首页 > 最新文献

信息工程最新文献

英文 中文
IF:
PrivySeC: A secure and privacy-compliant distributed framework for personal data sharing in IoT ecosystems PrivySeC:物联网生态系统中个人数据共享的安全且符合隐私标准的分布式框架
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-09 DOI: 10.1016/j.bcra.2024.100220
Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Massimo Piccardi, Daniel Franklin
The contemporary era is experiencing an unprecedented dependence on data generated by individuals via an array of interconnected devices constituting the Internet of Things (IoT). The information amassed through IoT devices serves many objectives, including prescriptive analytics and predictive maintenance, preemptive healthcare measures, disaster mitigation, operational efficiency, and increased yield. In contrast, most applications or systems that rely on user-generated data to fulfill their business objectives face challenges in adhering to privacy protocols. Consequently, users are exposed to many privacy risks. Such infringements upon privacy provisions give rise to apprehensions regarding the authenticity of the processed data. Hence, this paper presents the weaknesses and challenges in current practices and proposes “PrivySeC”, a Distributed Ledger Technology (DLT)-based framework for privacy preserving and secure sharing of personally and non-personally identifiable information. The security analysis indicates that the proposed solution ensures data privacy by design and complies with most of the requirements mandated by various privacy regulations. Similarly, PrivySeC promises low transaction latency and provides high throughput. Although we have created a privacy-preserving solution for sharing smart farm data, it can be customized to meet the specific privacy requirements of individual applications.
当今时代,人们对个人通过构成物联网(IoT)的一系列互联设备产生的数据的依赖程度前所未有。通过物联网设备积累的信息可实现许多目标,包括规范性分析和预测性维护、先发制人的医疗保健措施、减灾、运营效率和提高产量。相比之下,大多数依赖用户生成的数据来实现业务目标的应用程序或系统在遵守隐私协议方面都面临挑战。因此,用户面临许多隐私风险。这种对隐私条款的侵犯会引起人们对所处理数据真实性的担忧。因此,本文介绍了当前实践中的弱点和挑战,并提出了 "PrivySeC"--一种基于分布式账本技术(DLT)的框架,用于保护隐私并安全共享个人和非个人身份信息。安全分析表明,拟议的解决方案从设计上确保了数据隐私,并符合各种隐私法规规定的大多数要求。同样,PrivySeC 承诺交易延迟低,吞吐量高。虽然我们已经为共享智能农场数据创建了一个保护隐私的解决方案,但它还可以进行定制,以满足个别应用的特定隐私要求。
{"title":"PrivySeC: A secure and privacy-compliant distributed framework for personal data sharing in IoT ecosystems","authors":"Imran Makhdoom,&nbsp;Mehran Abolhasan,&nbsp;Justin Lipman,&nbsp;Massimo Piccardi,&nbsp;Daniel Franklin","doi":"10.1016/j.bcra.2024.100220","DOIUrl":"10.1016/j.bcra.2024.100220","url":null,"abstract":"<div><div>The contemporary era is experiencing an unprecedented dependence on data generated by individuals via an array of interconnected devices constituting the Internet of Things (IoT). The information amassed through IoT devices serves many objectives, including prescriptive analytics and predictive maintenance, preemptive healthcare measures, disaster mitigation, operational efficiency, and increased yield. In contrast, most applications or systems that rely on user-generated data to fulfill their business objectives face challenges in adhering to privacy protocols. Consequently, users are exposed to many privacy risks. Such infringements upon privacy provisions give rise to apprehensions regarding the authenticity of the processed data. Hence, this paper presents the weaknesses and challenges in current practices and proposes “PrivySeC”, a Distributed Ledger Technology (DLT)-based framework for privacy preserving and secure sharing of personally and non-personally identifiable information. The security analysis indicates that the proposed solution ensures data privacy by design and complies with most of the requirements mandated by various privacy regulations. Similarly, PrivySeC promises low transaction latency and provides high throughput. Although we have created a privacy-preserving solution for sharing smart farm data, it can be customized to meet the specific privacy requirements of individual applications.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 4","pages":"Article 100220"},"PeriodicalIF":6.9,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141697045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel method for measuring center-axis velocity of unmanned aerial vehicles through synthetic motion blur images 通过合成运动模糊图像测量无人驾驶飞行器中心轴速度的新方法
Pub Date : 2024-07-09 DOI: 10.1007/s43684-024-00073-x
Quanxi Zhan, Yanmin Zhou, Junrui Zhang, Chenyang Sun, Runjie Shen, Bin He

Accurate velocity measurement of unmanned aerial vehicles (UAVs) is essential in various applications. Traditional vision-based methods rely heavily on visual features, which are often inadequate in low-light or feature-sparse environments. This study presents a novel approach to measure the axial velocity of UAVs using motion blur images captured by a UAV-mounted monocular camera. We introduce a motion blur model that synthesizes imaging from neighboring frames to enhance motion blur visibility. The synthesized blur frames are transformed into spectrograms using the Fast Fourier Transform (FFT) technique. We then apply a binarization process and the Radon transform to extract light-dark stripe spacing, which represents the motion blur length. This length is used to establish a model correlating motion blur with axial velocity, allowing precise velocity calculation. Field tests in a hydropower station penstock demonstrated an average velocity error of 0.048 m/s compared to ultra-wideband (UWB) measurements. The root-mean-square error was 0.025, with an average computational time of 42.3 ms and CPU load of 17%. These results confirm the stability and accuracy of our velocity estimation algorithm in challenging environments.

