We develop a series of mathematical models to describe flow of information in different periods of time and the relationship between flow of information and inherent value. We optimize the diffusion mechanism of infor...We develop a series of mathematical models to describe flow of information in different periods of time and the relationship between flow of information and inherent value. We optimize the diffusion mechanism of information based on model SEIR and improve the diffusion mechanism. In order to explore how inherent value of the information affects the flow of information, we simulate the model by using Matalab. We also use the data that the number of people is connected to Internet in Canada from the year 2009 to 2014 to analysis the model’s reliability. Then we use the model to predict the communication networks’ relationships and capacities around the year 2050. Last we do sensitivity analysis by making small changes in parameters of simulation experiment. The result of the experiment is helpful to model how public interest and opinion can be changed in complex network.展开更多
The successful application of perimeter control of urban traffic system strongly depends on the macroscopic fundamental diagram of the targeted region.Despite intensive studies on the partitioning of urban road networ...The successful application of perimeter control of urban traffic system strongly depends on the macroscopic fundamental diagram of the targeted region.Despite intensive studies on the partitioning of urban road networks,the dynamic partitioning of urban regions reflecting the propagation of congestion remains an open question.This paper proposes to partition the network into homogeneous sub-regions based on random walk algorithm.Starting from selected random walkers,the road network is partitioned from the early morning when congestion emerges.A modified Akaike information criterion is defined to find the optimal number of partitions.Region boundary adjustment algorithms are adopted to optimize the partitioning results to further ensure the correlation of partitions.The traffic data of Melbourne city are used to verify the effectiveness of the proposed partitioning method.展开更多
With the exponential increase in information security risks,ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment.However,experts possess a limited understanding of fundamental ...With the exponential increase in information security risks,ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment.However,experts possess a limited understanding of fundamental security elements,such as assets,threats,and vulnerabilities,due to the confidentiality of airborne networks,resulting in cognitive uncertainty.Therefore,the Pythagorean fuzzy Analytic Hierarchy Process(AHP)Technique for Order Preference by Similarity to an Ideal Solution(TOPSIS)is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks.First,Pythagorean fuzzy AHP is employed to construct an index system and quantify the pairwise comparison matrix for determining the index weights,which is used to solve the expert cognitive uncertainty in the process of evaluating the index system weight of airborne networks.Second,Pythagorean fuzzy the TOPSIS to an Ideal Solution is utilized to assess the risk prioritization of airborne networks using the Pythagorean fuzzy weighted distance measure,which is used to address the cognitive uncertainty in the evaluation process of various indicators in airborne network threat scenarios.Finally,a comparative analysis was conducted.The proposed method demonstrated the highest Kendall coordination coefficient of 0.952.This finding indicates superior consistency and confirms the efficacy of the method in addressing expert cognition during information security risk assessment for airborne networks.展开更多
Having criticized the current architecture of Advanced Traveler Information Systems (ATISs), this work discusses a new base of requirements to develop a new paradigm for traffic information systems. It mainly integr...Having criticized the current architecture of Advanced Traveler Information Systems (ATISs), this work discusses a new base of requirements to develop a new paradigm for traffic information systems. It mainly integrates three dimensions within a traffic system: drivers' pattern of behavior and preferences, urban traffic desires, and capabilities of traffic information service providers. Based on the above, functional segments from several related backgrounds are brought together to structure a new architecture, called Interactive Traveler Information System (ITIS). The main interactive feature of this new architecture is a two-way communication track between drivers and the traffic information system provider-in fact, a decision on choosing a road at a particular time for an individual will be made based on the utility of both sides. This new configuration consists of driver-side smartphone application, centric traffic prediction, and decision-maker units, which will shape a new approach of decision-making processes. These all work together to satisfy the designated goal of ITIS, which is preserving the Wardrop equilibrium condition in the traffic network level. Finally, we concentrate on a comparison study, which shows a differentiation between performance of the proposed ITIS and the current ATIS model in a real situation. This has been done with simulations of analogical scenarios. The most noticeable advantage of the proposed architecture is not being limited to a saturation limit, and the positive effect of increasing system penetration in the performance of the newly introduced information system. In conclusion, new research subjects are suggested to be carried out.展开更多
A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the se...A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state.展开更多
