自主智能系统(英文)Pub Date : 2024-07-08DOI: 10.1007/s43684-024-00070-0
Huilin Yin, Pengyu Wang, Boyu Liu, Jun Yan
{"title":"An uncertainty-aware domain adaptive semantic segmentation framework","authors":"Huilin Yin, Pengyu Wang, Boyu Liu, Jun Yan","doi":"10.1007/s43684-024-00070-0","DOIUrl":"10.1007/s43684-024-00070-0","url":null,"abstract":"<div><p>Semantic segmentation is significant to realize the scene understanding of autonomous driving. Due to the lack of annotated real-world data, the technology of domain adaptation is applied so that the model is trained on the synthetic data and inferred on the real data. However, this domain gap leads to aleatoric and epistemic uncertainty. These uncertainties link to the potential safety issue of autonomous driving in normal weather and adverse weather. In this study, we explore the scientific problem that has received sparse attention previously. We postulate that the Dual Attention module can mitigate the uncertainty in the task of semantic segmentation and provide some empirical study to validate it. Furthermore, the utilization of Kullback-Leibler divergence (KL divergence) helps the estimation of aleatoric uncertainty and boosts the robustness of the segmentation model. Our empirical study on the diverse datasets of semantic segmentation demonstrates the effectiveness of our method in normal and adverse weather. Our code is available at: https://github.com/liubo629/Seg-Uncertainty-dual-attention.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00070-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141667973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Abdurrahman Rois , Fatmawati , Cicik Alfiniyah , Santi Martini , Dipo Aldila , Farai Nyabadza
{"title":"Modeling and optimal control of COVID-19 with comorbidity and three-dose vaccination in Indonesia","authors":"Muhammad Abdurrahman Rois , Fatmawati , Cicik Alfiniyah , Santi Martini , Dipo Aldila , Farai Nyabadza","doi":"10.1016/j.jobb.2024.06.004","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.06.004","url":null,"abstract":"<div><p>This paper presents and examines a COVID-19 model that takes comorbidities and up to three vaccine doses into account. We analyze the stability of the equilibria, examine herd immunity, and conduct a sensitivity analysis validated by data on COVID-19 in Indonesia. The disease-free equilibrium is locally and globally asymptotically stable whenever the basic reproduction number is less than one, while an endemic equilibrium exists and is globally asymptotically stable when the number is greater than one. Subsequently, the model incorporates two effective measures, namely public education and enhanced medical care, to determine the most advantageous approach for mitigating the transmission of the disease. The optimal control model is then determined using Pontryagin’s maximum principle. The integrated control strategy is the best method for reliably safeguarding the general population against COVID-19 infection. Cost evaluations and numerical simulations corroborate this conclusion.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000347/pdfft?md5=e3f237c1b54058dbee82e284d716e498&pid=1-s2.0-S2588933824000347-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141606860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
自主智能系统(英文)Pub Date : 2024-07-05DOI: 10.1007/s43684-024-00069-7
Feifei Chen, Qingyun Yu
{"title":"Multiple unmanned ship coverage and exploration in complex sea areas","authors":"Feifei Chen, Qingyun Yu","doi":"10.1007/s43684-024-00069-7","DOIUrl":"10.1007/s43684-024-00069-7","url":null,"abstract":"<div><p>This study addresses the complexities of maritime area information collection, particularly in challenging sea environments, by introducing a multi-agent control model for regional information gathering. Focusing on three key areas—regional coverage, collaborative exploration, and agent obstacle avoidance—we aim to establish a multi-unmanned ship coverage detection system. For regional coverage, a multi-objective optimization model considering effective area coverage and time efficiency is proposed, utilizing a heuristic simulated annealing algorithm for optimal allocation and path planning, achieving a 99.67% effective coverage rate in simulations. Collaborative exploration is tackled through a comprehensive optimization model, solved using an improved greedy strategy, resulting in a 100% static target detection and correct detection index. Agent obstacle avoidance is enhanced by a collision avoidance model and a distributed underlying collision avoidance algorithm, ensuring autonomous obstacle avoidance without communication or scheduling. Simulations confirm zero collaborative failures. This research offers practical solutions for multi-agent exploration and coverage in unknown sea areas, balancing workload and time efficiency while considering ship dynamics constraints.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00069-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141673492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
自主智能系统(英文)Pub Date : 2024-07-04DOI: 10.1007/s43684-024-00068-8
Fengnian Liu, Xiang Yu, Junya Tang
{"title":"Water-saving control system based on multiple intelligent algorithms","authors":"Fengnian Liu, Xiang Yu, Junya Tang","doi":"10.1007/s43684-024-00068-8","DOIUrl":"10.1007/s43684-024-00068-8","url":null,"abstract":"<div><p>Water conservation has become a global problem as the population increases. In many densely populated cities in China, leaks from century-old pipe works have been widespread. However, entirely eradicating the issues involves replacing all water networks, which is costly and time-consuming. This paper proposed an AI-enabled water-saving control system with three control modes: time division control, flow regulation, and critical point control according to actual flow. Firstly, based on the current leaking situation of water supply networks in China and the capability level of China’s water management, a water-saving technology integrating PID control and a series of deep learning algorithms was proposed. Secondly, a multi-jet control valve was designed to control pressure and reduce water distribution network cavitation. This technology has been successfully applied in industrial settings in China and has achieved gratifying water-saving results.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00068-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141677101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Miguel A Toro-Jarrin, Pilar Pazos, Miguel A Padilla
