The risk situation assessment and forecast technique of network security is a basic method of active defense techniques. In order to assess the risk of network security two methods were used to define the index of ris...The risk situation assessment and forecast technique of network security is a basic method of active defense techniques. In order to assess the risk of network security two methods were used to define the index of risk and forecast index in time series, they were analytical hierarchy process (AHP) and support vector regression (SVR). The module framework applied the methods above was also discussed. Experiment results showed the forecast values were so close to actual values and so it proved the approach is correct.展开更多
In order to reduce the calculation of the failure probability in the complex mechanical system reliability risk evaluation,and to implement importance analysis of system components effectively,the system fault tree wa...In order to reduce the calculation of the failure probability in the complex mechanical system reliability risk evaluation,and to implement importance analysis of system components effectively,the system fault tree was converted into five different Bayesian network models. The Bayesian network with the minimum conditional probability table specification and the highest computation efficiency was selected as the optimal network. The two heuristics were used to optimize the Bayesian network. The fault diagnosis and causal reasoning of the system were implemented by using the selected Bayesian network. The calculation methods of Fussel-Vesely( FV),risk reduction worth( RRW),Birnbaum measure( BM) and risk achievement worth( RAW) importances were presented. A certain engine was taken as an application example to illustrate the proposed method. The results show that not only the correlation of the relevant variables in the system can be accurately expressed and the calculation complexity can be reduced,but also the relatively weak link in the system can be located accurately.展开更多
Aircraft pollutant emissions are an important part of sources of pollution that directly or indirectly affect human health and ecosystems. This research suggests an Artificial Neural Network model to determine the hea...Aircraft pollutant emissions are an important part of sources of pollution that directly or indirectly affect human health and ecosystems. This research suggests an Artificial Neural Network model to determine the healthy risk level around Soekarno Hatta International Airport-Cengkareng Indonesia. This ANN modeling is a flexible method, which enables to recognize highly complex non-linear correlations. The network was trained with real measurement data and updated with new measurements, enhancing its quality and making it the ideal method for this research. Measurements of aircraft pollutant emissions are carried out with the aim to be used as input data and to validate the developed model. The obtained results concerned the improved ANN architecture model based on pollutant emissions as input variables. ANN model processes variables—hidden layers—and gives an output variable corresponding to a healthy risk level. This model is characterized by a 4-10-1 scheme. Based on ANN criteria, the best validation performance is achieved at epoch 28 from 34 epochs with the Mean Squared Error (MSE) of 9 × 10-3. The correlation between targets and outputs is confirmed. It validated a close relationship between targets and outputs. The network output errors value approaches zero. Further research is needed with the aim to enlarge the scheme of the ANN model by increasing its input variables. This is one of the major key defining environmental capacities of an airport that should be applied by Indonesian airport authorities. These would institute policies to manage or reduce pollutant emissions considering population and income growth to be socially positive.展开更多
The tool system of the organizational risk analyzer (ORA) to study the network of East Turkistan terrorists is selected. The model of the relationships among its personnel, knowledge, resources and task entities is re...The tool system of the organizational risk analyzer (ORA) to study the network of East Turkistan terrorists is selected. The model of the relationships among its personnel, knowledge, resources and task entities is represented by the meta-matrix in ORA, with which to analyze the risks and vulnerabilities of organizational structure quantitatively, and obtain the last vulnerabilities and risks of the organization. Case study in this system shows that it should be a shortcut to destroy effectively the network of terrorists by recognizing the caucus persons of the terrorism organization for the first and eliminating them when strikes the terror organization. It is vital to ensure effective use of the resources and control the risks of terrorist attacks.展开更多
Safety is the foundation of sustainable development in civil aviation.Although catastrophic accidents are rare,indicators of potential incidents and unsafe events frequently materialize.Therefore,a history of unsafe d...Safety is the foundation of sustainable development in civil aviation.Although catastrophic accidents are rare,indicators of potential incidents and unsafe events frequently materialize.Therefore,a history of unsafe data are considered in predicting safety risks.A deep learning method is adopted for extracting reactions in safety risks.The deep neural network(DNN)model for safety risk prediction is shown to extract complex data characteristics better than a shallow network model.Using extended unsafe data and monthly risk indices,hidden layers and iterations are determined.The effectiveness of DNN is also revealed in comparison with the traditional neural network.Through early risk detection using the method in the paper,airlines and the government can mitigate potential risk and take proactive measures to improve civil aviation safety.展开更多