在各种应用中,精确测量无人飞行器(UAV)的速度至关重要。传统的基于视觉的方法严重依赖于视觉特征,而在弱光或特征稀少的环境中,这种方法往往不够充分。本研究提出了一种利用无人飞行器安装的单目摄像头捕获的运动模糊图像测量无人飞行器轴向速度的新方法。我们引入了一种运动模糊模型,该模型可合成相邻帧的图像,以提高运动模糊的可见度。合成的模糊帧通过快速傅立叶变换(FFT)技术转换成频谱图。然后,我们采用二值化处理和拉顿变换来提取明暗条纹间距,这代表了运动模糊长度。该长度用于建立运动模糊与轴向速度的相关模型,从而实现精确的速度计算。水电站水闸的现场测试表明,与超宽带 (UWB) 测量相比,平均速度误差为 0.048 米/秒。均方根误差为 0.025,平均计算时间为 42.3 毫秒,CPU 负载为 17%。这些结果证实了我们的速度估计算法在挑战性环境中的稳定性和准确性。
{"title":"A novel method for measuring center-axis velocity of unmanned aerial vehicles through synthetic motion blur images","authors":"Quanxi Zhan,&nbsp;Yanmin Zhou,&nbsp;Junrui Zhang,&nbsp;Chenyang Sun,&nbsp;Runjie Shen,&nbsp;Bin He","doi":"10.1007/s43684-024-00073-x","DOIUrl":"10.1007/s43684-024-00073-x","url":null,"abstract":"<div><p>Accurate velocity measurement of unmanned aerial vehicles (UAVs) is essential in various applications. Traditional vision-based methods rely heavily on visual features, which are often inadequate in low-light or feature-sparse environments. This study presents a novel approach to measure the axial velocity of UAVs using motion blur images captured by a UAV-mounted monocular camera. We introduce a motion blur model that synthesizes imaging from neighboring frames to enhance motion blur visibility. The synthesized blur frames are transformed into spectrograms using the Fast Fourier Transform (FFT) technique. We then apply a binarization process and the Radon transform to extract light-dark stripe spacing, which represents the motion blur length. This length is used to establish a model correlating motion blur with axial velocity, allowing precise velocity calculation. Field tests in a hydropower station penstock demonstrated an average velocity error of 0.048 m/s compared to ultra-wideband (UWB) measurements. The root-mean-square error was 0.025, with an average computational time of 42.3 ms and CPU load of 17%. These results confirm the stability and accuracy of our velocity estimation algorithm in challenging environments.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00073-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141666199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An uncertainty-aware domain adaptive semantic segmentation framework 不确定性感知领域自适应语义分割框架
Pub Date : 2024-07-08 DOI: 10.1007/s43684-024-00070-0
Huilin Yin, Pengyu Wang, Boyu Liu, Jun Yan

Semantic segmentation is significant to realize the scene understanding of autonomous driving. Due to the lack of annotated real-world data, the technology of domain adaptation is applied so that the model is trained on the synthetic data and inferred on the real data. However, this domain gap leads to aleatoric and epistemic uncertainty. These uncertainties link to the potential safety issue of autonomous driving in normal weather and adverse weather. In this study, we explore the scientific problem that has received sparse attention previously. We postulate that the Dual Attention module can mitigate the uncertainty in the task of semantic segmentation and provide some empirical study to validate it. Furthermore, the utilization of Kullback-Leibler divergence (KL divergence) helps the estimation of aleatoric uncertainty and boosts the robustness of the segmentation model. Our empirical study on the diverse datasets of semantic segmentation demonstrates the effectiveness of our method in normal and adverse weather. Our code is available at: https://github.com/liubo629/Seg-Uncertainty-dual-attention.

