首页 > 最新文献

安全科学与韧性(英文)最新文献

英文 中文
Unsupervised intrusion detection system for in-vehicle communication networks 车载通信网络无监督入侵检测系统
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-02-22 DOI: 10.1016/j.jnlssr.2023.12.004
Kabilan N , Vinayakumar Ravi , V Sowmya

In-vehicle communication has been optimized day to day to keep updated of the technologies. Control area network (CAN) is used as a standard communication method because of its efficient and reliable connection. However, CAN is prone to several network level attacks because of its lack in security mechanisms. Various methods have been introduced to incorporate this in CAN. We proposed an unsupervised method of intrusion detection for in-vehicle communication networks by combining the optimal feature extracting ability of autoencoders and more precise clustering using fuzzy C-means (FCM). The proposed method is light weight and requires less computation time. We performed an extensive experiment and achieved an accuracy of 75.51 % with the ML350 in-vehicle intrusion dataset. By experimental result, the proposed method also works better for other intrusion detection problems like wireless intrusion detection datasets such as WNS-DS with accuracy of 84.05 % and network intrusion detection datasets such as KDDCup with accuracy 60.63 % , UNSW_NB15 with accuracy 73.62 % and Information Security Center of Excellence (ISCX) with accuracy 74.83 %. Overall, the proposed method outperforms the existing methods and avoids labeled datasets when training an in-vehicle intrusion detection model. The results of the experiment of our proposed method performed on various intrusion detection datasets indicate that the proposed approach is generalized and robust in detecting intrusions and can be effectively deployed in real time to monitor CAN traffic in vehicles and proactively alert during attacks.

随着技术的更新,车载通信也在不断优化。控制区域网络(CAN)因其高效可靠的连接而被用作标准通信方法。然而,由于缺乏安全机制,CAN 很容易受到一些网络级攻击。为了在 CAN 中加入安全机制,人们引入了各种方法。我们提出了一种无监督的车载通信网络入侵检测方法,该方法结合了自动编码器的最佳特征提取能力和使用模糊 C-means (FCM) 的更精确聚类。所提出的方法重量轻、计算时间短。我们进行了大量实验,在 ML350 车载入侵数据集上取得了 75.51 % 的准确率。根据实验结果,提出的方法在其他入侵检测问题上也有较好的效果,如无线入侵检测数据集 WNS-DS,准确率为 84.05 %;网络入侵检测数据集 KDDCup,准确率为 60.63 %;UNSW_NB15,准确率为 73.62 %;信息安全卓越中心(ISCX),准确率为 74.83 %。总体而言,在训练车载入侵检测模型时,建议的方法优于现有方法,并避免了标记数据集。我们提出的方法在各种入侵检测数据集上的实验结果表明,所提出的方法在检测入侵方面具有通用性和鲁棒性,可有效地用于实时监控车辆中的 CAN 流量,并在受到攻击时主动发出警报。
{"title":"Unsupervised intrusion detection system for in-vehicle communication networks","authors":"Kabilan N ,&nbsp;Vinayakumar Ravi ,&nbsp;V Sowmya","doi":"10.1016/j.jnlssr.2023.12.004","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2023.12.004","url":null,"abstract":"<div><p>In-vehicle communication has been optimized day to day to keep updated of the technologies. Control area network (CAN) is used as a standard communication method because of its efficient and reliable connection. However, CAN is prone to several network level attacks because of its lack in security mechanisms. Various methods have been introduced to incorporate this in CAN. We proposed an unsupervised method of intrusion detection for in-vehicle communication networks by combining the optimal feature extracting ability of autoencoders and more precise clustering using fuzzy C-means (FCM). The proposed method is light weight and requires less computation time. We performed an extensive experiment and achieved an accuracy of 75.51 % with the ML350 in-vehicle intrusion dataset. By experimental result, the proposed method also works better for other intrusion detection problems like wireless intrusion detection datasets such as WNS-DS with accuracy of 84.05 % and network intrusion detection datasets such as KDDCup with accuracy 60.63 % , UNSW_NB15 with accuracy 73.62 % and Information Security Center of Excellence (ISCX) with accuracy 74.83 %. Overall, the proposed method outperforms the existing methods and avoids labeled datasets when training an in-vehicle intrusion detection model. The results of the experiment of our proposed method performed on various intrusion detection datasets indicate that the proposed approach is generalized and robust in detecting intrusions and can be effectively deployed in real time to monitor CAN traffic in vehicles and proactively alert during attacks.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 2","pages":"Pages 119-129"},"PeriodicalIF":0.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000070/pdfft?md5=c270f1be76c12ff19f65027e63889cd9&pid=1-s2.0-S2666449624000070-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140328614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A probabilistic model based on the peak-over-threshold approach for risk assessment of airport controllers' performance 基于阈值峰值法的机场管制员绩效风险评估概率模型
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-02-20 DOI: 10.1016/j.jnlssr.2024.02.001
Lili Zu , Yijie Lu , Min Dong

