安全科学与韧性(英文)最新文献

筛选
英文 中文
Dynamic risk assessment of gas pipeline operation process by fusing visual and olfactory monitoring 通过融合视觉和嗅觉监测对天然气管道运行过程进行动态风险评估
安全科学与韧性(英文) Pub Date : 2024-03-17 DOI: 10.1016/j.jnlssr.2024.02.003
Denglong Ma , Weigao Mao , Guangsen Zhang , Chaoyi Liu , Yi Han , Xiaoming Zhang , Hansheng Wang , Kang Cen , Wan Lu , Denghui Li , Hanyue Zhang
{"title":"Dynamic risk assessment of gas pipeline operation process by fusing visual and olfactory monitoring","authors":"Denglong Ma ,&nbsp;Weigao Mao ,&nbsp;Guangsen Zhang ,&nbsp;Chaoyi Liu ,&nbsp;Yi Han ,&nbsp;Xiaoming Zhang ,&nbsp;Hansheng Wang ,&nbsp;Kang Cen ,&nbsp;Wan Lu ,&nbsp;Denghui Li ,&nbsp;Hanyue Zhang","doi":"10.1016/j.jnlssr.2024.02.003","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2024.02.003","url":null,"abstract":"<div><p>With the rapid increase in urban gas consumption, the frequency of maintenance and repair of gas pipelines has escalated, leading to a rise in safety accidents during these processes. The traditional manual supervision model presents challenges such as inaccurate monitoring results, incomplete risk factor analysis, and a lack of quantitative risk assessment. This research focuses on developing a dynamic risk assessment technology for gas emergency repair operations by integrating the monitoring outcomes of artificial olfactory for gas leakage information and video object recognition for visual safety factor monitoring data. To quantitatively evaluate the risk of the operation process, a three-dimensional risk assessment model combining gas leakage with risk-correlated sensitivity was established as well as a separate three-dimensional risk assessment model integrating visual risk factors with predictable risk disposition. Furthermore, a visual risk quantification expression mode based on the risk matrix-radar map method was introduced. Additionally, a risk quantification model based on the fusion of visual and olfactory results was formulated. The verification results of simulation scenarios based on field data indicate that the visual-olfactory fusion risk assessment method can more accurately reflect the dynamic risk level of the operation process compared to simple visual safety factor monitoring. The outcomes of this research can contribute to the identification of safety status and early warning of risks related to personnel, equipment, and environmental factors in emergency repair operations. Moreover, these results can be extended to other operational scenarios, such as oil and gas production stations and long-distance pipeline operations.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000161/pdfft?md5=9adfe514fc88f341a408e4a7855e67fd&pid=1-s2.0-S2666449624000161-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140539229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI for science: Predicting infectious diseases 人工智能促进科学预测传染病
安全科学与韧性(英文) Pub Date : 2024-03-15 DOI: 10.1016/j.jnlssr.2024.02.002
Alexis Pengfei Zhao , Shuangqi Li , Zhidong Cao , Paul Jen-Hwa Hu , Jiaojiao Wang , Yue Xiang , Da Xie , Xi Lu
{"title":"AI for science: Predicting infectious diseases","authors":"Alexis Pengfei Zhao ,&nbsp;Shuangqi Li ,&nbsp;Zhidong Cao ,&nbsp;Paul Jen-Hwa Hu ,&nbsp;Jiaojiao Wang ,&nbsp;Yue Xiang ,&nbsp;Da Xie ,&nbsp;Xi Lu","doi":"10.1016/j.jnlssr.2024.02.002","DOIUrl":"10.1016/j.jnlssr.2024.02.002","url":null,"abstract":"<div><p>The global health landscape has been persistently challenged by the emergence and re-emergence of infectious diseases. Traditional epidemiological models, rooted in the early 20th century, have provided foundational insights into disease dynamics. However, the intricate web of modern global interactions and the exponential growth of available data demand more advanced predictive tools. This is where AI for Science (AI4S) comes into play, offering a transformative approach by integrating artificial intelligence (AI) into infectious disease prediction. This paper elucidates the pivotal role of AI4S in enhancing and, in some instances, superseding traditional epidemiological methodologies. By harnessing AI's capabilities, AI4S facilitates real-time monitoring, sophisticated data integration, and predictive modeling with enhanced precision. The comparative analysis highlights the stark contrast between conventional models and the innovative strategies enabled by AI4S. In essence, AI4S represents a paradigm shift in infectious disease research. It addresses the limitations of traditional models and paves the way for a more proactive and informed response to future outbreaks. As we navigate the complexities of global health challenges, AI4S stands as a beacon, signifying the next phase of evolution in disease prediction, characterized by increased accuracy, adaptability, and efficiency.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266644962400015X/pdfft?md5=e98d804486d0967444d73fd9de22a294&pid=1-s2.0-S266644962400015X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140281542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring innovative techniques for damage control during natural disasters 探索自然灾害期间损害控制的创新技术
