This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather event...This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather events,and movement of tectonic plates.The proposed system is based on the Internet of Things and artificial intelligence identification technology.The monitoring system will cover various aspects of tunnel operations,such as the slope of the entrance,the structural safety of the cave body,toxic and harmful gases that may appear during operation,excessively high and low-temperature humidity,poor illumination,water leakage or road water accumulation caused by extreme weather,combustion and smoke caused by fires,and more.The system will enable comprehensive monitoring and early warning of fire protection systems,accident vehicles,and overheating vehicles.This will effectively improve safety during tunnel operation.展开更多
The use of artificial intelligence(AI)has increased since the middle of the 20th century,as evidenced by its applications to a wide range of engineering and science problems.Air traffic management(ATM)is becoming incr...The use of artificial intelligence(AI)has increased since the middle of the 20th century,as evidenced by its applications to a wide range of engineering and science problems.Air traffic management(ATM)is becoming increasingly automated and autonomous,making it lucrative for AI applications.This paper presents a systematic review of studies that employ AI techniques for improving ATM capability.A brief account of the history,structure,and advantages of these methods is provided,followed by the description of their applications to several representative ATM tasks,such as air traffic services(ATS),airspace management(AM),air traffic flow management(ATFM),and flight operations(FO).The major contribution of the current review is the professional survey of the AI application to ATM alongside with the description of their specific advantages:(i)these methods provide alternative approaches to conventional physical modeling techniques,(ii)these methods do not require knowing relevant internal system parameters,(iii)these methods are computationally more efficient,and(iv)these methods offer compact solutions to multivariable problems.In addition,this review offers a fresh outlook on future research.One is providing a clear rationale for the model type and structure selection for a given ATM mission.Another is to understand what makes a specific architecture or algorithm effective for a given ATM mission.These are among the most important issues that will continue to attract the attention of the AI research community and ATM work teams in the future.展开更多
The approach for probabilistic rationale of artificial intelligence systems actions is proposed.It is based on an implementation of the proposed interconnected ideas 1-7 about system analysis and optimization focused ...The approach for probabilistic rationale of artificial intelligence systems actions is proposed.It is based on an implementation of the proposed interconnected ideas 1-7 about system analysis and optimization focused on prognostic modeling.The ideas may be applied also by using another probabilistic models which supported by software tools and can predict successfulness or risks on a level of probability distribution functions.The approach includes description of the proposed probabilistic models,optimization methods for rationale actions and incremental algorithms for solving the problems of supporting decision-making on the base of monitored data and rationale robot actions in uncertainty conditions.The approach means practically a proactive commitment to excellence in uncertainty conditions.A suitability of the proposed models and methods is demonstrated by examples which cover wide applications of artificial intelligence systems.展开更多
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under s...Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical e military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical e military experts.Both the design and the results of the evaluation are revealed in this article.展开更多
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ...In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.展开更多
AIM: To develop an automatic tool on screening diabetic retinopathy(DR) from diabetic patients.METHODS: We extracted textures from eye fundus images of each diabetes subject using grey level co-occurrence matrix metho...AIM: To develop an automatic tool on screening diabetic retinopathy(DR) from diabetic patients.METHODS: We extracted textures from eye fundus images of each diabetes subject using grey level co-occurrence matrix method and trained a Bayesian model based on these textures. The receiver operating characteristic(ROC) curve was used to estimate the sensitivity and specificity of the Bayesian model.RESULTS: A total of 1000 eyes fundus images from diabetic patients in which 298 eyes were diagnosed as DR by two ophthalmologists. The Bayesian model was trained using four extracted textures including contrast, entropy, angular second moment and correlation using a training dataset. The Bayesian model achieved a sensitivity of 0.949 and a specificity of 0.928 in the validation dataset. The area under the ROC curve was 0.938, and the 10-fold cross validation method showed that the average accuracy rate is 93.5%.CONCLUSION: Textures extracted by grey level cooccurrence can be useful information for DR diagnosis, and a trained Bayesian model based on these textures can be an effective tool for DR screening among diabetic patients.展开更多
With the emergence of digital transformation success stories,more and more enterprises are launching digital solutions to improve business efficiency or achieve optimal revenue growth.The traditional communication mar...With the emergence of digital transformation success stories,more and more enterprises are launching digital solutions to improve business efficiency or achieve optimal revenue growth.The traditional communication market tends to be saturated,and the digital transformation of telecom operators is imminent.This article combining the development trend of telecom operators’product business and the application situation of the pilot summarizes the innovative application categories that telecom operators continue to launch based on their own advantages and in response to the needs of the industry.This article focuses on the transformation of security capabilities in communication services,big data,Internet of Things,artificial intelligence,unified authentication and network information security,and deeply analyzes the business characteristics and application modes from the aspects of resource integration,open platform construction,new connection construction,and innovative business development.This article puts forward suggestions for the security development of telecom operators,and provides basic research content for the subsequent research on the innovative application of telecom operators’capability openness.展开更多
文摘This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather events,and movement of tectonic plates.The proposed system is based on the Internet of Things and artificial intelligence identification technology.The monitoring system will cover various aspects of tunnel operations,such as the slope of the entrance,the structural safety of the cave body,toxic and harmful gases that may appear during operation,excessively high and low-temperature humidity,poor illumination,water leakage or road water accumulation caused by extreme weather,combustion and smoke caused by fires,and more.The system will enable comprehensive monitoring and early warning of fire protection systems,accident vehicles,and overheating vehicles.This will effectively improve safety during tunnel operation.
