The present research work attempted to delineate and characterize the reservoir facies from the Dawson Canyon Formation in the Penobscot field,Scotian Basin.An integrated study of instantaneous frequency,P-impedance,v...The present research work attempted to delineate and characterize the reservoir facies from the Dawson Canyon Formation in the Penobscot field,Scotian Basin.An integrated study of instantaneous frequency,P-impedance,volume of clay and neutron-porosity attributes,and structural framework was done to unravel the Late Cretaceous depositional system and reservoir facies distribution patterns within the study area.Fault strikes were found in the EW and NEE-SWW directions indicating the dominant course of tectonic activities during the Late Cretaceous period in the region.P-impedance was estimated using model-based seismic inversion.Petrophysical properties such as the neutron porosity(NPHI)and volume of clay(VCL)were estimated using the multilayer perceptron neural network with high accuracy.Comparatively,a combination of low instantaneous frequency(15-30 Hz),moderate to high impedance(7000-9500 gm/cc*m/s),low neutron porosity(27%-40%)and low volume of clay(40%-60%),suggests fair-to-good sandstone development in the Dawson Canyon Formation.After calibration with the welllog data,it is found that further lowering in these attribute responses signifies the clean sandstone facies possibly containing hydrocarbons.The present study suggests that the shale lithofacies dominates the Late Cretaceous deposition(Dawson Canyon Formation)in the Penobscot field,Scotian Basin.Major faults and overlying shale facies provide structural and stratigraphic seals and act as a suitable hydrocarbon entrapment mechanism in the Dawson Canyon Formation's reservoirs.The present research advocates the integrated analysis of multi-attributes estimated using different methods to minimize the risk involved in hydrocarbon exploration.展开更多
The challenge of transitioning from temporary humanitarian settlements to more sustainable human settlements is due to a significant increase in the number of forcibly displaced people over recent decades, difficultie...The challenge of transitioning from temporary humanitarian settlements to more sustainable human settlements is due to a significant increase in the number of forcibly displaced people over recent decades, difficulties in providing social services that meet the required standards, and the prolongation of emergencies. Despite this challenging context, short-term considerations continue to guide their planning and management rather than more integrated, longer-term perspectives, thus preventing viable, sustainable development. Over the years, the design of humanitarian settlements has not been adapted to local contexts and perspectives, nor to the dynamics of urbanization and population growth and data. In addition, the current approach to temporary settlement harms the environment and can strain limited resources. Inefficient land use and ad hoc development models have compounded difficulties and generated new challenges. As a result, living conditions in settlements have deteriorated over the last few decades and continue to pose new challenges. The stakes are such that major shortcomings have emerged along the way, leading to disruption, budget overruns in a context marked by a steady decline in funding. However, some attempts have been made to shift towards more sustainable approaches, but these have mainly focused on vague, sector-oriented themes, failing to consider systematic and integration views. This study is a contribution in addressing these shortcomings by designing a model-driving solution, emphasizing an integrated system conceptualized as a system of systems. This paper proposes a new methodology for designing an integrated and sustainable human settlement model, based on Model-Based Systems Engineering and a Systems Modeling Language to provide valuable insights toward sustainable solutions for displaced populations aligning with the United Nations 2030 agenda for sustainable development.展开更多
In the field of model-based system assessment,mathematical models are used to interpret the system behaviors.However,the industrial systems in this intelligent era will be more manageable.Various management operations...In the field of model-based system assessment,mathematical models are used to interpret the system behaviors.However,the industrial systems in this intelligent era will be more manageable.Various management operations will be dynamically set,and the system will be no longer static as it is initially designed.Thus,the static model generated by the traditional model-based safety assessment(MBSA)approach cannot be used to accurately assess the dependability.There mainly exists three problems.Complex:huge and complex behaviors make the modeling to be trivial manual;Dynamic:though there are thousands of states and transitions,the previous model must be resubmitted to assess whenever new management arrives;Unreusable:as for different systems,the model must be resubmitted by reconsidering both the management and the system itself at the same time though the management is the same.Motivated by solving the above problems,this research studies a formal management specifying approach with the advantages of agility modeling,dynamic modeling,and specification design that can be re-suable.Finally,three typical managements are specified in a series-parallel system as a demonstration to show the potential.展开更多
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in...Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.展开更多
Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate w...Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods.展开更多
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,shoul...This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,should ideally achieve the dual purposes of maximum data hiding and maintenance of the integrity of the cover media so that it is least suspect.The contemporary methods of steganography are at best a compromise between these two.In this paper,we present our approach,entitled Ant Colony Optimization(ACO)-Least Significant Bit(LSB),which attempts to optimize the capacity in steganographic embedding.The approach makes use of a grayscale cover image to hide the confidential data with an additional bit pair per byte,both for integrity verification and the file checksumof the secret data.This approach encodes confidential information into four pairs of bits and embeds it within uncompressed grayscale images.The ACO algorithm uses adaptive exploration to select some pixels,maximizing the capacity of data embedding whileminimizing the degradation of visual quality.Pheromone evaporation is introduced through iterations to avoid stagnation in solution refinement.The levels of pheromone are modified to reinforce successful pixel choices.Experimental results obtained through the ACO-LSB method reveal that it clearly improves image steganography capabilities by providing an increase of up to 30%in the embedding capacity compared with traditional approaches;the average Peak Signal to Noise Ratio(PSNR)is 40.5 dB with a Structural Index Similarity(SSIM)of 0.98.The approach also demonstrates very high resistance to detection,cutting down the rate by 20%.Implemented in MATLAB R2023a,the model was tested against one thousand publicly available grayscale images,thus providing robust evidence of its effectiveness.展开更多
Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into ...Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.展开更多
A new steganographic method by pixel-value differencing(PVD)using general quantization ranges of pixel pairs’difference values is proposed.The objective of this method is to provide a data embedding technique with a ...A new steganographic method by pixel-value differencing(PVD)using general quantization ranges of pixel pairs’difference values is proposed.The objective of this method is to provide a data embedding technique with a range table with range widths not limited to powers of 2,extending PVD-based methods to enhance their flexibility and data-embedding rates without changing their capabilities to resist security attacks.Specifically,the conventional PVD technique partitions a grayscale image into 1×2 non-overlapping blocks.The entire range[0,255]of all possible absolute values of the pixel pairs’grayscale differences in the blocks is divided into multiple quantization ranges.The width of each quantization range is a power of two to facilitate the direct embedding of the bit information with high embedding rates.Without using power-of-two range widths,the embedding rates can drop using conventional embedding techniques.In contrast,the proposed method uses general quantization range widths,and a multiple-based number conversion mechanism is employed skillfully to implement the use of nonpower-of-two range widths,with each pixel pair being employed to embed a digit in the multiple-based number.All the message bits are converted into a big multiple-based number whose digits can be embedded into the pixel pairs with a higher embedding rate.Good experimental results showed the feasibility of the proposed method and its resistance to security attacks.In addition,implementation examples are provided,where the proposed method adopts non-power-of-two range widths and employsmultiple-based number conversion to expand the data-hiding and steganalysis-resisting capabilities of other PVD methods.展开更多
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s...Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.展开更多
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential priority.To overcome these difficulties,different steganography and data encr...In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential priority.To overcome these difficulties,different steganography and data encryption methods have been proposed by researchers to secure communications.Most of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB substitution.In this work,we have an approach that utilizes a combinationofMost SignificantBit(MSB)matching andLeast Significant Bit(LSB)substitution.The proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of individual pixels using pair matching,enabling the storage of 6 bits in one pixel by modifying a maximum of three bits.The proposed technique is evaluated using embedding capacity and Peak Signal-to-Noise Ratio(PSNR)score,we compared our work with the Zakariya scheme the results showed a significant increase in data concealment capacity.The achieved results of ourwork showthat our algorithmdemonstrates an improvement in hiding capacity from11%to 22%for different data samples while maintaining a minimumPeak Signal-to-Noise Ratio(PSNR)of 37 dB.These findings highlight the effectiveness and trustworthiness of the proposed algorithm in securing the communication process and maintaining visual integrity.展开更多