安全科学与韧性(英文) Pub Date : 2024-03-14 DOI: 10.1016/j.jnlssr.2024.02.004
Moinak Maiti , Parthajit Kayal
{"title":"Exploring innovative techniques for damage control during natural disasters","authors":"Moinak Maiti ,&nbsp;Parthajit Kayal","doi":"10.1016/j.jnlssr.2024.02.004","DOIUrl":"10.1016/j.jnlssr.2024.02.004","url":null,"abstract":"<div><p>The study critically examines the principles, mechanisms, and effectiveness of different damage control techniques in dealing with natural disasters, emphasizing their pivotal role in minimizing casualties and economic losses. Each of these damage control techniques is mapped based on their applications and relevance in the key areas of natural disaster management. By utilizing various real-world instances, the present study shows that the effective implementation of various innovative techniques is shaping the space of natural disaster management in a global context. The integration of different innovative techniques into the existing natural disaster management system has improved the survival rate, economic performance, and sustainable development. The study finds that innovative disaster financing models, clear strategies, and creating awareness among communities can improve the overall efficiency of innovative techniques that are currently used for damage control during natural disaster events. Despite the substantial advantages of these creative strategies, the study acknowledges challenges such as financial constraints, unclear policy goals, and community adaptation requirements. The study also indicates that in the future, automatic damage restoration, quick prototyping, and additive engineering will play a vital role in controlling damage from catastrophic events, while it acknowledges limitations in temporal scope, generalizability, and financial constraints.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000173/pdfft?md5=d9f27cf83cda5df06f88a07917a4a9a9&pid=1-s2.0-S2666449624000173-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140271564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised intrusion detection system for in-vehicle communication networks 车载通信网络无监督入侵检测系统
安全科学与韧性(英文) Pub Date : 2024-02-22 DOI: 10.1016/j.jnlssr.2023.12.004
Kabilan N , Vinayakumar Ravi , V Sowmya
{"title":"Unsupervised intrusion detection system for in-vehicle communication networks","authors":"Kabilan N ,&nbsp;Vinayakumar Ravi ,&nbsp;V Sowmya","doi":"10.1016/j.jnlssr.2023.12.004","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2023.12.004","url":null,"abstract":"<div><p>In-vehicle communication has been optimized day to day to keep updated of the technologies. Control area network (CAN) is used as a standard communication method because of its efficient and reliable connection. However, CAN is prone to several network level attacks because of its lack in security mechanisms. Various methods have been introduced to incorporate this in CAN. We proposed an unsupervised method of intrusion detection for in-vehicle communication networks by combining the optimal feature extracting ability of autoencoders and more precise clustering using fuzzy C-means (FCM). The proposed method is light weight and requires less computation time. We performed an extensive experiment and achieved an accuracy of 75.51 % with the ML350 in-vehicle intrusion dataset. By experimental result, the proposed method also works better for other intrusion detection problems like wireless intrusion detection datasets such as WNS-DS with accuracy of 84.05 % and network intrusion detection datasets such as KDDCup with accuracy 60.63 % , UNSW_NB15 with accuracy 73.62 % and Information Security Center of Excellence (ISCX) with accuracy 74.83 %. Overall, the proposed method outperforms the existing methods and avoids labeled datasets when training an in-vehicle intrusion detection model. The results of the experiment of our proposed method performed on various intrusion detection datasets indicate that the proposed approach is generalized and robust in detecting intrusions and can be effectively deployed in real time to monitor CAN traffic in vehicles and proactively alert during attacks.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000070/pdfft?md5=c270f1be76c12ff19f65027e63889cd9&pid=1-s2.0-S2666449624000070-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140328614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A probabilistic model based on the peak-over-threshold approach for risk assessment of airport controllers' performance 基于阈值峰值法的机场管制员绩效风险评估概率模型
安全科学与韧性(英文) Pub Date : 2024-02-20 DOI: 10.1016/j.jnlssr.2024.02.001
Lili Zu , Yijie Lu , Min Dong