{"title":"It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations","authors":"Miguel A Toro-Jarrin, Pilar Pazos, Miguel A Padilla","doi":"10.1093/cybsec/tyae011","DOIUrl":"https://doi.org/10.1093/cybsec/tyae011","url":null,"abstract":"Numerous factors determine information security-related actions (IS-actions) in the workplace. Attitudes toward following security rules and recommendations and attitudes toward specific IS actions determine intentions associated with those actions. IS research has examined the role of the instrumental aspect of attitudes. However, authors argue that attitudes toward a behavioral object are a multidimensional construct. We examined the dimensionality of attitudes toward security recommendations, hypothesized its multidimensional nature, and developed a new scale [attitudes toward security recommendations (ASR scale)]. The results indicated the multidimensional nature of attitudes toward security recommendations supporting our hypothesis. The results revealed two dimensions corresponding to the perceived legitimacy and effectiveness of security recommendations and its perceived rigor. The new ASR scale showed good psychometric properties. This work contributes to the IS research at suggesting that attitudes are a multidimensional construct in the IS context. These findings imply that the employee’s evaluation of information security policy can be examined considering their instrumentality (security recommendations are important) and rigor (security recommendations are strict). Different effects of the dimensions of attitudes over IS-action suggest different interventions. Additionally, this study offers the ASR scale as a new instrument to capture employees’ evaluation of security recommendations.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141547245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Laith N. AL-Eitan , Haneen O. Ali , Hana S. Abu Kharmah , Maryam K. Alasmar , Iliya Y. Khair , Ahmad H. Mihyar
{"title":"Addressing poxvirus challenges in the Middle East to enhance biosafety and biosecurity measures","authors":"Laith N. AL-Eitan , Haneen O. Ali , Hana S. Abu Kharmah , Maryam K. Alasmar , Iliya Y. Khair , Ahmad H. Mihyar","doi":"10.1016/j.jobb.2024.06.003","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.06.003","url":null,"abstract":"<div><p>The emergence and zoonotic transmission of poxviruses in the Middle East have been recognized as complex public health issues. Poxviruses, a vast family of DNA viruses, can infect many hosts, including animals and humans. The Middle East has had multiple epidemics of poxvirus infections (e.g., Monkeypox, Smallpox, and Camelpox) that have raised concerns owing to their detrimental effects on livestock, wildlife, and sporadic human cases. This review aims to thoroughly examine the complexity of the epidemiological patterns, intricate genetic diversity, and several contributing factors that support the emergence and zoonotic transmission of poxviruses in the Middle East. Several aspects of poxviruses contribute to the emergence of endemics and zoonotic breakouts, such as the complex nature of human-animal interactions, environmental changes, and their subtle capacity for viral adaptability. This review was compiled in the hopes of contributing to the current understanding of poxvirus biology and its implications for human and animal health in the Middle East. We provide a comprehensive overview of the most common poxviruses in the Middle East, including their classification, structure, replication cycle, pathogenesis, route of transmissions, and of how the Middle East has developed ways to mitigate these biological threats.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000335/pdfft?md5=951f14f2c0d40a84ed4f933830b032c0&pid=1-s2.0-S2588933824000335-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
自主智能系统(英文)Pub Date : 2024-07-01DOI: 10.1007/s43684-024-00066-w
G. Rigatos, M. Abbaszadeh, J. Pomares
{"title":"A nonlinear optimal control approach for 3-DOF four-cable driven parallel robots","authors":"G. Rigatos, M. Abbaszadeh, J. Pomares","doi":"10.1007/s43684-024-00066-w","DOIUrl":"10.1007/s43684-024-00066-w","url":null,"abstract":"<div><p>In this article, a nonlinear optimal control approach is proposed for the dynamic model of 3-DOF four-cable driven parallel robots (CDPR). To solve the associated nonlinear optimal control problem, the dynamic model of the 3-DOF cable-driven parallel robot undergoes approximate linearization around a temporary operating point that is recomputed at each time-step of the control method. The linearization relies on Taylor series expansion and on the associated Jacobian matrices. For the linearized state-space model of the 3-DOF cable-driven parallel robot a stabilizing optimal (H-infinity) feedback controller is designed. To compute the controller’s feedback gains an algebraic Riccati equation is repetitively solved at each iteration of the control algorithm. The stability properties of the control method are proven through Lyapunov analysis. The proposed nonlinear optimal control approach achieves fast and accurate tracking of reference setpoints under moderate variations of the control inputs and a minimum dispersion of energy.