and E i is the exposure duration of risks. By calculation, the calculated hazard index for the example demonstrated in this study is  H = 14,154.65 2517.55 = 5.6224 .
Step 2: Evaluating the ironmaking plant’s risk control capability ‘C’.
This involves a comprehensive assessment of the ironmaking plant personnel’s integrated security management level ‘ C 1 ’ and the ironmaking plant system’s automated risk control capability ‘ C 2 ’ on a percentage basis. By conducting surveys based on the study from the enterprise risk control assessment table for various systems, a score is given for the enterprise risk control capability C = C 1 + C 2 . In this experiment, the ironmaking plant’s risk control capability is assumed to be C = 66 .
Step 3: Calculating the ironmaking plant’s control capability B ( k ) .
The specific formula for calculating the control capability index is:
B ( k ) = α C β H
Within this context, α and β are constants, with α = 0.068 and β = 0.55 .
This control index is used to represent the dynamic changes in the enterprise’s risk level. When B ( k ) is greater than 0, it indicates an increase in the system’s risk level, whereas if B ( k ) is less than 0, it signifies a decrease in the system’s risk level. After calculation, based on the experimental data mentioned earlier, the index for the ironmaking plant’s control capability is B ( k ) = 1.40 .
Step 4: Calculating the Initial Security Risk Level of the Enterprise S ( K 1 ) .
The initial security risk level of the enterprise can be calculated using the following formula:
S ( K 1 ) = G l n 1 P
where: ‘ G ’ is a constant (10), and ‘ P ’ is the rate of injuries per thousand employees. Assuming the ironmaking plant’s injury rate is 3/1000, the initial security risk level of the ironmaking plant is 58.09. In the context of safety within ironmaking plants, a higher injury rate per thousand personnel is indicative of a lower initial safety risk level.
Step 5: Calculating the comprehensive security risk level of the enterprise S ( K ) .
The specific formula for calculating the comprehensive security risk level is:
S ( K ) = S ( K 1 ) + B ( k )
After calculation, the comprehensive security risk level for this experiment is S ( K ) = 59.49 .
Upon performing these five steps of calculation, the results of the system’s security risk level are tabulated in Table 10.
Step 6: Division of security risk level.
The security risk level is categorized as shown in Table 11 below.
S 1 and S 2 are interval critical values, calculated by the following formulas:
S 1 = 60 G ln 1 + 1 2 M P ( 1 + 1 + 4 M P )
S 2 = 60 G ln 1 + 1 2 M P ( 1 1 + 4 M P )
where: ‘ M ’ is the actual number of employees, ‘ P ’ is the expected rate of injuries per 1000 employees. Assuming the enterprise has 3500 employees, with an expected injury rate of 0.002, after calculation, S 1 = 67.912 and S 2 = 63.725 . However, the comprehensive risk level of our system is S = 59.49 , indicating an inadequate level.
Through neural network predictions and security risk value calculations, the risk level of the ironmaking plant’s environment can be determined. If the relative security risk level is low, it is necessary to analyze the security analysis table to identify the abnormal indicator data leading to a lower security risk level and conduct an analysis of potential faults or possible faults. Upon analyzing the results, commands are issued through the constructed edge IoT service management system to control or repair the fault areas. Through the aforementioned series of operational steps, the realization of ironmaking plant security assessment and response to security incidents can be achieved.
Neural network models enhanced with PSO exhibit notable performance advancements in safety perception assessment tasks within steel manufacturing environments, outshining conventional approaches such as standard neural networks, decision trees, or support vector machines. This section delves into the distinctive improvements and underscores the benefits of utilizing such models:

Comparative Analysis of Prediction Outcomes

  • Accuracy: Models refined by PSO consistently achieve superior prediction accuracy. This enhancement stems from PSO’s ability to unearth optimal solutions within the parameter space—solutions that may be bypassed during traditional training methodologies.
  • Generalization Capability: PSO-enhanced models demonstrate an augmented ability to generalize. This is attributed to the PSO algorithm’s promotion of a comprehensive parameter search during the optimization phase, which effectively minimizes the propensity for overfitting.
  • Convergence Efficiency: In certain instances, PSO-refined neural network models reach optimal solutions more swiftly. This efficiency is a result of the PSO algorithm directing the search with a collective intelligence approach, thereby circumventing the pitfalls of local optima that plague conventional methods.