This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is pr...This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is presented to describe the coordinated platoon behavior of leader-follower vehicles in the simultaneous presence of unknown external disturbances and an unknown leader control input.Under such a platoon model,the central aim is to achieve robust platoon formation tracking with desired inter-vehicle spacing and same velocities and accelerations guided by the leader,while attaining improved communication efficiency.Toward this aim,a novel bandwidth-aware dynamic event-triggered scheduling mechanism is developed.One salient feature of the scheduling mechanism is that the threshold parameter in the triggering law is dynamically adjusted over time based on both vehicular state variations and bandwidth status.Then,a sufficient condition for platoon control system stability and performance analysis as well as a co-design criterion of the admissible event-triggered platooning control law and the desired scheduling mechanism are derived.Finally,simulation results are provided to substantiate the effectiveness and merits of the proposed co-design approach for guaranteeing a trade-off between robust platooning control performance and communication efficiency.展开更多
Considering the relatively poor robustness of quality scores for different types of distortion and the lack of mechanism for determining distortion types, a no-reference image quality assessment(NR-IQA) method based o...Considering the relatively poor robustness of quality scores for different types of distortion and the lack of mechanism for determining distortion types, a no-reference image quality assessment(NR-IQA) method based on the Ada Boost BP neural network in the wavelet domain(WABNN) is proposed. A 36-dimensional image feature vector is constructed by extracting natural scene statistics(NSS) features and local information entropy features of the distorted image wavelet sub-band coefficients in three scales. The ABNN classifier is obtained by learning the relationship between image features and distortion types. The ABNN scorer is obtained by learning the relationship between image features and image quality scores. A series of contrast experiments are carried out in the laboratory of image and video engineering(LIVE) database and TID2013 database. Experimental results show the high accuracy of the distinguishing distortion type, the high consistency with subjective scores and the high robustness of the method for distorted images. Experiment results also show the independence of the database and the relatively high operation efficiency of this method.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
A fuzzy comprehensive assessment method of running condition was constructed and applied to a large-scale centrifugal compressor set in a petrochemical corporation aiming at the monitoring and early warning of abnorma...A fuzzy comprehensive assessment method of running condition was constructed and applied to a large-scale centrifugal compressor set in a petrochemical corporation aiming at the monitoring and early warning of abnormal conditions in industry.The maximal information coefficient(MIC)correlation analysis of indexes was introduced to determine the independent indexes to be assessed,and the dynamic deterioration degree was calculated using the predicted independent indexes by the second-order Markov chain model.The fuzzy membership degree weighting method was employed to assess the running condition of all units in the set.Simple and direct radar chart was used to visualize condition assessment grades.Results showed that the proposed fuzzy comprehensive assessment method successfully assessed the running condition of the set.The constructed method achieved 10 min earlier alarm than the traditional threshold alarm occurred at the specific moment of00:44 on April 7 of 2018.The method would provide a valuable tool and have a wide engineering application in ensuring the safety and reliability of industrial production.展开更多
In order to make equipment run safely, economically and continuously, some new maintenance models were put forward to improve the equipment after-sale maintenance service, such as E-maintenance, third-party maintenanc...In order to make equipment run safely, economically and continuously, some new maintenance models were put forward to improve the equipment after-sale maintenance service, such as E-maintenance, third-party maintenance, etc. To certain extent, the models solved the problem of the distance between the manufacturer and customer and the dispersion of the maintenance technologies, however, those resources are still widely distributed and do not collaborate efficiently. In this paper, a network-based collaborative maintenance service model was proposed for after-sales equipment to solve the problem of maintenance resources integration. Concretely, equipment designers, maintainers, spare parts suppliers and maintenance experts were grouped together to establish dynamic alliance. The leader of the alliance is the manufacturer under guaranty period or equipment user exceeding the guaranty period. The process of maintenance service was divided into three stages which are fault diagnosis, maintenance decision and maintenance implementation. The sub-alliances were established to carry out maintenance work at each stage. In addition, the business process of network-based collaborative maintenance was analyzed and collaborative business system for equipment's after-sales collaborative maintenance service was designed. In the end, an informational economics model of network-based collaborative maintenance was established to demonstrate the effectiveness of this maintenance model.展开更多
文摘We develop a series of mathematical models to describe flow of information in different periods of time and the relationship between flow of information and inherent value. We optimize the diffusion mechanism of information based on model SEIR and improve the diffusion mechanism. In order to explore how inherent value of the information affects the flow of information, we simulate the model by using Matalab. We also use the data that the number of people is connected to Internet in Canada from the year 2009 to 2014 to analysis the model’s reliability. Then we use the model to predict the communication networks’ relationships and capacities around the year 2050. Last we do sensitivity analysis by making small changes in parameters of simulation experiment. The result of the experiment is helpful to model how public interest and opinion can be changed in complex network.