Airport tower control plays an instrumental role in ensuring airport safety. However, obtaining objective, quantitative safety evaluations is challenging due to the unavailability of pertinent human operation data. This study introduces a probabilistic model that combines aircraft dynamics and the peak-over-threshold (POT) approach to assess the safety performance of airport controllers. We applied the POT approach to model reaction times extracted from a radiotelephony dataset via a voice event detection algorithm. The model couples the risks of tower control and aircraft operation to analyze the influence of human factors. Using data from radiotelephony communications and the Base of Aircraft Data (BADA) database, we compared risk levels across scenarios. Our findings revealed heightened airport control risks under low demand (0.374) compared to typical conditions (0.197). Furthermore, the risks associated with coupling under low demand exceeded those under typical demand, with the final approach stage presenting the highest risk (4.929×107). Our model underscores the significance of human factors and the implications of mental disconnects between pilots and controllers for safety risks. Collectively, these consistent findings affirm the reliability of our probabilistic model as an evaluative tool for evaluating the safety performance of airport tower controllers. The results also illuminate the path toward quantitative real-time safety evaluations for airport controllers within the industry. We recommend that airport regulators focus on the performance of airport controllers, particularly during the final approach stage.

机场塔台控制在确保机场安全方面发挥着重要作用。然而,由于无法获得相关的人类操作数据,因此获得客观、定量的安全评估具有挑战性。本研究引入了一个概率模型,该模型结合了飞机动力学和阈值峰值(POT)方法,用于评估机场管制员的安全性能。我们将 POT 方法应用于通过语音事件检测算法从无线电话数据集中提取的反应时间建模。该模型将塔台控制和飞机操作的风险结合起来,分析人为因素的影响。利用无线电通话通信数据和飞机数据基础 (BADA) 数据库,我们比较了各种情况下的风险水平。我们的研究结果表明,在低需求(0.374)与典型条件(0.197)相比,机场控制风险更高。此外,低需求下与耦合相关的风险超过了典型需求下的风险,其中最后进近阶段的风险最高(4.929×10-7)。我们的模型强调了人为因素的重要性,以及飞行员和管制员之间心理脱节对安全风险的影响。总之,这些一致的研究结果肯定了我们的概率模型作为机场塔台管制员安全绩效评估工具的可靠性。这些结果也为行业内对机场管制员进行量化实时安全评估指明了道路。我们建议机场监管机构关注机场管制员的表现,尤其是在最后进近阶段。
{"title":"A probabilistic model based on the peak-over-threshold approach for risk assessment of airport controllers' performance","authors":"Lili Zu ,&nbsp;Yijie Lu ,&nbsp;Min Dong","doi":"10.1016/j.jnlssr.2024.02.001","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2024.02.001","url":null,"abstract":"<div><p>Airport tower control plays an instrumental role in ensuring airport safety. However, obtaining objective, quantitative safety evaluations is challenging due to the unavailability of pertinent human operation data. This study introduces a probabilistic model that combines aircraft dynamics and the peak-over-threshold (POT) approach to assess the safety performance of airport controllers. We applied the POT approach to model reaction times extracted from a radiotelephony dataset via a voice event detection algorithm. The model couples the risks of tower control and aircraft operation to analyze the influence of human factors. Using data from radiotelephony communications and the Base of Aircraft Data (BADA) database, we compared risk levels across scenarios. Our findings revealed heightened airport control risks under low demand (0.374) compared to typical conditions (0.197). Furthermore, the risks associated with coupling under low demand exceeded those under typical demand, with the final approach stage presenting the highest risk (<span><math><mrow><mn>4.929</mn><mo>×</mo><msup><mrow><mn>10</mn></mrow><mrow><mo>−</mo><mn>7</mn></mrow></msup></mrow></math></span>). Our model underscores the significance of human factors and the implications of mental disconnects between pilots and controllers for safety risks. Collectively, these consistent findings affirm the reliability of our probabilistic model as an evaluative tool for evaluating the safety performance of airport tower controllers. The results also illuminate the path toward quantitative real-time safety evaluations for airport controllers within the industry. We recommend that airport regulators focus on the performance of airport controllers, particularly during the final approach stage.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 110-118"},"PeriodicalIF":0.0,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000057/pdfft?md5=9d6786b81f15945e52ed0553f0807e58&pid=1-s2.0-S2666449624000057-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139986215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-voting system using cloud-based hybrid blockchain technology 使用云端混合区块链技术的电子投票系统
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-02-20 DOI: 10.1016/j.jnlssr.2024.01.002
Beulah Jayakumari , S Lilly Sheeba , Maya Eapen , Jani Anbarasi , Vinayakumar Ravi , A. Suganya , Malathy Jawahar