Steganography is a technique that is frequently used to hide hidden information in multimedia artifacts including music, video, and images. In order to protect data saved in the cloud, this paper presents a steganogra...Steganography is a technique that is frequently used to hide hidden information in multimedia artifacts including music, video, and images. In order to protect data saved in the cloud, this paper presents a steganography method for encrypting sound utilizing LSB-based computation. By using the least significant bit (LSB) of a byte to represent a message and then substituting each LSB bit with a binary message and encrypting a significant quantity of data. The proposed system uses the LSB technique of picture steganography, Multi-Level Encryption Algorithm (MLEA) and Two-Level Encryption Algorithm (TLEA) data encryption to give the highest level of cloud security. Compared to other current schemes, the performance of the suggested method is 1.732125% better on average.展开更多
The condition of rotor system must be assessed in order to develop condition-based maintenance for rotating machinery. It is determined by multiple variables such as unbalance degree, misalignment degree, the amount o...The condition of rotor system must be assessed in order to develop condition-based maintenance for rotating machinery. It is determined by multiple variables such as unbalance degree, misalignment degree, the amount of bending deformation of the shaft, occurrence of shaft crack of rotor system and so on. The estimation of the degrees of unbalance and misalignment in flexible coupling-rotor system is discussed. The model-based approach is employed to solve this problem. The models of the equivalent external loads for unbalance and misalignment are derived and analyzed. Then, the degrees of unbalance and misalignment are estimated by analyzing the components of the equivalent external loads of which the frequencies are equal to the 1 and 2 times running frequency respectively. The equivalent external loads are calculated according to the dynamic equation of the original rotor system and the differences between the dynamical responses in normal case and the vibrations when the degree of unbalance or misalignment or both changes. The denoise method based on bandpass filter is used to decrease the effect of noise on the estimation accuracy. The numerical examples are given to show that the proposed approach can estimate the degrees of unbalance and misalignment of the flexible coupling-rotor system accurately.展开更多
This paper focuses on the use of models for increasing the precision of estimators in large-area forest surveys. It is motivated by the increasing availability of remotely sensed data, which facilitates the developmen...This paper focuses on the use of models for increasing the precision of estimators in large-area forest surveys. It is motivated by the increasing availability of remotely sensed data, which facilitates the development of models predicting the variables of interest in forest surveys. We present, review and compare three different estimation frameworks where models play a core role: model-assisted, model-based, and hybrid estimation. The first two are well known, whereas the third has only recently been introduced in forest surveys. Hybrid inference mixes design- based and model-based inference, since it relies on a probability sample of auxiliary data and a model predicting the target variable from the auxiliary data.We review studies on large-area forest surveys based on model-assisted, model- based, and hybrid estimation, and discuss advantages and disadvantages of the approaches. We conclude that no general recommendations can be made about whether model-assisted, model-based, or hybrid estimation should be preferred. The choice depends on the objective of the survey and the possibilities to acquire appropriate field and remotely sensed data. We also conclude that modelling approaches can only be successfully applied for estimating target variables such as growing stock volume or biomass, which are adequately related to commonly available remotely sensed data, and thus purely field based surveys remain important for several important forest parameters.展开更多
In previous researches on a model-based diagnostic system, the components are assumed mutually independent. Howerver , the assumption is not always the case because the information about whether a component is faulty ...In previous researches on a model-based diagnostic system, the components are assumed mutually independent. Howerver , the assumption is not always the case because the information about whether a component is faulty or not usually influences our knowledge about other components. Some experts may draw such a conclusion that 'if component m 1 is faulty, then component m 2 may be faulty too'. How can we use this experts' knowledge to aid the diagnosis? Based on Kohlas's probabilistic assumption-based reasoning method, we use Bayes networks to solve this problem. We calculate the posterior fault probability of the components in the observation state. The result is reasonable and reflects the effectiveness of the experts' knowledge.展开更多
In this paper,a novel control structure called feedback scheduling of model-based networked control systems is proposed to cope with a flexible network load and resource constraints.The state update time is adjusted a...In this paper,a novel control structure called feedback scheduling of model-based networked control systems is proposed to cope with a flexible network load and resource constraints.The state update time is adjusted according to the real-time network congestion situation.State observer is used under the situation where the state of the controlled plant could not be acquired.The stability criterion of the proposed structure is proved with time-varying state update time.On the basis of the stability of the novel system structure,the compromise between the control performance and the network utilization is realized by using feedback scheduler. Examples are provided to show the advantage of the proposed control structure.展开更多
