A technology for unintended lane departure warning was proposed. As crucial information, lane boundaries were detected based on principal component analysis of grayscale distribution in search bars of given number and...A technology for unintended lane departure warning was proposed. As crucial information, lane boundaries were detected based on principal component analysis of grayscale distribution in search bars of given number and then each search bar was tracked using Kalman filter between frames. The lane detection performance was evaluated and demonstrated in ways of receiver operating characteristic, dice similarity coefficient and real-time performance. For lane departure detection, a lane departure risk evaluation model based on lasting time and frequency was effectively executed on the ARM-based platform. Experimental results indicate that the algorithm generates satisfactory lane detection results under different traffic and lighting conditions, and the proposed warning mechanism sends effective warning signals, avoiding most false warning.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
In order to reduce the calculation of the failure probability in the complex mechanical system reliability risk evaluation,and to implement importance analysis of system components effectively,the system fault tree wa...In order to reduce the calculation of the failure probability in the complex mechanical system reliability risk evaluation,and to implement importance analysis of system components effectively,the system fault tree was converted into five different Bayesian network models. The Bayesian network with the minimum conditional probability table specification and the highest computation efficiency was selected as the optimal network. The two heuristics were used to optimize the Bayesian network. The fault diagnosis and causal reasoning of the system were implemented by using the selected Bayesian network. The calculation methods of Fussel-Vesely( FV),risk reduction worth( RRW),Birnbaum measure( BM) and risk achievement worth( RAW) importances were presented. A certain engine was taken as an application example to illustrate the proposed method. The results show that not only the correlation of the relevant variables in the system can be accurately expressed and the calculation complexity can be reduced,but also the relatively weak link in the system can be located accurately.展开更多
Owing to information asymmetry,evaluating the credit risk of small-and mediumsized enterprises(SMEs)is difficult.While previous studies evaluating the credit risk of SMEs have mostly focused on intrinsic risk generate...Owing to information asymmetry,evaluating the credit risk of small-and mediumsized enterprises(SMEs)is difficult.While previous studies evaluating the credit risk of SMEs have mostly focused on intrinsic risk generated by SMEs,our study considers both intrinsic and relational risks generated by neighbor firms’publicly available risk events.We propose a framework for quantifying relational risk based on publicly available risk events for SMEs’credit risk evaluation.Our proposed framework quantifies relational risk by weighting the impact of publicly available risk events of each firm in an interfirm network—considering the impact of interfirm network type,risk event type,and time dependence of risk events—and combines the relational risk score with financial and demographic features to evaluate SMEs credit risk.Our results reveal that relational risk score significantly improves both discrimination and granting performances of credit risk evaluation of SMEs,providing valuable managerial and practical implications for financial institutions.展开更多
Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. A...Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. An index system for network security equipment was established and a model based on attack tree with risk fusion was proposed to obtain the score of qualitative indices. The proposed model implements attack tree model and controlled interval and memory(CIM) model to solve the problem of quantifying qualitative indices, and thus improves the accuracy of the evaluation.展开更多
It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only fo...It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors.展开更多
This paper proposes a framework for evaluating the efficacy and suitability of maintenance programs with a focus on quantitative risk assessment in the domain of aircraft maintenance task transfer. The analysis is anc...This paper proposes a framework for evaluating the efficacy and suitability of maintenance programs with a focus on quantitative risk assessment in the domain of aircraft maintenance task transfer. The analysis is anchored in the principles of Maintenance Steering Group-3 (MSG-3) logic decision paradigms. The paper advances a holistic risk assessment index architecture tailored for the task transfer of maintenance programs. Utilizing the analytic network process (ANP), the study quantifies the weight interrelationships among diverse variables, incorporating expert-elicited subjective weighting. A multielement connection number-based evaluative model is employed to characterize decision-specific data, thereby facilitating the quantification of task transfer-associated risk through the appraisal of set-pair potentials. Moreover, the paper conducts a temporal risk trend analysis founded on partial connection numbers of varying orders. This analytical construct serves to streamline the process of risk assessment pertinent to maintenance program task transfer. The empirical component of this research, exemplified through a case study of the Boeing 737NG aircraft maintenance program, corroborates the methodological robustness and pragmatic applicability of the proposed framework in the quantification and analysis of mission transfer risk.展开更多
基金Project(51175159)supported by the National Natural Science Foundation of ChinaProject(2013WK3024)supported by the Science andTechnology Planning Program of Hunan Province,ChinaProject(CX2013B146)supported by the Hunan Provincial InnovationFoundation for Postgraduate,China
