{"title":"Cost-aware strategies for enhancing energy resilience in microgrids via stationary and mobile resources","authors":"S.M. Safayet Ullah , Kouhyar Sheida , Farzad Ferdowsi , Terrence Chambers","doi":"10.1016/j.jnlssr.2024.10.002","DOIUrl":"10.1016/j.jnlssr.2024.10.002","url":null,"abstract":"<div><div>The primary goal of this research study is to enhance energy resilience with a focus on cost efficiency. To achieve this objective, two key objectives have been identified: (1) reducing unserved loads, and (2) implementing cost-effective resource allocation strategies. A high-fidelity detailed model of a solar plus storage microgrid is developed to simulate a variety of what-if scenarios. This model is based on the conceptual design of a campus microgrid facility, which is slated for commissioning at UL Lafayette in close collaboration with a local power utility. The study examines the microgrid’s performance under different configurations, including both stationary battery and mobile battery storage options. To ensure the realism of the scenarios, real solar data from specific days following the occurrence of three major hurricanes in Louisiana is utilized. The analysis includes an assessment of unserved loads under various scenarios, as well as an investigation into the resilience impact of investment decisions and the planning and operation of mobile storage systems. The results indicate the proposed planning and operation will improve resilience while staying within the profitable range. The resilience is quantified and compared with other scenarios providing an insightful planning framework for decision-makers.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 2","pages":"Pages 163-174"},"PeriodicalIF":3.7,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143792727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
安全科学与韧性(英文)Pub Date : 2024-11-28DOI: 10.1016/j.jnlssr.2024.09.002
Hafiz Mughees Ahmad, Afshin Rahimi
{"title":"SH17: A dataset for human safety and personal protective equipment detection in manufacturing industry","authors":"Hafiz Mughees Ahmad, Afshin Rahimi","doi":"10.1016/j.jnlssr.2024.09.002","DOIUrl":"10.1016/j.jnlssr.2024.09.002","url":null,"abstract":"<div><div>Workplace accidents continue to pose significant human safety risks, particularly in the construction and manufacturing industries. The necessity for effective Personal Protective Equipment (PPE) compliance has become increasingly paramount. We focus on developing non-invasive techniques based on the Object Detection (OD) and Convolutional Neural Network (CNN). The aim is to detect and verify the proper use of various types of PPE such as helmets, safety glasses, masks, and protective clothing. This study proposes the SH17 Dataset, consisting of 8,099 annotated images containing 75,994 instances of 17 classes collected from diverse industrial environments, to train and validate the OD models. We have trained state-of-the-art OD models for benchmarking, and initial results demonstrate promising accuracy levels with You Only Look Once (YOLO)v9-e model variant exceeding 70.9% in PPE detection. The validation of the model across cross-domain datasets indicates that integrating these technologies can substantially enhance safety management systems. This approach offers a scalable and efficient solution for industries seeking to comply with human safety regulations while safeguarding their workforce. The dataset is available at <span><span>https://github.com/ahmadmughees/sh17dataset</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 2","pages":"Pages 175-185"},"PeriodicalIF":3.7,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143807336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
安全科学与韧性(英文)Pub Date : 2024-11-22DOI: 10.1016/j.jnlssr.2024.10.001
Chupei Liao, Kuoyi Lin
{"title":"DDC-Chat: Achieving accurate distracted driver classification through instruction tuning of visual language model","authors":"Chupei Liao, Kuoyi Lin","doi":"10.1016/j.jnlssr.2024.10.001","DOIUrl":"10.1016/j.jnlssr.2024.10.001","url":null,"abstract":"<div><div>Driver behavior is a critical factor in road safety, highlighting the need for advanced methods in <strong>D</strong>istracted <strong>D</strong>riving <strong>C</strong>lassification (DDC). In this study, we introduce DDC-Chat, a novel classification method based on a <strong>V</strong>isual large <strong>L</strong>anguage <strong>M</strong>odel (VLM). DDC-Chat is an interactive multimodal system built upon LLAVA-Plus, fine-tuned specifically for addressing distracted driving detection. It utilizes logical reasoning chains to activate visual skills, including segmentation and pose detection, through end-to-end training. Furthermore, instruction tuning allows DDC-Chat to continuously incorporate new visual skills, enhancing its ability to classify distracted driving behavior. Our extensive experiments demonstrate that DDC-Chat achieves state-of-the-art performance on public DDC datasets, surpassing previous benchmarks. In evaluations on the 100-Driver dataset, the model exhibits superior results in both zero-shot and few-shot learning contexts, establishing it as a valuable tool for improving driving safety by accurately identifying driver distraction. Due to the computational intensity of inference, DDC-Chat is optimized for deployment on remote servers, with data streamed from in-vehicle monitoring systems for real-time analysis.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 2","pages":"Pages 250-264"},"PeriodicalIF":3.7,"publicationDate":"2024-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143860683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