{"title":"A probabilistic model based on the peak-over-threshold approach for risk assessment of airport controllers' performance","authors":"Lili Zu ,&nbsp;Yijie Lu ,&nbsp;Min Dong","doi":"10.1016/j.jnlssr.2024.02.001","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2024.02.001","url":null,"abstract":"<div><p>Airport tower control plays an instrumental role in ensuring airport safety. However, obtaining objective, quantitative safety evaluations is challenging due to the unavailability of pertinent human operation data. This study introduces a probabilistic model that combines aircraft dynamics and the peak-over-threshold (POT) approach to assess the safety performance of airport controllers. We applied the POT approach to model reaction times extracted from a radiotelephony dataset via a voice event detection algorithm. The model couples the risks of tower control and aircraft operation to analyze the influence of human factors. Using data from radiotelephony communications and the Base of Aircraft Data (BADA) database, we compared risk levels across scenarios. Our findings revealed heightened airport control risks under low demand (0.374) compared to typical conditions (0.197). Furthermore, the risks associated with coupling under low demand exceeded those under typical demand, with the final approach stage presenting the highest risk (<span><math><mrow><mn>4.929</mn><mo>×</mo><msup><mrow><mn>10</mn></mrow><mrow><mo>−</mo><mn>7</mn></mrow></msup></mrow></math></span>). Our model underscores the significance of human factors and the implications of mental disconnects between pilots and controllers for safety risks. Collectively, these consistent findings affirm the reliability of our probabilistic model as an evaluative tool for evaluating the safety performance of airport tower controllers. The results also illuminate the path toward quantitative real-time safety evaluations for airport controllers within the industry. We recommend that airport regulators focus on the performance of airport controllers, particularly during the final approach stage.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000057/pdfft?md5=9d6786b81f15945e52ed0553f0807e58&pid=1-s2.0-S2666449624000057-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139986215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-voting system using cloud-based hybrid blockchain technology 使用云端混合区块链技术的电子投票系统
安全科学与韧性(英文) Pub Date : 2024-02-20 DOI: 10.1016/j.jnlssr.2024.01.002
Beulah Jayakumari , S Lilly Sheeba , Maya Eapen , Jani Anbarasi , Vinayakumar Ravi , A. Suganya , Malathy Jawahar
{"title":"E-voting system using cloud-based hybrid blockchain technology","authors":"Beulah Jayakumari ,&nbsp;S Lilly Sheeba ,&nbsp;Maya Eapen ,&nbsp;Jani Anbarasi ,&nbsp;Vinayakumar Ravi ,&nbsp;A. Suganya ,&nbsp;Malathy Jawahar","doi":"10.1016/j.jnlssr.2024.01.002","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2024.01.002","url":null,"abstract":"<div><p>With the invention of Internet-enabled devices, cloud and blockchain-based technologies, an online voting system can smoothly carry out election processes. During pandemic situations, citizens tend to develop panic about mass gatherings, which may influence the decrease in the number of votes. This urges a reliable, flexible, transparent, secure, and cost-effective voting system. The proposed online voting system using cloud-based hybrid blockchain technology eradicates the flaws that persist in the existing voting system, and it is carried out in three phases: the registration phase, vote casting phase and vote counting phase. A timestamp-based authentication protocol with digital signature validates voters and candidates during the registration and vote casting phases. Using smart contracts, third-party interventions are eliminated, and the transactions are secured in the blockchain network. Finally, to provide accurate voting results, the practical Byzantine fault tolerance (PBFT) consensus mechanism is adopted to ensure that the vote has not been modified or corrupted. Hence, the overall performance of the proposed system is significantly better than that of the existing system. Further performance was analyzed based on authentication delay, vote alteration, response time, and latency.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000069/pdfft?md5=3f8ecb21cf6c18772a6fba45e0bdbc41&pid=1-s2.0-S2666449624000069-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139985765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restimate: Recovery Estimation Tool for Resilience Planning 重新估算:复原力规划的复原力估算工具
安全科学与韧性(英文) Pub Date : 2024-02-08 DOI: 10.1016/j.jnlssr.2024.01.001
Scott Miles , Megan Ly , Nick Terry , Youngjun Choe