In early 2018,the Boliden Garpenberg operation implemented an optimized control strategy as an addition to the existing ventilation on demand system.The purpose of the strategy is to further minimize energy use for ma...In early 2018,the Boliden Garpenberg operation implemented an optimized control strategy as an addition to the existing ventilation on demand system.The purpose of the strategy is to further minimize energy use for main and booster fans,whilst also fulfilling airflow setpoints without violating constraints such as min/max differential pressure over fans and interaction of air between areas in mines.Using air flow measurements and a dynamical model of the ventilation system,a mine-wide coordination control of fans can be carried out.The numerical model is data driven and derived from historical operational data or step changes experiments.This makes both initial deployment and lifetime model maintenance,as the mine evolves,a comparably easy operation.The control has been proven to operate in a stable manner over long periods without having to re-calibrate the model.Results prove a 40%decrease in energy use for the fans involved and a greater controllability of air flow.Moreover,a 15%decrease of the total air flow into the mine will give additional proportional heating savings during winter periods.All in all,the multivariable controller shows a correlation between production in the mine and the ventilation system performance superior to all of its predecessors.展开更多
This work was focused on the model-based design method of two-axis four-actuator(TAFA) fast steering mirror system(FSM), in order to improve the design efficiency. The structure and operation principle commonality of ...This work was focused on the model-based design method of two-axis four-actuator(TAFA) fast steering mirror system(FSM), in order to improve the design efficiency. The structure and operation principle commonality of normal TAFA FSM were investigated. Based on the structure and the commonality, the conditions of single-axis idea, high-frequency resonance and coupling were modeled gradually. Combining these models, a holonomic system model was established to reflect and predict the performance of TAFA FSM. A model-based design method was proposed based on the holonomic system model. The design flow and design concept of the method were described. In accordance with the method, a TAFA FSM was designed. Simulations and experiments of the FSM were done, and the results of them were compared. The compared results indicate that the holonomic system model can well reflect and predict the performance of TAFA FSM. The bandwidth of TAFA FSM is more than 250 Hz; adjust time is less than 15 ms;overshoot is less than 8%; position accuracy is better than 10 μrad; the FSM prototype can satisfy the requirements.展开更多
In this paper, the control of a two-time-scale plant, where the sensor is connected to a linear controller/ actuator via a network is addressed. The slow and fast systems of singularly perturbed systems are used to pr...In this paper, the control of a two-time-scale plant, where the sensor is connected to a linear controller/ actuator via a network is addressed. The slow and fast systems of singularly perturbed systems are used to produce an estimate of the plant state behavior between transmission times, by which one can reduce the usage of the network. The approximate solutions of the whole systems are derived and it is shown that the whole systems via the network control are generally asymptotically stable as long as their slow and fast systems are both stable. These results are also extended to the case of network delay.展开更多
The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive...The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive information securely,researchers are combining robust cryptography and steganographic approaches.The objective of this research is to introduce a more secure method of video steganography by using Deoxyribonucleic acid(DNA)for embedding encrypted data and an intelligent frame selection algorithm to improve video imperceptibility.In the previous approach,DNA was used only for frame selection.If this DNA is compromised,then our frames with the hidden and unencrypted data will be exposed.Moreover the frame selected in this way were random frames,and no consideration was made to the contents of frames.Hiding data in this way introduces visible artifacts in video.In the proposed approach rather than using DNA for frame selection we have created a fakeDNA out of our data and then embedded it in a video file on intelligently selected frames called the complex frames.Using chaotic maps and linear congruential generators,a unique pixel set is selected each time only from the identified complex frames,and encrypted data is embedded in these random locations.Experimental results demonstrate that the proposed technique shows minimum degradation of the stenographic video hence reducing the very first chances of visual surveillance.Further,the selection of complex frames for embedding and creation of a fake DNA as proposed in this research have higher peak signal-to-noise ratio(PSNR)and reduced mean squared error(MSE)values that indicate improved results.The proposed methodology has been implemented in Matlab.展开更多
