This paper presents a hierarchy model of Air Traffic Management (ATM) according to the security requirements in ATM system, analyzes it by grey assessment and Analytic Hierarchy Process (AHP), and evaluates it in deta...This paper presents a hierarchy model of Air Traffic Management (ATM) according to the security requirements in ATM system, analyzes it by grey assessment and Analytic Hierarchy Process (AHP), and evaluates it in details. It also provides theoretical support for building an effective evaluation system. The basic idea is to use AHP and Grey Assessment to obtain the weights of the indicators, and count grey evaluation coefficients with whitening function. The compositive clustering coefficients are obtained by combining the weights and the grey evaluation coefficients. Evaluation result can be gotten from the compositive clustering coefficients.展开更多
Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain univers...Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain university as samples, this paper, with the information system security assessment model as its foundation, proposes a multi-attribute group decision-making (MAGDM) security assessment method based on a variable consistency dominance-based rough set approach (VC-DRSA). This assessment method combines VC-DRSA with the analytic hierarchy process (AHP), uncovers the inherent information hidden in data via the quality of sorting (QoS), and makes a synthetic security assessment of the information system after determining the security attribute weight. The sample findings show that this method can effectively remove the bottleneck of MAGDM, thus assuming practical significance in information system security assessment.展开更多
Based on the principles of virtual work for continuum medium,the element free Galerkin method to simulate the numerical calculations of steady-state creep was used and the discrete equation was derived in meshlss meth...Based on the principles of virtual work for continuum medium,the element free Galerkin method to simulate the numerical calculations of steady-state creep was used and the discrete equation was derived in meshlss method for steady-state creep.The es- sential boundary conditions and volume incompressible conditions can be realized by em- ploying the penalty parameters,so the symmetric positive definite system stiffness matrix can be yielded.Results of numerical cases show that element free Galerkin method,with its high accuracy,is much more convenient to deal with the pre-process and post-process, the results by meshless method is in good agreement with the exact solution data.展开更多
Crowd density is an important factor of crowd stability.Previous crowd density estimation methods are highly dependent on the specific video scene.This paper presented a video scene invariant crowd density estimation ...Crowd density is an important factor of crowd stability.Previous crowd density estimation methods are highly dependent on the specific video scene.This paper presented a video scene invariant crowd density estimation method using Geographic Information Systems(GIS) to monitor crowd size for large areas.The proposed method mapped crowd images to GIS.Then we can estimate crowd density for each camera in GIS using an estimation model obtained by one camera.Test results show that one model obtained by one camera in GIS can be adaptively applied to other cameras in outdoor video scenes.A real-time monitoring system for crowd size in large areas based on scene invariant model has been successfully used in 'Jiangsu Qinhuai Lantern Festival,2012'.It can provide early warning information and scientific basis for safety and security decision making.展开更多
In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super...In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super efficiency. The DEA model of multi-stage super efficiency is established for the commercial bank information security system applications of China's banks using data envelopment analysis (DEA), and then output efficiency, taxation efficiency, and comprehensive efficiency are analyzed by choosing eight banks such as Industrial and Commercial bank of China as sample data, and finally the operating performance of Chinese commercial banks' information security management system is concluded.展开更多
There are many potential hazards in the underground mining these include fire, explosion, inundation, roof collapse, toxic gases, chemical pollution, etc. Over past centuries, in US alone, more than 100 000 miners los...There are many potential hazards in the underground mining these include fire, explosion, inundation, roof collapse, toxic gases, chemical pollution, etc. Over past centuries, in US alone, more than 100 000 miners lost their life in different accidents. The primary safety methods used in underground mines concentrate on the monitoring of the hazardous gases, fire detection and ventilation. Using advanced instruments and monitoring techniques have significantly reduced the accidents in the modem mines. However despite the advancement of these monitoring facilities, accidents still occur in underground mining annually in the world, and many miners were killed because they were trapped and unable to escape due to blocked of exit access. Described a new development for the emergency evacuation system in underground mines and analyzed the advantages and disadvantages of the system. It is expected that the new system will greatly improve the emergency exit methods and save more lives in the future.展开更多
The present study aims to propose the method for the quantitative evaluation of safety concerning evacuation routes in case of earthquake disasters in urban areas using ACO (Ant Colony Optimization) algorithm and G...The present study aims to propose the method for the quantitative evaluation of safety concerning evacuation routes in case of earthquake disasters in urban areas using ACO (Ant Colony Optimization) algorithm and GIS (Geographic Information Systems). Regarding the safety evaluation method, firstly, the similarity in safety was focused on while taking into consideration road blockage probability, and after classifying roads by means of the hierarchical cluster analysis, the congestion rates of evacuation routes using ACO simulations were estimated. Based on these results, the multiple evacuation routes extracted were visualized on digital maps by means of GIS, and its safety was evaluated. Furthermore, the selection of safe evacuation routes between evacuation sites, for cases when the possibility of large-scale evacuation after an earthquake disaster is high, is made possible. As the safety evaluation method is based on public information, by obtaining the same geographic information as the present study, it is effective in other areas regardless of whether the information is of the past and future. Therefore, in addition to spatial reproducibility, the safety evaluation method also has high temporal reproducibility. Because safety evaluations are conducted on evacuation routes based on quantified data, highly safe evacuation routes that are selected have been quantitatively evaluated, and thus serve as an effective indicator when selecting evacuation routes.展开更多
A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the se...A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state.展开更多
基金Supported by the GKG200702020, jointly supported program by the National Natural Science Foundation of China and CAAC (No.60776808)
文摘This paper presents a hierarchy model of Air Traffic Management (ATM) according to the security requirements in ATM system, analyzes it by grey assessment and Analytic Hierarchy Process (AHP), and evaluates it in details. It also provides theoretical support for building an effective evaluation system. The basic idea is to use AHP and Grey Assessment to obtain the weights of the indicators, and count grey evaluation coefficients with whitening function. The compositive clustering coefficients are obtained by combining the weights and the grey evaluation coefficients. Evaluation result can be gotten from the compositive clustering coefficients.