Advantages and Rationale behind the Model

  • Parameter Optimization: The PSO algorithm excels in fine-tuning neural networks’ weights and biases by mimicking the communal behaviors observed in bird flocks. This strategy surpasses traditional gradient descent methods in avoiding local optima traps.
  • Adaptability: Boasting remarkable versatility, the PSO algorithm can tackle a wide array of optimization challenges. In the context of safety perception assessments in steel mills, where data often exhibit complex nonlinear patterns, PSO’s global search capability proves invaluable.
  • Implementation and Adjustability: Unlike more intricate optimization algorithms, PSO is straightforward to implement, with intuitive parameter adjustments. This accessibility enables model developers to tailor models effectively to specific predictive scenarios.
  • Robustness: PSO-optimized neural networks are characterized by their robustness, maintaining consistent performance despite minor variations in input data. This stability is due to PSO’s consideration of multiple solution avenues during optimization, bolstering the model’s resilience to uncertainties.
In summary, neural network models optimized via particle swarm optimization stand out in safety perception assessment within steel mills, offering enhanced prediction accuracy, generalization, and convergence rates over traditional models. These benefits are primarily linked to PSO’s global search capability, its adaptability in processing complex data, and the straightforward, robust nature of its implementation. Consequently, PSO-optimized neural network models emerge as a formidable tool in managing intricate, nonlinear prediction tasks.

4. Discussion

In this study, we innovatively proposed a dynamic safety assessment method for iron-making plants, integrating cloud-edge collaboration technology. This method effectively achieves efficient data integration and processing through network reconstruction technology. Compared to the centralized platform concept of the Industrial Internet of Things proposed by Cong Liqun et al. [23], the highlight of our study lies in emphasizing safety perception assessment at the edge layer and data analysis processing through cloud technology, significantly enhancing response efficiency and the accuracy of safety risk assessment. Utilizing a particle swarm optimized neural network model, our study surpasses traditional models in aspects such as prediction accuracy, generalization ability, and convergence speed. Compared to the platform design concept based on the Internet, cloud computing, and big data analysis proposed by Zhou Xiaoge et al. [24], our model not only emphasizes the importance of information collection and data processing but also enhances the global search capability and adaptability to complex data processing through the particle swarm optimization algorithm. Additionally, this study validated the effectiveness and feasibility of the proposed method through a 12-month simulation test on 27 functional module indicators within a specific ironmaking plant. Compared to the safety production accident risk early warning model for steel enterprises proposed by Dang Guangyuan [25], our model achieves a more comprehensive safety perception and assessment, reducing reliance on subjective experience and significantly improving the accuracy of safety assessment. Although Junjie Wang et al. [26] proposed a neural network-based method for assessing the safety of building structures that could effectively predict the safety levels of structures with the advantage of rapid and mass processing, by introducing the particle swarm optimization algorithm, our research further improves the model’s prediction accuracy and convergence speed in dealing with complex nonlinear problems. Miao Xiaoyu [7] discussed the application of cloud computing in safety management of iron-making plants, and our study further expands the application scope of cloud computing by constructing a cloud-edge collaborative architecture, significantly improving the timeliness of data processing and the efficiency of safety assessment. Valentina Casola et al. [27] proposed a new model for cloud-edge collaborative resource allocation for the Industrial Internet of Things, introducing new ideas in resource allocation, cost, performance, and security strategies. However, our study, by comprehensively utilizing multivariate regression analysis and artificial neural networks, not only achieves real-time data collection and monitoring but also conducts in-depth analysis of safety risks and predictions, providing a more comprehensive safety assessment and risk management solution for ironmaking plants. Bouafia Abderraouf et al. [28] researched a dynamic safety assessment method that offers improvement options for the safety of EMS. In contrast, our study, by adopting a cloud-edge collaborative framework and software-defined networking technology, achieves more flexible and efficient safety assessments, especially performing better in dynamic environments.
In summary, by adopting novel technical means and methods, this study opens new vistas for dynamic safety assessment and risk management in ironmaking plants, significantly contributing to enhancing the safety production level and management efficiency of ironmaking plants.