语义分割对于实现自动驾驶的场景理解意义重大。由于缺乏有注释的真实世界数据,因此采用了领域适应技术,即在合成数据上训练模型,在真实数据上推断模型。然而,这种领域差距导致了不确定性和认识上的不确定性。这些不确定性与自动驾驶在正常天气和恶劣天气下的潜在安全问题有关。在本研究中,我们探讨了这一之前很少有人关注的科学问题。我们假设双重注意力模块可以减轻语义分割任务中的不确定性,并提供了一些实证研究来验证这一假设。此外,Kullback-Leibler 分歧(KL 分歧)的使用有助于估计不确定性,并提高分割模型的鲁棒性。我们在不同语义分割数据集上进行的实证研究证明了我们的方法在正常和恶劣天气下的有效性。我们的代码见:https://github.com/liubo629/Seg-Uncertainty-dual-attention。
{"title":"An uncertainty-aware domain adaptive semantic segmentation framework","authors":"Huilin Yin,&nbsp;Pengyu Wang,&nbsp;Boyu Liu,&nbsp;Jun Yan","doi":"10.1007/s43684-024-00070-0","DOIUrl":"10.1007/s43684-024-00070-0","url":null,"abstract":"<div><p>Semantic segmentation is significant to realize the scene understanding of autonomous driving. Due to the lack of annotated real-world data, the technology of domain adaptation is applied so that the model is trained on the synthetic data and inferred on the real data. However, this domain gap leads to aleatoric and epistemic uncertainty. These uncertainties link to the potential safety issue of autonomous driving in normal weather and adverse weather. In this study, we explore the scientific problem that has received sparse attention previously. We postulate that the Dual Attention module can mitigate the uncertainty in the task of semantic segmentation and provide some empirical study to validate it. Furthermore, the utilization of Kullback-Leibler divergence (KL divergence) helps the estimation of aleatoric uncertainty and boosts the robustness of the segmentation model. Our empirical study on the diverse datasets of semantic segmentation demonstrates the effectiveness of our method in normal and adverse weather. Our code is available at: https://github.com/liubo629/Seg-Uncertainty-dual-attention.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00070-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141667973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and optimal control of COVID-19 with comorbidity and three-dose vaccination in Indonesia 印度尼西亚 COVID-19 合并症和三剂疫苗接种的建模和优化控制
Q1 Social Sciences Pub Date : 2024-07-06 DOI: 10.1016/j.jobb.2024.06.004
Muhammad Abdurrahman Rois , Fatmawati , Cicik Alfiniyah , Santi Martini , Dipo Aldila , Farai Nyabadza

This paper presents and examines a COVID-19 model that takes comorbidities and up to three vaccine doses into account. We analyze the stability of the equilibria, examine herd immunity, and conduct a sensitivity analysis validated by data on COVID-19 in Indonesia. The disease-free equilibrium is locally and globally asymptotically stable whenever the basic reproduction number is less than one, while an endemic equilibrium exists and is globally asymptotically stable when the number is greater than one. Subsequently, the model incorporates two effective measures, namely public education and enhanced medical care, to determine the most advantageous approach for mitigating the transmission of the disease. The optimal control model is then determined using Pontryagin’s maximum principle. The integrated control strategy is the best method for reliably safeguarding the general population against COVID-19 infection. Cost evaluations and numerical simulations corroborate this conclusion.

本文介绍并研究了将合并症和多达三种疫苗剂量考虑在内的 COVID-19 模型。我们分析了均衡的稳定性,研究了群体免疫,并通过印度尼西亚 COVID-19 的数据进行了敏感性分析。当基本繁殖数小于 1 时,无病平衡是局部和全局渐近稳定的,而当基本繁殖数大于 1 时,存在地方病平衡,并且是全局渐近稳定的。随后,该模型纳入了两种有效措施,即公共教育和加强医疗保健,以确定缓解疾病传播的最有利方法。然后,利用庞特里亚金最大原则确定最佳控制模型。综合控制策略是可靠保护大众免受 COVID-19 感染的最佳方法。成本评估和数值模拟证实了这一结论。
{"title":"Modeling and optimal control of COVID-19 with comorbidity and three-dose vaccination in Indonesia","authors":"Muhammad Abdurrahman Rois ,&nbsp;Fatmawati ,&nbsp;Cicik Alfiniyah ,&nbsp;Santi Martini ,&nbsp;Dipo Aldila ,&nbsp;Farai Nyabadza","doi":"10.1016/j.jobb.2024.06.004","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.06.004","url":null,"abstract":"<div><p>This paper presents and examines a COVID-19 model that takes comorbidities and up to three vaccine doses into account. We analyze the stability of the equilibria, examine herd immunity, and conduct a sensitivity analysis validated by data on COVID-19 in Indonesia. The disease-free equilibrium is locally and globally asymptotically stable whenever the basic reproduction number is less than one, while an endemic equilibrium exists and is globally asymptotically stable when the number is greater than one. Subsequently, the model incorporates two effective measures, namely public education and enhanced medical care, to determine the most advantageous approach for mitigating the transmission of the disease. The optimal control model is then determined using Pontryagin’s maximum principle. The integrated control strategy is the best method for reliably safeguarding the general population against COVID-19 infection. Cost evaluations and numerical simulations corroborate this conclusion.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"6 3","pages":"Pages 181-195"},"PeriodicalIF":0.0,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000347/pdfft?md5=e3f237c1b54058dbee82e284d716e498&pid=1-s2.0-S2588933824000347-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141606860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple unmanned ship coverage and exploration in complex sea areas 复杂海域的多无人船覆盖和勘探
Pub Date : 2024-07-05 DOI: 10.1007/s43684-024-00069-7
Feifei Chen, Qingyun Yu