The objective of the research is to analyze the ability of the artificial neural network model developed to forecast the credit risk of a panel of Italian manufacturing companies. In a theoretical point of view, this ...The objective of the research is to analyze the ability of the artificial neural network model developed to forecast the credit risk of a panel of Italian manufacturing companies. In a theoretical point of view, this paper introduces a litera-ture review on the application of artificial intelligence systems for credit risk management. In an empirical point of view, this research compares the architecture of the artificial neural network model developed in this research to an-other one, built for a research conducted in 2004 with a similar panel of companies, showing the differences between the two neural network models.展开更多
According to the index early warning method, a commercial bank loans risk early warning system based on BP neural networks is proposed. The warning signal is mainly involved with the financial situation signal of loan...According to the index early warning method, a commercial bank loans risk early warning system based on BP neural networks is proposed. The warning signal is mainly involved with the financial situation signal of loaning corporation. Except the structure description of the system structure the demonstration of attemptive designing is also elaborated.展开更多
P2P lending network is person to person lending network, lnternet-based applications, individuals lending financial model to others through the network intermediary,' platform. Currently P2P lending network has devel...P2P lending network is person to person lending network, lnternet-based applications, individuals lending financial model to others through the network intermediary,' platform. Currently P2P lending network has developed rapidly, but the P2P network lending platform also are lacing increasing risks, the biggest risk is credit risk. This article from the credit rating perspective, comparative analysis of the existing credit rating methodology, Analysis to establish a relatively sound credit rating mechanisms, thus reducing credit risk.展开更多
Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. A...Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. An index system for network security equipment was established and a model based on attack tree with risk fusion was proposed to obtain the score of qualitative indices. The proposed model implements attack tree model and controlled interval and memory(CIM) model to solve the problem of quantifying qualitative indices, and thus improves the accuracy of the evaluation.展开更多
Wind power is a kind of clean energy promising significant social and environmental benefits, and in The Peoples Republic of China, the government supports and encourages the development of wind power as one element i...Wind power is a kind of clean energy promising significant social and environmental benefits, and in The Peoples Republic of China, the government supports and encourages the development of wind power as one element in a shift to renewable energy. In recent years however, maritime safety issues have arisen during offshore wind power construction and attendant production processes associated with the rapid promotion and development of offshore wind farms. Therefore, it is necessary to carry out risk assessment for phases in the life cycle of offshore wind farms. This paper reports on a risk assessment model based on a Dynamic Bayesian network that performs offshore wind farms maritime risk assessment. The advantage of this approach is the way in which a Bayesian model expresses uncertainty. Furthermore, such models permit simulations and reenactment of accidents in a virtual environment. There were several goals in this research. Offshore wind power project risk identification and evaluation theories and methods were explored to identify the sources of risk during different phases of the offshore wind farm life cycle. Based on this foundation, a dynamic Bayesian network model with Genie was established, and evaluated, in terms of its effectiveness for analysis of risk during different phases of the offshore wind farm life cycle. Research results show that a dynamic Bayesian network method can perform risk assessments effectively and flexibly, responding to the actual context of offshore wind power construction. Historical data and almost real-time information are combined to analyze the risk of the construction of offshore wind power. Our results inform a discussion of security and risk mitigation measures that when implemented, could improve safety. This work has value as a reference and guide for the safe development of offshore wind power.展开更多
