In the past fifteen years, the attention of ship safety treatment as an objective rather than a constraint has started to sweep through the whole maritime industry. The risk-based ship design (RBD) methodology, advo...In the past fifteen years, the attention of ship safety treatment as an objective rather than a constraint has started to sweep through the whole maritime industry. The risk-based ship design (RBD) methodology, advocating systematic integration of risk assessment within the conventional design process has started to takeoff. Despite this wide recognition and increasing popularity, important factors that could potentially undermine the quality of the results come from both quantitative and qualitative aspects during the risk assessment process. This paper details a promising solution by developing a formalized methodology for risk assessment through effective storing and processing of historical data combined with data generated through first-principle approaches. This method should help to generate appropriate risk models in the selected platform (Bayesian networks) which can be employed for decision making at design stare.展开更多
The increasing use of the Internet with vehicles has made travel more convenient.However,hackers can attack intelligent vehicles through various technical loopholes,resulting in a range of security issues.Due to these...The increasing use of the Internet with vehicles has made travel more convenient.However,hackers can attack intelligent vehicles through various technical loopholes,resulting in a range of security issues.Due to these security issues,the safety protection technology of the in-vehicle system has become a focus of research.Using the advanced autoencoder network and recurrent neural network in deep learning,we investigated the intrusion detection system based on the in-vehicle system.We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior.In order to verify the accuracy and efficiency of the proposed model,it was evaluated using real vehicle data.The experimental results show that the combination of the two technologies can effectively and accurately identify abnormal boundary behavior.The parameters of the model are self-iteratively updated using the time-based back propagation algorithm.We verified that the model proposed in this study can reach a nearly 96%accurate detection rate.展开更多
Internet-based process control is becoming new generations of control systems, in which the Internet is used as a platform for global remote monitoring and control. The obvious benefit is to enable global collaboratio...Internet-based process control is becoming new generations of control systems, in which the Internet is used as a platform for global remote monitoring and control. The obvious benefit is to enable global collaboration between operators from geographically dispersed locations, data sharing and data provision for remote monitoring and control. However, connection to an open network and the use of universal technology present new problems that did not exist with the conventional design and construction of control systems, such as time delay and data loss in Internet transmission and security. This paper reviews the latest research results and presents design guidance of Internet based monitoring and control systems.展开更多
基金the financial support received by the University of Strathclyde in the form of a postgraduate research scholarship for the duration of the second author’s P hD studies
文摘In the past fifteen years, the attention of ship safety treatment as an objective rather than a constraint has started to sweep through the whole maritime industry. The risk-based ship design (RBD) methodology, advocating systematic integration of risk assessment within the conventional design process has started to takeoff. Despite this wide recognition and increasing popularity, important factors that could potentially undermine the quality of the results come from both quantitative and qualitative aspects during the risk assessment process. This paper details a promising solution by developing a formalized methodology for risk assessment through effective storing and processing of historical data combined with data generated through first-principle approaches. This method should help to generate appropriate risk models in the selected platform (Bayesian networks) which can be employed for decision making at design stare.
基金This work was supported by Research on the Influences of Network Security Threat Intelligence on Sichuan Government and Enterprises and the Development Countermeasure(Project ID 2018ZR0220)Research on Key Technologies of Network Security Protection in Intelligent Vehicle Based on(Project ID 2018JY0510)+3 种基金the Research on Abnormal Behavior Detection Technology of Automotive CAN Bus Based on Information Entropy(Project ID 2018Z105)the Research on the Training Mechanism of Driverless Network Safety Talents for Sichuan Auto Industry Based on Industry-University Synergy(Project ID 18RKX0667),Research and implementation of traffic cooperative perception and traffic signal optimization of main road(Project ID 2018YF0500707SN)Research and implementation of intelligent traffic control and monitoring system(Project ID 2019YGG0201)Remote upgrade system of intelligent vehicle software(Project ID 2018GZDZX0011).
文摘The increasing use of the Internet with vehicles has made travel more convenient.However,hackers can attack intelligent vehicles through various technical loopholes,resulting in a range of security issues.Due to these security issues,the safety protection technology of the in-vehicle system has become a focus of research.Using the advanced autoencoder network and recurrent neural network in deep learning,we investigated the intrusion detection system based on the in-vehicle system.We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior.In order to verify the accuracy and efficiency of the proposed model,it was evaluated using real vehicle data.The experimental results show that the combination of the two technologies can effectively and accurately identify abnormal boundary behavior.The parameters of the model are self-iteratively updated using the time-based back propagation algorithm.We verified that the model proposed in this study can reach a nearly 96%accurate detection rate.
基金Supported by the Engineering and Physical Science Research Council in the UK
文摘Internet-based process control is becoming new generations of control systems, in which the Internet is used as a platform for global remote monitoring and control. The obvious benefit is to enable global collaboration between operators from geographically dispersed locations, data sharing and data provision for remote monitoring and control. However, connection to an open network and the use of universal technology present new problems that did not exist with the conventional design and construction of control systems, such as time delay and data loss in Internet transmission and security. This paper reviews the latest research results and presents design guidance of Internet based monitoring and control systems.