安全科学与韧性(英文)Pub Date : 2024-11-18DOI: 10.1016/j.jnlssr.2024.08.002
Muammer Yaman , Cüneyt Kurtay
{"title":"Analysis of fire evacuation scenarios in children's cultural centers","authors":"Muammer Yaman , Cüneyt Kurtay","doi":"10.1016/j.jnlssr.2024.08.002","DOIUrl":"10.1016/j.jnlssr.2024.08.002","url":null,"abstract":"<div><div>Fires that occur in assembly buildings cause great loss of life and property. Children's cultural centers included in assembly buildings should also be evaluated within this context. Children create an occupant profile in cultural centers, and the internal environment has an excessive fire load, which poses a great risk of fires. In fire evacuation scenarios for children's cultural centers, it is necessary to create appropriate evacuation conditions. In this work, fire safety was analyzed over total evacuation time within occupant-based fire evacuation simulations of a children's cultural center located in Istanbul. The effect of the children's theatre hall located on the top floor on a building's total evacuation time has been studied. The effectiveness of alternative fire escape routes on evacuation time through different evacuation scenarios has been analyzed, and safe evacuation strategies for children's cultural centers have been revealed. As a result of this study, recommendations were presented within performance-based fire evacuation strategies in the design of children's cultural centers. As the future of the countries, fire safety design criteria have been created in children's cultural centers for children to be able to be safe in educational, cultural, and artistic environments.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 1","pages":"Pages 114-123"},"PeriodicalIF":3.7,"publicationDate":"2024-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
安全科学与韧性(英文)Pub Date : 2024-11-16DOI: 10.1016/j.jnlssr.2024.09.003
Mohammad Amin Eshghi Nezami, Hamed Kashani
{"title":"The value of a statistical life in assessing seismic resilience enhancement policies: A stated preference binary choice experiment","authors":"Mohammad Amin Eshghi Nezami, Hamed Kashani","doi":"10.1016/j.jnlssr.2024.09.003","DOIUrl":"10.1016/j.jnlssr.2024.09.003","url":null,"abstract":"<div><div>To decide about investments in appropriate seismic vulnerability reduction and resilience enhancement measures, policymakers need to acquire adequate insight into the value of a statistical life (VSL). The VSL measures the monetary value the public assigns to reducing mortality due to a specific risk (e.g., dying from an earthquake) over a given period. In the absence of appropriate models to estimate the context-specific VSL for a given community, past studies have resorted to approaches such as using the VSL estimated for other purposes (e.g., transportation and environmental safety) or other countries (e.g., the US). This can lead to under- or over-estimation of VSL, misappropriation of the funds for seismic vulnerability reduction programs, and adverse economic, political, and social consequences. This study proposes a methodology that follows the stated preference binary choice approach to estimate the willingness to pay (WTP) to reduce the risk of earthquake-induced mortalities. The proposed method, which is applied to quantify VSL in Iran, involves using a questionnaire to collect the needed information about people's choices when investing in various risk reduction measures. It uses a test containing positivity and proportionality components to check the responses’ consistency. Regression modeling is used to estimate the respondents’ WTP and VSL.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 2","pages":"Pages 150-162"},"PeriodicalIF":3.7,"publicationDate":"2024-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143636732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
安全科学与韧性(英文)Pub Date : 2024-11-15DOI: 10.1016/j.jnlssr.2024.09.004
Daffa Tristan Firdaus , Ntivuguruzwa Jean De La Croix , Tohari Ahmad , Didacienne Mukanyiligira , Louis Sibomana