基金Project supported by the National Natural Science Foundation of China(Grant No.12072340)the Chinese Scholarship Council and the Australia Research Council through a linkage project fund。
文摘The successful application of perimeter control of urban traffic system strongly depends on the macroscopic fundamental diagram of the targeted region.Despite intensive studies on the partitioning of urban road networks,the dynamic partitioning of urban regions reflecting the propagation of congestion remains an open question.This paper proposes to partition the network into homogeneous sub-regions based on random walk algorithm.Starting from selected random walkers,the road network is partitioned from the early morning when congestion emerges.A modified Akaike information criterion is defined to find the optimal number of partitions.Region boundary adjustment algorithms are adopted to optimize the partitioning results to further ensure the correlation of partitions.The traffic data of Melbourne city are used to verify the effectiveness of the proposed partitioning method.
基金supported by the Fundamental Research Funds for the Central Universities of CAUC(3122022076)National Natural Science Foundation of China(NSFC)(U2133203).
文摘With the exponential increase in information security risks,ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment.However,experts possess a limited understanding of fundamental security elements,such as assets,threats,and vulnerabilities,due to the confidentiality of airborne networks,resulting in cognitive uncertainty.Therefore,the Pythagorean fuzzy Analytic Hierarchy Process(AHP)Technique for Order Preference by Similarity to an Ideal Solution(TOPSIS)is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks.First,Pythagorean fuzzy AHP is employed to construct an index system and quantify the pairwise comparison matrix for determining the index weights,which is used to solve the expert cognitive uncertainty in the process of evaluating the index system weight of airborne networks.Second,Pythagorean fuzzy the TOPSIS to an Ideal Solution is utilized to assess the risk prioritization of airborne networks using the Pythagorean fuzzy weighted distance measure,which is used to address the cognitive uncertainty in the evaluation process of various indicators in airborne network threat scenarios.Finally,a comparative analysis was conducted.The proposed method demonstrated the highest Kendall coordination coefficient of 0.952.This finding indicates superior consistency and confirms the efficacy of the method in addressing expert cognition during information security risk assessment for airborne networks.
文摘Having criticized the current architecture of Advanced Traveler Information Systems (ATISs), this work discusses a new base of requirements to develop a new paradigm for traffic information systems. It mainly integrates three dimensions within a traffic system: drivers' pattern of behavior and preferences, urban traffic desires, and capabilities of traffic information service providers. Based on the above, functional segments from several related backgrounds are brought together to structure a new architecture, called Interactive Traveler Information System (ITIS). The main interactive feature of this new architecture is a two-way communication track between drivers and the traffic information system provider-in fact, a decision on choosing a road at a particular time for an individual will be made based on the utility of both sides. This new configuration consists of driver-side smartphone application, centric traffic prediction, and decision-maker units, which will shape a new approach of decision-making processes. These all work together to satisfy the designated goal of ITIS, which is preserving the Wardrop equilibrium condition in the traffic network level. Finally, we concentrate on a comparison study, which shows a differentiation between performance of the proposed ITIS and the current ATIS model in a real situation. This has been done with simulations of analogical scenarios. The most noticeable advantage of the proposed architecture is not being limited to a saturation limit, and the positive effect of increasing system penetration in the performance of the newly introduced information system. In conclusion, new research subjects are suggested to be carried out.
文摘A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state.
基金This work was supported in part by the Australian Research Council Discovery Early Career Researcher Award under Grant DE200101128.