基金supported by the National Natural Science Foundation of China(62073330)the Natural Science Foundation of Hunan Province(2020JJ4339)the Scientific Research Fund of Hunan Province Education Department(20B272).
文摘The use of artificial intelligence(AI)has increased since the middle of the 20th century,as evidenced by its applications to a wide range of engineering and science problems.Air traffic management(ATM)is becoming increasingly automated and autonomous,making it lucrative for AI applications.This paper presents a systematic review of studies that employ AI techniques for improving ATM capability.A brief account of the history,structure,and advantages of these methods is provided,followed by the description of their applications to several representative ATM tasks,such as air traffic services(ATS),airspace management(AM),air traffic flow management(ATFM),and flight operations(FO).The major contribution of the current review is the professional survey of the AI application to ATM alongside with the description of their specific advantages:(i)these methods provide alternative approaches to conventional physical modeling techniques,(ii)these methods do not require knowing relevant internal system parameters,(iii)these methods are computationally more efficient,and(iv)these methods offer compact solutions to multivariable problems.In addition,this review offers a fresh outlook on future research.One is providing a clear rationale for the model type and structure selection for a given ATM mission.Another is to understand what makes a specific architecture or algorithm effective for a given ATM mission.These are among the most important issues that will continue to attract the attention of the AI research community and ATM work teams in the future.
文摘The approach for probabilistic rationale of artificial intelligence systems actions is proposed.It is based on an implementation of the proposed interconnected ideas 1-7 about system analysis and optimization focused on prognostic modeling.The ideas may be applied also by using another probabilistic models which supported by software tools and can predict successfulness or risks on a level of probability distribution functions.The approach includes description of the proposed probabilistic models,optimization methods for rationale actions and incremental algorithms for solving the problems of supporting decision-making on the base of monitored data and rationale robot actions in uncertainty conditions.The approach means practically a proactive commitment to excellence in uncertainty conditions.A suitability of the proposed models and methods is demonstrated by examples which cover wide applications of artificial intelligence systems.
文摘Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical e military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical e military experts.Both the design and the results of the evaluation are revealed in this article.
文摘In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.
基金Supported by the Priming Scientific Research Foundation for the Junior Researcher in Beijing Tongren Hospital,Capital Medical University
文摘AIM: To develop an automatic tool on screening diabetic retinopathy(DR) from diabetic patients.METHODS: We extracted textures from eye fundus images of each diabetes subject using grey level co-occurrence matrix method and trained a Bayesian model based on these textures. The receiver operating characteristic(ROC) curve was used to estimate the sensitivity and specificity of the Bayesian model.RESULTS: A total of 1000 eyes fundus images from diabetic patients in which 298 eyes were diagnosed as DR by two ophthalmologists. The Bayesian model was trained using four extracted textures including contrast, entropy, angular second moment and correlation using a training dataset. The Bayesian model achieved a sensitivity of 0.949 and a specificity of 0.928 in the validation dataset. The area under the ROC curve was 0.938, and the 10-fold cross validation method showed that the average accuracy rate is 93.5%.CONCLUSION: Textures extracted by grey level cooccurrence can be useful information for DR diagnosis, and a trained Bayesian model based on these textures can be an effective tool for DR screening among diabetic patients.
文摘With the emergence of digital transformation success stories,more and more enterprises are launching digital solutions to improve business efficiency or achieve optimal revenue growth.The traditional communication market tends to be saturated,and the digital transformation of telecom operators is imminent.This article combining the development trend of telecom operators’product business and the application situation of the pilot summarizes the innovative application categories that telecom operators continue to launch based on their own advantages and in response to the needs of the industry.This article focuses on the transformation of security capabilities in communication services,big data,Internet of Things,artificial intelligence,unified authentication and network information security,and deeply analyzes the business characteristics and application modes from the aspects of resource integration,open platform construction,new connection construction,and innovative business development.This article puts forward suggestions for the security development of telecom operators,and provides basic research content for the subsequent research on the innovative application of telecom operators’capability openness.