{"title":"Steganographic model to conceal the secret data in audio files utilizing a fourfold paradigm: Interpolation, multi-layering, optimized sample space, and smoothing","authors":"Daffa Tristan Firdaus , Ntivuguruzwa Jean De La Croix , Tohari Ahmad , Didacienne Mukanyiligira , Louis Sibomana","doi":"10.1016/j.jnlssr.2024.09.004","DOIUrl":"10.1016/j.jnlssr.2024.09.004","url":null,"abstract":"<div><div>Audio steganography techniques are evaluated using performance metrics such as payload capacity, stego audio file quality, and security (imperceptibility of hidden data). Increasing payload capacity often reduces stego image quality and security. However, maintaining high-quality stego audio with high imperceptibility requires compromising payload capacity. Therefore, achieving a balanced trade-off between payload capacity and stego audio quality has become essential but increasingly challenging. Current methods often lack adaptiveness, potentially compromising both embedding capacity and stego audio quality. To address these limitations, this study offers valuable insights to guide researchers in developing high-performing audio steganography models. The proposed method seeks to improve stego audio quality by implementing a smoothing-based technique and optimizing the sample space through linear interpolation, followed by a multi-layering process. Comprehensive experiments are conducted on common audio datasets to benchmark the method against state-of-the-art techniques. The results demonstrate peak signal-to-noise ratio (PSNR) values ranging from 105.14 to 126.34 dB, indicating substantial fidelity preservation compared to existing methods with PSNR values ranging from 120.55 decibel (dB) for 1 kb to 100.57 dB for 100 kb. These findings confirm the effectiveness of the model in maintaining audio quality while concealing data. Moreover, this study recommends that practitioners in steganography with audio data prioritize data concealment algorithms that enhance security over stego audio quality.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 2","pages":"Pages 138-149"},"PeriodicalIF":3.7,"publicationDate":"2024-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143609402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
安全科学与韧性(英文)Pub Date : 2024-10-28DOI: 10.1016/j.jnlssr.2024.07.004
Ranpeng Wang , Hang Gao , Yi Liu
{"title":"A data fusion-based method for pedestrian detection and flow statistics across different crowd densities","authors":"Ranpeng Wang , Hang Gao , Yi Liu","doi":"10.1016/j.jnlssr.2024.07.004","DOIUrl":"10.1016/j.jnlssr.2024.07.004","url":null,"abstract":"<div><div>Accurate tracking and statistics analysis of pedestrian flow have wide applications in public scenarios. However, the conventional tracking-by-detection approaches are prone to missing individuals in densely populated or poorly lit environments. This study introduces a pedestrian detection and flow statistics method based on data fusion, which effectively tracks pedestrians across varying crowd densities. The proposed method amalgamates object detection strategies with crowd counting technique to determine the locations of all pedestrians. By observing the coordinates of pedestrians' foot points, this approach assesses the interaction dynamics between the movement trajectories of pedestrians and designated spatial areas, thereby enabling the collection of flow statistics. Experimental results indicate that the proposed method identifies 2.7 times more pedestrians than object detection methods alone and decreases false positives by 58% compared to crowd counting techniques in crowded settings. In conclusion, the proposed method exhibits considerable promise for achieving accurate pedestrian detection and flow analysis.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 1","pages":"Pages 105-113"},"PeriodicalIF":3.7,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143217882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
安全科学与韧性(英文)Pub Date : 2024-10-19DOI: 10.1016/j.jnlssr.2024.06.012
Chao Chen , Jiali Tang , Jie Li , Genserik Reniers , Changjun Li
{"title":"A systematic review of safety risk assessment research in China","authors":"Chao Chen , Jiali Tang , Jie Li , Genserik Reniers , Changjun Li","doi":"10.1016/j.jnlssr.2024.06.012","DOIUrl":"10.1016/j.jnlssr.2024.06.012","url":null,"abstract":"<div><div>The rapid industrialization and urbanization in China require a high level of safety management and thus urge the development of safety risk assessment in China. In the past two decades, many safety risk assessment research findings have been published in international journals by Chinese scholars, while it is not clear the development progress and China's contributions to the world in this research field. Therefore, a systematic and thorough literature review is conducted to investigate risk assessment research in China. Firstly, the research publications authored by Chinese scholars are searched from the well-known literature database Web of Science to support the analysis of risk assessment research in China. Secondly, a bibliometric analysis is conducted for the obtained literature related to risk assessment research in China to find out publication trends, research organizations, research authors, research topics, and research methods. Then, a thorough analysis of research topics and research methods is carried out to present the research progress. Finally, possible future research issues in the risk assessment research domain are discussed based on this literature review. According to the discussion, more attention in China should be paid to the risk of digital or autonomous systems, the risk related to extreme events, and the risk in large cities.