This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems,...This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems, the model-based networked predictive control strategy can compensate for communication delay and data loss in an active way. The designed model-based predictive controller can also guarantee the stability of the closed-loop networked system. The simulation re- suits demonstrate the feasibility and efficacy of the proposed model-based predictive controller design scheme.展开更多
文摘The present research work attempted to delineate and characterize the reservoir facies from the Dawson Canyon Formation in the Penobscot field,Scotian Basin.An integrated study of instantaneous frequency,P-impedance,volume of clay and neutron-porosity attributes,and structural framework was done to unravel the Late Cretaceous depositional system and reservoir facies distribution patterns within the study area.Fault strikes were found in the EW and NEE-SWW directions indicating the dominant course of tectonic activities during the Late Cretaceous period in the region.P-impedance was estimated using model-based seismic inversion.Petrophysical properties such as the neutron porosity(NPHI)and volume of clay(VCL)were estimated using the multilayer perceptron neural network with high accuracy.Comparatively,a combination of low instantaneous frequency(15-30 Hz),moderate to high impedance(7000-9500 gm/cc*m/s),low neutron porosity(27%-40%)and low volume of clay(40%-60%),suggests fair-to-good sandstone development in the Dawson Canyon Formation.After calibration with the welllog data,it is found that further lowering in these attribute responses signifies the clean sandstone facies possibly containing hydrocarbons.The present study suggests that the shale lithofacies dominates the Late Cretaceous deposition(Dawson Canyon Formation)in the Penobscot field,Scotian Basin.Major faults and overlying shale facies provide structural and stratigraphic seals and act as a suitable hydrocarbon entrapment mechanism in the Dawson Canyon Formation's reservoirs.The present research advocates the integrated analysis of multi-attributes estimated using different methods to minimize the risk involved in hydrocarbon exploration.
文摘The challenge of transitioning from temporary humanitarian settlements to more sustainable human settlements is due to a significant increase in the number of forcibly displaced people over recent decades, difficulties in providing social services that meet the required standards, and the prolongation of emergencies. Despite this challenging context, short-term considerations continue to guide their planning and management rather than more integrated, longer-term perspectives, thus preventing viable, sustainable development. Over the years, the design of humanitarian settlements has not been adapted to local contexts and perspectives, nor to the dynamics of urbanization and population growth and data. In addition, the current approach to temporary settlement harms the environment and can strain limited resources. Inefficient land use and ad hoc development models have compounded difficulties and generated new challenges. As a result, living conditions in settlements have deteriorated over the last few decades and continue to pose new challenges. The stakes are such that major shortcomings have emerged along the way, leading to disruption, budget overruns in a context marked by a steady decline in funding. However, some attempts have been made to shift towards more sustainable approaches, but these have mainly focused on vague, sector-oriented themes, failing to consider systematic and integration views. This study is a contribution in addressing these shortcomings by designing a model-driving solution, emphasizing an integrated system conceptualized as a system of systems. This paper proposes a new methodology for designing an integrated and sustainable human settlement model, based on Model-Based Systems Engineering and a Systems Modeling Language to provide valuable insights toward sustainable solutions for displaced populations aligning with the United Nations 2030 agenda for sustainable development.
基金the National Natural Science Foundation of China(52105070,U21B2074)Department of Science and Technology of Liaoning Province China(2033JH1/10400007).
文摘In the field of model-based system assessment,mathematical models are used to interpret the system behaviors.However,the industrial systems in this intelligent era will be more manageable.Various management operations will be dynamically set,and the system will be no longer static as it is initially designed.Thus,the static model generated by the traditional model-based safety assessment(MBSA)approach cannot be used to accurately assess the dependability.There mainly exists three problems.Complex:huge and complex behaviors make the modeling to be trivial manual;Dynamic:though there are thousands of states and transitions,the previous model must be resubmitted to assess whenever new management arrives;Unreusable:as for different systems,the model must be resubmitted by reconsidering both the management and the system itself at the same time though the management is the same.Motivated by solving the above problems,this research studies a formal management specifying approach with the advantages of agility modeling,dynamic modeling,and specification design that can be re-suable.Finally,three typical managements are specified in a series-parallel system as a demonstration to show the potential.
