The growing prevalence of fake images on the Internet and social media makes image integrity verification a crucial research topic.One of the most popular methods for manipulating digital images is image splicing,whic...The growing prevalence of fake images on the Internet and social media makes image integrity verification a crucial research topic.One of the most popular methods for manipulating digital images is image splicing,which involves copying a specific area from one image and pasting it into another.Attempts were made to mitigate the effects of image splicing,which continues to be a significant research challenge.This study proposes a new splicing detectionmodel,combining Sonine functions-derived convex-based features and deep features.Two stages make up the proposed method.The first step entails feature extraction,then classification using the“support vector machine”(SVM)to differentiate authentic and spliced images.The proposed Sonine functions-based feature extraction model reveals the spliced texture details by extracting some clues about the probability of image pixels.The proposed model achieved an accuracy of 98.93% when tested with the CASIA V2.0 dataset“Chinese Academy of Sciences,Institute of Automation”which is a publicly available dataset for forgery classification.The experimental results show that,for image splicing forgery detection,the proposed Sonine functions-derived convex-based features and deep features outperform state-of-the-art techniques in terms of accuracy,precision,and recall.Overall,the obtained detection accuracy attests to the benefit of using the Sonine functions alongside deep feature representations.Finding the regions or locations where image tampering has taken place is limited by the study.Future research will need to look into advanced image analysis techniques that can offer a higher degree of accuracy in identifying and localizing tampering regions.展开更多
Acute Lymphoblastic Leukemia(ALL)is a fatal malignancy that is featured by the abnormal increase of immature lymphocytes in blood or bone marrow.Early prognosis of ALL is indispensable for the effectual remediation of...Acute Lymphoblastic Leukemia(ALL)is a fatal malignancy that is featured by the abnormal increase of immature lymphocytes in blood or bone marrow.Early prognosis of ALL is indispensable for the effectual remediation of this disease.Initial screening of ALL is conducted through manual examination of stained blood smear microscopic images,a process which is time-consuming and prone to errors.Therefore,many deep learning-based computer-aided diagnosis(CAD)systems have been established to automatically diagnose ALL.This paper proposes a novel hybrid deep learning system for ALL diagnosis in blood smear images.The introduced system integrates the proficiency of autoencoder networks in feature representational learning in latent space with the superior feature extraction capability of standard pretrained convolutional neural networks(CNNs)to identify the existence of ALL in blood smears.An augmented set of deep image features are formed from the features extracted by GoogleNet and Inception-v3 CNNs from a hybrid dataset of microscopic blood smear images.A sparse autoencoder network is designed to create an abstract set of significant latent features from the enlarged image feature set.The latent features are used to perform image classification using Support Vector Machine(SVM)classifier.The obtained results show that the latent features improve the classification performance of the proposed ALL diagnosis system over the original image features.Moreover,the classification performance of the system with various sizes of the latent feature set is evaluated.The retrieved results reveal that the introduced ALL diagnosis system superiorly compete the state of the art.展开更多
Electricity theft is a widespread non-technical issue that has a negative impact on both power grids and electricity users.It hinders the economic growth of utility companies,poses electrical risks,and impacts the hig...Electricity theft is a widespread non-technical issue that has a negative impact on both power grids and electricity users.It hinders the economic growth of utility companies,poses electrical risks,and impacts the high energy costs borne by consumers.The development of smart grids is crucial for the identification of power theft since these systems create enormous amounts of data,including information on client consumption,which may be used to identify electricity theft using machine learning and deep learning techniques.Moreover,there also exist different solutions such as hardware-based solutions to detect electricity theft that may require human resources and expensive hardware.Computer-based solutions are presented in the literature to identify electricity theft but due to the dimensionality curse,class imbalance issue and improper hyper-parameter tuning of such models lead to poor performance.In this research,a hybrid deep learning model abbreviated as RoGRUT is proposed to detect electricity theft as amalicious and non-malicious activity.The key steps of the RoGRUT are data preprocessing that covers the problem of class imbalance,feature extraction and final theft detection.Different advanced-level models like RoBERTa is used to address the curse of dimensionality issue,the near miss for class imbalance,and transfer learning for classification.The effectiveness of the RoGRUTis evaluated using the dataset fromactual smartmeters.A significant number of simulations demonstrate that,when compared to its competitors,the RoGRUT achieves the best classification results.The performance evaluation of the proposed model revealed exemplary results across variousmetrics.The accuracy achieved was 88%,with precision at an impressive 86%and recall reaching 84%.The F1-Score,a measure of overall performance,stood at 85%.Furthermore,themodel exhibited a noteworthyMatthew correlation coefficient of 78%and excelled with an area under the curve of 91%.展开更多