{"title":"Restimate: Recovery Estimation Tool for Resilience Planning","authors":"Scott Miles ,&nbsp;Megan Ly ,&nbsp;Nick Terry ,&nbsp;Youngjun Choe","doi":"10.1016/j.jnlssr.2024.01.001","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2024.01.001","url":null,"abstract":"<div><p>The U.S. National Institute of Standards and Technology (NIST) published the Community Resilience Planning Guide in 2016. The NIST Guide advocates for a participatory process for developing a performance measurement framework for the jurisdiction's resilience against a scenario hazard. The framework centers around tables of expected and desired recovery times for selected community assets, such as electricity, water, and natural gas infrastructures. The NIST Guide does not provide a method for estimating the expected recovery times. However, building high-fidelity computer models for such estimations requires substantial resources that even larger jurisdictions cannot cost-justify. The most promising approach to recovery time estimation is to systematically use data elicited from people to tap into the wisdom of the (knowledgeable) crowd. This paper describes a novel research-through-design project to enable the computer-supported elicitation of recovery time series data. This work is the first in the literature to examine people's ability to estimate recovery curves and how design influences such estimations. Its main contribution to resilience planning is three-fold: development of a new elicitation tool called Restimate, understanding its potential user base, and providing insights into how it can facilitate resilience planning. Restimate is the first tool to enable evidence-based expert elicitation in any community with limited resources for resilience planning. Beyond resilience planning, those who facilitate high-stakes planning activities under large uncertainties (e.g., mission-critical system design and planning) will benefit from a similar research-through-design process.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000045/pdfft?md5=efcbd9e2f5868035b756e8a77d1fd347&pid=1-s2.0-S2666449624000045-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139714984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A model for aircraft cabin evacuation considering passenger type 考虑乘客类型的机舱疏散模型
安全科学与韧性(英文) Pub Date : 2024-01-13 DOI: 10.1016/j.jnlssr.2023.12.002
Yaping Ma , Jinfeng Yuan , Lingling Tan , Quanyi Liu , Mengling Li
{"title":"A model for aircraft cabin evacuation considering passenger type","authors":"Yaping Ma ,&nbsp;Jinfeng Yuan ,&nbsp;Lingling Tan ,&nbsp;Quanyi Liu ,&nbsp;Mengling Li","doi":"10.1016/j.jnlssr.2023.12.002","DOIUrl":"10.1016/j.jnlssr.2023.12.002","url":null,"abstract":"<div><p>Pedestrian safety evacuation in aircraft cabins has been a challenging problem because of the aircraft's unique characteristics, such as the diversity of passengers and the restricted evacuation environment. It is difficult to reproduce evacuation activities in aircraft cabin due to safety concerns and cost constraints. To fill this gap, an improved cellular automaton model of crowd evacuation for aircraft cabin is established by incorporating the characteristics of cabin space structures and passenger attributes. Passengers are divided into healthy individual passengers and disabled-healthy group passengers, whose movement mechanisms are quantified. Based on the constructed model, simulation experiments are conducted using the configuration cabin layout of B737-800 as an example. The results show that the evacuation time is prolonged with increased passenger density and the number of disabled passengers. Moreover, the overall evacuation time is insignificantly affected by whether disabled-healthy group passengers' seats are close to the aisle or window, and the evacuation efficiency is best when their seats are evenly distributed in the cabin. The evacuation time is the shortest when all cabin doors are open, and pedestrians are evacuated the slowest when the central emergency doors are closed. This study provides valuable insights into effective strategies for pedestrian evacuation and crowd emergency management of civil aircraft.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266644962400001X/pdfft?md5=2b7c167babf9fa412bbefbe329883b94&pid=1-s2.0-S266644962400001X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139540497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and resilient improved image steganography using hybrid fuzzy neural network with fuzzy logic 利用带模糊逻辑的混合模糊神经网络改进图像隐写术的安全性和弹性
安全科学与韧性(英文) Pub Date : 2024-01-12 DOI: 10.1016/j.jnlssr.2023.12.003
Sachin Dhawan , Hemanta Kumar Bhuyan , Subhendu Kumar Pani , Vinayakumar Ravi , Rashmi Gupta , Arun Rana , Alanoud Al Mazroa
