安全科学与韧性(英文)最新文献

筛选
英文 中文
Unsupervised intrusion detection system for in-vehicle communication networks 车载通信网络无监督入侵检测系统
安全科学与韧性(英文) Pub Date : 2024-02-22 DOI: 10.1016/j.jnlssr.2023.12.004
Kabilan N , Vinayakumar Ravi , V Sowmya
{"title":"Unsupervised intrusion detection system for in-vehicle communication networks","authors":"Kabilan N ,&nbsp;Vinayakumar Ravi ,&nbsp;V Sowmya","doi":"10.1016/j.jnlssr.2023.12.004","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2023.12.004","url":null,"abstract":"<div><p>In-vehicle communication has been optimized day to day to keep updated of the technologies. Control area network (CAN) is used as a standard communication method because of its efficient and reliable connection. However, CAN is prone to several network level attacks because of its lack in security mechanisms. Various methods have been introduced to incorporate this in CAN. We proposed an unsupervised method of intrusion detection for in-vehicle communication networks by combining the optimal feature extracting ability of autoencoders and more precise clustering using fuzzy C-means (FCM). The proposed method is light weight and requires less computation time. We performed an extensive experiment and achieved an accuracy of 75.51 % with the ML350 in-vehicle intrusion dataset. By experimental result, the proposed method also works better for other intrusion detection problems like wireless intrusion detection datasets such as WNS-DS with accuracy of 84.05 % and network intrusion detection datasets such as KDDCup with accuracy 60.63 % , UNSW_NB15 with accuracy 73.62 % and Information Security Center of Excellence (ISCX) with accuracy 74.83 %. Overall, the proposed method outperforms the existing methods and avoids labeled datasets when training an in-vehicle intrusion detection model. The results of the experiment of our proposed method performed on various intrusion detection datasets indicate that the proposed approach is generalized and robust in detecting intrusions and can be effectively deployed in real time to monitor CAN traffic in vehicles and proactively alert during attacks.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000070/pdfft?md5=c270f1be76c12ff19f65027e63889cd9&pid=1-s2.0-S2666449624000070-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140328614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A probabilistic model based on the peak-over-threshold approach for risk assessment of airport controllers' performance 基于阈值峰值法的机场管制员绩效风险评估概率模型
安全科学与韧性(英文) Pub Date : 2024-02-20 DOI: 10.1016/j.jnlssr.2024.02.001
Lili Zu , Yijie Lu , Min Dong
{"title":"A probabilistic model based on the peak-over-threshold approach for risk assessment of airport controllers' performance","authors":"Lili Zu ,&nbsp;Yijie Lu ,&nbsp;Min Dong","doi":"10.1016/j.jnlssr.2024.02.001","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2024.02.001","url":null,"abstract":"<div><p>Airport tower control plays an instrumental role in ensuring airport safety. However, obtaining objective, quantitative safety evaluations is challenging due to the unavailability of pertinent human operation data. This study introduces a probabilistic model that combines aircraft dynamics and the peak-over-threshold (POT) approach to assess the safety performance of airport controllers. We applied the POT approach to model reaction times extracted from a radiotelephony dataset via a voice event detection algorithm. The model couples the risks of tower control and aircraft operation to analyze the influence of human factors. Using data from radiotelephony communications and the Base of Aircraft Data (BADA) database, we compared risk levels across scenarios. Our findings revealed heightened airport control risks under low demand (0.374) compared to typical conditions (0.197). Furthermore, the risks associated with coupling under low demand exceeded those under typical demand, with the final approach stage presenting the highest risk (<span><math><mrow><mn>4.929</mn><mo>×</mo><msup><mrow><mn>10</mn></mrow><mrow><mo>−</mo><mn>7</mn></mrow></msup></mrow></math></span>). Our model underscores the significance of human factors and the implications of mental disconnects between pilots and controllers for safety risks. Collectively, these consistent findings affirm the reliability of our probabilistic model as an evaluative tool for evaluating the safety performance of airport tower controllers. The results also illuminate the path toward quantitative real-time safety evaluations for airport controllers within the industry. We recommend that airport regulators focus on the performance of airport controllers, particularly during the final approach stage.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000057/pdfft?md5=9d6786b81f15945e52ed0553f0807e58&pid=1-s2.0-S2666449624000057-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139986215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-voting system using cloud-based hybrid blockchain technology 使用云端混合区块链技术的电子投票系统
