A 3.8-kin Coupled Ice-Ocean Model (C1OM) was implemented to successfully reproduce many observed phenomena in the Beaufort and Chukchi seas, including the Bering-inflow-originated coastal current that splits into th...A 3.8-kin Coupled Ice-Ocean Model (C1OM) was implemented to successfully reproduce many observed phenomena in the Beaufort and Chukchi seas, including the Bering-inflow-originated coastal current that splits into three branches: Alaska Coastal Water (ACW) , Central Channel, and Herald Valley branches. Other modeled phenomena include the Beaufort Slope Current (BSC) , the Beaufort Gyre, the East Siberian Current ( ESC), mesoscale eddies, seasonal landfast ice, sea ice ridging, shear, and deformation. Many of these downscaling processes can only be captured by using a high-resolution CIOM, nested in a global climate model. The seasonal cycles for sea ice concentration, thickness, velocity, and other variables are well reproduced with Solid validation by satellite measurements. The seasonal cycles for upper ocean dynamics and thermodynamics are also well reproduced, which include the formation of the cold saline layer due to the injection of salt during sea ice formation, the BSC, and the subsurface upwelling in winter that brings up warm, even more saline Atlantic Water along the shelfbreak and shelf along the Beaufort coast.展开更多
In this paper, we take the model of Laser range finder based on synchronized scanner as example, show how to use data fusion method in the process of sensor model designing to get more robust output. Also we provide o...In this paper, we take the model of Laser range finder based on synchronized scanner as example, show how to use data fusion method in the process of sensor model designing to get more robust output. Also we provide our idea on the relation of sensor model, data fusion and system structure, and in the paper, there is a solution that transform the parameter space to get linear model for Kalman filter.展开更多
Non-contact remote sensing techniques,such as terrestrial laser scanning(TLS)and unmanned aerial vehicle(UAV)photogrammetry,have been globally applied for landslide monitoring in high and steep mountainous areas.These...Non-contact remote sensing techniques,such as terrestrial laser scanning(TLS)and unmanned aerial vehicle(UAV)photogrammetry,have been globally applied for landslide monitoring in high and steep mountainous areas.These techniques acquire terrain data and enable ground deformation monitoring.However,practical application of these technologies still faces many difficulties due to complex terrain,limited access and dense vegetation.For instance,monitoring high and steep slopes can obstruct the TLS sightline,and the accuracy of the UAV model may be compromised by absence of ground control points(GCPs).This paper proposes a TLS-and UAV-based method for monitoring landslide deformation in high mountain valleys using traditional real-time kinematics(RTK)-based control points(RCPs),low-precision TLS-based control points(TCPs)and assumed control points(ACPs)to achieve high-precision surface deformation analysis under obstructed vision and impassable conditions.The effects of GCP accuracy,GCP quantity and automatic tie point(ATP)quantity on the accuracy of UAV modeling and surface deformation analysis were comprehensively analyzed.The results show that,the proposed method allows for the monitoring accuracy of landslides to exceed the accuracy of the GCPs themselves by adding additional low-accuracy GCPs.The proposed method was implemented for monitoring the Xinhua landslide in Baoxing County,China,and was validated against data from multiple sources.展开更多
The Internet of Things(IoT)role is instrumental in the technological advancement of the healthcare industry.Both the hardware and the core level of software platforms are the progress resulted from the accompaniment o...The Internet of Things(IoT)role is instrumental in the technological advancement of the healthcare industry.Both the hardware and the core level of software platforms are the progress resulted from the accompaniment of Medicine 4.0.Healthcare IoT systems are the emergence of this foresight.The communication systems between the sensing nodes and the processors;and the processing algorithms to produce output obtained from the data collected by the sensors are the major empowering technologies.At present,many new technologies supplement these empowering technologies.So,in this research work,a practical feature extraction and classification technique is suggested for handling data acquisition besides data fusion to enhance treatment-related data.In the initial stage,IoT devices are gathered and pre-processed for fusion processing.Dynamic Bayesian Network is considered an improved balance for tractability,a tool for CDF operations.Improved Principal Component Analysis is deployed for feature extraction along with dimension reduction.Lastly,this data learning is attained through Hybrid Learning Classifier Model for data fusion performance examination.In this research,Deep Belief Neural Network and Support VectorMachine are hybridized for healthcare data prediction.Thus,the suggested system is probably a beneficial decision support tool for multiple data sources prediction and predictive ability enhancement.展开更多
Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to u...Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment.展开更多
Advanced Persistent Threat(APT)is now the most common network assault.However,the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks.The...Advanced Persistent Threat(APT)is now the most common network assault.However,the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks.They cannot provide rapid and accurate early warning and decision responses to the present system state because they are inadequate at deducing the risk evolution rules of network threats.To address the above problems,firstly,this paper constructs the multi-source threat element analysis ontology(MTEAO)by integrating multi-source network security knowledge bases.Subsequently,based on MTEAO,we propose a two-layer threat prediction model(TL-TPM)that combines the knowledge graph and the event graph.The macro-layer of TL-TPM is based on the knowledge graph to derive the propagation path of threats among devices and to correlate threat elements for threat warning and decision-making;The micro-layer ingeniously maps the attack graph onto the event graph and derives the evolution path of attack techniques based on the event graph to improve the explainability of the evolution of threat events.The experiment’s results demonstrate that TL-TPM can completely depict the threat development trend,and the early warning results are more precise and scientific,offering knowledge and guidance for active defense.展开更多
基金supports from the University of Alaska Costal Marine Institute(CMI) and Minerals Management Service(MMS) and IARC/JAMSTEC Cooperative Agreementsupported by NSF OPP Project ARC-0712673 awarded to Yanling Yu and Hajo Eicken (PIs) and Jia Wang(co-PI).This is GLERL Contribution No.1497
文摘A 3.8-kin Coupled Ice-Ocean Model (C1OM) was implemented to successfully reproduce many observed phenomena in the Beaufort and Chukchi seas, including the Bering-inflow-originated coastal current that splits into three branches: Alaska Coastal Water (ACW) , Central Channel, and Herald Valley branches. Other modeled phenomena include the Beaufort Slope Current (BSC) , the Beaufort Gyre, the East Siberian Current ( ESC), mesoscale eddies, seasonal landfast ice, sea ice ridging, shear, and deformation. Many of these downscaling processes can only be captured by using a high-resolution CIOM, nested in a global climate model. The seasonal cycles for sea ice concentration, thickness, velocity, and other variables are well reproduced with Solid validation by satellite measurements. The seasonal cycles for upper ocean dynamics and thermodynamics are also well reproduced, which include the formation of the cold saline layer due to the injection of salt during sea ice formation, the BSC, and the subsurface upwelling in winter that brings up warm, even more saline Atlantic Water along the shelfbreak and shelf along the Beaufort coast.