According to China’s second national survey of pollution sources, the contribution of agricultural non-point sources(ANS) to water pollution is still high. Risk prevention and control are the main means to control co...According to China’s second national survey of pollution sources, the contribution of agricultural non-point sources(ANS) to water pollution is still high. Risk prevention and control are the main means to control costs and improve the efficiency of ANS, but most studies directly take pollution load as the risk standard, leading to a considerable misjudgment of the actual pollution risk. To objectively reflect the risk of agricultural non-point source pollution(ANSP) in Chongqing, China, we investigated the influences of initial source input, intermediate transformation, and terminal absorption of pollutants via literature research and the Delphi method and built a PTA(pressure kinetic energy, transformation kinetic energy, and absorption kinetic energy) model that covers 12 factors, with the support of geographical information system(GIS) technology. The terrain factor calculation results and the calculation results of other factors were optimized by Python tools to reduce human error and workload. Via centroid migration analysis and Kernel density analysis, the risk level, spatial aggregation degree, and key prevention and control regions could be accurately determined. There was a positive correlation between the water quality of the rivers in Chongqing and the risk assessment results of different periods, indirectly reflecting the reliability of the assessment results by the proposed model. There was an obvious tendency for the low-risk regions transforming into high-risk regions. The proportion of high-risk regions and extremely high-risk regions increased from 17.82% and 16.63%in 2000 to 18.10% and 16.76% in 2015, respectively. And the risk level in the main urban areas was significantly higher than that in the southeastern and northeastern areas of Chongqing. The centroids of all grades of risky areas presented a successive distribution from west to east, and the centroids of high-risk and extremely high-risk regions shifted eastward. From 2000 to 2015, the centroids of highrisk and extremely high-risk regions moved 4.63 km(1.68°) and 4.48 km(12.08°) east by north, respectively. The kernel density analysis results showed that the high-risk regions were mainly concentrated in the main urban areas and that the distribution of agglomeration areas overall displayed a transition trend from contiguous distribution to decentralized concentration. The risk levels of the regions with a high proportion of cultivated land and artificial surface were significantly increased, and the occupation of cultivated land in the process of urbanization promoted the movement of the centroids of high-risk and extremely high-risk regions. The identification of key areas for risk prevention and control provides data scientific basis for the development of prevention and control strategies.展开更多
Social media forums have emerged as the most popular form of communication in the modern technology era,allowing people to discuss and express their opinions.This increases the amount of material being shared on socia...Social media forums have emerged as the most popular form of communication in the modern technology era,allowing people to discuss and express their opinions.This increases the amount of material being shared on social media sites.There is a wealth of information about the threat that may be found in such open data sources.The security of already-deployed software and systems relies heavily on the timely detection of newly-emerging threats to their safety that can be gleaned from such information.Despite the fact that several models for detecting cybersecurity events have been presented,it remains challenging to extract security events from the vast amounts of unstructured text present in public data sources.The majority of the currently available methods concentrate on detecting events that have a high number of dimensions.This is because the unstructured text in open data sources typically contains a large number of dimensions.However,to react to attacks quicker than they can be launched,security analysts and information technology operators need to be aware of critical security events as soon as possible,regardless of how often they are reported.This research provides a unique event detection method that can swiftly identify significant security events from open forums such as Twitter.The proposed work identified new threats and the revival of an attack or related event,independent of the volume of mentions relating to those events on Twitter.In this research work,deep learning has been used to extract predictive features from open-source text.The proposed model is composed of data collection,data transformation,feature extraction using deep learning,Latent Dirichlet Allocation(LDA)based medium-level cyber-event detection and final Google Trends-based high-level cyber-event detection.The proposed technique has been evaluated on numerous datasets.Experiment results show that the proposed method outperforms existing methods in detecting cyber events by giving 95.96% accuracy.展开更多
In recent years,the growth of female employees in the commercial market and industries has increased.As a result,some people think travelling to distant and isolated locations during odd hours generates new threats to...In recent years,the growth of female employees in the commercial market and industries has increased.As a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s safety.The exponential increase in assaults and attacks on women,on the other hand,is posing a threat to women’s growth,development,and security.At the time of the attack,it appears the women were immobilized and needed immediate support.Only self-defense isn’t sufficient against abuse;a new technological solution is desired and can be used as quickly as hitting a switch or button.The proposed Women Safety Gadget(WSG)aims to design a wearable safety device model based on Internet-of-Things(IoT)and Cloud Technology.It is designed in three layers,namely layer-1,having an android app;layer-2,with messaging and location tracking system;and layer-3,which updates information in the cloud database.WSG can detect an unsafe condition by the pressure sensor of the finger on the artificial nail,consequently diffuses a pepper spray,and automatically notifies the saved closest contacts and police station through messaging and location settings.WSG has a response time of 1000 ms once the nail is pressed;the average time for pulse rate measure is 0.475 s,and diffusing the pepper spray is 0.2–0.5 s.The average activation time is 2.079 s.展开更多