With the invention of Internet-enabled devices, cloud and blockchain-based technologies, an online voting system can smoothly carry out election processes. During pandemic situations, citizens tend to develop panic about mass gatherings, which may influence the decrease in the number of votes. This urges a reliable, flexible, transparent, secure, and cost-effective voting system. The proposed online voting system using cloud-based hybrid blockchain technology eradicates the flaws that persist in the existing voting system, and it is carried out in three phases: the registration phase, vote casting phase and vote counting phase. A timestamp-based authentication protocol with digital signature validates voters and candidates during the registration and vote casting phases. Using smart contracts, third-party interventions are eliminated, and the transactions are secured in the blockchain network. Finally, to provide accurate voting results, the practical Byzantine fault tolerance (PBFT) consensus mechanism is adopted to ensure that the vote has not been modified or corrupted. Hence, the overall performance of the proposed system is significantly better than that of the existing system. Further performance was analyzed based on authentication delay, vote alteration, response time, and latency.

随着互联网设备、云技术和区块链技术的发明,在线投票系统可以顺利开展选举工作。在大流行病情况下,公民往往会对大规模集会产生恐慌,这可能会影响投票数量的减少。这就需要一个可靠、灵活、透明、安全且具有成本效益的投票系统。所提出的在线投票系统采用基于云的混合区块链技术,根除了现有投票系统存在的缺陷,该系统分三个阶段进行:登记阶段、投票阶段和计票阶段。在登记和投票阶段,基于时间戳的数字签名认证协议对选民和候选人进行验证。通过使用智能合约,消除了第三方干预,并确保了区块链网络中交易的安全性。最后,为了提供准确的投票结果,采用了实用拜占庭容错(PBFT)共识机制,以确保投票未被修改或破坏。因此,拟议系统的整体性能明显优于现有系统。进一步的性能分析基于认证延迟、投票更改、响应时间和延迟。
{"title":"E-voting system using cloud-based hybrid blockchain technology","authors":"Beulah Jayakumari ,&nbsp;S Lilly Sheeba ,&nbsp;Maya Eapen ,&nbsp;Jani Anbarasi ,&nbsp;Vinayakumar Ravi ,&nbsp;A. Suganya ,&nbsp;Malathy Jawahar","doi":"10.1016/j.jnlssr.2024.01.002","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2024.01.002","url":null,"abstract":"<div><p>With the invention of Internet-enabled devices, cloud and blockchain-based technologies, an online voting system can smoothly carry out election processes. During pandemic situations, citizens tend to develop panic about mass gatherings, which may influence the decrease in the number of votes. This urges a reliable, flexible, transparent, secure, and cost-effective voting system. The proposed online voting system using cloud-based hybrid blockchain technology eradicates the flaws that persist in the existing voting system, and it is carried out in three phases: the registration phase, vote casting phase and vote counting phase. A timestamp-based authentication protocol with digital signature validates voters and candidates during the registration and vote casting phases. Using smart contracts, third-party interventions are eliminated, and the transactions are secured in the blockchain network. Finally, to provide accurate voting results, the practical Byzantine fault tolerance (PBFT) consensus mechanism is adopted to ensure that the vote has not been modified or corrupted. Hence, the overall performance of the proposed system is significantly better than that of the existing system. Further performance was analyzed based on authentication delay, vote alteration, response time, and latency.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 102-109"},"PeriodicalIF":0.0,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000069/pdfft?md5=3f8ecb21cf6c18772a6fba45e0bdbc41&pid=1-s2.0-S2666449624000069-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139985765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restimate: Recovery Estimation Tool for Resilience Planning 重新估算:复原力规划的复原力估算工具
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-02-08 DOI: 10.1016/j.jnlssr.2024.01.001
Scott Miles , Megan Ly , Nick Terry , Youngjun Choe