This study addresses the complexities of maritime area information collection, particularly in challenging sea environments, by introducing a multi-agent control model for regional information gathering. Focusing on three key areas—regional coverage, collaborative exploration, and agent obstacle avoidance—we aim to establish a multi-unmanned ship coverage detection system. For regional coverage, a multi-objective optimization model considering effective area coverage and time efficiency is proposed, utilizing a heuristic simulated annealing algorithm for optimal allocation and path planning, achieving a 99.67% effective coverage rate in simulations. Collaborative exploration is tackled through a comprehensive optimization model, solved using an improved greedy strategy, resulting in a 100% static target detection and correct detection index. Agent obstacle avoidance is enhanced by a collision avoidance model and a distributed underlying collision avoidance algorithm, ensuring autonomous obstacle avoidance without communication or scheduling. Simulations confirm zero collaborative failures. This research offers practical solutions for multi-agent exploration and coverage in unknown sea areas, balancing workload and time efficiency while considering ship dynamics constraints.

本研究通过引入区域信息收集的多代理控制模型,解决了海洋区域信息收集的复杂性,尤其是在具有挑战性的海洋环境中。重点关注三个关键领域--区域覆盖、协同探索和代理避障--我们的目标是建立一个多无人船覆盖探测系统。在区域覆盖方面,提出了一个考虑有效区域覆盖和时间效率的多目标优化模型,利用启发式模拟退火算法进行优化分配和路径规划,在仿真中实现了 99.67% 的有效覆盖率。通过综合优化模型解决协作探索问题,并使用改进的贪婪策略求解,从而实现了 100% 的静态目标检测率和正确检测指数。避撞模型和分布式底层避撞算法增强了代理避障能力,确保无需通信或调度即可自主避障。模拟证实了零协作失败。这项研究为在未知海域进行多代理探索和覆盖提供了切实可行的解决方案,在兼顾工作量和时间效率的同时,还考虑到了船舶动力学约束。
{"title":"Multiple unmanned ship coverage and exploration in complex sea areas","authors":"Feifei Chen,&nbsp;Qingyun Yu","doi":"10.1007/s43684-024-00069-7","DOIUrl":"10.1007/s43684-024-00069-7","url":null,"abstract":"<div><p>This study addresses the complexities of maritime area information collection, particularly in challenging sea environments, by introducing a multi-agent control model for regional information gathering. Focusing on three key areas—regional coverage, collaborative exploration, and agent obstacle avoidance—we aim to establish a multi-unmanned ship coverage detection system. For regional coverage, a multi-objective optimization model considering effective area coverage and time efficiency is proposed, utilizing a heuristic simulated annealing algorithm for optimal allocation and path planning, achieving a 99.67% effective coverage rate in simulations. Collaborative exploration is tackled through a comprehensive optimization model, solved using an improved greedy strategy, resulting in a 100% static target detection and correct detection index. Agent obstacle avoidance is enhanced by a collision avoidance model and a distributed underlying collision avoidance algorithm, ensuring autonomous obstacle avoidance without communication or scheduling. Simulations confirm zero collaborative failures. This research offers practical solutions for multi-agent exploration and coverage in unknown sea areas, balancing workload and time efficiency while considering ship dynamics constraints.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00069-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141673492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Water-saving control system based on multiple intelligent algorithms 基于多种智能算法的节水控制系统
Pub Date : 2024-07-04 DOI: 10.1007/s43684-024-00068-8
Fengnian Liu, Xiang Yu, Junya Tang

Water conservation has become a global problem as the population increases. In many densely populated cities in China, leaks from century-old pipe works have been widespread. However, entirely eradicating the issues involves replacing all water networks, which is costly and time-consuming. This paper proposed an AI-enabled water-saving control system with three control modes: time division control, flow regulation, and critical point control according to actual flow. Firstly, based on the current leaking situation of water supply networks in China and the capability level of China’s water management, a water-saving technology integrating PID control and a series of deep learning algorithms was proposed. Secondly, a multi-jet control valve was designed to control pressure and reduce water distribution network cavitation. This technology has been successfully applied in industrial settings in China and has achieved gratifying water-saving results.