5. Conclusions

This investigation adeptly addressed the prevalent issues of network heterogeneity and data isolation in ironmaking facilities through a comprehensive network reconstruction. On this foundation, it introduced a cutting-edge framework for dynamic security perception assessment, leveraging cloud-edge collaboration.
  • Incorporating intelligent monitoring and safety-alerting wireless sensor networks alongside IoT gateways, the research innovatively reengineered the ironmaking plant’s multisource heterogeneous network system. This reengineering facilitated device pooling and data acquisition. Moreover, it established a multisource heterogeneous security perception system coupled with a cohesive cloud-edge platform, markedly bolstering security assessment capabilities. Additionally, this study devised a bespoke set of safety assessment indicators and a tailored security assessment procedural framework specific to ironmaking operations.
  • Utilizing a synergistic cloud-edge strategy, the study employed multisource linear regression models at the edge cloud for localized safety concerns, and at the central cloud, it harnessed particle swarm optimized artificial neural network models to address complex safety issues spanning the entire facility. This approach not only reinforced safety management and mitigated potential risks but also furnished a holistic perspective for tackling safety analysis challenges at both regional and plant-wide levels.
  • The practicality and efficacy of the proposed methodology were corroborated through a 12-month simulation trial of functionalized module indicator data within a select ironmaking plant. The outcomes affirmatively indicated that this methodology outperforms conventional safety systems in ironmaking facilities, especially in enhancing response velocity, the stability of intelligent manufacturing systems, and the overall breadth and promptness of safety monitoring and evaluation.
The study underscores the imperative for dynamic security perception assessments in ironmaking plants to be a continual, rigorously monitored, evaluated, and refined process to foster the long-term progression of these facilities. Future research endeavors will concentrate on augmenting data integrity to minimize false alarms and omissions, and on refining algorithms and technologies to elevate the precision and dependability of safety perception assessments within ironmaking environments, thereby advancing safety standards. The methodologies and findings of this paper offer novel insights and methodologies for the conception and enhancement of safety frameworks in ironmaking plants, presenting viable strategies for realizing more intelligent and secure iron production processes.
Moreover, the research outputs detailed in this document have been acknowledged through the awarding of two invention patents, specifically, “An Ironmaking Plant Management System and Its Architecture Method Based on Edge Internet of Things” (Patent No.: ZL202111194007.8, Authorization No.: CN 114,118,678 B, Authorization Date: 2023.10.27, Certificate No.: 6432615) and “Ironmaking Plant Security Situation Awareness Method Based on Edge Internet of Things Technology and Neural Network” (Patent No.: ZL202111194017.1, Authorization No.: CN114048952 B, Authorization Date: 17 February 2023, Certificate No.: 5741725). These accolades not only underscore the paper’s significant contribution to addressing security challenges in ironmaking plants through a dynamic cloud-edge collaborative approach but are also a testament to its empirical validation and patent recognition.

Author Contributions

Conceptualization, J.B. and X.C.; designed the study, J.B.; methodology, J.B.; software, J.B.; writing—original draft preparation, J.B.; data curation, X.C.; project administration, X.C.; funding acquisition, X.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the National Science Foundation China (Project No. 71571091 and No. 71771112).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

This thesis involves information from the production data of a steel plant, we promised the steel plant step not to disclose the relevant data.

Acknowledgments

The authors are grateful to Xuebo Chen, whose thesis guidance I benefited greatly and acknowledgement.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Python Copy code:
import numpy as np
Construct design matrix X and column vector y
X = n p . h s t a c k ( ( n p . o n e s ( ( l e n ( d f ) ,   1 ) ) , d f [[‘equipment hazard factor’, ‘environmental hazard factor’, ‘substance hazard factor’, ‘Duration of hazardous exposure’, ‘Unsafe people behavior’, ‘Number of personnel’, ‘Security management level’, ‘System’s automatic control risk capability’]]. v a l u e s ) )   y = d f [‘Comprehensive Security Index‘]   . v a l u e s . r e s h a p e ( 1 ,   1 )
Solve for model coefficients using the least squares method b e t a = n p . l i n a l g . i n v ( X . T . d o t ( X ) ) . d o t ( X . T ) . d o t ( y )   p r i n t ( b e t a )
Executing the above code yielded the model’s coefficients: [[ 9.99817223] [ 0.24062024] [0.2769353] [0.22103358] [0.38395215] [−1.08123768] [−0.33388078] [0.33633435] [−0.27044071]]

