Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vul...Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks.Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes.The trust-based security mechanism is usually adopted to solve this problem in WSNs.However,the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes.Moreover,how to efficiently collect behavioral evidences are rarely discussed.To address these issues,in this paper,we present a trust management mechanism based on fuzzy logic and a cloud model.First,a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty.Then,the cloud model is introduced to estimate the trust values for sensor nodes.Finally,a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance.Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring.展开更多
While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of runni...While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of running software. Our approach is to use a behavior-based monitoring agent to make remote attestation more flexible, dynamic, and trustworthy. This approach was mostly made possible by extensive use of process information which is readily available in Unix. We also made use of a behavior tree to effectively record predictable behaviors of each process. In this paper, we primarily focus on building a prototype implementation of such framework, presenting one example built on it, successfully find potential security risks in the run time of a ftp program and then evaluate the performance of this model.展开更多
In recent years, aquaculture industry in China is developing rapidly, and especially, China has the largest aquaculture area and the most output in the world. In the past, traditional aquaculture mainly depended on ma...In recent years, aquaculture industry in China is developing rapidly, and especially, China has the largest aquaculture area and the most output in the world. In the past, traditional aquaculture mainly depended on manual labour to breed and gain aquatic organisms. However, with the increasing scale of production and the continuous improvement of science and technology, the traditional aquaculture approach has become more and more unsuitable for the development of the times. With the rapid development of computer technology, computer vision technology infiltrates through the traditional aquaculture industry quickly and improves the aquaculture production efficiency .This paper mainly introduces the basic situation of computer vision technology and summarizes the application of computer vision technology in aquaculture industry at home and abroad. The paper concludes with the expectation of application of computer vision in the aquaculture.展开更多
Behavior choice, coal mine monitoring, and control intensity are combined in a general mathematical model established from the perspective of a behavioral game. A case study is provided with effective conditions of mo...Behavior choice, coal mine monitoring, and control intensity are combined in a general mathematical model established from the perspective of a behavioral game. A case study is provided with effective conditions of monitoring provided. This paper defines the expected value difference of control return and behavior cost difference and discusses the measurement and optimization of variable indexes, including the monitoring intensity and costs of control. The results imply that the control of unsafe behavior can be more effective when monitoring and control of coal mines are both improved. Monitoring will be useful when the rewards for displaying safe behavior, and the monitoring of unsafe behavior, are improved to a high level.展开更多
Population aging places a growing stress on society’s resources. There is a need for Assisted Living (AL) technologies that allow the elderly to live independently as long as possible. The AndroidCare open source pro...Population aging places a growing stress on society’s resources. There is a need for Assisted Living (AL) technologies that allow the elderly to live independently as long as possible. The AndroidCare open source project aims to explore what functionality can be provided in a low cost AL solution where no professional health organization is involved in the deployment or maintenance of the solution, nor in supervising the pa-tient;all these tasks are carried out by a relative of the elder. Therefore, in the system’s design simplicity of use has prevailed over having a lot of features. It is based on stan-dard off-the-shell commodity hardware (a smartphone) and it provides 1) assistance to the elder in complying with the treatment of chronic diseases;2) monitors and alerts of the occurrence of risk situations such as falls;and 3) simplifies the supervision of the elder’s therapy and behavior by the caregiver.展开更多
Aiming at drivers’dangerous driving behavior monitoring and health monitoring,this paper designs an intelligent steering wheel that can monitor dan-gerous driving behavior and a steering wheel sleeve that can monitor...Aiming at drivers’dangerous driving behavior monitoring and health monitoring,this paper designs an intelligent steering wheel that can monitor dan-gerous driving behavior and a steering wheel sleeve that can monitor physical health.The MTCNN model is primarily used to obtain a driver’s face image in real time.The PFLD algorithm was used to obtain the facial model positioning feature points,and the degree of driver fatigue was determined by combining the relevant parameters.The fatigue algorithm proposed in this paper can improve the effectiveness and accuracy of monitoring.Then,according to the LSTM network model,11 groups of key point information of the human body are obtained,and the human motion track is identified and then combined with the facial information to complete the judgment of driving behavior such as drinking water,smoking and walking.Through the PPG and ECG fusion algorithm based on LSTM,the reliability of the system to collect vital signs such as body temperature,blood pressure,heart rate and blood oxygen of the driver is improved.It was determined that the system could monitor a driver’s driving behavior in real time and consider its health management.展开更多
The main purpose of this study is to develop a mathematical model for calculating the probability of money laundering process, by monitoring the behavior of the client using 70 indicators of money laundering. The scie...The main purpose of this study is to develop a mathematical model for calculating the probability of money laundering process, by monitoring the behavior of the client using 70 indicators of money laundering. The scientific method used in this study (received from the Modern Criminology) has great investigative power and it is widely applicable. Hopefully the practical application of this study will increase greatly the probability of detection and punishment of the clients who are implicated in the process of money laundering. In particular, this study will be useful for banks, Financial Intelligence Unit (FIU) of Albania, Department of Economic Crime at the Ministry of Domestic Affairs and Albanian State Intelligence Service (SIS). Also, the investigation of money laundering will be a useful tool to detect other crimes, such as drug trafficking, human trafficking, illegal arms trade, etc. The prevention of money laundering is simultaneously a powerful strike against terrorism both on national and international levels.展开更多
This study is devoted to the experimental validation of the multi-type sensor placement and response reconstruction method for structural health monitoring of long-span suspension bridges. The method for multi-type se...This study is devoted to the experimental validation of the multi-type sensor placement and response reconstruction method for structural health monitoring of long-span suspension bridges. The method for multi-type sensor placement and response reconstruction is briefly described. A test bed, comprising of a physical model and an updated finite element (P-E) model of a long-span suspension bridge is also concisely introduced. The proposed method is then applied to the test bed; the equation of motion of the test bed subject to ground motion, the objective function for sensor location optimization, the principles for mode selection and multi-type response reconstruction are established. A numerical study using the updated FE model is performed to select the sensor types, numbers, and locations. Subsequently, with the identified sensor locations and some practical considerations, fiber Bragg grating (FBG) sensors, laser displacement transducers, and accelerometers are installed on the physical bridge model. Finally, experimental investigations are conducted to validate the proposed method. The experimental results show that the reconstructed responses using the measured responses from the limited number of multitype sensors agree well with the actual bridge responses. The proposed method is validated to be feasible and effective for the monitoring of structural behavior of longspan suspension bridges.展开更多
Mixed messages about the nation’s economic health and tightened house- hold budgets have kept consumers cautious for most of 2010. Consumers have pegged their conf idence in the economy to the labor market, which has...Mixed messages about the nation’s economic health and tightened house- hold budgets have kept consumers cautious for most of 2010. Consumers have pegged their conf idence in the economy to the labor market, which has shown few signs of improvement.展开更多
A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single po...A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single point failure of data analysis nodes is avoided by this P2P model,in which a greedy data forwarding method based on node priority and link delay is devised to promote the efficiency of data analysis nodes.And the data fusion method based on repulsive theory-Dumpster/Shafer(PSORT-DS)is used to deal with the challenge of multi-source alarm information.This data fusion method debases the false alarm rate.Compared with improved Dumpster/Shafer(DS)theoretical method based on particle swarm optimization(PSO)and classical DS evidence theoretical method,the proposed model reduces false alarm rate by 3%and 7%,respectively,whereas their detection rate increases by 4%and 16%,respectively.展开更多
In this study,the effect of different sampling rates(i.e.observation recording interval)on the Precise Point Positioning(PPP)solutions in terms of accuracy was investigated.For this purpose,a field test was carried ou...In this study,the effect of different sampling rates(i.e.observation recording interval)on the Precise Point Positioning(PPP)solutions in terms of accuracy was investigated.For this purpose,a field test was carried out inÇorum province,Turkey,on 11 September 2019.Within this context,a Geodetic Point(GP)was established and precisely coordinated.A static GNSS measurement was occupied on the GP for about 4-hour time at 0.10 second(s)/10 Hz measurement intervals with the Trimble R10 geodetic grade GNSS receiver.The original observation file was converted to RINEX format and then decimated into the different data sampling rates as 0.2 s,0.5 s,1 s,5 s,10 s,30 s,60 s,and 120 s.All these RINEX observation files were submitted to the Canadian Spatial Reference System-Precise Point Positioning(CSRS-PPP)online processing service the day after the data collection date by choosing both static and kinematic processing options.In this way,PPP-derived static coordinates,and the kinematic coordinates of each measurement epoch were calculated.The PPP-derived coordinates obtained from each decimated sampling intervals were compared to known coordinates of the GP for northing,easting,2D position,and height components.According to the static and kinematic processing results,high data sampling rates did not change the PPP solutions in terms of accuracy when compared to the results obtained using lower sampling rates.The results of this study imply that it was not necessary to collect GNSS data with high-rate intervals for many surveying projects requiring cm-level accuracy.展开更多
Malicious applications can be introduced to attack users and services so as to gain financial rewards, individuals' sensitive information, company and government intellectual property, and to gain remote control of s...Malicious applications can be introduced to attack users and services so as to gain financial rewards, individuals' sensitive information, company and government intellectual property, and to gain remote control of systems. However, traditional methods of malicious code detection, such as signature detection, behavior detection, virtual machine detection, and heuristic detection, have various weaknesses which make them unreliable. This paper presents the existing technologies of malicious code detection and a malicious code detection model is proposed based on behavior association. The behavior points of malicious code are first extracted through API monitoring technology and integrated into the behavior; then a relation between behaviors is established according to data dependence. Next, a behavior association model is built up and a discrimination method is put forth using pushdown automation. Finally, the exact malicious code is taken as a sample to carry out an experiment on the behavior's capture, association, and discrimination, thus proving that the theoretical model is viable.展开更多
There are a large number of extensions with many users in Google Chrome,which greatly enriches the functionalities of Chrome.However,due to inadequate security auditing,vulnerable updating mechanisms and time-delayed ...There are a large number of extensions with many users in Google Chrome,which greatly enriches the functionalities of Chrome.However,due to inadequate security auditing,vulnerable updating mechanisms and time-delayed maintenance of Chrome Web Store,the store becomes a platform for attackers to distribute malicious extensions.Existing static analysis methods can hardly detect obfuscated codes and dynamic codes injected by extensions,while dynamic detection methods have low coverage due to the need to meet various constraints when extensions are being executed.We propose a method to analyze Chrome extension behaviors dynamically based on direct execution of Java Script(JS).The core idea of this method is to convert the analysis of the whole extension into the analysis of each JS in the extension,bypassing the constraints(e.g.language,region,URL)of the extension itself,and improving the coverage of detection.The analysis of more than 44000 extensions showed that the method can effectively identify predefined behaviors.Among them,20 extensions had access to malicious domains,1113 extensions injected advertisements and 381 extensions collected users’passwords or cookies.At the same time,the number of URL requests obtained from this method is 177893,which is 52.44%more than that from traditional dynamic analysis method.展开更多
基金supported in part by the Chongqing Electronics Engineering Technology Research Center for Interactive Learningin part by the Chongqing key discipline of electronic informationin part by the Science and Technology Research Program of Chongqing Municipal Education Commission(KJQN202201630)。
文摘Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks.Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes.The trust-based security mechanism is usually adopted to solve this problem in WSNs.However,the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes.Moreover,how to efficiently collect behavioral evidences are rarely discussed.To address these issues,in this paper,we present a trust management mechanism based on fuzzy logic and a cloud model.First,a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty.Then,the cloud model is introduced to estimate the trust values for sensor nodes.Finally,a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance.Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring.
基金Supported by the National Natural Science Foun-dation of China (90104005 ,60373087 ,60473023)
文摘While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of running software. Our approach is to use a behavior-based monitoring agent to make remote attestation more flexible, dynamic, and trustworthy. This approach was mostly made possible by extensive use of process information which is readily available in Unix. We also made use of a behavior tree to effectively record predictable behaviors of each process. In this paper, we primarily focus on building a prototype implementation of such framework, presenting one example built on it, successfully find potential security risks in the run time of a ftp program and then evaluate the performance of this model.
文摘In recent years, aquaculture industry in China is developing rapidly, and especially, China has the largest aquaculture area and the most output in the world. In the past, traditional aquaculture mainly depended on manual labour to breed and gain aquatic organisms. However, with the increasing scale of production and the continuous improvement of science and technology, the traditional aquaculture approach has become more and more unsuitable for the development of the times. With the rapid development of computer technology, computer vision technology infiltrates through the traditional aquaculture industry quickly and improves the aquaculture production efficiency .This paper mainly introduces the basic situation of computer vision technology and summarizes the application of computer vision technology in aquaculture industry at home and abroad. The paper concludes with the expectation of application of computer vision in the aquaculture.
基金Project supports from The Humanistic and Social Scientific Research Planning Program in Ministry of Education of China (No.12YJA630063)The Social Science Foundation of Jiangsu Province of China (No. 10GLB001)the Ph.D. Programs Foundation of Ministry of Education of China (No. 20100095120014) are acknowledged
文摘Behavior choice, coal mine monitoring, and control intensity are combined in a general mathematical model established from the perspective of a behavioral game. A case study is provided with effective conditions of monitoring provided. This paper defines the expected value difference of control return and behavior cost difference and discusses the measurement and optimization of variable indexes, including the monitoring intensity and costs of control. The results imply that the control of unsafe behavior can be more effective when monitoring and control of coal mines are both improved. Monitoring will be useful when the rewards for displaying safe behavior, and the monitoring of unsafe behavior, are improved to a high level.
文摘Population aging places a growing stress on society’s resources. There is a need for Assisted Living (AL) technologies that allow the elderly to live independently as long as possible. The AndroidCare open source project aims to explore what functionality can be provided in a low cost AL solution where no professional health organization is involved in the deployment or maintenance of the solution, nor in supervising the pa-tient;all these tasks are carried out by a relative of the elder. Therefore, in the system’s design simplicity of use has prevailed over having a lot of features. It is based on stan-dard off-the-shell commodity hardware (a smartphone) and it provides 1) assistance to the elder in complying with the treatment of chronic diseases;2) monitors and alerts of the occurrence of risk situations such as falls;and 3) simplifies the supervision of the elder’s therapy and behavior by the caregiver.
文摘Aiming at drivers’dangerous driving behavior monitoring and health monitoring,this paper designs an intelligent steering wheel that can monitor dan-gerous driving behavior and a steering wheel sleeve that can monitor physical health.The MTCNN model is primarily used to obtain a driver’s face image in real time.The PFLD algorithm was used to obtain the facial model positioning feature points,and the degree of driver fatigue was determined by combining the relevant parameters.The fatigue algorithm proposed in this paper can improve the effectiveness and accuracy of monitoring.Then,according to the LSTM network model,11 groups of key point information of the human body are obtained,and the human motion track is identified and then combined with the facial information to complete the judgment of driving behavior such as drinking water,smoking and walking.Through the PPG and ECG fusion algorithm based on LSTM,the reliability of the system to collect vital signs such as body temperature,blood pressure,heart rate and blood oxygen of the driver is improved.It was determined that the system could monitor a driver’s driving behavior in real time and consider its health management.
文摘The main purpose of this study is to develop a mathematical model for calculating the probability of money laundering process, by monitoring the behavior of the client using 70 indicators of money laundering. The scientific method used in this study (received from the Modern Criminology) has great investigative power and it is widely applicable. Hopefully the practical application of this study will increase greatly the probability of detection and punishment of the clients who are implicated in the process of money laundering. In particular, this study will be useful for banks, Financial Intelligence Unit (FIU) of Albania, Department of Economic Crime at the Ministry of Domestic Affairs and Albanian State Intelligence Service (SIS). Also, the investigation of money laundering will be a useful tool to detect other crimes, such as drug trafficking, human trafficking, illegal arms trade, etc. The prevention of money laundering is simultaneously a powerful strike against terrorism both on national and international levels.
文摘This study is devoted to the experimental validation of the multi-type sensor placement and response reconstruction method for structural health monitoring of long-span suspension bridges. The method for multi-type sensor placement and response reconstruction is briefly described. A test bed, comprising of a physical model and an updated finite element (P-E) model of a long-span suspension bridge is also concisely introduced. The proposed method is then applied to the test bed; the equation of motion of the test bed subject to ground motion, the objective function for sensor location optimization, the principles for mode selection and multi-type response reconstruction are established. A numerical study using the updated FE model is performed to select the sensor types, numbers, and locations. Subsequently, with the identified sensor locations and some practical considerations, fiber Bragg grating (FBG) sensors, laser displacement transducers, and accelerometers are installed on the physical bridge model. Finally, experimental investigations are conducted to validate the proposed method. The experimental results show that the reconstructed responses using the measured responses from the limited number of multitype sensors agree well with the actual bridge responses. The proposed method is validated to be feasible and effective for the monitoring of structural behavior of longspan suspension bridges.
文摘Mixed messages about the nation’s economic health and tightened house- hold budgets have kept consumers cautious for most of 2010. Consumers have pegged their conf idence in the economy to the labor market, which has shown few signs of improvement.
基金Supported by the National Natural Science Foundation of China(61370212)the Research Fund for the Doctoral Program of Higher Education of China(20122304130002)+1 种基金the Natural Science Foundation of Heilongjiang Province(ZD 201102)the Fundamental Research Fund for the Central Universities(HEUCFZ1213,HEUCF100601)
文摘A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single point failure of data analysis nodes is avoided by this P2P model,in which a greedy data forwarding method based on node priority and link delay is devised to promote the efficiency of data analysis nodes.And the data fusion method based on repulsive theory-Dumpster/Shafer(PSORT-DS)is used to deal with the challenge of multi-source alarm information.This data fusion method debases the false alarm rate.Compared with improved Dumpster/Shafer(DS)theoretical method based on particle swarm optimization(PSO)and classical DS evidence theoretical method,the proposed model reduces false alarm rate by 3%and 7%,respectively,whereas their detection rate increases by 4%and 16%,respectively.
文摘In this study,the effect of different sampling rates(i.e.observation recording interval)on the Precise Point Positioning(PPP)solutions in terms of accuracy was investigated.For this purpose,a field test was carried out inÇorum province,Turkey,on 11 September 2019.Within this context,a Geodetic Point(GP)was established and precisely coordinated.A static GNSS measurement was occupied on the GP for about 4-hour time at 0.10 second(s)/10 Hz measurement intervals with the Trimble R10 geodetic grade GNSS receiver.The original observation file was converted to RINEX format and then decimated into the different data sampling rates as 0.2 s,0.5 s,1 s,5 s,10 s,30 s,60 s,and 120 s.All these RINEX observation files were submitted to the Canadian Spatial Reference System-Precise Point Positioning(CSRS-PPP)online processing service the day after the data collection date by choosing both static and kinematic processing options.In this way,PPP-derived static coordinates,and the kinematic coordinates of each measurement epoch were calculated.The PPP-derived coordinates obtained from each decimated sampling intervals were compared to known coordinates of the GP for northing,easting,2D position,and height components.According to the static and kinematic processing results,high data sampling rates did not change the PPP solutions in terms of accuracy when compared to the results obtained using lower sampling rates.The results of this study imply that it was not necessary to collect GNSS data with high-rate intervals for many surveying projects requiring cm-level accuracy.
基金supported by the National Natural Science Foundation of China (Nos. 61272033 and 61272405)
文摘Malicious applications can be introduced to attack users and services so as to gain financial rewards, individuals' sensitive information, company and government intellectual property, and to gain remote control of systems. However, traditional methods of malicious code detection, such as signature detection, behavior detection, virtual machine detection, and heuristic detection, have various weaknesses which make them unreliable. This paper presents the existing technologies of malicious code detection and a malicious code detection model is proposed based on behavior association. The behavior points of malicious code are first extracted through API monitoring technology and integrated into the behavior; then a relation between behaviors is established according to data dependence. Next, a behavior association model is built up and a discrimination method is put forth using pushdown automation. Finally, the exact malicious code is taken as a sample to carry out an experiment on the behavior's capture, association, and discrimination, thus proving that the theoretical model is viable.
基金the National Natural Science Foundation of China(61972297,U1636107)。
文摘There are a large number of extensions with many users in Google Chrome,which greatly enriches the functionalities of Chrome.However,due to inadequate security auditing,vulnerable updating mechanisms and time-delayed maintenance of Chrome Web Store,the store becomes a platform for attackers to distribute malicious extensions.Existing static analysis methods can hardly detect obfuscated codes and dynamic codes injected by extensions,while dynamic detection methods have low coverage due to the need to meet various constraints when extensions are being executed.We propose a method to analyze Chrome extension behaviors dynamically based on direct execution of Java Script(JS).The core idea of this method is to convert the analysis of the whole extension into the analysis of each JS in the extension,bypassing the constraints(e.g.language,region,URL)of the extension itself,and improving the coverage of detection.The analysis of more than 44000 extensions showed that the method can effectively identify predefined behaviors.Among them,20 extensions had access to malicious domains,1113 extensions injected advertisements and 381 extensions collected users’passwords or cookies.At the same time,the number of URL requests obtained from this method is 177893,which is 52.44%more than that from traditional dynamic analysis method.