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 1","pages":"Pages 58-69"},"PeriodicalIF":3.7,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143155757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
安全科学与韧性(英文)Pub Date : 2024-10-19DOI: 10.1016/j.jnlssr.2024.08.001
M. Sinthuja , S. Pravinthraja , B K Dhanalakshmi , H L Gururaj , Vinayakumar Ravi , G Jyothish Lal
{"title":"An efficient and resilience linear prefix approach for mining maximal frequent itemset using clustering","authors":"M. Sinthuja , S. Pravinthraja , B K Dhanalakshmi , H L Gururaj , Vinayakumar Ravi , G Jyothish Lal","doi":"10.1016/j.jnlssr.2024.08.001","DOIUrl":"10.1016/j.jnlssr.2024.08.001","url":null,"abstract":"<div><div>The numerous volumes of data generated every day necessitate the deployment of new technologies capable of dealing with massive amounts of data efficiently. This is the case with Association Rules, a tool for unsupervised data mining that extracts information in the form of IF-THEN patterns. Although various approaches for extracting frequent itemset (prior step before mining association rules) in extremely large databases have been presented, the high computational cost and shortage of memory remain key issues to be addressed while processing enormous data. The objective of this research is to discover frequent itemset by using clustering for preprocessing and adopting the linear prefix tree algorithm for mining the maximal frequent itemset. The performance of the proposed CL-LP-MAX-tree was evaluated by comparing it with the existing FP-max algorithm. Experimentation was performed with the three different standard datasets to record evidence to prove that the proposed CL-LP-MAX-tree algorithm outperform the existing FP-max algorithm in terms of runtime and memory consumption.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 1","pages":"Pages 93-104"},"PeriodicalIF":3.7,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143155760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
安全科学与韧性(英文)Pub Date : 2024-09-25DOI: 10.1016/j.jnlssr.2024.09.001
Runkang Guo, Yong Zhao, Yatai Ji, Mengyu Yan, Zhengqiu Zhu
{"title":"Clutaxis: An information-driven source search method balancing exploration and exploitation in turbulent environments","authors":"Runkang Guo, Yong Zhao, Yatai Ji, Mengyu Yan, Zhengqiu Zhu","doi":"10.1016/j.jnlssr.2024.09.001","DOIUrl":"10.1016/j.jnlssr.2024.09.001","url":null,"abstract":"<div><div>Locating unknown emission sources in turbulent environments is a challenging yet crucial task, particularly in emergency response scenarios. Existing studies have developed information-theoretic approaches to fuse intermittent information collected by mobile sensors regarding the sources. This fused information is then used to support source-term estimation (STE) in various search algorithms. Among these, the cognitive strategy—a promising information-driven search algorithm—leverages a reward-based action selection mechanism to balance exploration and exploitation during each search step. However, this mechanism is hampered by a high computational load and rigid search trajectories, limiting its application in real-world systems. To address these issues, this paper proposes a novel information-driven search method called Clutaxis, based on a global exploration and exploitation tradeoff principle. Specifically, a particle filter is leveraged to maintain the STE. After projecting the particle filter samples onto a 2D search scene, the density-based spatial clustering of applications with noise (DBSCAN) algorithm is used to extract the density information of the samples, which is then used to construct a belief source area (BSA). By leveraging the uncertainty of the BSA, Clutaxis adopts explorative or exploitative actions with no restrictions on motion direction. Through dedicated simulations, the experimental results demonstrate the robustness of Clutaxis to key parameters and its advantages in computational complexity and search performance compared to two state-of-the-art algorithms (Infotaxis and Entrotaxis) and two Clutaxis variants (Clutaxis_ER and Clutaxis_EI).</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 2","pages":"Pages 125-137"},"PeriodicalIF":3.7,"publicationDate":"2024-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143578688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}