References

  1. Gan, J.; Wang, X.; Zhou, J.; Tang, L.; Yuan, L. Intelligent Monitoring Network Construction based on the utilization of the Internet of things (IoT) in the Metallurgical Coking Process. Open Phys. 2018, 16, 656–662. [Google Scholar] [CrossRef]
  2. Liu, W. Research on the Safety Monitoring System of Molten Iron Transportation Behavior Based on the Internet of Things. Master’s Thesis, University of Science and Technology Liaoning, Liaoning, China, 2019. [Google Scholar]
  3. Zhu, J. Steel enterprise emergency prevention and control system based on neural network face recognition. Metall. Autom. 2020, 44 (Suppl. S1), 110–112. [Google Scholar]
  4. Shirali, G.; Salehi, V.; Savari, R.; Ahmadiangali, K. Investigating the effectiveness of safety costs on productivity and quality enhancement by means of a quantitative approach. Saf. Sci. 2018, 103, 316–322. [Google Scholar] [CrossRef]
  5. Nazaripour, E.; Halvani, G.; Jahangiri, M.; Fallahzadeh, H.; Mohammadzadeh, M. Safety performance evaluation in a steel industry: A short-term time series approach. Saf. Sci. 2018, 110, 285–290. [Google Scholar] [CrossRef]
  6. Wu, Q.; Liu, Z. Evaluation model and application of ironmaking plant based on fuzzy hierarchy comprehensive method. Chin. J. Saf. Sci. 2008, 10, 136–140. [Google Scholar]
  7. Miao, X. Design and Application of Early Warning and Evaluation Model for Safety Production in an Ironmaking Plant. Master’s Thesis, Harbin Institute of Technology, Harbin, China, 2018. [Google Scholar]
  8. Wang, B.; Liu, J.; Xu, H.; Lv, L. Application of dynamic safety risk assessment model of industrial enterprises in safety risk management and control of a steelmaking plant. Ind. Saf. Environ. Prot. 2020, 46, 11–16. [Google Scholar]
  9. Fan, J.; Gao, Y. Research on VBA-based auxiliary system for safe operation of HMI in blast furnace ironmaking. Metall. Manag. 2020, 1, 3–5. [Google Scholar]
  10. Caiza, G.; Sanz, R. Digital Twin to Control and Monitor an Industrial Cyber-Physical Environment Supported by Augmented Reality. Appl. Sci. 2023, 13, 7503. [Google Scholar] [CrossRef]
  11. Fujiki, S. On the Construction and Operation of the Kimitsu Iron Works. Trans. Iron Steel Inst. Jpn. 1970, 10, 302–321. [Google Scholar] [CrossRef]
  12. Jin, Y.; Zhang, X. Safety culture construction measures and highlights of Angang Ironmaking Plant. Metall. Econ. Manag. 2020, 5, 46–48. [Google Scholar]
  13. Caulfield, J. Kehoe Iron Works: Industrial strength makeover. Build. Des. Constr. 2018, 3, 25–29. [Google Scholar]
  14. Lema, D.G.; Rubén, U.; García, D.F. Low-cost system for real-time verification of personal protective equipment in industrial facilities using edge computing devices. J. Real-Time Image Process. 2023, 20, 111. [Google Scholar] [CrossRef]
  15. Aljubayrin, S.; Aldehim, G.; Alruwais, N.; Mahmood, K.; Al Duhayyim, M.; Min, H.; Nkenyereye, L.; Khan, W.U. Dynamic offloading strategy for computational energy efficiency of wireless power transfer based MEC networks in industry 5.0. J. King Saud Univ. Comput. Inf. Sci. 2023, 35, 101841. [Google Scholar] [CrossRef]
  16. Zhu, W.; Wei, J.; Zhou, Z.; Ma, G.; Xie, H. Research on Network Security Situational Awareness Method Based on Power Grid Dispatching System. Electrical Measurement and Instrumentation. pp. 1–8. Available online: https://kns.cnki.net/kcms/detail/23.1202.TH.20230207.1446.008.html (accessed on 9 February 2024).
  17. Nakano, H. Construction and Operation of Fukuyama Iron Works, Nippon Kokan. Trans. Iron Steel Inst. Jpn. 2020, 9, 259–280. [Google Scholar] [CrossRef]