安全科学与韧性(英文) Pub Date : 2024-02-20 DOI: 10.1016/j.jnlssr.2024.01.002
Beulah Jayakumari , S Lilly Sheeba , Maya Eapen , Jani Anbarasi , Vinayakumar Ravi , A. Suganya , Malathy Jawahar
{"title":"E-voting system using cloud-based hybrid blockchain technology","authors":"Beulah Jayakumari ,&nbsp;S Lilly Sheeba ,&nbsp;Maya Eapen ,&nbsp;Jani Anbarasi ,&nbsp;Vinayakumar Ravi ,&nbsp;A. Suganya ,&nbsp;Malathy Jawahar","doi":"10.1016/j.jnlssr.2024.01.002","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2024.01.002","url":null,"abstract":"<div><p>With the invention of Internet-enabled devices, cloud and blockchain-based technologies, an online voting system can smoothly carry out election processes. During pandemic situations, citizens tend to develop panic about mass gatherings, which may influence the decrease in the number of votes. This urges a reliable, flexible, transparent, secure, and cost-effective voting system. The proposed online voting system using cloud-based hybrid blockchain technology eradicates the flaws that persist in the existing voting system, and it is carried out in three phases: the registration phase, vote casting phase and vote counting phase. A timestamp-based authentication protocol with digital signature validates voters and candidates during the registration and vote casting phases. Using smart contracts, third-party interventions are eliminated, and the transactions are secured in the blockchain network. Finally, to provide accurate voting results, the practical Byzantine fault tolerance (PBFT) consensus mechanism is adopted to ensure that the vote has not been modified or corrupted. Hence, the overall performance of the proposed system is significantly better than that of the existing system. Further performance was analyzed based on authentication delay, vote alteration, response time, and latency.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000069/pdfft?md5=3f8ecb21cf6c18772a6fba45e0bdbc41&pid=1-s2.0-S2666449624000069-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139985765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restimate: Recovery Estimation Tool for Resilience Planning 重新估算:复原力规划的复原力估算工具
安全科学与韧性(英文) Pub Date : 2024-02-08 DOI: 10.1016/j.jnlssr.2024.01.001
Scott Miles , Megan Ly , Nick Terry , Youngjun Choe
{"title":"Restimate: Recovery Estimation Tool for Resilience Planning","authors":"Scott Miles ,&nbsp;Megan Ly ,&nbsp;Nick Terry ,&nbsp;Youngjun Choe","doi":"10.1016/j.jnlssr.2024.01.001","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2024.01.001","url":null,"abstract":"<div><p>The U.S. National Institute of Standards and Technology (NIST) published the Community Resilience Planning Guide in 2016. The NIST Guide advocates for a participatory process for developing a performance measurement framework for the jurisdiction's resilience against a scenario hazard. The framework centers around tables of expected and desired recovery times for selected community assets, such as electricity, water, and natural gas infrastructures. The NIST Guide does not provide a method for estimating the expected recovery times. However, building high-fidelity computer models for such estimations requires substantial resources that even larger jurisdictions cannot cost-justify. The most promising approach to recovery time estimation is to systematically use data elicited from people to tap into the wisdom of the (knowledgeable) crowd. This paper describes a novel research-through-design project to enable the computer-supported elicitation of recovery time series data. This work is the first in the literature to examine people's ability to estimate recovery curves and how design influences such estimations. Its main contribution to resilience planning is three-fold: development of a new elicitation tool called Restimate, understanding its potential user base, and providing insights into how it can facilitate resilience planning. Restimate is the first tool to enable evidence-based expert elicitation in any community with limited resources for resilience planning. Beyond resilience planning, those who facilitate high-stakes planning activities under large uncertainties (e.g., mission-critical system design and planning) will benefit from a similar research-through-design process.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000045/pdfft?md5=efcbd9e2f5868035b756e8a77d1fd347&pid=1-s2.0-S2666449624000045-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139714984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A model for aircraft cabin evacuation considering passenger type 考虑乘客类型的机舱疏散模型
