{"title":"Decision modeling for resilient infrastructures","authors":"Jing Gong, W. Wallace, J. Mitchell","doi":"10.1109/ISI.2011.5984083","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984083","url":null,"abstract":"Research on resilient infrastructures in this paper focuses on getting disrupted infrastructures back to normal as soon as possible, i.e., a timely, efficient recovery from disruptions caused by natural, technological and willful disasters. The models and algorithms are presented for the optimal restoration strategy, with consideration of interdependencies of infrastructures. The contribution of this paper will be of assistance to emergency mangers' decision-making processes for mitigating the impact of disasters","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122060442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of accelerated degradation test under constant stress with errors for longitudinal data","authors":"Sai-Yin Zhang, Zhongzhan Zhang","doi":"10.1109/ISI.2011.5984106","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984106","url":null,"abstract":"In industrial statistics, the degradation test is regularly used in the analysis of product reliability. This paper is focused on the modeling of accelerated degradation test with longitudinal observation under constant stresses with Berkson-type measurement errors, and suggests the minimum distance estimator for the parameters in the model. The consistency and asymptotic normality of the estimator are obtained, and the performance of the estimator for moderate sample sizes is shown by simulation.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123350492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An SIR model for violent topic diffusion in social media","authors":"Jiyoung Woo, Jaebong Son, Hsinchun Chen","doi":"10.1109/ISI.2011.5984043","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984043","url":null,"abstract":"Social media is being increasingly used as a political communication channel. The web makes it easy to spread extreme opinions or ideologies that were once restricted to small groups. Terrorists and extremists use the web to deliver their extreme ideology to people and encourage them to get involved in fanatic behaviors. In this research, we aim to understand the mechanisms and properties of the exposure process to extreme opinions through these new publication methods, especially web forums. We propose the topic diffusion model for web forums, based on the SIR (Susceptible, Infective, and Recovered) model frequently used in previous research to analyze disease outbreaks and knowledge diffusion. The logistic growth of possible authors, the interaction between possible authors and current authors, and the influence decay of past authors are incorporated in a novel topic-based SIR model. From the proposed model we can estimate the maximum number of authors on a topic, the degree of infectiousness of a topic, and the rate describing how fast past authors lose influence over others. We apply the proposed model to a major international Jihadi forum where extreme ideology is expounded and evaluate the model on the diffusion of major violent topics. The fitting results show that it is plausible to describe the mechanism of violent topic diffusion in web forums with the SIR epidemic model.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131591230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pengyi Fan, Pei Li, Zhihong Jiang, Wei Li, Hui Wang
{"title":"Measurement and analysis of topology and information propagation on Sina-Microblog","authors":"Pengyi Fan, Pei Li, Zhihong Jiang, Wei Li, Hui Wang","doi":"10.1109/ISI.2011.5984121","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984121","url":null,"abstract":"Sina-Microblog, the earliest and biggest microblogging service in China, has become one of the most popular media in information propagation. In order to gain insights into the topological and information diffusing characteristics of microblogging network in China, we crawled Sina-Microblog for about 3 months and obtain the trace of its topology and topics. Compared with other online social networks, our measurement study shows a number of interesting findings. Our data suggests that Sina-Microblog network has apparent small-world effect and scale-free characteristic, specially, the outdegree distribution appears to have multiple separate power-law regimes with different exponents. We also observe the overlay graph of Sina-Microblog represents assortative mixing pattern and weak correlation of indegree and outdegree. Moreover, by constructing the cascades of different topics, our data suggests that the distribution of cascades size follows a power-law and heavy-tailed property with the slope approximately −2, and the common motifs of cascades with different topics are very similar, above 93% of them are isolated nodes. In order to find the formative motivity of hot cascades, we find that they always evolve to the structures like ‘star pattern’ and ‘two-polar pattern’, which are mainly due to the indegree of participating nodes, and are also correlated with the content of tweet.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123400652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distribution rule of corrosion damage morphology parameters for aluminum alloy","authors":"D. Zhang, X. Tan, Y. Chen","doi":"10.1109/ISI.2011.5984114","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984114","url":null,"abstract":"Corrosion damage is very critical in the aircraft structure, especially in the highly corrosive marine environment. To better assess the residual strength and more accurate predict the life extension for aircraft structure, the corrosion test for any new aluminum alloy is an essential step. In this paper, different statistical analysis methods are employed and compared to get the best corrosion damage distribution rule for a new type of aluminum alloy. The data are collected through the equivalent accelerated corrosion test base on key environment data.