  18. Gillian, C. Wortley Forge: The Evolution of an Eighteenth-Century Ironworks. North. Hist. 2023, 60, 52–73. [Google Scholar]
  19. Bayram, K.H.; Cemal, K. Prediction of Channel Utilization with Artificial Neural Networks Model in Mac Layer in Wireless Local Area Networks. Wirel. Pers. Commun. 2022, 126, 3389–3418. [Google Scholar]
  20. Kohitij, K.; Simon, K. Interpretability of artificial neural network models in artificial intelligence versus neuroscience. Nat. Mach. Intell. 2022, 4, 1065–1067. [Google Scholar]
  21. Martínez-Morales, J.; Quej-Cosgaya, H.; Lagunas-Jiménez, J.; Palacios-Hernández, E.; Morales-Saldaña, J. Design optimization of multilayer perceptron neural network by ant colony optimization applied to engine emissions data. Sci. China (Technol. Sci.) 2019, 62, 1055–1064. [Google Scholar] [CrossRef]
  22. Sang, B. Application of genetic algorithm and BP neural network in supply chain finance under information sharing. J. Comput. Appl. Math. 2021, 384, 113170. [Google Scholar] [CrossRef]
  23. Cong, L. Edge computing technology in the Internet practice of the iron and steel industry. Autom. Expo. 2021, 38, 12–16. [Google Scholar]
  24. Zhou, X.; Yao, W. Design of steel digital safety monitoring and management platform based on big data. Non-Ferr. Metall. Des. Res. 2015, 36, 48–50. [Google Scholar]
  25. Dang, G. Research on Early Warning Model of Safety Production Accident Risk in Iron and Steel Enterprises. Master’s Thesis, North China University of Science and Technology, Tangshan, China, 2015. [Google Scholar]
  26. Wang, J.; Jiao, K. Research on building structure safety assessment model based on neural network. J. Build. Sci. Eng. 2022, 39, 174–182. [Google Scholar]
  27. Casola, V.; De Benedictis, A.; Di Martino, S.; Mazzocca, N.; Starace, L.L.L. Security-Aware Deployment Optimization of Cloud–Edge Systems in Industrial IoT. IEEE Internet Things J. 2020, 8, 12724–12733. [Google Scholar] [CrossRef]
  28. Bouafia, A.; Bougofa, M.; Zeroauli, B.; Kharzi, R.; Chakhrit, A.; Baziz, A.; Aberkane, S.; Medjram, M.S.; Mebarki, A. Environmental impact assessment Approach to Dynamic Safety Evaluation: A Liquefied Natural. IOP Conf. Ser. Earth Environ. Sci. 2022, 1098, 012011. [Google Scholar] [CrossRef]
Figure 1. Traditional ironmaking production process diagram.
Figure 1. Traditional ironmaking production process diagram.
Sustainability 16 02399 g001
Figure 2. Wireless sensor network construction based on IoT gateways.
Figure 2. Wireless sensor network construction based on IoT gateways.
Sustainability 16 02399 g002
Figure 3. Data collection gateway data flow chart.
Figure 3. Data collection gateway data flow chart.
Sustainability 16 02399 g003
Figure 4. Reconstructed ironmaking plant dynamic security assessment system architecture.
Figure 4. Reconstructed ironmaking plant dynamic security assessment system architecture.
Sustainability 16 02399 g004
Figure 5. The cloud-edge-end three-layer architecture deployment of the platform.
Figure 5. The cloud-edge-end three-layer architecture deployment of the platform.
Sustainability 16 02399 g005
Figure 6. Intrinsic security level evaluation (The blue numbers in the figure are the assessed rating values).
Figure 6. Intrinsic security level evaluation (The blue numbers in the figure are the assessed rating values).
Sustainability 16 02399 g006
Figure 7. Intrinsic security level assessment chart (The blue numbers in the figure are the assessed rating values).
Figure 7. Intrinsic security level assessment chart (The blue numbers in the figure are the assessed rating values).
Sustainability 16 02399 g007