文摘This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is presented to describe the coordinated platoon behavior of leader-follower vehicles in the simultaneous presence of unknown external disturbances and an unknown leader control input.Under such a platoon model,the central aim is to achieve robust platoon formation tracking with desired inter-vehicle spacing and same velocities and accelerations guided by the leader,while attaining improved communication efficiency.Toward this aim,a novel bandwidth-aware dynamic event-triggered scheduling mechanism is developed.One salient feature of the scheduling mechanism is that the threshold parameter in the triggering law is dynamically adjusted over time based on both vehicular state variations and bandwidth status.Then,a sufficient condition for platoon control system stability and performance analysis as well as a co-design criterion of the admissible event-triggered platooning control law and the desired scheduling mechanism are derived.Finally,simulation results are provided to substantiate the effectiveness and merits of the proposed co-design approach for guaranteeing a trade-off between robust platooning control performance and communication efficiency.
基金supported by the National Natural Science Foundation of China(61471194 61705104)+1 种基金the Science and Technology on Avionics Integration Laboratory and Aeronautical Science Foundation of China(20155552050)the Natural Science Foundation of Jiangsu Province(BK20170804)
文摘Considering the relatively poor robustness of quality scores for different types of distortion and the lack of mechanism for determining distortion types, a no-reference image quality assessment(NR-IQA) method based on the Ada Boost BP neural network in the wavelet domain(WABNN) is proposed. A 36-dimensional image feature vector is constructed by extracting natural scene statistics(NSS) features and local information entropy features of the distorted image wavelet sub-band coefficients in three scales. The ABNN classifier is obtained by learning the relationship between image features and distortion types. The ABNN scorer is obtained by learning the relationship between image features and image quality scores. A series of contrast experiments are carried out in the laboratory of image and video engineering(LIVE) database and TID2013 database. Experimental results show the high accuracy of the distinguishing distortion type, the high consistency with subjective scores and the high robustness of the method for distorted images. Experiment results also show the independence of the database and the relatively high operation efficiency of this method.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘A fuzzy comprehensive assessment method of running condition was constructed and applied to a large-scale centrifugal compressor set in a petrochemical corporation aiming at the monitoring and early warning of abnormal conditions in industry.The maximal information coefficient(MIC)correlation analysis of indexes was introduced to determine the independent indexes to be assessed,and the dynamic deterioration degree was calculated using the predicted independent indexes by the second-order Markov chain model.The fuzzy membership degree weighting method was employed to assess the running condition of all units in the set.Simple and direct radar chart was used to visualize condition assessment grades.Results showed that the proposed fuzzy comprehensive assessment method successfully assessed the running condition of the set.The constructed method achieved 10 min earlier alarm than the traditional threshold alarm occurred at the specific moment of00:44 on April 7 of 2018.The method would provide a valuable tool and have a wide engineering application in ensuring the safety and reliability of industrial production.
基金supported by National Natural Science Foundation of China (Grant No. 70301012)National Hi-tech Research and Development Program of China (863 Program, Grant No. 2006AA04Z369-1)Innovative Talent Project of the Third Stage of "211" Project, Chongqing University, China (Grant No. S-09107)
文摘In order to make equipment run safely, economically and continuously, some new maintenance models were put forward to improve the equipment after-sale maintenance service, such as E-maintenance, third-party maintenance, etc. To certain extent, the models solved the problem of the distance between the manufacturer and customer and the dispersion of the maintenance technologies, however, those resources are still widely distributed and do not collaborate efficiently. In this paper, a network-based collaborative maintenance service model was proposed for after-sales equipment to solve the problem of maintenance resources integration. Concretely, equipment designers, maintainers, spare parts suppliers and maintenance experts were grouped together to establish dynamic alliance. The leader of the alliance is the manufacturer under guaranty period or equipment user exceeding the guaranty period. The process of maintenance service was divided into three stages which are fault diagnosis, maintenance decision and maintenance implementation. The sub-alliances were established to carry out maintenance work at each stage. In addition, the business process of network-based collaborative maintenance was analyzed and collaborative business system for equipment's after-sales collaborative maintenance service was designed. In the end, an informational economics model of network-based collaborative maintenance was established to demonstrate the effectiveness of this maintenance model.