随着人口的增加,节水已成为一个全球性问题。在中国许多人口稠密的城市,有着百年历史的管道工程漏水现象十分普遍。然而,要彻底根治这些问题,就必须更换所有供水管网,成本高且耗时长。本文提出了一种人工智能节水控制系统,具有三种控制模式:分时控制、流量调节和根据实际流量进行临界点控制。首先,根据我国供水管网漏水现状和我国水资源管理能力水平,提出了一种集 PID 控制和一系列深度学习算法于一体的节水技术。其次,设计了一种多射流控制阀,用于控制压力和减少供水管网气蚀。该技术已成功应用于中国工业领域,并取得了可喜的节水成果。
{"title":"Water-saving control system based on multiple intelligent algorithms","authors":"Fengnian Liu,&nbsp;Xiang Yu,&nbsp;Junya Tang","doi":"10.1007/s43684-024-00068-8","DOIUrl":"10.1007/s43684-024-00068-8","url":null,"abstract":"<div><p>Water conservation has become a global problem as the population increases. In many densely populated cities in China, leaks from century-old pipe works have been widespread. However, entirely eradicating the issues involves replacing all water networks, which is costly and time-consuming. This paper proposed an AI-enabled water-saving control system with three control modes: time division control, flow regulation, and critical point control according to actual flow. Firstly, based on the current leaking situation of water supply networks in China and the capability level of China’s water management, a water-saving technology integrating PID control and a series of deep learning algorithms was proposed. Secondly, a multi-jet control valve was designed to control pressure and reduce water distribution network cavitation. This technology has been successfully applied in industrial settings in China and has achieved gratifying water-saving results.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00068-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141677101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations 不仅要有良好的态度:对安全建议态度的因素探讨
IF 3.9 Q1 SOCIAL SCIENCES, INTERDISCIPLINARY Pub Date : 2024-07-03 DOI: 10.1093/cybsec/tyae011
Miguel A Toro-Jarrin, Pilar Pazos, Miguel A Padilla
Numerous factors determine information security-related actions (IS-actions) in the workplace. Attitudes toward following security rules and recommendations and attitudes toward specific IS actions determine intentions associated with those actions. IS research has examined the role of the instrumental aspect of attitudes. However, authors argue that attitudes toward a behavioral object are a multidimensional construct. We examined the dimensionality of attitudes toward security recommendations, hypothesized its multidimensional nature, and developed a new scale [attitudes toward security recommendations (ASR scale)]. The results indicated the multidimensional nature of attitudes toward security recommendations supporting our hypothesis. The results revealed two dimensions corresponding to the perceived legitimacy and effectiveness of security recommendations and its perceived rigor. The new ASR scale showed good psychometric properties. This work contributes to the IS research at suggesting that attitudes are a multidimensional construct in the IS context. These findings imply that the employee’s evaluation of information security policy can be examined considering their instrumentality (security recommendations are important) and rigor (security recommendations are strict). Different effects of the dimensions of attitudes over IS-action suggest different interventions. Additionally, this study offers the ASR scale as a new instrument to capture employees’ evaluation of security recommendations.
工作场所中与信息安全有关的行动(IS-行动)由许多因素决定。对遵守安全规则和建议的态度以及对具体 IS 行动的态度决定了与这些行动相关的意向。对 IS 的研究探讨了态度的工具性作用。然而,有学者认为,对行为对象的态度是一个多维度的结构。我们研究了对安全建议的态度的维度,假设其具有多维性,并开发了一个新的量表[对安全建议的态度(ASR 量表)]。结果表明,对安全建议的态度具有多维性,支持了我们的假设。结果显示了两个维度,分别对应于对安全建议合法性和有效性的感知以及对其严谨性的感知。新的 ASR 量表显示出良好的心理测量特性。这项研究表明,在 IS 环境中,态度是一个多维度的结构,这对 IS 研究做出了贡献。这些发现意味着,员工对信息安全政策的评价可以考虑其工具性(安全建议很重要)和严格性(安全建议很严格)。态度维度对 IS 行动的不同影响建议采取不同的干预措施。此外,本研究还提供了 ASR 量表,作为了解员工对安全建议评价的新工具。
{"title":"It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations","authors":"Miguel A Toro-Jarrin, Pilar Pazos, Miguel A Padilla","doi":"10.1093/cybsec/tyae011","DOIUrl":"https://doi.org/10.1093/cybsec/tyae011","url":null,"abstract":"Numerous factors determine information security-related actions (IS-actions) in the workplace. Attitudes toward following security rules and recommendations and attitudes toward specific IS actions determine intentions associated with those actions. IS research has examined the role of the instrumental aspect of attitudes. However, authors argue that attitudes toward a behavioral object are a multidimensional construct. We examined the dimensionality of attitudes toward security recommendations, hypothesized its multidimensional nature, and developed a new scale [attitudes toward security recommendations (ASR scale)]. The results indicated the multidimensional nature of attitudes toward security recommendations supporting our hypothesis. The results revealed two dimensions corresponding to the perceived legitimacy and effectiveness of security recommendations and its perceived rigor. The new ASR scale showed good psychometric properties. This work contributes to the IS research at suggesting that attitudes are a multidimensional construct in the IS context. These findings imply that the employee’s evaluation of information security policy can be examined considering their instrumentality (security recommendations are important) and rigor (security recommendations are strict). Different effects of the dimensions of attitudes over IS-action suggest different interventions. Additionally, this study offers the ASR scale as a new instrument to capture employees’ evaluation of security recommendations.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":"24 1","pages":""},"PeriodicalIF":3.9,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141547245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Addressing poxvirus challenges in the Middle East to enhance biosafety and biosecurity measures 应对中东痘病毒挑战,加强生物安全和生物安保措施
Q1 Social Sciences Pub Date : 2024-07-02 DOI: 10.1016/j.jobb.2024.06.003
Laith N. AL-Eitan , Haneen O. Ali , Hana S. Abu Kharmah , Maryam K. Alasmar , Iliya Y. Khair , Ahmad H. Mihyar