基金Supported by the High Technology Research and Development Programme of China (No. 2007AA01Z473)
文摘Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain university as samples, this paper, with the information system security assessment model as its foundation, proposes a multi-attribute group decision-making (MAGDM) security assessment method based on a variable consistency dominance-based rough set approach (VC-DRSA). This assessment method combines VC-DRSA with the analytic hierarchy process (AHP), uncovers the inherent information hidden in data via the quality of sorting (QoS), and makes a synthetic security assessment of the information system after determining the security attribute weight. The sample findings show that this method can effectively remove the bottleneck of MAGDM, thus assuming practical significance in information system security assessment.
基金the Youth Science Foundation of Anhui Province(08040106831)Key Projects on College Natural Science Research of Anhui Province(KJ2008A125)
文摘Based on the principles of virtual work for continuum medium,the element free Galerkin method to simulate the numerical calculations of steady-state creep was used and the discrete equation was derived in meshlss method for steady-state creep.The es- sential boundary conditions and volume incompressible conditions can be realized by em- ploying the penalty parameters,so the symmetric positive definite system stiffness matrix can be yielded.Results of numerical cases show that element free Galerkin method,with its high accuracy,is much more convenient to deal with the pre-process and post-process, the results by meshless method is in good agreement with the exact solution data.
基金The authors would like to thank the reviewers for their detailed reviews and constructive comments. We are also grateful for Sophie Song's help on the improving English. This work was supported in part by the ‘Fivetwelfh' National Science and Technology Support Program of the Ministry of Science and Technology of China (No. 2012BAH35B02), the National Natural Science Foundation of China (NSFC) (No. 41401107, No. 41201402, and No. 41201417).
文摘Crowd density is an important factor of crowd stability.Previous crowd density estimation methods are highly dependent on the specific video scene.This paper presented a video scene invariant crowd density estimation method using Geographic Information Systems(GIS) to monitor crowd size for large areas.The proposed method mapped crowd images to GIS.Then we can estimate crowd density for each camera in GIS using an estimation model obtained by one camera.Test results show that one model obtained by one camera in GIS can be adaptively applied to other cameras in outdoor video scenes.A real-time monitoring system for crowd size in large areas based on scene invariant model has been successfully used in 'Jiangsu Qinhuai Lantern Festival,2012'.It can provide early warning information and scientific basis for safety and security decision making.
文摘In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super efficiency. The DEA model of multi-stage super efficiency is established for the commercial bank information security system applications of China's banks using data envelopment analysis (DEA), and then output efficiency, taxation efficiency, and comprehensive efficiency are analyzed by choosing eight banks such as Industrial and Commercial bank of China as sample data, and finally the operating performance of Chinese commercial banks' information security management system is concluded.
文摘There are many potential hazards in the underground mining these include fire, explosion, inundation, roof collapse, toxic gases, chemical pollution, etc. Over past centuries, in US alone, more than 100 000 miners lost their life in different accidents. The primary safety methods used in underground mines concentrate on the monitoring of the hazardous gases, fire detection and ventilation. Using advanced instruments and monitoring techniques have significantly reduced the accidents in the modem mines. However despite the advancement of these monitoring facilities, accidents still occur in underground mining annually in the world, and many miners were killed because they were trapped and unable to escape due to blocked of exit access. Described a new development for the emergency evacuation system in underground mines and analyzed the advantages and disadvantages of the system. It is expected that the new system will greatly improve the emergency exit methods and save more lives in the future.
文摘The present study aims to propose the method for the quantitative evaluation of safety concerning evacuation routes in case of earthquake disasters in urban areas using ACO (Ant Colony Optimization) algorithm and GIS (Geographic Information Systems). Regarding the safety evaluation method, firstly, the similarity in safety was focused on while taking into consideration road blockage probability, and after classifying roads by means of the hierarchical cluster analysis, the congestion rates of evacuation routes using ACO simulations were estimated. Based on these results, the multiple evacuation routes extracted were visualized on digital maps by means of GIS, and its safety was evaluated. Furthermore, the selection of safe evacuation routes between evacuation sites, for cases when the possibility of large-scale evacuation after an earthquake disaster is high, is made possible. As the safety evaluation method is based on public information, by obtaining the same geographic information as the present study, it is effective in other areas regardless of whether the information is of the past and future. Therefore, in addition to spatial reproducibility, the safety evaluation method also has high temporal reproducibility. Because safety evaluations are conducted on evacuation routes based on quantified data, highly safe evacuation routes that are selected have been quantitatively evaluated, and thus serve as an effective indicator when selecting evacuation routes.
文摘A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state.