文摘In this paper, we take the model of Laser range finder based on synchronized scanner as example, show how to use data fusion method in the process of sensor model designing to get more robust output. Also we provide our idea on the relation of sensor model, data fusion and system structure, and in the paper, there is a solution that transform the parameter space to get linear model for Kalman filter.
基金support of the National Natural Science Foundation of China(Grant Nos.U2240221 and 41977229)the Sichuan Youth Science and Technology Innovation Research Team Project(Grant No.2020JDTD0006).
文摘Non-contact remote sensing techniques,such as terrestrial laser scanning(TLS)and unmanned aerial vehicle(UAV)photogrammetry,have been globally applied for landslide monitoring in high and steep mountainous areas.These techniques acquire terrain data and enable ground deformation monitoring.However,practical application of these technologies still faces many difficulties due to complex terrain,limited access and dense vegetation.For instance,monitoring high and steep slopes can obstruct the TLS sightline,and the accuracy of the UAV model may be compromised by absence of ground control points(GCPs).This paper proposes a TLS-and UAV-based method for monitoring landslide deformation in high mountain valleys using traditional real-time kinematics(RTK)-based control points(RCPs),low-precision TLS-based control points(TCPs)and assumed control points(ACPs)to achieve high-precision surface deformation analysis under obstructed vision and impassable conditions.The effects of GCP accuracy,GCP quantity and automatic tie point(ATP)quantity on the accuracy of UAV modeling and surface deformation analysis were comprehensively analyzed.The results show that,the proposed method allows for the monitoring accuracy of landslides to exceed the accuracy of the GCPs themselves by adding additional low-accuracy GCPs.The proposed method was implemented for monitoring the Xinhua landslide in Baoxing County,China,and was validated against data from multiple sources.
文摘The Internet of Things(IoT)role is instrumental in the technological advancement of the healthcare industry.Both the hardware and the core level of software platforms are the progress resulted from the accompaniment of Medicine 4.0.Healthcare IoT systems are the emergence of this foresight.The communication systems between the sensing nodes and the processors;and the processing algorithms to produce output obtained from the data collected by the sensors are the major empowering technologies.At present,many new technologies supplement these empowering technologies.So,in this research work,a practical feature extraction and classification technique is suggested for handling data acquisition besides data fusion to enhance treatment-related data.In the initial stage,IoT devices are gathered and pre-processed for fusion processing.Dynamic Bayesian Network is considered an improved balance for tractability,a tool for CDF operations.Improved Principal Component Analysis is deployed for feature extraction along with dimension reduction.Lastly,this data learning is attained through Hybrid Learning Classifier Model for data fusion performance examination.In this research,Deep Belief Neural Network and Support VectorMachine are hybridized for healthcare data prediction.Thus,the suggested system is probably a beneficial decision support tool for multiple data sources prediction and predictive ability enhancement.
文摘Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment.
文摘Advanced Persistent Threat(APT)is now the most common network assault.However,the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks.They cannot provide rapid and accurate early warning and decision responses to the present system state because they are inadequate at deducing the risk evolution rules of network threats.To address the above problems,firstly,this paper constructs the multi-source threat element analysis ontology(MTEAO)by integrating multi-source network security knowledge bases.Subsequently,based on MTEAO,we propose a two-layer threat prediction model(TL-TPM)that combines the knowledge graph and the event graph.The macro-layer of TL-TPM is based on the knowledge graph to derive the propagation path of threats among devices and to correlate threat elements for threat warning and decision-making;The micro-layer ingeniously maps the attack graph onto the event graph and derives the evolution path of attack techniques based on the event graph to improve the explainability of the evolution of threat events.The experiment’s results demonstrate that TL-TPM can completely depict the threat development trend,and the early warning results are more precise and scientific,offering knowledge and guidance for active defense.