安全科学与韧性(英文) Pub Date : 2024-01-13 DOI: 10.1016/j.jnlssr.2023.12.002
Yaping Ma , Jinfeng Yuan , Lingling Tan , Quanyi Liu , Mengling Li
{"title":"A model for aircraft cabin evacuation considering passenger type","authors":"Yaping Ma ,&nbsp;Jinfeng Yuan ,&nbsp;Lingling Tan ,&nbsp;Quanyi Liu ,&nbsp;Mengling Li","doi":"10.1016/j.jnlssr.2023.12.002","DOIUrl":"10.1016/j.jnlssr.2023.12.002","url":null,"abstract":"<div><p>Pedestrian safety evacuation in aircraft cabins has been a challenging problem because of the aircraft's unique characteristics, such as the diversity of passengers and the restricted evacuation environment. It is difficult to reproduce evacuation activities in aircraft cabin due to safety concerns and cost constraints. To fill this gap, an improved cellular automaton model of crowd evacuation for aircraft cabin is established by incorporating the characteristics of cabin space structures and passenger attributes. Passengers are divided into healthy individual passengers and disabled-healthy group passengers, whose movement mechanisms are quantified. Based on the constructed model, simulation experiments are conducted using the configuration cabin layout of B737-800 as an example. The results show that the evacuation time is prolonged with increased passenger density and the number of disabled passengers. Moreover, the overall evacuation time is insignificantly affected by whether disabled-healthy group passengers' seats are close to the aisle or window, and the evacuation efficiency is best when their seats are evenly distributed in the cabin. The evacuation time is the shortest when all cabin doors are open, and pedestrians are evacuated the slowest when the central emergency doors are closed. This study provides valuable insights into effective strategies for pedestrian evacuation and crowd emergency management of civil aircraft.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266644962400001X/pdfft?md5=2b7c167babf9fa412bbefbe329883b94&pid=1-s2.0-S266644962400001X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139540497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and resilient improved image steganography using hybrid fuzzy neural network with fuzzy logic 利用带模糊逻辑的混合模糊神经网络改进图像隐写术的安全性和弹性
安全科学与韧性(英文) Pub Date : 2024-01-12 DOI: 10.1016/j.jnlssr.2023.12.003
Sachin Dhawan , Hemanta Kumar Bhuyan , Subhendu Kumar Pani , Vinayakumar Ravi , Rashmi Gupta , Arun Rana , Alanoud Al Mazroa
{"title":"Secure and resilient improved image steganography using hybrid fuzzy neural network with fuzzy logic","authors":"Sachin Dhawan ,&nbsp;Hemanta Kumar Bhuyan ,&nbsp;Subhendu Kumar Pani ,&nbsp;Vinayakumar Ravi ,&nbsp;Rashmi Gupta ,&nbsp;Arun Rana ,&nbsp;Alanoud Al Mazroa","doi":"10.1016/j.jnlssr.2023.12.003","DOIUrl":"10.1016/j.jnlssr.2023.12.003","url":null,"abstract":"<div><p>The exponential growth in communication networks, data technology, advanced libraries, and mainly World Wide Web services has played a pivotal role in facilitating the retrieval of various types of information as needed. However, this progress has also led to security concerns related to the transmission of confidential data. Nevertheless, safeguarding these data during communication through insecure channels is crucial for obvious reasons. The emergence of steganography offers a robust approach to concealing confidential information, such as images, audio tracks, text files, and video files, in suitable media carriers. A novel technique is envisioned based on back-propagation learning. According to the proposed method, a hybrid fuzzy neural network (HFNN) is applied to the output obtained from the least significant bit substitution of secret data using pixel value differences and exploiting the modification direction. Through simulation and test results, it has been observed that the proposed methodology achieves secure steganography and superior visual quality. During the experiments, we observed that for the secret image of the cameraman, the PSNR &amp; MSE values of the proposed technique are 61.963895 and 0.041361, respectively.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000033/pdfft?md5=556a7a7eb64422f764d2e1eb7ec44d4d&pid=1-s2.0-S2666449624000033-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139633944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A social computing method for energy safety 能源安全的社会计算方法
安全科学与韧性(英文) Pub Date : 2024-01-12 DOI: 10.1016/j.jnlssr.2023.12.001
Pengfei Zhao , Shuangqi Li , Zhidong Cao , Paul Jen-Hwa Hu , Daniel Dajun Zeng , Da Xie , Yichen Shen , Jiangfeng Li , Tianyi Luo