Biometric applications widely use the face as a component for recognition and automatic detection.Face rotation is a variable component and makes face detection a complex and challenging task with varied angles and ro...Biometric applications widely use the face as a component for recognition and automatic detection.Face rotation is a variable component and makes face detection a complex and challenging task with varied angles and rotation.This problem has been investigated,and a novice algorithm,namely RIFDS(Rotation Invariant Face Detection System),has been devised.The objective of the paper is to implement a robust method for face detection taken at various angle.Further to achieve better results than known algorithms for face detection.In RIFDS Polar Harmonic Transforms(PHT)technique is combined with Multi-Block Local Binary Pattern(MBLBP)in a hybrid manner.The MBLBP is used to extract texture patterns from the digital image,and the PHT is used to manage invariant rotation characteristics.In this manner,RIFDS can detect human faces at different rotations and with different facial expressions.The RIFDS performance is validated on different face databases like LFW,ORL,CMU,MIT-CBCL,JAFFF Face Databases,and Lena images.The results show that the RIFDS algorithm can detect faces at varying angles and at different image resolutions and with an accuracy of 99.9%.The RIFDS algorithm outperforms previous methods like Viola-Jones,Multi-blockLocal Binary Pattern(MBLBP),and Polar HarmonicTransforms(PHTs).The RIFDS approach has a further scope with a genetic algorithm to detect faces(approximation)even from shadows.展开更多
1 Introduction and main contributions Link prediction for temporal networks aims to evaluate the likelihood of the future linkage among nodes,which has significant applications in social networks,biological networks a...1 Introduction and main contributions Link prediction for temporal networks aims to evaluate the likelihood of the future linkage among nodes,which has significant applications in social networks,biological networks and traffic analysis[1],etc.Network embedding[2]is an important analytical tool for temporal network link prediction,which helps us better understand network evolution[3].How to encode high-dimensional and non-Euclidean network information is a crucial problem for node embedding in temporal networks.One of the challenges is to reveal the spatial structure at each timestamp and the temporal property over time[4].Some existing work[5]shows that extracting the spatial relation of each node can be used as a valid feature representation for each node.Moreover,the emergence of deep learning techniques[4,5]brings new insights for learning temporal properties,but most models using deep learning still fail to achieve satisfying prediction accuracy.展开更多
Reactive synthesis is a technique for automatic generation of a reactive system from a high level specification.The system is reactive in the sense that it reacts to the inputs from the environment.The specification i...Reactive synthesis is a technique for automatic generation of a reactive system from a high level specification.The system is reactive in the sense that it reacts to the inputs from the environment.The specification is in general given as a linear temporal logic(LTL)formula.The behaviour of the system interacting with the environment can be represented as a game in which the system plays against the environment.Thus,a problem of reactive synthesis is commonly treated as solving such a game with the specification as the winning condition.Reactive synthesis has been thoroughly investigated for more two decades.A well-known challenge is to deal with the complex uncertainty of the environment.We understand that a major issue is due to the lack of a sufficient treatment of probabilistic properties in the traditional models.For example,a two-player game defined by a standard Kriple structure does not consider probabilistic transitions in reaction to the uncertain physical environment;and a Markov Decision Process(MDP)in general does not explicitly separate the system from its environment and it does not describe the interaction between system and the environment.In this paper,we propose a new and more general model which combines the two-player game and the MDP.Furthermore,we study probabilistic reactive synthesis for the games of General Reactivity of Rank 1(i.e.,GR(1))defined in this model.More specifically,we present an algorithm,which for given model,a location and a GR(1)specification,determines the strategy for each player how to maximize/minimize the probabilities of the satisfaction of at location.We use an example to describe the model of probabilistic games and demonstrate our algorithm.展开更多
文摘The growing prevalence of fake images on the Internet and social media makes image integrity verification a crucial research topic.One of the most popular methods for manipulating digital images is image splicing,which involves copying a specific area from one image and pasting it into another.Attempts were made to mitigate the effects of image splicing,which continues to be a significant research challenge.This study proposes a new splicing detectionmodel,combining Sonine functions-derived convex-based features and deep features.Two stages make up the proposed method.The first step entails feature extraction,then classification using the“support vector machine”(SVM)to differentiate authentic and spliced images.The proposed Sonine functions-based feature extraction model reveals the spliced texture details by extracting some clues about the probability of image pixels.The proposed model achieved an accuracy of 98.93% when tested with the CASIA V2.0 dataset“Chinese Academy of Sciences,Institute of Automation”which is a publicly available dataset for forgery classification.The experimental results show that,for image splicing forgery detection,the proposed Sonine functions-derived convex-based features and deep features outperform state-of-the-art techniques in terms of accuracy,precision,and recall.Overall,the obtained detection accuracy attests to the benefit of using the Sonine functions alongside deep feature representations.Finding the regions or locations where image tampering has taken place is limited by the study.Future research will need to look into advanced image analysis techniques that can offer a higher degree of accuracy in identifying and localizing tampering regions.