基金supported in part by the National Natural Science Foundation of China(Nos.62372083,62072074,62076054,62027827,62002047)the Sichuan Science and Technology Innovation Platform and Talent Plan(No.2022JDJQ0039)+2 种基金the Sichuan Science and Technology Support Plan(Nos.2024NSFTD0005,2022YFQ0045,2022YFS0220,2023YFS0020,2023YFS0197,2023YFG0148)the CCF-Baidu Open Fund(No.202312)the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).
文摘Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.
基金Dr.Arshiya Sajid Ansari would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under Project No.R-2023-910.
文摘Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods.
文摘This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,should ideally achieve the dual purposes of maximum data hiding and maintenance of the integrity of the cover media so that it is least suspect.The contemporary methods of steganography are at best a compromise between these two.In this paper,we present our approach,entitled Ant Colony Optimization(ACO)-Least Significant Bit(LSB),which attempts to optimize the capacity in steganographic embedding.The approach makes use of a grayscale cover image to hide the confidential data with an additional bit pair per byte,both for integrity verification and the file checksumof the secret data.This approach encodes confidential information into four pairs of bits and embeds it within uncompressed grayscale images.The ACO algorithm uses adaptive exploration to select some pixels,maximizing the capacity of data embedding whileminimizing the degradation of visual quality.Pheromone evaporation is introduced through iterations to avoid stagnation in solution refinement.The levels of pheromone are modified to reinforce successful pixel choices.Experimental results obtained through the ACO-LSB method reveal that it clearly improves image steganography capabilities by providing an increase of up to 30%in the embedding capacity compared with traditional approaches;the average Peak Signal to Noise Ratio(PSNR)is 40.5 dB with a Structural Index Similarity(SSIM)of 0.98.The approach also demonstrates very high resistance to detection,cutting down the rate by 20%.Implemented in MATLAB R2023a,the model was tested against one thousand publicly available grayscale images,thus providing robust evidence of its effectiveness.
基金This research was funded by the Ministry of Higher Education(MOHE)through Fundamental Research Grant Scheme(FRGS)under the Grand Number FRGS/1/2020/ICT01/UK M/02/4,and University Kebangsaan Malaysia for open access publication.
文摘Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.
文摘A new steganographic method by pixel-value differencing(PVD)using general quantization ranges of pixel pairs’difference values is proposed.The objective of this method is to provide a data embedding technique with a range table with range widths not limited to powers of 2,extending PVD-based methods to enhance their flexibility and data-embedding rates without changing their capabilities to resist security attacks.Specifically,the conventional PVD technique partitions a grayscale image into 1×2 non-overlapping blocks.The entire range[0,255]of all possible absolute values of the pixel pairs’grayscale differences in the blocks is divided into multiple quantization ranges.The width of each quantization range is a power of two to facilitate the direct embedding of the bit information with high embedding rates.Without using power-of-two range widths,the embedding rates can drop using conventional embedding techniques.In contrast,the proposed method uses general quantization range widths,and a multiple-based number conversion mechanism is employed skillfully to implement the use of nonpower-of-two range widths,with each pixel pair being employed to embed a digit in the multiple-based number.All the message bits are converted into a big multiple-based number whose digits can be embedded into the pixel pairs with a higher embedding rate.Good experimental results showed the feasibility of the proposed method and its resistance to security attacks.In addition,implementation examples are provided,where the proposed method adopts non-power-of-two range widths and employsmultiple-based number conversion to expand the data-hiding and steganalysis-resisting capabilities of other PVD methods.
文摘Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.
基金in part by the Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(NRF-2021R1A6A1A03039493)by the 2024 Yeungnam University Research Grant.
文摘In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential priority.To overcome these difficulties,different steganography and data encryption methods have been proposed by researchers to secure communications.Most of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB substitution.In this work,we have an approach that utilizes a combinationofMost SignificantBit(MSB)matching andLeast Significant Bit(LSB)substitution.The proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of individual pixels using pair matching,enabling the storage of 6 bits in one pixel by modifying a maximum of three bits.The proposed technique is evaluated using embedding capacity and Peak Signal-to-Noise Ratio(PSNR)score,we compared our work with the Zakariya scheme the results showed a significant increase in data concealment capacity.The achieved results of ourwork showthat our algorithmdemonstrates an improvement in hiding capacity from11%to 22%for different data samples while maintaining a minimumPeak Signal-to-Noise Ratio(PSNR)of 37 dB.These findings highlight the effectiveness and trustworthiness of the proposed algorithm in securing the communication process and maintaining visual integrity.