Managing TG-51 reference dosimetry in a large hospital network can be a challenging task. The objectives of this study are to investigate the effectiveness of using Statistical Process Control (SPC) to manage TG-51 wo...Managing TG-51 reference dosimetry in a large hospital network can be a challenging task. The objectives of this study are to investigate the effectiveness of using Statistical Process Control (SPC) to manage TG-51 workflow in such a network. All the sites in the network performed the annual reference dosimetry in water according to TG-51. These data were used to cross-calibrate the same ion chambers in plastic phantoms for monthly QA output measurements. An energy-specific dimensionless beam quality cross-calibration factor, <img src="Edit_6bfb9907-c034-4197-97a7-e8337a7fc21a.png" width="20" height="19" alt="" />, was derived to monitor the process across multiple sites. The SPC analysis was then performed to obtain the mean, <img src="Edit_c630a2dd-f714-4042-a46e-da0ca863cb41.png" width="30" height="20" alt="" /> , standard deviation, <span style="font-size:6.5pt;font-family:;" "=""><span style="white-space:normal;"><span style="font-size:6.5pt;font-family:"">σ</span><span style="white-space:nowrap;"><sub><i>k</i></sub></span></span></span>, the Upper Control Limit (UCL) and Lower Control Limit (LCL) in each beam. This process was first applied to 15 years of historical data at the main campus to assess the effectiveness of the process. A two-year prospective study including all 30 linear accelerators spread over the main campus and seven satellites in the network followed. The ranges of the control limits (±3σ) were found to be in the range of 1.7% - 2.6% and 3.3% - 4.2% for the main campus and the satellite sites respectively. The wider range in the satellite sites was attributed to variations in the workflow. Standardization of workflow was also found to be effective in narrowing the control limits. The SPC is effective in identifying variations in the workflow and was shown to be an effective tool in managing large network reference dosimetry.展开更多
The uncertainty during the period of software project development often brings huge risks to contractors and clients. If we can find an effective method to predict the cost and quality of software projects based on fa...The uncertainty during the period of software project development often brings huge risks to contractors and clients. If we can find an effective method to predict the cost and quality of software projects based on facts like the project character and two-side cooperating capability at the beginning of the project,we can reduce the risk. Bayesian Belief Network(BBN) is a good tool for analyzing uncertain consequences, but it is difficult to produce precise network structure and conditional probability table.In this paper,we built up network structure by Delphi method for conditional probability table learning,and learn update probability table and nodes’confidence levels continuously according to the application cases, which made the evaluation network have learning abilities, and evaluate the software development risk of organization more accurately.This paper also introduces EM algorithm, which will enhance the ability to produce hidden nodes caused by variant software projects.展开更多
Security measures for a computer network system can be enhanced with better understanding the vulnerabilities and their behavior over the time. It is observed that the effects of vulnerabilities vary with the time ove...Security measures for a computer network system can be enhanced with better understanding the vulnerabilities and their behavior over the time. It is observed that the effects of vulnerabilities vary with the time over their life cycle. In the present study, we have presented a new methodology to assess the magnitude of the risk of a vulnerability as a “Risk Rank”. To derive this new methodology well known Markovian approach with a transition probability matrix is used including relevant risk factors for discovered and recorded vulnerabilities. However, in addition to observing the risk factor for each vulnerability individually we have introduced the concept of ranking vulnerabilities at a particular time taking a similar approach to Google Page Rank Algorithm. New methodology is exemplified using a simple model of computer network with three recorded vulnerabilities with their CVSS scores.展开更多
基金Supported bythe Basic Research of Commission ofScience , Technology and Industry for National Defense (03058720)
文摘The risk situation assessment and forecast technique of network security is a basic method of active defense techniques. In order to assess the risk of network security two methods were used to define the index of risk and forecast index in time series, they were analytical hierarchy process (AHP) and support vector regression (SVR). The module framework applied the methods above was also discussed. Experiment results showed the forecast values were so close to actual values and so it proved the approach is correct.
基金National Natural Science Foundations of China(Nos.61164009,61463021)the Science Foundation of Education Commission of Jiangxi Province,China(No.GJJ14420)+1 种基金the Young Scientists Object Program of Jiangxi Province,China(No.20144BCB23037)the Graduate Innovation Foundation of Jiangxi Province,China(No.YC2014-S364)
文摘In order to reduce the calculation of the failure probability in the complex mechanical system reliability risk evaluation,and to implement importance analysis of system components effectively,the system fault tree was converted into five different Bayesian network models. The Bayesian network with the minimum conditional probability table specification and the highest computation efficiency was selected as the optimal network. The two heuristics were used to optimize the Bayesian network. The fault diagnosis and causal reasoning of the system were implemented by using the selected Bayesian network. The calculation methods of Fussel-Vesely( FV),risk reduction worth( RRW),Birnbaum measure( BM) and risk achievement worth( RAW) importances were presented. A certain engine was taken as an application example to illustrate the proposed method. The results show that not only the correlation of the relevant variables in the system can be accurately expressed and the calculation complexity can be reduced,but also the relatively weak link in the system can be located accurately.