文摘A technology for unintended lane departure warning was proposed. As crucial information, lane boundaries were detected based on principal component analysis of grayscale distribution in search bars of given number and then each search bar was tracked using Kalman filter between frames. The lane detection performance was evaluated and demonstrated in ways of receiver operating characteristic, dice similarity coefficient and real-time performance. For lane departure detection, a lane departure risk evaluation model based on lasting time and frequency was effectively executed on the ARM-based platform. Experimental results indicate that the algorithm generates satisfactory lane detection results under different traffic and lighting conditions, and the proposed warning mechanism sends effective warning signals, avoiding most false warning.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
基金National Natural Science Foundations of China(Nos.61164009,61463021)the Science Foundation of Education Commission of Jiangxi Province,China(No.GJJ14420)+1 种基金the Young Scientists Object Program of Jiangxi Province,China(No.20144BCB23037)the Graduate Innovation Foundation of Jiangxi Province,China(No.YC2014-S364)
文摘In order to reduce the calculation of the failure probability in the complex mechanical system reliability risk evaluation,and to implement importance analysis of system components effectively,the system fault tree was converted into five different Bayesian network models. The Bayesian network with the minimum conditional probability table specification and the highest computation efficiency was selected as the optimal network. The two heuristics were used to optimize the Bayesian network. The fault diagnosis and causal reasoning of the system were implemented by using the selected Bayesian network. The calculation methods of Fussel-Vesely( FV),risk reduction worth( RRW),Birnbaum measure( BM) and risk achievement worth( RAW) importances were presented. A certain engine was taken as an application example to illustrate the proposed method. The results show that not only the correlation of the relevant variables in the system can be accurately expressed and the calculation complexity can be reduced,but also the relatively weak link in the system can be located accurately.
基金the National Natural Science Foundation of China(Grant Nos.71731005,Nos.72101073)。
文摘Owing to information asymmetry,evaluating the credit risk of small-and mediumsized enterprises(SMEs)is difficult.While previous studies evaluating the credit risk of SMEs have mostly focused on intrinsic risk generated by SMEs,our study considers both intrinsic and relational risks generated by neighbor firms’publicly available risk events.We propose a framework for quantifying relational risk based on publicly available risk events for SMEs’credit risk evaluation.Our proposed framework quantifies relational risk by weighting the impact of publicly available risk events of each firm in an interfirm network—considering the impact of interfirm network type,risk event type,and time dependence of risk events—and combines the relational risk score with financial and demographic features to evaluate SMEs credit risk.Our results reveal that relational risk score significantly improves both discrimination and granting performances of credit risk evaluation of SMEs,providing valuable managerial and practical implications for financial institutions.
基金The Research of Key Technology and Application of Information Security Certification Project(No.2016YFF0204001)
文摘Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. An index system for network security equipment was established and a model based on attack tree with risk fusion was proposed to obtain the score of qualitative indices. The proposed model implements attack tree model and controlled interval and memory(CIM) model to solve the problem of quantifying qualitative indices, and thus improves the accuracy of the evaluation.
基金supported by National Natural Science Foundation of China (No.60873231)Research Fund for the Doctoral Program of Higher Education (No.20093223120001)+2 种基金Science and Technology Support Program of Jiangsu Province (No.BE2009158)Natural Science Fund of Higher Education of Jiangsu Province(No.09KJB520010)Special Fund for Fast Sharing of Science Paper in Net Era by CSTD (No.2009117)
文摘It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors.
基金supported by the Civil Aviation Administration of China(CAAC)"Safety Capability"Building Fund(Grant No.AADSA2019009)the Fundamental Research Funds of Central Universities(Grant No.3122022060).
文摘This paper proposes a framework for evaluating the efficacy and suitability of maintenance programs with a focus on quantitative risk assessment in the domain of aircraft maintenance task transfer. The analysis is anchored in the principles of Maintenance Steering Group-3 (MSG-3) logic decision paradigms. The paper advances a holistic risk assessment index architecture tailored for the task transfer of maintenance programs. Utilizing the analytic network process (ANP), the study quantifies the weight interrelationships among diverse variables, incorporating expert-elicited subjective weighting. A multielement connection number-based evaluative model is employed to characterize decision-specific data, thereby facilitating the quantification of task transfer-associated risk through the appraisal of set-pair potentials. Moreover, the paper conducts a temporal risk trend analysis founded on partial connection numbers of varying orders. This analytical construct serves to streamline the process of risk assessment pertinent to maintenance program task transfer. The empirical component of this research, exemplified through a case study of the Boeing 737NG aircraft maintenance program, corroborates the methodological robustness and pragmatic applicability of the proposed framework in the quantification and analysis of mission transfer risk.