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00066-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141715848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment","authors":"Ziyuan Huang, Parinaz Naghizadeh, Mingyan Liu","doi":"10.1093/cybsec/tyae009","DOIUrl":"https://doi.org/10.1093/cybsec/tyae009","url":null,"abstract":"Network games are commonly used to capture the strategic interactions among interconnected agents in simultaneous moves. The agents’ actions in a Nash equilibrium must take into account the mutual dependencies connecting them, which is typically obtained by solving a set of fixed point equations. Stackelberg games, on the other hand, model the sequential moves between agents that are categorized as leaders and followers. The corresponding solution concept, the subgame perfect equilibrium, is typically obtained using backward induction. Both game forms enjoy very wide use in the (cyber)security literature, the network game often as a template to study security investment and externality—also referred to as the interdependent security games—and the Stackelberg game as a formalism to model a variety of attacker–defender scenarios. In this study, we examine a model that combines both types of strategic reasoning: the interdependency as well as sequential moves. Specifically, we consider a scenario with a network of interconnected first movers (firms or defenders, whose security efforts and practices collectively determine the security posture of the eco-system) and one or more second movers, the attacker(s), who determine how much effort to exert on attacking the many potential targets. This gives rise to an equilibrium concept that embodies both types of equilibria mentioned above. We will examine how its existence and uniqueness conditions differ from that for a standard network game. Of particular interest are comparisons between the two game forms in terms of effort exerted by the defender(s) and the attacker(s), respectively, and the free-riding behavior among the defenders.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141502761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nursanti Anggriani , Lazarus Kalvein Beay , Meksianis Z. Ndii , Fatuh Inayaturohmat , Sanubari Tansah Tresna
{"title":"A mathematical model for a disease outbreak considering waning-immunity class with nonlinear incidence and recovery rates","authors":"Nursanti Anggriani , Lazarus Kalvein Beay , Meksianis Z. Ndii , Fatuh Inayaturohmat , Sanubari Tansah Tresna","doi":"10.1016/j.jobb.2024.05.005","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.05.005","url":null,"abstract":"<div><p>In the spread of infectious diseases, intervention levels play a crucial role in shaping interactions between healthy and infected individuals, leading to a nonlinear transmission process. Additionally, the availability of medical resources limits the recovery rate of infected patients, adding further nonlinear dynamics to the healing process. Our research introduces novelty by combining nonlinear incidence and recovery rates alongside waning immunity in an epidemic model. We present a modified SIRW-type model, examining the epidemic problem with these factors. Through analysis, we explore conditions for non-endemic and co-existing cases based on the basic reproduction ratio. The local stability of equilibria is verified using the Routh-Hurwitz criteria, while global stability is assessed using Lyapunov functions for each equilibrium. Furthermore, we investigate bifurcations around both non-endemic and co-existing equilibria. Numerically, we give some simulations to support our analytical findings.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000311/pdfft?md5=9a3f3ac37c5d275226798d8df28d62fc&pid=1-s2.0-S2588933824000311-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salman Khalid Salman, Yasir Mufeed Abdulateef, Sawsan Qahtan Taha Al-Quhli
{"title":"The association between mycotic pneumonia and neonatal septicemia","authors":"Salman Khalid Salman, Yasir Mufeed Abdulateef, Sawsan Qahtan Taha Al-Quhli","doi":"10.1016/j.jobb.2024.06.002","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.06.002","url":null,"abstract":"<div><h3>Background</h3><p>Candida species are the fourth most common etiological agents of late-onset infection in the neonatal intensive care unit (NICU) and are responsible for considerable morbidity and mortality.</p></div><div><h3>Objectives</h3><p>From November 2023 to February 2024, we investigated the association of mycotic pneumonia with septicemia in 60 neonates, and their roles of mycotic pneumonia in the morbidity and mortality of neonates in two NICUs in the Al-Ramadi Teaching Hospital for Maternity and Children.</p></div><div><h3>Methods</h3><p>All infants in this study had been diagnosed with septicemia and treated with empirical antimicrobial therapy. An early morning nasogastric tube (NG-tube) was used to collect swallowed sputum by suction for culture and sensitivity testing.</p></div><div><h3>Results</h3><p>The average white blood count for the neonates was 8547 ± 5884.5 cells/mm<sup>2</sup>. The mean C-reactive protein was 39.3 ± 26 mg/l, the mean serum albumin was 2.9 ± 0.2 g/dl and the positive bacterial blood culture was 28 (46.7 %). 9 (15 %) neonates died during the study period. The NG-tube culture identified fungal growth in all samples. Of these, 49 (81.6 %) were identified as <em>Candida albicans</em>, 6 (10 %) as <em>Candida tropicalis</em>, and 5 (8.3 %) as <em>Cryptococcus laurentii</em>. The bacterial culture results from the NG-tube samples identified 13 (21.6 %) patients with gram-positive bacteria and 47 (78.3 %) with gram-negative bacteria.</p></div><div><h3>Conclusion</h3><p>We found a prevalence of Candida spp. among neonates in addition to microbial oxygen tube contamination, indicating a biosafety breach in the neonatal unit. Mycotic infection requires global attention as a probable cause of respiratory failure in neonatal septicemia.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000323/pdfft?md5=e98223a68d44a37acdaeed7c16c9e563&pid=1-s2.0-S2588933824000323-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}