文摘Steganography is a technique that is frequently used to hide hidden information in multimedia artifacts including music, video, and images. In order to protect data saved in the cloud, this paper presents a steganography method for encrypting sound utilizing LSB-based computation. By using the least significant bit (LSB) of a byte to represent a message and then substituting each LSB bit with a binary message and encrypting a significant quantity of data. The proposed system uses the LSB technique of picture steganography, Multi-Level Encryption Algorithm (MLEA) and Two-Level Encryption Algorithm (TLEA) data encryption to give the highest level of cloud security. Compared to other current schemes, the performance of the suggested method is 1.732125% better on average.
基金supported by National Natural Science Foundation of China(Grant No. 10772061)Heilongjiang Provincial Natural Science Foundation of China(Grant No. ZJG0704)
文摘The condition of rotor system must be assessed in order to develop condition-based maintenance for rotating machinery. It is determined by multiple variables such as unbalance degree, misalignment degree, the amount of bending deformation of the shaft, occurrence of shaft crack of rotor system and so on. The estimation of the degrees of unbalance and misalignment in flexible coupling-rotor system is discussed. The model-based approach is employed to solve this problem. The models of the equivalent external loads for unbalance and misalignment are derived and analyzed. Then, the degrees of unbalance and misalignment are estimated by analyzing the components of the equivalent external loads of which the frequencies are equal to the 1 and 2 times running frequency respectively. The equivalent external loads are calculated according to the dynamic equation of the original rotor system and the differences between the dynamical responses in normal case and the vibrations when the degree of unbalance or misalignment or both changes. The denoise method based on bandpass filter is used to decrease the effect of noise on the estimation accuracy. The numerical examples are given to show that the proposed approach can estimate the degrees of unbalance and misalignment of the flexible coupling-rotor system accurately.
文摘This paper focuses on the use of models for increasing the precision of estimators in large-area forest surveys. It is motivated by the increasing availability of remotely sensed data, which facilitates the development of models predicting the variables of interest in forest surveys. We present, review and compare three different estimation frameworks where models play a core role: model-assisted, model-based, and hybrid estimation. The first two are well known, whereas the third has only recently been introduced in forest surveys. Hybrid inference mixes design- based and model-based inference, since it relies on a probability sample of auxiliary data and a model predicting the target variable from the auxiliary data.We review studies on large-area forest surveys based on model-assisted, model- based, and hybrid estimation, and discuss advantages and disadvantages of the approaches. We conclude that no general recommendations can be made about whether model-assisted, model-based, or hybrid estimation should be preferred. The choice depends on the objective of the survey and the possibilities to acquire appropriate field and remotely sensed data. We also conclude that modelling approaches can only be successfully applied for estimating target variables such as growing stock volume or biomass, which are adequately related to commonly available remotely sensed data, and thus purely field based surveys remain important for several important forest parameters.
文摘In previous researches on a model-based diagnostic system, the components are assumed mutually independent. Howerver , the assumption is not always the case because the information about whether a component is faulty or not usually influences our knowledge about other components. Some experts may draw such a conclusion that 'if component m 1 is faulty, then component m 2 may be faulty too'. How can we use this experts' knowledge to aid the diagnosis? Based on Kohlas's probabilistic assumption-based reasoning method, we use Bayes networks to solve this problem. We calculate the posterior fault probability of the components in the observation state. The result is reasonable and reflects the effectiveness of the experts' knowledge.
文摘In this paper,a novel control structure called feedback scheduling of model-based networked control systems is proposed to cope with a flexible network load and resource constraints.The state update time is adjusted according to the real-time network congestion situation.State observer is used under the situation where the state of the controlled plant could not be acquired.The stability criterion of the proposed structure is proved with time-varying state update time.On the basis of the stability of the novel system structure,the compromise between the control performance and the network utilization is realized by using feedback scheduler. Examples are provided to show the advantage of the proposed control structure.