文摘Acute Lymphoblastic Leukemia(ALL)is a fatal malignancy that is featured by the abnormal increase of immature lymphocytes in blood or bone marrow.Early prognosis of ALL is indispensable for the effectual remediation of this disease.Initial screening of ALL is conducted through manual examination of stained blood smear microscopic images,a process which is time-consuming and prone to errors.Therefore,many deep learning-based computer-aided diagnosis(CAD)systems have been established to automatically diagnose ALL.This paper proposes a novel hybrid deep learning system for ALL diagnosis in blood smear images.The introduced system integrates the proficiency of autoencoder networks in feature representational learning in latent space with the superior feature extraction capability of standard pretrained convolutional neural networks(CNNs)to identify the existence of ALL in blood smears.An augmented set of deep image features are formed from the features extracted by GoogleNet and Inception-v3 CNNs from a hybrid dataset of microscopic blood smear images.A sparse autoencoder network is designed to create an abstract set of significant latent features from the enlarged image feature set.The latent features are used to perform image classification using Support Vector Machine(SVM)classifier.The obtained results show that the latent features improve the classification performance of the proposed ALL diagnosis system over the original image features.Moreover,the classification performance of the system with various sizes of the latent feature set is evaluated.The retrieved results reveal that the introduced ALL diagnosis system superiorly compete the state of the art.
基金a grant from the Center of Excellence in Information Assurance(CoEIA),KSU.
文摘Electricity theft is a widespread non-technical issue that has a negative impact on both power grids and electricity users.It hinders the economic growth of utility companies,poses electrical risks,and impacts the high energy costs borne by consumers.The development of smart grids is crucial for the identification of power theft since these systems create enormous amounts of data,including information on client consumption,which may be used to identify electricity theft using machine learning and deep learning techniques.Moreover,there also exist different solutions such as hardware-based solutions to detect electricity theft that may require human resources and expensive hardware.Computer-based solutions are presented in the literature to identify electricity theft but due to the dimensionality curse,class imbalance issue and improper hyper-parameter tuning of such models lead to poor performance.In this research,a hybrid deep learning model abbreviated as RoGRUT is proposed to detect electricity theft as amalicious and non-malicious activity.The key steps of the RoGRUT are data preprocessing that covers the problem of class imbalance,feature extraction and final theft detection.Different advanced-level models like RoBERTa is used to address the curse of dimensionality issue,the near miss for class imbalance,and transfer learning for classification.The effectiveness of the RoGRUTis evaluated using the dataset fromactual smartmeters.A significant number of simulations demonstrate that,when compared to its competitors,the RoGRUT achieves the best classification results.The performance evaluation of the proposed model revealed exemplary results across variousmetrics.The accuracy achieved was 88%,with precision at an impressive 86%and recall reaching 84%.The F1-Score,a measure of overall performance,stood at 85%.Furthermore,themodel exhibited a noteworthyMatthew correlation coefficient of 78%and excelled with an area under the curve of 91%.