文摘Aircraft pollutant emissions are an important part of sources of pollution that directly or indirectly affect human health and ecosystems. This research suggests an Artificial Neural Network model to determine the healthy risk level around Soekarno Hatta International Airport-Cengkareng Indonesia. This ANN modeling is a flexible method, which enables to recognize highly complex non-linear correlations. The network was trained with real measurement data and updated with new measurements, enhancing its quality and making it the ideal method for this research. Measurements of aircraft pollutant emissions are carried out with the aim to be used as input data and to validate the developed model. The obtained results concerned the improved ANN architecture model based on pollutant emissions as input variables. ANN model processes variables—hidden layers—and gives an output variable corresponding to a healthy risk level. This model is characterized by a 4-10-1 scheme. Based on ANN criteria, the best validation performance is achieved at epoch 28 from 34 epochs with the Mean Squared Error (MSE) of 9 × 10-3. The correlation between targets and outputs is confirmed. It validated a close relationship between targets and outputs. The network output errors value approaches zero. Further research is needed with the aim to enlarge the scheme of the ANN model by increasing its input variables. This is one of the major key defining environmental capacities of an airport that should be applied by Indonesian airport authorities. These would institute policies to manage or reduce pollutant emissions considering population and income growth to be socially positive.
文摘The tool system of the organizational risk analyzer (ORA) to study the network of East Turkistan terrorists is selected. The model of the relationships among its personnel, knowledge, resources and task entities is represented by the meta-matrix in ORA, with which to analyze the risks and vulnerabilities of organizational structure quantitatively, and obtain the last vulnerabilities and risks of the organization. Case study in this system shows that it should be a shortcut to destroy effectively the network of terrorists by recognizing the caucus persons of the terrorism organization for the first and eliminating them when strikes the terror organization. It is vital to ensure effective use of the resources and control the risks of terrorist attacks.
基金supported by the Joint Funds of the National Natural Science Foundation of China (No. U1833110)
文摘Safety is the foundation of sustainable development in civil aviation.Although catastrophic accidents are rare,indicators of potential incidents and unsafe events frequently materialize.Therefore,a history of unsafe data are considered in predicting safety risks.A deep learning method is adopted for extracting reactions in safety risks.The deep neural network(DNN)model for safety risk prediction is shown to extract complex data characteristics better than a shallow network model.Using extended unsafe data and monthly risk indices,hidden layers and iterations are determined.The effectiveness of DNN is also revealed in comparison with the traditional neural network.Through early risk detection using the method in the paper,airlines and the government can mitigate potential risk and take proactive measures to improve civil aviation safety.
文摘The objective of the research is to analyze the ability of the artificial neural network model developed to forecast the credit risk of a panel of Italian manufacturing companies. In a theoretical point of view, this paper introduces a litera-ture review on the application of artificial intelligence systems for credit risk management. In an empirical point of view, this research compares the architecture of the artificial neural network model developed in this research to an-other one, built for a research conducted in 2004 with a similar panel of companies, showing the differences between the two neural network models.
基金Supported by the National Science Foundation of China(Approved NO.79770086)
文摘According to the index early warning method, a commercial bank loans risk early warning system based on BP neural networks is proposed. The warning signal is mainly involved with the financial situation signal of loaning corporation. Except the structure description of the system structure the demonstration of attemptive designing is also elaborated.
文摘P2P lending network is person to person lending network, lnternet-based applications, individuals lending financial model to others through the network intermediary,' platform. Currently P2P lending network has developed rapidly, but the P2P network lending platform also are lacing increasing risks, the biggest risk is credit risk. This article from the credit rating perspective, comparative analysis of the existing credit rating methodology, Analysis to establish a relatively sound credit rating mechanisms, thus reducing credit risk.
基金The Research of Key Technology and Application of Information Security Certification Project(No.2016YFF0204001)
文摘Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. An index system for network security equipment was established and a model based on attack tree with risk fusion was proposed to obtain the score of qualitative indices. The proposed model implements attack tree model and controlled interval and memory(CIM) model to solve the problem of quantifying qualitative indices, and thus improves the accuracy of the evaluation.