{"title":"A social computing method for energy safety","authors":"Pengfei Zhao ,&nbsp;Shuangqi Li ,&nbsp;Zhidong Cao ,&nbsp;Paul Jen-Hwa Hu ,&nbsp;Daniel Dajun Zeng ,&nbsp;Da Xie ,&nbsp;Yichen Shen ,&nbsp;Jiangfeng Li ,&nbsp;Tianyi Luo","doi":"10.1016/j.jnlssr.2023.12.001","DOIUrl":"10.1016/j.jnlssr.2023.12.001","url":null,"abstract":"<div><p>Information and communication technologies enable the transformation of traditional energy systems into cyber-physical energy systems (CPESs), but such systems have also become popular targets of cyberattacks. Currently, available methods for evaluating the impacts of cyberattacks suffer from limited resilience, efficacy, and practical value. To mitigate their potentially disastrous consequences, this study suggests a two-stage, discrepancy-based optimization approach that considers both preparatory actions and response measures, integrating concepts from social computing. The proposed Kullback-Leibler divergence-based, distributionally robust optimization (KDR) method has a hierarchical, two-stage objective function that incorporates the operating costs of both system infrastructures (e.g., energy resources, reserve capacity) and real-time response measures (e.g., load shedding, demand-side management, electric vehicle charging station management). By incorporating social computing principles, the optimization framework can also capture the social behavior and interactions of energy consumers in response to cyberattacks. The preparatory stage entails day-ahead operational decisions, leveraging insights from social computing to model and predict the behaviors of individuals and communities affected by potential cyberattacks. The mitigation stage generates responses designed to contain the consequences of the attack by directing and optimizing energy use from the demand side, taking into account the social context and preferences of energy consumers, to ensure resilient, economically efficient CPES operations. Our method can determine optimal schemes in both stages, accounting for the social dimensions of the problem. An original disaster mitigation model uses an abstract formulation to develop a risk-neutral model that characterizes cyberattacks through KDR, incorporating social computing techniques to enhance the understanding and response to cyber threats. This approach can mitigate the impacts more effectively than several existing methods, even with limited data availability. To extend this risk-neutral model, we incorporate conditional value at risk as an essential risk measure, capturing the uncertainty and diverse impact scenarios arising from social computing factors. The empirical results affirm that the KDR method, which is enriched with social computing considerations, produces resilient, economically efficient solutions for managing the impacts of cyberattacks on a CPES. By integrating social computing principles into the optimization framework, it becomes possible to better anticipate and address the social and behavioral aspects associated with cyberattacks on CPESs, ultimately improving the overall resilience and effectiveness of the system's response measures.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000021/pdfft?md5=ee0b546ba126233207f393bc1858e3fd&pid=1-s2.0-S2666449624000021-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139636635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Single image defogging via multi-exposure image fusion and detail enhancement 通过多曝光图像融合和细节增强实现单幅图像除雾
安全科学与韧性(英文) Pub Date : 2023-12-22 DOI: 10.1016/j.jnlssr.2023.11.003
Wenjing Mao , Dezhi Zheng , Minze Chen , Juqiang Chen
{"title":"Single image defogging via multi-exposure image fusion and detail enhancement","authors":"Wenjing Mao ,&nbsp;Dezhi Zheng ,&nbsp;Minze Chen ,&nbsp;Juqiang Chen","doi":"10.1016/j.jnlssr.2023.11.003","DOIUrl":"10.1016/j.jnlssr.2023.11.003","url":null,"abstract":"<div><p>Outdoor cameras play an important role in monitoring security and social governance. As a common weather phenomenon, haze can easily affect the quality of camera shooting, resulting in loss and distortion of image details. This paper proposes an improved multi-exposure image fusion defogging technique based on the artificial multi-exposure image fusion (AMEF) algorithm. First, the foggy image is adaptively exposed, and the fused image is subsequently obtained via multiple exposures. The fusion weight is determined by the saturation, contrast, and brightness. Finally, the image fused by a multi-scale Laplacian algorithm is enhanced with simple adaptive details to obtain a clearer defogging image. It is subjectively and objectively verified that this algorithm can obtain more image details and distinct picture colors without a priori information, effectively improving the defogging ability.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449623000555/pdfft?md5=4f37c1a069f1184722bd5ba9365158c7&pid=1-s2.0-S2666449623000555-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139018021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the correlation between temperature and crime: A case-crossover study of eight cities in America 探索气温与犯罪之间的相关性:美国八个城市的案例交叉研究