The emergence and zoonotic transmission of poxviruses in the Middle East have been recognized as complex public health issues. Poxviruses, a vast family of DNA viruses, can infect many hosts, including animals and humans. The Middle East has had multiple epidemics of poxvirus infections (e.g., Monkeypox, Smallpox, and Camelpox) that have raised concerns owing to their detrimental effects on livestock, wildlife, and sporadic human cases. This review aims to thoroughly examine the complexity of the epidemiological patterns, intricate genetic diversity, and several contributing factors that support the emergence and zoonotic transmission of poxviruses in the Middle East. Several aspects of poxviruses contribute to the emergence of endemics and zoonotic breakouts, such as the complex nature of human-animal interactions, environmental changes, and their subtle capacity for viral adaptability. This review was compiled in the hopes of contributing to the current understanding of poxvirus biology and its implications for human and animal health in the Middle East. We provide a comprehensive overview of the most common poxviruses in the Middle East, including their classification, structure, replication cycle, pathogenesis, route of transmissions, and of how the Middle East has developed ways to mitigate these biological threats.

痘病毒在中东地区的出现和人畜共患传播已被视为复杂的公共卫生问题。痘病毒是一个庞大的 DNA 病毒家族,可感染多种宿主,包括动物和人类。中东地区曾多次发生痘病毒感染(如猴痘、天花和骆驼痘)疫情,对牲畜、野生动物和零星人类病例造成的危害引起了人们的关注。本综述旨在深入研究流行病学模式的复杂性、错综复杂的遗传多样性以及支持痘病毒在中东地区出现和人畜共患传播的若干诱因。痘病毒的几个方面促成了地方流行病的出现和人畜共患病的爆发,例如人与动物之间复杂的相互作用、环境变化及其微妙的病毒适应能力。编写这篇综述的目的是希望加深人们对痘病毒生物学及其对中东地区人类和动物健康影响的了解。我们全面概述了中东地区最常见的痘病毒,包括它们的分类、结构、复制周期、致病机理、传播途径,以及中东地区如何开发出缓解这些生物威胁的方法。
{"title":"Addressing poxvirus challenges in the Middle East to enhance biosafety and biosecurity measures","authors":"Laith N. AL-Eitan ,&nbsp;Haneen O. Ali ,&nbsp;Hana S. Abu Kharmah ,&nbsp;Maryam K. Alasmar ,&nbsp;Iliya Y. Khair ,&nbsp;Ahmad H. Mihyar","doi":"10.1016/j.jobb.2024.06.003","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.06.003","url":null,"abstract":"<div><p>The emergence and zoonotic transmission of poxviruses in the Middle East have been recognized as complex public health issues. Poxviruses, a vast family of DNA viruses, can infect many hosts, including animals and humans. The Middle East has had multiple epidemics of poxvirus infections (e.g., Monkeypox, Smallpox, and Camelpox) that have raised concerns owing to their detrimental effects on livestock, wildlife, and sporadic human cases. This review aims to thoroughly examine the complexity of the epidemiological patterns, intricate genetic diversity, and several contributing factors that support the emergence and zoonotic transmission of poxviruses in the Middle East. Several aspects of poxviruses contribute to the emergence of endemics and zoonotic breakouts, such as the complex nature of human-animal interactions, environmental changes, and their subtle capacity for viral adaptability. This review was compiled in the hopes of contributing to the current understanding of poxvirus biology and its implications for human and animal health in the Middle East. We provide a comprehensive overview of the most common poxviruses in the Middle East, including their classification, structure, replication cycle, pathogenesis, route of transmissions, and of how the Middle East has developed ways to mitigate these biological threats.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"6 3","pages":"Pages 142-156"},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000335/pdfft?md5=951f14f2c0d40a84ed4f933830b032c0&pid=1-s2.0-S2588933824000335-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A nonlinear optimal control approach for 3-DOF four-cable driven parallel robots 3-DOF 四缆驱动并联机器人的非线性优化控制方法
Pub Date : 2024-07-01 DOI: 10.1007/s43684-024-00066-w
G. Rigatos, M. Abbaszadeh, J. Pomares