基金Under the auspices of the Chongqing Science and Technology Commission(No.cstc2018jxjl20012,cstc2018jszx-zdyfxm X0021,cstc2019jscx-gksb X0103)。
文摘According to China’s second national survey of pollution sources, the contribution of agricultural non-point sources(ANS) to water pollution is still high. Risk prevention and control are the main means to control costs and improve the efficiency of ANS, but most studies directly take pollution load as the risk standard, leading to a considerable misjudgment of the actual pollution risk. To objectively reflect the risk of agricultural non-point source pollution(ANSP) in Chongqing, China, we investigated the influences of initial source input, intermediate transformation, and terminal absorption of pollutants via literature research and the Delphi method and built a PTA(pressure kinetic energy, transformation kinetic energy, and absorption kinetic energy) model that covers 12 factors, with the support of geographical information system(GIS) technology. The terrain factor calculation results and the calculation results of other factors were optimized by Python tools to reduce human error and workload. Via centroid migration analysis and Kernel density analysis, the risk level, spatial aggregation degree, and key prevention and control regions could be accurately determined. There was a positive correlation between the water quality of the rivers in Chongqing and the risk assessment results of different periods, indirectly reflecting the reliability of the assessment results by the proposed model. There was an obvious tendency for the low-risk regions transforming into high-risk regions. The proportion of high-risk regions and extremely high-risk regions increased from 17.82% and 16.63%in 2000 to 18.10% and 16.76% in 2015, respectively. And the risk level in the main urban areas was significantly higher than that in the southeastern and northeastern areas of Chongqing. The centroids of all grades of risky areas presented a successive distribution from west to east, and the centroids of high-risk and extremely high-risk regions shifted eastward. From 2000 to 2015, the centroids of highrisk and extremely high-risk regions moved 4.63 km(1.68°) and 4.48 km(12.08°) east by north, respectively. The kernel density analysis results showed that the high-risk regions were mainly concentrated in the main urban areas and that the distribution of agglomeration areas overall displayed a transition trend from contiguous distribution to decentralized concentration. The risk levels of the regions with a high proportion of cultivated land and artificial surface were significantly increased, and the occupation of cultivated land in the process of urbanization promoted the movement of the centroids of high-risk and extremely high-risk regions. The identification of key areas for risk prevention and control provides data scientific basis for the development of prevention and control strategies.
基金funded by a grant from the Center of Excellence in Information Assurance(CoEIA),KSU.
文摘Social media forums have emerged as the most popular form of communication in the modern technology era,allowing people to discuss and express their opinions.This increases the amount of material being shared on social media sites.There is a wealth of information about the threat that may be found in such open data sources.The security of already-deployed software and systems relies heavily on the timely detection of newly-emerging threats to their safety that can be gleaned from such information.Despite the fact that several models for detecting cybersecurity events have been presented,it remains challenging to extract security events from the vast amounts of unstructured text present in public data sources.The majority of the currently available methods concentrate on detecting events that have a high number of dimensions.This is because the unstructured text in open data sources typically contains a large number of dimensions.However,to react to attacks quicker than they can be launched,security analysts and information technology operators need to be aware of critical security events as soon as possible,regardless of how often they are reported.This research provides a unique event detection method that can swiftly identify significant security events from open forums such as Twitter.The proposed work identified new threats and the revival of an attack or related event,independent of the volume of mentions relating to those events on Twitter.In this research work,deep learning has been used to extract predictive features from open-source text.The proposed model is composed of data collection,data transformation,feature extraction using deep learning,Latent Dirichlet Allocation(LDA)based medium-level cyber-event detection and final Google Trends-based high-level cyber-event detection.The proposed technique has been evaluated on numerous datasets.Experiment results show that the proposed method outperforms existing methods in detecting cyber events by giving 95.96% accuracy.
基金The authors extend their appreciation to the deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through project number(IFP-2020-19).
文摘In recent years,the growth of female employees in the commercial market and industries has increased.As a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s safety.The exponential increase in assaults and attacks on women,on the other hand,is posing a threat to women’s growth,development,and security.At the time of the attack,it appears the women were immobilized and needed immediate support.Only self-defense isn’t sufficient against abuse;a new technological solution is desired and can be used as quickly as hitting a switch or button.The proposed Women Safety Gadget(WSG)aims to design a wearable safety device model based on Internet-of-Things(IoT)and Cloud Technology.It is designed in three layers,namely layer-1,having an android app;layer-2,with messaging and location tracking system;and layer-3,which updates information in the cloud database.WSG can detect an unsafe condition by the pressure sensor of the finger on the artificial nail,consequently diffuses a pepper spray,and automatically notifies the saved closest contacts and police station through messaging and location settings.WSG has a response time of 1000 ms once the nail is pressed;the average time for pulse rate measure is 0.475 s,and diffusing the pepper spray is 0.2–0.5 s.The average activation time is 2.079 s.