文摘Wind power is a kind of clean energy promising significant social and environmental benefits, and in The Peoples Republic of China, the government supports and encourages the development of wind power as one element in a shift to renewable energy. In recent years however, maritime safety issues have arisen during offshore wind power construction and attendant production processes associated with the rapid promotion and development of offshore wind farms. Therefore, it is necessary to carry out risk assessment for phases in the life cycle of offshore wind farms. This paper reports on a risk assessment model based on a Dynamic Bayesian network that performs offshore wind farms maritime risk assessment. The advantage of this approach is the way in which a Bayesian model expresses uncertainty. Furthermore, such models permit simulations and reenactment of accidents in a virtual environment. There were several goals in this research. Offshore wind power project risk identification and evaluation theories and methods were explored to identify the sources of risk during different phases of the offshore wind farm life cycle. Based on this foundation, a dynamic Bayesian network model with Genie was established, and evaluated, in terms of its effectiveness for analysis of risk during different phases of the offshore wind farm life cycle. Research results show that a dynamic Bayesian network method can perform risk assessments effectively and flexibly, responding to the actual context of offshore wind power construction. Historical data and almost real-time information are combined to analyze the risk of the construction of offshore wind power. Our results inform a discussion of security and risk mitigation measures that when implemented, could improve safety. This work has value as a reference and guide for the safe development of offshore wind power.
文摘Managing TG-51 reference dosimetry in a large hospital network can be a challenging task. The objectives of this study are to investigate the effectiveness of using Statistical Process Control (SPC) to manage TG-51 workflow in such a network. All the sites in the network performed the annual reference dosimetry in water according to TG-51. These data were used to cross-calibrate the same ion chambers in plastic phantoms for monthly QA output measurements. An energy-specific dimensionless beam quality cross-calibration factor, <img src="Edit_6bfb9907-c034-4197-97a7-e8337a7fc21a.png" width="20" height="19" alt="" />, was derived to monitor the process across multiple sites. The SPC analysis was then performed to obtain the mean, <img src="Edit_c630a2dd-f714-4042-a46e-da0ca863cb41.png" width="30" height="20" alt="" /> , standard deviation, <span style="font-size:6.5pt;font-family:;" "=""><span style="white-space:normal;"><span style="font-size:6.5pt;font-family:"">σ</span><span style="white-space:nowrap;"><sub><i>k</i></sub></span></span></span>, the Upper Control Limit (UCL) and Lower Control Limit (LCL) in each beam. This process was first applied to 15 years of historical data at the main campus to assess the effectiveness of the process. A two-year prospective study including all 30 linear accelerators spread over the main campus and seven satellites in the network followed. The ranges of the control limits (±3σ) were found to be in the range of 1.7% - 2.6% and 3.3% - 4.2% for the main campus and the satellite sites respectively. The wider range in the satellite sites was attributed to variations in the workflow. Standardization of workflow was also found to be effective in narrowing the control limits. The SPC is effective in identifying variations in the workflow and was shown to be an effective tool in managing large network reference dosimetry.
文摘The uncertainty during the period of software project development often brings huge risks to contractors and clients. If we can find an effective method to predict the cost and quality of software projects based on facts like the project character and two-side cooperating capability at the beginning of the project,we can reduce the risk. Bayesian Belief Network(BBN) is a good tool for analyzing uncertain consequences, but it is difficult to produce precise network structure and conditional probability table.In this paper,we built up network structure by Delphi method for conditional probability table learning,and learn update probability table and nodes’confidence levels continuously according to the application cases, which made the evaluation network have learning abilities, and evaluate the software development risk of organization more accurately.This paper also introduces EM algorithm, which will enhance the ability to produce hidden nodes caused by variant software projects.
文摘Security measures for a computer network system can be enhanced with better understanding the vulnerabilities and their behavior over the time. It is observed that the effects of vulnerabilities vary with the time over their life cycle. In the present study, we have presented a new methodology to assess the magnitude of the risk of a vulnerability as a “Risk Rank”. To derive this new methodology well known Markovian approach with a transition probability matrix is used including relevant risk factors for discovered and recorded vulnerabilities. However, in addition to observing the risk factor for each vulnerability individually we have introduced the concept of ranking vulnerabilities at a particular time taking a similar approach to Google Page Rank Algorithm. New methodology is exemplified using a simple model of computer network with three recorded vulnerabilities with their CVSS scores.