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124027853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilizing infrared technology to prevent terrorist attacks","authors":"Timmy Nguyen, L. Deligiannidis","doi":"10.1109/ISI.2011.5984778","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984778","url":null,"abstract":"We present our investigation that could increase the safety of infrastructures by preventing biological and chemical attacks from terrorists. We surveyed the buildings of our campus using infrared (IR) technology then assessed for faults and cavities. These energy leaks can be used as prime points in which terrorists inject the lethal chemicals into the buildings. Also if a terrorist is biologically raiding an area and using IR technology, they will have the knowledge of which buildings are vulnerable to the attacks. By sealing these faults and cavities, buildings with highly sensitive data and/or government personal will have a layer of protection around them. Integration with Google Earth has made it easier to view buildings and switch seamlessly between regular buildings and their IR counterparts. Using Google Earth as our main visualization platform allowed us to easily analyze in 3D the entire campus giving us a better perspective of the buildings and their faults compared to looking at flat two-dimensional images.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116570859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the analysis of the applications and social influence of mobile phone reading in the medium and small cities in China: Take the first pilot city Baoding for an example","authors":"Z. Ran, Fu Guochun, Chen Jianhui","doi":"10.1109/ISI.2011.5984116","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984116","url":null,"abstract":"TD-SCDMA Industry Alliance in China made a 3G commercial test in Baoding, a key region. We investigated the development of 3G in the medium and small cities. The focus of this investigation is mobile phone reading. According to the analysis, at present mobile reading is a 3G service which has a large audience. Therefore, the current mobile phone reading has made an important impact on the creation and dissemination of literature and mobile reading contributed to consumption of literature.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117036302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of cyberspace security situational awareness based on fuzz reason","authors":"Haidong Xiao, Ning Chen","doi":"10.1109/ISI.2011.5984105","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984105","url":null,"abstract":"Fuzzy reasoning analysis (FRA) is known as a mathematical programming approach to strong nonlinear system prediction,In this paper,the design and implementation of a fuzzy reasoning based cyberspace security awareness model is presented. The new feature of the this method is that it can give better perception and projection of cyberspace security situational. We show that this new method, referred to as machine learning situational awareness analyses, is efficient in situational perceiving, main contribution of this paper is to further integration of the fuzzy reasoning and situational risk control strategies to cyberspace security analysis.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127185514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic behavior model selection by iterative learning and abnormality recognition","authors":"Heping Li, Jie Liu, Shuwu Zhang","doi":"10.1109/ISI.2011.5984046","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984046","url":null,"abstract":"Automatic behavior recognition is one important task of community security and surveillance system. In this paper, a novel method is proposed for automatic selection of behavior models by iterative learning and abnormality recognition. The method is mainly composed of the following two steps: (1) The models of normal behaviors are automatically selected and trained by combining Dynamic Time Warping based spectral clustering and iterative learning; (2) Maximum A Posteriori adaptation technique is used to estimate the parameters of abnormal behavior models from those of normal behavior models. Compared with the related works in the literature, our method has three advantages: (1) automatic selection of the class number of normal behaviors from large unlabeled video data according to the process of iterative learning, (2) semi-supervised learning of abnormal behavior models, and (3) avoidance of the running risk of over-fitting during learning the Hidden Markov Models of behaviors in case of sparse data. Experiments demonstrate the effectiveness of our proposed method.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126857906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing social media in escalating crisis situations","authors":"Il-Chul Moon, Alice H. Oh, Kathleen M. Carley","doi":"10.1109/ISI.2011.5984053","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984053","url":null,"abstract":"The rapid diffusion of information and opinions through social media, such as web forums and micro-blogs, is affecting the development of crisis situations, such as the Iranian presidential election, the Egyptian protest, and the ROKS Cheonan sinking. Understanding this rapid widespread diffusion, and assessing what information is spreading, what ideas are becoming common, and who is talking about what, is critical for crisis management. This paper presents a computational system for social media assessing the flow of ideas on the web and changes in who is talking about what. This system, given raw social media data, identifies the key topics, the key paths by which topics evolve, the key individuals who contribute to the topic, and the key influence relations between the contributors. We present this system implemented with the Author-Topic model, the meta-network model, and various computational techniques to find and filter the heavy contributors and influences. We demonstrate the performance of the system, by applying it to social media data surrounding the ROKS Cheonan sinking. We describe the results of assessing the initial and changing perceptions of the event using this system.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128133226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}