基金The authors would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under Project Number No-R-2021-154.
文摘Biometric applications widely use the face as a component for recognition and automatic detection.Face rotation is a variable component and makes face detection a complex and challenging task with varied angles and rotation.This problem has been investigated,and a novice algorithm,namely RIFDS(Rotation Invariant Face Detection System),has been devised.The objective of the paper is to implement a robust method for face detection taken at various angle.Further to achieve better results than known algorithms for face detection.In RIFDS Polar Harmonic Transforms(PHT)technique is combined with Multi-Block Local Binary Pattern(MBLBP)in a hybrid manner.The MBLBP is used to extract texture patterns from the digital image,and the PHT is used to manage invariant rotation characteristics.In this manner,RIFDS can detect human faces at different rotations and with different facial expressions.The RIFDS performance is validated on different face databases like LFW,ORL,CMU,MIT-CBCL,JAFFF Face Databases,and Lena images.The results show that the RIFDS algorithm can detect faces at varying angles and at different image resolutions and with an accuracy of 99.9%.The RIFDS algorithm outperforms previous methods like Viola-Jones,Multi-blockLocal Binary Pattern(MBLBP),and Polar HarmonicTransforms(PHTs).The RIFDS approach has a further scope with a genetic algorithm to detect faces(approximation)even from shadows.
基金This work has been supported by Chongqing Graduate Student Research and Innovation Project(CYB19096)the China Scholarship Council(202006990041)+2 种基金the Fundamental Research Funds for the Central Universities(XDJK2020D021)the Capacity Development Grant of Southwest University(SWU116007)the National Natural Science Foundation of China(Grant Nos.61672435,61732019,61811530327)。
文摘1 Introduction and main contributions Link prediction for temporal networks aims to evaluate the likelihood of the future linkage among nodes,which has significant applications in social networks,biological networks and traffic analysis[1],etc.Network embedding[2]is an important analytical tool for temporal network link prediction,which helps us better understand network evolution[3].How to encode high-dimensional and non-Euclidean network information is a crucial problem for node embedding in temporal networks.One of the challenges is to reveal the spatial structure at each timestamp and the temporal property over time[4].Some existing work[5]shows that extracting the spatial relation of each node can be used as a valid feature representation for each node.Moreover,the emergence of deep learning techniques[4,5]brings new insights for learning temporal properties,but most models using deep learning still fail to achieve satisfying prediction accuracy.
基金This work was supported by Postgraduate Research and Practice Innovation Program of Jiangsu Province(KYCX20_0225)the National Natural Science Foundation of China(Grant No.61872371)+2 种基金The work is also supported in part by the grants of Capacity Development Fund of Southwest University(SWU116007)projects the National Natural Science Foundation of China(Grant Nos.61732019,61672435,61811530327,62032019)All content represents the opinion of the authors,which is not necessarily shared or endorsed by their respective employers and/or sponsors。
文摘Reactive synthesis is a technique for automatic generation of a reactive system from a high level specification.The system is reactive in the sense that it reacts to the inputs from the environment.The specification is in general given as a linear temporal logic(LTL)formula.The behaviour of the system interacting with the environment can be represented as a game in which the system plays against the environment.Thus,a problem of reactive synthesis is commonly treated as solving such a game with the specification as the winning condition.Reactive synthesis has been thoroughly investigated for more two decades.A well-known challenge is to deal with the complex uncertainty of the environment.We understand that a major issue is due to the lack of a sufficient treatment of probabilistic properties in the traditional models.For example,a two-player game defined by a standard Kriple structure does not consider probabilistic transitions in reaction to the uncertain physical environment;and a Markov Decision Process(MDP)in general does not explicitly separate the system from its environment and it does not describe the interaction between system and the environment.In this paper,we propose a new and more general model which combines the two-player game and the MDP.Furthermore,we study probabilistic reactive synthesis for the games of General Reactivity of Rank 1(i.e.,GR(1))defined in this model.More specifically,we present an algorithm,which for given model,a location and a GR(1)specification,determines the strategy for each player how to maximize/minimize the probabilities of the satisfaction of at location.We use an example to describe the model of probabilistic games and demonstrate our algorithm.