In this article, a nonlinear optimal control approach is proposed for the dynamic model of 3-DOF four-cable driven parallel robots (CDPR). To solve the associated nonlinear optimal control problem, the dynamic model of the 3-DOF cable-driven parallel robot undergoes approximate linearization around a temporary operating point that is recomputed at each time-step of the control method. The linearization relies on Taylor series expansion and on the associated Jacobian matrices. For the linearized state-space model of the 3-DOF cable-driven parallel robot a stabilizing optimal (H-infinity) feedback controller is designed. To compute the controller’s feedback gains an algebraic Riccati equation is repetitively solved at each iteration of the control algorithm. The stability properties of the control method are proven through Lyapunov analysis. The proposed nonlinear optimal control approach achieves fast and accurate tracking of reference setpoints under moderate variations of the control inputs and a minimum dispersion of energy.

本文针对 3-DOF 四缆驱动并联机器人(CDPR)的动态模型提出了一种非线性优化控制方法。为了解决相关的非线性优化控制问题,3-DOF 缆线驱动并联机器人的动态模型围绕一个临时工作点进行近似线性化,该工作点在控制方法的每个时间步中重新计算。线性化依赖于泰勒级数展开和相关的雅各布矩阵。针对线性化的 3-DOF 拉索驱动并联机器人状态空间模型,设计了一个稳定的最优(H-无限)反馈控制器。为了计算控制器的反馈增益,在控制算法的每次迭代中都要重复求解代数 Riccati 方程。通过 Lyapunov 分析证明了控制方法的稳定性。所提出的非线性优化控制方法可在控制输入变化适中和能量分散最小的情况下,快速、准确地跟踪参考设定点。
{"title":"A nonlinear optimal control approach for 3-DOF four-cable driven parallel robots","authors":"G. Rigatos,&nbsp;M. Abbaszadeh,&nbsp;J. Pomares","doi":"10.1007/s43684-024-00066-w","DOIUrl":"10.1007/s43684-024-00066-w","url":null,"abstract":"<div><p>In this article, a nonlinear optimal control approach is proposed for the dynamic model of 3-DOF four-cable driven parallel robots (CDPR). To solve the associated nonlinear optimal control problem, the dynamic model of the 3-DOF cable-driven parallel robot undergoes approximate linearization around a temporary operating point that is recomputed at each time-step of the control method. The linearization relies on Taylor series expansion and on the associated Jacobian matrices. For the linearized state-space model of the 3-DOF cable-driven parallel robot a stabilizing optimal (H-infinity) feedback controller is designed. To compute the controller’s feedback gains an algebraic Riccati equation is repetitively solved at each iteration of the control algorithm. The stability properties of the control method are proven through Lyapunov analysis. The proposed nonlinear optimal control approach achieves fast and accurate tracking of reference setpoints under moderate variations of the control inputs and a minimum dispersion of energy.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00066-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141715848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment 斯塔克尔伯格式相互依存的安全博弈:先行者优势如何影响搭便车和安全(投资不足)问题
IF 3.9 Q1 SOCIAL SCIENCES, INTERDISCIPLINARY Pub Date : 2024-06-28 DOI: 10.1093/cybsec/tyae009
Ziyuan Huang, Parinaz Naghizadeh, Mingyan Liu
Network games are commonly used to capture the strategic interactions among interconnected agents in simultaneous moves. The agents’ actions in a Nash equilibrium must take into account the mutual dependencies connecting them, which is typically obtained by solving a set of fixed point equations. Stackelberg games, on the other hand, model the sequential moves between agents that are categorized as leaders and followers. The corresponding solution concept, the subgame perfect equilibrium, is typically obtained using backward induction. Both game forms enjoy very wide use in the (cyber)security literature, the network game often as a template to study security investment and externality—also referred to as the interdependent security games—and the Stackelberg game as a formalism to model a variety of attacker–defender scenarios. In this study, we examine a model that combines both types of strategic reasoning: the interdependency as well as sequential moves. Specifically, we consider a scenario with a network of interconnected first movers (firms or defenders, whose security efforts and practices collectively determine the security posture of the eco-system) and one or more second movers, the attacker(s), who determine how much effort to exert on attacking the many potential targets. This gives rise to an equilibrium concept that embodies both types of equilibria mentioned above. We will examine how its existence and uniqueness conditions differ from that for a standard network game. Of particular interest are comparisons between the two game forms in terms of effort exerted by the defender(s) and the attacker(s), respectively, and the free-riding behavior among the defenders.