文摘In early 2018,the Boliden Garpenberg operation implemented an optimized control strategy as an addition to the existing ventilation on demand system.The purpose of the strategy is to further minimize energy use for main and booster fans,whilst also fulfilling airflow setpoints without violating constraints such as min/max differential pressure over fans and interaction of air between areas in mines.Using air flow measurements and a dynamical model of the ventilation system,a mine-wide coordination control of fans can be carried out.The numerical model is data driven and derived from historical operational data or step changes experiments.This makes both initial deployment and lifetime model maintenance,as the mine evolves,a comparably easy operation.The control has been proven to operate in a stable manner over long periods without having to re-calibrate the model.Results prove a 40%decrease in energy use for the fans involved and a greater controllability of air flow.Moreover,a 15%decrease of the total air flow into the mine will give additional proportional heating savings during winter periods.All in all,the multivariable controller shows a correlation between production in the mine and the ventilation system performance superior to all of its predecessors.
基金Projects(51135009)supported by the National Natural Science Foundation of China
文摘This work was focused on the model-based design method of two-axis four-actuator(TAFA) fast steering mirror system(FSM), in order to improve the design efficiency. The structure and operation principle commonality of normal TAFA FSM were investigated. Based on the structure and the commonality, the conditions of single-axis idea, high-frequency resonance and coupling were modeled gradually. Combining these models, a holonomic system model was established to reflect and predict the performance of TAFA FSM. A model-based design method was proposed based on the holonomic system model. The design flow and design concept of the method were described. In accordance with the method, a TAFA FSM was designed. Simulations and experiments of the FSM were done, and the results of them were compared. The compared results indicate that the holonomic system model can well reflect and predict the performance of TAFA FSM. The bandwidth of TAFA FSM is more than 250 Hz; adjust time is less than 15 ms;overshoot is less than 8%; position accuracy is better than 10 μrad; the FSM prototype can satisfy the requirements.
基金the National Natural Science Foundation of China (No. 10671069, 60674046)
文摘In this paper, the control of a two-time-scale plant, where the sensor is connected to a linear controller/ actuator via a network is addressed. The slow and fast systems of singularly perturbed systems are used to produce an estimate of the plant state behavior between transmission times, by which one can reduce the usage of the network. The approximate solutions of the whole systems are derived and it is shown that the whole systems via the network control are generally asymptotically stable as long as their slow and fast systems are both stable. These results are also extended to the case of network delay.
基金Taif University Researchers Supporting Project number(TURSP-2020/98),Taif University,Taif,Saudi Arabia.
文摘The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive information securely,researchers are combining robust cryptography and steganographic approaches.The objective of this research is to introduce a more secure method of video steganography by using Deoxyribonucleic acid(DNA)for embedding encrypted data and an intelligent frame selection algorithm to improve video imperceptibility.In the previous approach,DNA was used only for frame selection.If this DNA is compromised,then our frames with the hidden and unencrypted data will be exposed.Moreover the frame selected in this way were random frames,and no consideration was made to the contents of frames.Hiding data in this way introduces visible artifacts in video.In the proposed approach rather than using DNA for frame selection we have created a fakeDNA out of our data and then embedded it in a video file on intelligently selected frames called the complex frames.Using chaotic maps and linear congruential generators,a unique pixel set is selected each time only from the identified complex frames,and encrypted data is embedded in these random locations.Experimental results demonstrate that the proposed technique shows minimum degradation of the stenographic video hence reducing the very first chances of visual surveillance.Further,the selection of complex frames for embedding and creation of a fake DNA as proposed in this research have higher peak signal-to-noise ratio(PSNR)and reduced mean squared error(MSE)values that indicate improved results.The proposed methodology has been implemented in Matlab.
基金Project supported by the Key Program for the National Natural Science Foundation of China(Grant No.61333003)the General Program for the National Natural Science Foundation of China(Grant No.61273104)
文摘This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems, the model-based networked predictive control strategy can compensate for communication delay and data loss in an active way. The designed model-based predictive controller can also guarantee the stability of the closed-loop networked system. The simulation re- suits demonstrate the feasibility and efficacy of the proposed model-based predictive controller design scheme.