Figure 8. Operational flow of the system.
Figure 8. Operational flow of the system.
Sustainability 16 02399 g008
Figure 9. Dynamic security assessment system flow.
Figure 9. Dynamic security assessment system flow.
Sustainability 16 02399 g009
Figure 10. Fitness curve of PSO–BP neural network.
Figure 10. Fitness curve of PSO–BP neural network.
Sustainability 16 02399 g010
Figure 11. Prediction error curve of PSO-BP neural network.
Figure 11. Prediction error curve of PSO-BP neural network.
Sustainability 16 02399 g011
Figure 12. Comparison of the results of different output methods.
Figure 12. Comparison of the results of different output methods.
Sustainability 16 02399 g012
Table 1. Security analysis.
Table 1. Security analysis.
NumberSubsystemsFunctionalized ModulesHazardous ModeEquipment
Defects
Environmental
Defects
Duration of Hazardous Exposure
1Blast furnace systemDetection2455144
Electrical1952160.8
Cooling174354
2Feeding and loading systemScreening 212558.9
Weighing 402130.4
Transmission 233220
3Pulverized coal injectionSpray gun 610132
Bin pump 1811223.5
Coal grinding2250146.5
4Air supply systemThe fan system82180
Wind furnace 133480
Combustion 1503120
5Iron slag
treatment system
Granulating 2012115
Dehydration 173254
Cinder flushing 813176.25
6Gas dust removal systemGravity 1332112
Venturi 2123135
Bag 83185
7PeopleRecognition 40390
Video surveillance 131040
Positioning 211106
8ThingsVehicle 183586
Material 602103
Equipment45146.2
9EnvironmentNatural 1633114
Generate 2853170
Energy 53267
Table 2. Substance risk factor assessment table.
Table 2. Substance risk factor assessment table.
Production or Storage of Substance Fire Hazard LevelPhysical Hazard Factor
A0.20
B0.15
C0.10
D0.05
E0.00
Table 3. Safety level combinations.
Table 3. Safety level combinations.
Intrinsic Security Level Assessment ChartSafety Level Combination Situation
1A1
2A2, A1 + B1
3A3, A1 + B2, A2 + B1, A1 + B1 + C1
4A2 + B2, A3 + B1, A1 + B1 + C2, A1 + B2 + C1, A2 + B1 + C1
5A3 + B2, A1 + B1 + C3, A1 + B2 + C2, A2 + B1 + C2, A2 + B2 + C1, A3 + B1 + C1
6A1 + B2 + C3, A2 + B1 + C3, A2 + B2 + C2, A3 + B1 + C2, A3 + B2 + C1
7A2 + B2 + C3, A3 + B1 + C3, A3 + B2 + C2
8A3 + B2 + C3
Table 4. Comparison of three types of prediction errors between PSO–BP neural network and BP neural network category.
Table 4. Comparison of three types of prediction errors between PSO–BP neural network and BP neural network category.
CategoryPSO-BP Neural NetworksBP Neural Networks
Mean Absolute Error (MAE)0.0521030.060356
Mean Squared Error (MSE)0.00289320.0051007
Root Mean Squared Error (RMSE)0.0537880.071419
Table 5. Table of risk assessment indicators for each system.
Table 5. Table of risk assessment indicators for each system.
NumberSubsystemsFunctionalized Modules h s k 1 k 2 k 3
1Blast furnace systemDetection50.250.250.2
Electrical10.250.10.2
Cooling70.20.150
2Feeding and loading systemScreening 60.10.250.15
Weighing 300.10.1
Transmission 80.150.10.1
3Pulverized coal injectionSpray gun 40.0500
Bin pump 40.050.050
Coal grinding60.2500.1
4Air supply
system
The fan system80.10.050.15
Wind furnace 60.150.20.2
Combustion 100.150.15
5Iron slag
treatment system
Granulating 10.050.10.1
Dehydration 30.150.10
Cinder flushing 80.050.150.15
6Gas dust removal systemGravity 30.050.10.2
Venturi 60.150.150.15
Bag 50.10.050.15
7PeopleRecognition 400.150.2
Video surveillance 30.0500
Positioning 20.050.050.1
8ThingsVehicle 60.150.250.15
Material 600.10.1
Equipment40.250.050.15
9EnvironmentNatural 10.150.150.1
Generate 20.250.150
Energy 50.150.10.15
Table 6. Neural network training set input (January data for example).