{"title":"Secure and resilient improved image steganography using hybrid fuzzy neural network with fuzzy logic","authors":"Sachin Dhawan ,&nbsp;Hemanta Kumar Bhuyan ,&nbsp;Subhendu Kumar Pani ,&nbsp;Vinayakumar Ravi ,&nbsp;Rashmi Gupta ,&nbsp;Arun Rana ,&nbsp;Alanoud Al Mazroa","doi":"10.1016/j.jnlssr.2023.12.003","DOIUrl":"10.1016/j.jnlssr.2023.12.003","url":null,"abstract":"<div><p>The exponential growth in communication networks, data technology, advanced libraries, and mainly World Wide Web services has played a pivotal role in facilitating the retrieval of various types of information as needed. However, this progress has also led to security concerns related to the transmission of confidential data. Nevertheless, safeguarding these data during communication through insecure channels is crucial for obvious reasons. The emergence of steganography offers a robust approach to concealing confidential information, such as images, audio tracks, text files, and video files, in suitable media carriers. A novel technique is envisioned based on back-propagation learning. According to the proposed method, a hybrid fuzzy neural network (HFNN) is applied to the output obtained from the least significant bit substitution of secret data using pixel value differences and exploiting the modification direction. Through simulation and test results, it has been observed that the proposed methodology achieves secure steganography and superior visual quality. During the experiments, we observed that for the secret image of the cameraman, the PSNR &amp; MSE values of the proposed technique are 61.963895 and 0.041361, respectively.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000033/pdfft?md5=556a7a7eb64422f764d2e1eb7ec44d4d&pid=1-s2.0-S2666449624000033-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139633944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A social computing method for energy safety 能源安全的社会计算方法
安全科学与韧性(英文) Pub Date : 2024-01-12 DOI: 10.1016/j.jnlssr.2023.12.001
Pengfei Zhao , Shuangqi Li , Zhidong Cao , Paul Jen-Hwa Hu , Daniel Dajun Zeng , Da Xie , Yichen Shen , Jiangfeng Li , Tianyi Luo
{"title":"A social computing method for energy safety","authors":"Pengfei Zhao ,&nbsp;Shuangqi Li ,&nbsp;Zhidong Cao ,&nbsp;Paul Jen-Hwa Hu ,&nbsp;Daniel Dajun Zeng ,&nbsp;Da Xie ,&nbsp;Yichen Shen ,&nbsp;Jiangfeng Li ,&nbsp;Tianyi Luo","doi":"10.1016/j.jnlssr.2023.12.001","DOIUrl":"10.1016/j.jnlssr.2023.12.001","url":null,"abstract":"<div><p>Information and communication technologies enable the transformation of traditional energy systems into cyber-physical energy systems (CPESs), but such systems have also become popular targets of cyberattacks. Currently, available methods for evaluating the impacts of cyberattacks suffer from limited resilience, efficacy, and practical value. To mitigate their potentially disastrous consequences, this study suggests a two-stage, discrepancy-based optimization approach that considers both preparatory actions and response measures, integrating concepts from social computing. The proposed Kullback-Leibler divergence-based, distributionally robust optimization (KDR) method has a hierarchical, two-stage objective function that incorporates the operating costs of both system infrastructures (e.g., energy resources, reserve capacity) and real-time response measures (e.g., load shedding, demand-side management, electric vehicle charging station management). By incorporating social computing principles, the optimization framework can also capture the social behavior and interactions of energy consumers in response to cyberattacks. The preparatory stage entails day-ahead operational decisions, leveraging insights from social computing to model and predict the behaviors of individuals and communities affected by potential cyberattacks. The mitigation stage generates responses designed to contain the consequences of the attack by directing and optimizing energy use from the demand side, taking into account the social context and preferences of energy consumers, to ensure resilient, economically efficient CPES operations. Our method can determine optimal schemes in both stages, accounting for the social dimensions of the problem. An original disaster mitigation model uses an abstract formulation to develop a risk-neutral model that characterizes cyberattacks through KDR, incorporating social computing techniques to enhance the understanding and response to cyber threats. This approach can mitigate the impacts more effectively than several existing methods, even with limited data availability. To extend this risk-neutral model, we incorporate conditional value at risk as an essential risk measure, capturing the uncertainty and diverse impact scenarios arising from social computing factors. The empirical results affirm that the KDR method, which is enriched with social computing considerations, produces resilient, economically efficient solutions for managing the impacts of cyberattacks on a CPES. By integrating social computing principles into the optimization framework, it becomes possible to better anticipate and address the social and behavioral aspects associated with cyberattacks on CPESs, ultimately improving the overall resilience and effectiveness of the system's response measures.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000021/pdfft?md5=ee0b546ba126233207f393bc1858e3fd&pid=1-s2.0-S2666449624000021-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139636635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信