网络博弈通常用于捕捉相互关联的代理人在同时行动中的战略互动。在纳什均衡中,代理人的行动必须考虑到他们之间的相互依赖关系,这通常是通过求解一组固定点方程获得的。另一方面,斯塔克尔伯格博弈模拟的是被划分为领导者和追随者的代理人之间的顺序行动。相应的解概念,即子博弈完全均衡,通常是通过逆向归纳法得到的。这两种博弈形式在(网络)安全文献中都有非常广泛的应用,网络博弈通常是研究安全投资和外部性的模板,也被称为相互依存的安全博弈,而斯塔克尔伯格博弈则是模拟各种攻击者-防御者情景的形式主义。在本研究中,我们研究了一种结合了这两种战略推理的模型:相互依赖和顺序移动。具体来说,我们考虑的情景是由相互连接的先行者(企业或防御者,其安全努力和实践共同决定了生态系统的安全态势)和一个或多个后行者(攻击者)组成的网络,后者决定在攻击众多潜在目标时需要付出多少努力。这就产生了一个平衡概念,它体现了上述两类平衡。我们将研究它的存在性和唯一性条件与标准网络博弈的存在性和唯一性条件有何不同。尤其值得关注的是,这两种博弈形式分别在防御方和攻击方所付出的努力以及防御方的搭便车行为方面的比较。
{"title":"Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment","authors":"Ziyuan Huang, Parinaz Naghizadeh, Mingyan Liu","doi":"10.1093/cybsec/tyae009","DOIUrl":"https://doi.org/10.1093/cybsec/tyae009","url":null,"abstract":"Network games are commonly used to capture the strategic interactions among interconnected agents in simultaneous moves. The agents’ actions in a Nash equilibrium must take into account the mutual dependencies connecting them, which is typically obtained by solving a set of fixed point equations. Stackelberg games, on the other hand, model the sequential moves between agents that are categorized as leaders and followers. The corresponding solution concept, the subgame perfect equilibrium, is typically obtained using backward induction. Both game forms enjoy very wide use in the (cyber)security literature, the network game often as a template to study security investment and externality—also referred to as the interdependent security games—and the Stackelberg game as a formalism to model a variety of attacker–defender scenarios. In this study, we examine a model that combines both types of strategic reasoning: the interdependency as well as sequential moves. Specifically, we consider a scenario with a network of interconnected first movers (firms or defenders, whose security efforts and practices collectively determine the security posture of the eco-system) and one or more second movers, the attacker(s), who determine how much effort to exert on attacking the many potential targets. This gives rise to an equilibrium concept that embodies both types of equilibria mentioned above. We will examine how its existence and uniqueness conditions differ from that for a standard network game. Of particular interest are comparisons between the two game forms in terms of effort exerted by the defender(s) and the attacker(s), respectively, and the free-riding behavior among the defenders.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":"20 1","pages":""},"PeriodicalIF":3.9,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141502761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
全部 科技通报 计算机与应用化学 电子工业专用设备 河北工业科技 Journal of Applied Sciences 中国科学技术大学学报 印制电路信息 Wuhan University Journal of Natural Sciences Virtual Reality Intelligent Hardware 模式识别与人工智能 控制与决策 电机与控制学报 南京邮电大学学报(自然科学版) 计算机研究与发展 计算机学报 自动化学报 电子科技大学学报 华南理工大学学报(自然科学版) 中国图象图形学报 雷达学报 信息与控制 数据采集与处理 机器人 西北工业大学学报 High Technology Letters Journal of Cybersecurity 中国科学:信息科学 Big Data Mining and Analytics Visual Computing for Industry, Biomedicine, and Art 清华大学学报(自然科学版) 计算机辅助设计与图形学学报 电波科学学报 Journal of Biosafety and Biosecurity Blockchain-Research and Applications 建模与仿真(英文) 建模与仿真 Soc Netw 单片机与嵌入式系统应用 信息安全(英文) 数据挖掘 指挥信息系统与技术 通信世界 智能与融合网络(英文) 电磁分析与应用期刊(英文) 资源环境与信息工程(英文) 无线传感网络(英文) 高性能计算技术 中文信息学报 通信技术政策研究 Tsinghua Sci. Technol. 天线与传播(英文) 物联网技术 离散数学期刊(英文) 计算机应用 ZTE Communications 软件工程与应用(英文) 航空计算技术 智能控制与自动化(英文) 电路与系统(英文) 计算机工程 天线学报 仪表技术与传感器 海军航空工程学院学报 Comput Technol Appl 军事通信技术 计算机仿真 无线通信 现代电子技术(英文) Journal of Systems Science and Information 电脑和通信(英文) 无线工程与技术(英文) 无线互联科技 人工智能与机器人研究 计算机工程与设计 电路与系统学报 软件 通讯和计算机:中英文版 智能学习系统与应用(英文) 图像与信号处理 软件工程与应用 电力电子 现代非线性理论与应用(英文) 计算机科学 计算机科学与应用 物联网(英文) 数据与计算发展前沿 电信科学 自主智能(英文) 人工智能杂志(英文) 信号处理 人工智能技术学报(英文) 自主智能系统(英文) 信息通信技术 数据分析和信息处理(英文)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1