安全科学与韧性(英文) Pub Date : 2023-12-17 DOI: 10.1016/j.jnlssr.2023.11.001
Jinming Hu , Xiaofeng Hu , Xin'ge Han , Yan Lin , Huanggang Wu , Bing Shen
{"title":"Exploring the correlation between temperature and crime: A case-crossover study of eight cities in America","authors":"Jinming Hu ,&nbsp;Xiaofeng Hu ,&nbsp;Xin'ge Han ,&nbsp;Yan Lin ,&nbsp;Huanggang Wu ,&nbsp;Bing Shen","doi":"10.1016/j.jnlssr.2023.11.001","DOIUrl":"10.1016/j.jnlssr.2023.11.001","url":null,"abstract":"<div><p>Recent years have seen increasing academic interest in exploring the correlation between temperature and crime. However, it is uncertain whether similar long-term trends or seasonality (rather than causal effect) of temperature and crime is the major reason for the observed correlation between them. To explore whether there is still a correlation between temperature and crime when long-term trends and seasonal cycles are filtered out, we use the Kalman filter to decompose the time series of temperature and crimes, and then the fast Fourier transform is used to calculate the exact circle of their seasonality separately. Based on that, the box-plot method and linear regression are used to explore the correlation between temperature residuals and crime residuals. The results show that more than half of the crime types have similar seasonal cycles (approximately 1 year) to that of temperature. Moreover, the daily residual analyses show that temperature residuals have a positive correlation with assault and robbery residuals in all cities, whose average slopes are more than 0.1. The other four types of crimes vary greatly from case to case. The temperature residuals show a weak correlation with the residuals of some crime types.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449623000531/pdfft?md5=ef4f4c46d1e5d5cc63651ba91d45e8d7&pid=1-s2.0-S2666449623000531-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138988188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-driven evacuation and rescue traffic optimization with rescue contraflow control 数据驱动的疏散和救援交通优化与救援逆流控制
安全科学与韧性(英文) Pub Date : 2023-12-14 DOI: 10.1016/j.jnlssr.2023.11.002
Zheng Liu , Jialin Liu , Xuecheng Shang , Xingang Li
{"title":"Data-driven evacuation and rescue traffic optimization with rescue contraflow control","authors":"Zheng Liu ,&nbsp;Jialin Liu ,&nbsp;Xuecheng Shang ,&nbsp;Xingang Li","doi":"10.1016/j.jnlssr.2023.11.002","DOIUrl":"10.1016/j.jnlssr.2023.11.002","url":null,"abstract":"<div><p>In response to local sudden disasters, e.g., high-rise office or residential building fire disasters, road occupation can cause conflicts, and traffic directions may be opposite between evacuation vehicles and rescue vehicles; moreover, lane contraflow can be adopted to meet these surge traffic demands. However, lane contraflow that provides more roads for rescue vehicles reduces the traffic supply in the evacuation direction. It is unclear how to control the number of contraflow roads used by rescue vehicles to coordinate evacuation and rescue traffic operations. Here, we adjust the critical rescue traffic volume of reversing the normal road traffic direction to control rescue contraflow. Additionally, we propose a multiobjective mixed integer linear programming formulation for evacuation and rescue traffic optimization. Additionally, considering that the upper limit of the critical rescue traffic volume is unknown and that the proposed formulation includes multiple objectives and multi-priority vehicle classes, a three-stage solving algorithm is developed. Next, a large-scale evacuation and rescue traffic optimization result dataset is obtained for the Nguyen–Dupuis road network, and the impact of different rescue contraflow control plans on evacuation and rescue traffic is studied based on data-driven statistical analysis. The results show that by adjusting the optimal rescue traffic route, the critical rescue traffic volume for reversing the normal road traffic direction can reduce the interference of rescue traffic to evacuation traffic operation performance without reducing rescue traffic operation performance, and can be used to coordinate evacuation and rescue traffic operation under rescue contraflow.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449623000543/pdfft?md5=a313ae95ca5422cb9d3c008e9bcb6806&pid=1-s2.0-S2666449623000543-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139015413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信