Table 6. Neural network training set input (January data for example).
IndicatorsJanuary
Blast Furnace SystemEnvironment
MonitoringElectricalCoolingNaturalGenerateEnergy
Hazardous Mode1121312717
k 1 015301
k 2 523522
E144160.8541329057
h s 517638
k 3 0.20.20000.1
Table 7. Expected output of neural network training set (January data for example).
Table 7. Expected output of neural network training set (January data for example).
IndicatorsJanuary
Blast Furnace SystemEnvironment
MonitoringElectricalCoolingNatural GenerateEnergy
Hazard index h 850.8158.7146.11204.93853278.9
Table 8. Neural network test set input.
Table 8. Neural network test set input.
MonthSubsystemsFunctionalized
Modules
Hazardous ModeEquipment
Defects
Environmental
Effects
Duration of
Hazardous Exposure
h s k 3
DecemberBlast furnace systemDetection245514450.2
Electrical195216010.2
Cooling17435470
Feeding and loading systemScreening 21255860.15
Weighing 40213030.1
Transmission 23322080.1
Pulverized coal injectionSpray gun 61013240
Bin pump 161122340
Coal grinding225014660.1
Air supply
System
Fan system8211880.15
Wind furnace 133412060.2
Combustion 150311510.15
Iron slag
treatment system
Granulating 20125410.1
Dehydration 173217630
Cinder flushing 8132680.15
Gas dust removal systemGravity 110514450.2
Venturi 211216210.15
Bag 3535470.15
PeopleRecognition 4034040.2
Video surveillance 131010690
Positioning 2118620.1
ThingsVehicle 18354060.15
Material 60210360.1
Equipment4514640.15
EnvironmentNatural 163311510.1
Generate 285317020
Energy 5226750.15
Table 9. The test set of 27 functionalized-modules hazard index table.
Table 9. The test set of 27 functionalized-modules hazard index table.
MonthSubsystemsFunctionalized Modules Hazard   Index   h
DecemberBlast furnace systemDetection1350
Electrical265.32
Cooling521.64
Feeding and loading systemScreening 558.81
Weighing 473.35
Transmission 222.64
Pulverized coal injectionSpray gun 554.4
Bin pump 985.64
Coal grinding1208.63
Air supply
System
The fan system830.07
Wind furnace 794.88
Combustion 158.7
Iron slag
treatment system
Granulating 146.11
Dehydration 204.93
Cinder flushing 1957.96
Gas dust removal systemGravity 855.02
Venturi 156.73
Bag 142.58
PeopleRecognition 496.8
Video surveillance 126
Positioning 257.15
ThingsVehicle 853.11
Material 747.78
Equipment278.93
EnvironmentNatural 165.84
Generate 488.75
Energy 487.34
Table 10. The results of calculating the risk level of the system.
Table 10. The results of calculating the risk level of the system.
Initial Risk Level
s ( k 1 )
Hazard Index  H Risk Management Capability  C Management Capability Index  B ( k ) Comprehensive
Risk Level  S ( k )
58.095.6224661.4059.49
Table 11. Security risk level division.
Table 11. Security risk level division.
FailureCriticalityPassingExcellent
S < S2S2 ≤ S < 6565 ≤ S < S1S1 ≤ S
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Bai, J.; Chen, X. A Dynamic Security Assessment Method for Ironmaking Plants Based on Cloud-Edge Collaboration in Reconstructed Networks. Sustainability 2024, 16, 2399. https://doi.org/10.3390/su16062399

AMA Style

Bai J, Chen X. A Dynamic Security Assessment Method for Ironmaking Plants Based on Cloud-Edge Collaboration in Reconstructed Networks. Sustainability. 2024; 16(6):2399. https://doi.org/10.3390/su16062399

Chicago/Turabian Style

Bai, Jiujun, and Xuebo Chen. 2024. "A Dynamic Security Assessment Method for Ironmaking Plants Based on Cloud-Edge Collaboration in Reconstructed Networks" Sustainability 16, no. 6: 2399. https://doi.org/10.3390/su16062399

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop