In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f...In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network.展开更多
Seismic cluster nodes can be monitored by monitoring system,but thresholds for link failure alarm in monitoring systems are not determined presently,especially in different types of cluster links.Communication link ty...Seismic cluster nodes can be monitored by monitoring system,but thresholds for link failure alarm in monitoring systems are not determined presently,especially in different types of cluster links.Communication link types are discussed in seismic profession.By analyzing the characteristics of various links,the main performance metric,network latency,was proposed,which influenced states of communication links and gave the monitoring results deviation formula for judging the cluster monitoring system at different delay thresholds settings based on multiple-link delay error ratio analysis algorithm we offered.From the final experimental data of the monitoring system,fault alarm thresholds settings were posed under five different communication links,which had the instruction significance to the cluster monitoring in seismic profession.展开更多
A combined cluster and regression analysis were performed for the first time to identify rainfall threshold that triggers landslide events in Amboori, Kerala, India. Amboori is a tropical area that is highly vulnerabl...A combined cluster and regression analysis were performed for the first time to identify rainfall threshold that triggers landslide events in Amboori, Kerala, India. Amboori is a tropical area that is highly vulnerable to landslides. The 2, 3, and 5-day antecedent rainfall data versus daily rainfall was clustered to identify a cluster of critical events that could potentially trigger landslides. Further, the cluster of critical events was utilized for regression analysis to develop the threshold equations. The 5-day antecedent(xvariable) vs. daily rainfall(y-variable) provided the best fit to the data with a threshold equation of y = 80.7-0.1981 x. The intercept of the equation indicates that if the 5-day antecedent rainfall is zero, the minimum daily rainfall needed to trigger the landslide in the Amboori region would be 80.7 mm. The negative coefficient of the antecedent rainfall indicates that when the cumulative antecedent rainfall increases, the amount of daily rainfall required to trigger monsoon landslide decreases. The coefficient value indicates that the contribution of the 5-day antecedent rainfall is~20% to the landslide trigger threshold. The slope stability analysis carried out for the area, using Probabilistic Infinite Slope Analysis Model(PISA-m), was utilized to identify the areas vulnerable to landslide in the region. The locations in the area where past landslides have occurred demonstrate lower Factors of Safety(FS) in the slope stability analysis. Thus, rainfall threshold analysis together with the FS values from slope stability can be suitable for developing a simple, cost-effective, and comprehensive early-warning system for shallow landslides in Amboori and similar regions.展开更多
In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (...In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (k, n) threshold cryptography, Each node, whetherclusterhead or ordinary member, holds a share of the global certificate, and any k nodes cancommunicate securely. There is no need for any clusterhead to execute extra functions more thanrouting. Our scheme needs some prior configuration before deployment, and can be used in criticalenvironment with small scale. The security-enhancement for Lowest-ID algorithm can also be appliedinto other clustering approaches with minor modification. The feasibility of this method wasverified bythe simulation results.展开更多
A low energy uneven cluster protocol design method is proposed. Aiming at the random choosing for cluster head of traditional Leach protocol, and the defect of the single hop from all the cluster heads to the sink nod...A low energy uneven cluster protocol design method is proposed. Aiming at the random choosing for cluster head of traditional Leach protocol, and the defect of the single hop from all the cluster heads to the sink node, an improved method for Leave protocol is advanced. Firstly, the election model of cluster head is improved, and the node residual energy is considered in the process of threshold and the cluster head election to improve the whole network life circle. In the multi-hop route, choosing the maximum energy and the nearest node as the next hop and a route transferring data among many clusters is formed. The experiment shows the method having great improvement compared with Leach protocol and prolonging the network life cycle.展开更多
In recent years, the demand for Wireless Sensor Network (WSN) in smart farming has had a tremendous increase in demand for its efficiency. Wireless sensor networks have very many nodes, and it is of no use when the ba...In recent years, the demand for Wireless Sensor Network (WSN) in smart farming has had a tremendous increase in demand for its efficiency. Wireless sensor networks have very many nodes, and it is of no use when the battery dies. This is why there are several routing protocols being take into consideration to cub this problem. In this paper, in order to increase the heterogeneity and energy levels of the network, the M-LEACH protocol is proposed. The key aim of the Leach protocol is to prolong the existence of wireless sensor network by lowering the energy consumption needed for Cluster Head creation and maintenance, the proposed algorithm instructs a node to use high power amplification as it acts as the Cluster heads, and low power amplification when it becomes a Cluster Member, in the next stage. Finally, for better effectiveness, M-LEACH employs hard and soft threshold systems. Since it eliminates collisions and reduces the packet drop ratio for other signals, the M-LEACH protocol proposed works better than the Leach protocol.展开更多
Rainfall accumulation thresholds are crucial for issuing landslide warnings by identifying when soil saturation from rain could potentially trigger a landslide. Two essential types of thresholds are considered: enviro...Rainfall accumulation thresholds are crucial for issuing landslide warnings by identifying when soil saturation from rain could potentially trigger a landslide. Two essential types of thresholds are considered: environmental and operational. The environmental threshold indicates the minimum rainfall level required to potentially initiate a landslide. Conversely, the operational threshold is set lower to enable agencies to issue alerts before reaching environmental thresholds. Establishing these thresholds improves the accuracy of landslide predictions in terms of location and timing. This study introduces an innovative approach for determining these thresholds. Our approach employs cluster analysis and historical landslide data from the Metropolitan Region of Recife, Pernambuco State, Brazil. We applied our defined values to a significant landslide event in 2022, validating their robustness as the foundation for the operational threshold used by Cemaden, Brazil’s National Center for Monitoring and Early Warning of Natural Disasters.展开更多
Computer Tomography in medical imaging provides human internal body pictures in the digital form. The more quality images it provides, the better information we get. Normally, medical imaging can be constructed by pro...Computer Tomography in medical imaging provides human internal body pictures in the digital form. The more quality images it provides, the better information we get. Normally, medical imaging can be constructed by projection data from several perspectives. In this paper, our research challenges and describes a numerical method for refining the image of a Region of Interest (ROI) by constructing support within a standard CT image. It is obvious that the quality of tomographic slice is affected by artifacts. CT using filter and K-means clustering provides a way to reconstruct an ROI with minimal artifacts and improve the degree of the spatial resolution. Experimental results are presented for improving the reconstructed images, showing that the approach enhances the overall resolution and contrast of ROI images. Our method provides a number of advantages: robustness with noise in projection data and support construction without the need to acquire any additional setup.展开更多
为了保持原始功能磁共振成像(function Magnetic Resonance Imaging, fMRI)数据的空间结构实现噪声体素移除,提高聚类的效果,提出了一种基于遗传算法的简易优化算法.以广义线性模型(Generalize Linear Model, GLM)方法获取的数据作为大...为了保持原始功能磁共振成像(function Magnetic Resonance Imaging, fMRI)数据的空间结构实现噪声体素移除,提高聚类的效果,提出了一种基于遗传算法的简易优化算法.以广义线性模型(Generalize Linear Model, GLM)方法获取的数据作为大脑视觉刺激的真实激活模板,基于遗传算法对5位被测者的fMRI数据图像进行分析.取不同阈值(0.1~0.9)时交叉率和变异率为0且具有唯一的最优值为模糊C均值聚类算法(Fuzzy C-Means, FCM)结果,依据真实模板验证聚类结果的准确度.结果表明,相比原始的FCM方法,改变阈值的大小可以使FCM聚类结果的准确度得到有效提高.通过简易优化遗传算法,可以确定最佳阈值为0.6.展开更多
为解决传统LEACH(Low Energy Adaptive Clustering Hierarchy)协议网络节点能量消耗高、存活数量少和生存寿命短等问题,提出了一种LEACH-AD改进方案。该算法引入最优簇头比率P值、加入距离因子、剩余能量因子和密度因子等因素更新的阈...为解决传统LEACH(Low Energy Adaptive Clustering Hierarchy)协议网络节点能量消耗高、存活数量少和生存寿命短等问题,提出了一种LEACH-AD改进方案。该算法引入最优簇头比率P值、加入距离因子、剩余能量因子和密度因子等因素更新的阈值公式进行分簇以及簇间的传输。实验结果表明,改进后的LEACH-AD协议在首个死亡节点、10%死亡节点以及全部死亡节点分别比原LEACH协议延长138轮、195轮、628轮。在能量消耗方面比原LEACH协议多持续了631轮,改进后的路由协议减少了网络节点的能量消耗量,从而有效延长了无线网络与传感节点的工作时间,这对无线监测系统的研究与开发意义重大。展开更多
基金National Natural Science Foundation of China(U2133208,U20A20161)National Natural Science Foundation of China(No.62273244)Sichuan Science and Technology Program(No.2022YFG0180).
文摘In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network.
基金National Natural Science Fundations of China(Nos.71171045 and 61301118)Shanghai Science and Technology Committee Program,China(No.15dz1207600)China Scholarship Council(No.201504190015)
文摘Seismic cluster nodes can be monitored by monitoring system,but thresholds for link failure alarm in monitoring systems are not determined presently,especially in different types of cluster links.Communication link types are discussed in seismic profession.By analyzing the characteristics of various links,the main performance metric,network latency,was proposed,which influenced states of communication links and gave the monitoring results deviation formula for judging the cluster monitoring system at different delay thresholds settings based on multiple-link delay error ratio analysis algorithm we offered.From the final experimental data of the monitoring system,fault alarm thresholds settings were posed under five different communication links,which had the instruction significance to the cluster monitoring in seismic profession.
文摘A combined cluster and regression analysis were performed for the first time to identify rainfall threshold that triggers landslide events in Amboori, Kerala, India. Amboori is a tropical area that is highly vulnerable to landslides. The 2, 3, and 5-day antecedent rainfall data versus daily rainfall was clustered to identify a cluster of critical events that could potentially trigger landslides. Further, the cluster of critical events was utilized for regression analysis to develop the threshold equations. The 5-day antecedent(xvariable) vs. daily rainfall(y-variable) provided the best fit to the data with a threshold equation of y = 80.7-0.1981 x. The intercept of the equation indicates that if the 5-day antecedent rainfall is zero, the minimum daily rainfall needed to trigger the landslide in the Amboori region would be 80.7 mm. The negative coefficient of the antecedent rainfall indicates that when the cumulative antecedent rainfall increases, the amount of daily rainfall required to trigger monsoon landslide decreases. The coefficient value indicates that the contribution of the 5-day antecedent rainfall is~20% to the landslide trigger threshold. The slope stability analysis carried out for the area, using Probabilistic Infinite Slope Analysis Model(PISA-m), was utilized to identify the areas vulnerable to landslide in the region. The locations in the area where past landslides have occurred demonstrate lower Factors of Safety(FS) in the slope stability analysis. Thus, rainfall threshold analysis together with the FS values from slope stability can be suitable for developing a simple, cost-effective, and comprehensive early-warning system for shallow landslides in Amboori and similar regions.
基金Supported by the National High Technology Re search and Development Program of China (2003AA142080)
文摘In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (k, n) threshold cryptography, Each node, whetherclusterhead or ordinary member, holds a share of the global certificate, and any k nodes cancommunicate securely. There is no need for any clusterhead to execute extra functions more thanrouting. Our scheme needs some prior configuration before deployment, and can be used in criticalenvironment with small scale. The security-enhancement for Lowest-ID algorithm can also be appliedinto other clustering approaches with minor modification. The feasibility of this method wasverified bythe simulation results.
文摘A low energy uneven cluster protocol design method is proposed. Aiming at the random choosing for cluster head of traditional Leach protocol, and the defect of the single hop from all the cluster heads to the sink node, an improved method for Leave protocol is advanced. Firstly, the election model of cluster head is improved, and the node residual energy is considered in the process of threshold and the cluster head election to improve the whole network life circle. In the multi-hop route, choosing the maximum energy and the nearest node as the next hop and a route transferring data among many clusters is formed. The experiment shows the method having great improvement compared with Leach protocol and prolonging the network life cycle.
文摘In recent years, the demand for Wireless Sensor Network (WSN) in smart farming has had a tremendous increase in demand for its efficiency. Wireless sensor networks have very many nodes, and it is of no use when the battery dies. This is why there are several routing protocols being take into consideration to cub this problem. In this paper, in order to increase the heterogeneity and energy levels of the network, the M-LEACH protocol is proposed. The key aim of the Leach protocol is to prolong the existence of wireless sensor network by lowering the energy consumption needed for Cluster Head creation and maintenance, the proposed algorithm instructs a node to use high power amplification as it acts as the Cluster heads, and low power amplification when it becomes a Cluster Member, in the next stage. Finally, for better effectiveness, M-LEACH employs hard and soft threshold systems. Since it eliminates collisions and reduces the packet drop ratio for other signals, the M-LEACH protocol proposed works better than the Leach protocol.
文摘Rainfall accumulation thresholds are crucial for issuing landslide warnings by identifying when soil saturation from rain could potentially trigger a landslide. Two essential types of thresholds are considered: environmental and operational. The environmental threshold indicates the minimum rainfall level required to potentially initiate a landslide. Conversely, the operational threshold is set lower to enable agencies to issue alerts before reaching environmental thresholds. Establishing these thresholds improves the accuracy of landslide predictions in terms of location and timing. This study introduces an innovative approach for determining these thresholds. Our approach employs cluster analysis and historical landslide data from the Metropolitan Region of Recife, Pernambuco State, Brazil. We applied our defined values to a significant landslide event in 2022, validating their robustness as the foundation for the operational threshold used by Cemaden, Brazil’s National Center for Monitoring and Early Warning of Natural Disasters.
文摘Computer Tomography in medical imaging provides human internal body pictures in the digital form. The more quality images it provides, the better information we get. Normally, medical imaging can be constructed by projection data from several perspectives. In this paper, our research challenges and describes a numerical method for refining the image of a Region of Interest (ROI) by constructing support within a standard CT image. It is obvious that the quality of tomographic slice is affected by artifacts. CT using filter and K-means clustering provides a way to reconstruct an ROI with minimal artifacts and improve the degree of the spatial resolution. Experimental results are presented for improving the reconstructed images, showing that the approach enhances the overall resolution and contrast of ROI images. Our method provides a number of advantages: robustness with noise in projection data and support construction without the need to acquire any additional setup.
文摘为了保持原始功能磁共振成像(function Magnetic Resonance Imaging, fMRI)数据的空间结构实现噪声体素移除,提高聚类的效果,提出了一种基于遗传算法的简易优化算法.以广义线性模型(Generalize Linear Model, GLM)方法获取的数据作为大脑视觉刺激的真实激活模板,基于遗传算法对5位被测者的fMRI数据图像进行分析.取不同阈值(0.1~0.9)时交叉率和变异率为0且具有唯一的最优值为模糊C均值聚类算法(Fuzzy C-Means, FCM)结果,依据真实模板验证聚类结果的准确度.结果表明,相比原始的FCM方法,改变阈值的大小可以使FCM聚类结果的准确度得到有效提高.通过简易优化遗传算法,可以确定最佳阈值为0.6.
文摘为解决传统LEACH(Low Energy Adaptive Clustering Hierarchy)协议网络节点能量消耗高、存活数量少和生存寿命短等问题,提出了一种LEACH-AD改进方案。该算法引入最优簇头比率P值、加入距离因子、剩余能量因子和密度因子等因素更新的阈值公式进行分簇以及簇间的传输。实验结果表明,改进后的LEACH-AD协议在首个死亡节点、10%死亡节点以及全部死亡节点分别比原LEACH协议延长138轮、195轮、628轮。在能量消耗方面比原LEACH协议多持续了631轮,改进后的路由协议减少了网络节点的能量消耗量,从而有效延长了无线网络与传感节点的工作时间,这对无线监测系统的研究与开发意义重大。