The U.S. National Institute of Standards and Technology (NIST) published the Community Resilience Planning Guide in 2016. The NIST Guide advocates for a participatory process for developing a performance measurement framework for the jurisdiction's resilience against a scenario hazard. The framework centers around tables of expected and desired recovery times for selected community assets, such as electricity, water, and natural gas infrastructures. The NIST Guide does not provide a method for estimating the expected recovery times. However, building high-fidelity computer models for such estimations requires substantial resources that even larger jurisdictions cannot cost-justify. The most promising approach to recovery time estimation is to systematically use data elicited from people to tap into the wisdom of the (knowledgeable) crowd. This paper describes a novel research-through-design project to enable the computer-supported elicitation of recovery time series data. This work is the first in the literature to examine people's ability to estimate recovery curves and how design influences such estimations. Its main contribution to resilience planning is three-fold: development of a new elicitation tool called Restimate, understanding its potential user base, and providing insights into how it can facilitate resilience planning. Restimate is the first tool to enable evidence-based expert elicitation in any community with limited resources for resilience planning. Beyond resilience planning, those who facilitate high-stakes planning activities under large uncertainties (e.g., mission-critical system design and planning) will benefit from a similar research-through-design process.

美国国家标准与技术研究院(NIST)于 2016 年发布了《社区复原力规划指南》。NIST 指南提倡采用参与式流程,为辖区抵御情景灾害的能力制定绩效衡量框架。该框架以选定社区资产(如电力、水和天然气基础设施)的预期和期望恢复时间表为中心。NIST 指南没有提供估算预期恢复时间的方法。然而,建立用于此类估算的高保真计算机模型需要大量资源,即使是较大的辖区也无法在成本上得到合理的补偿。最有前途的恢复时间估算方法是系统地使用从人们那里获得的数据,利用(知识渊博的)群众的智慧。本文介绍了一个新颖的 "通过设计进行研究 "项目,该项目可在计算机支持下获取恢复时间序列数据。这是文献中首次研究人们估算恢复曲线的能力以及设计如何影响这种估算。它对恢复能力规划的主要贡献有三个方面:开发了一种名为 Restimate 的新激发工具,了解了其潜在用户群,并就该工具如何促进恢复能力规划提供了见解。Restimate 是第一个能够在资源有限的社区进行基于证据的专家征询的工具。除抗灾规划外,那些在巨大不确定性条件下促进高风险规划活动(如关键任务系统设计和规划)的人也将受益于类似的 "通过设计进行研究 "的流程。
{"title":"Restimate: Recovery Estimation Tool for Resilience Planning","authors":"Scott Miles ,&nbsp;Megan Ly ,&nbsp;Nick Terry ,&nbsp;Youngjun Choe","doi":"10.1016/j.jnlssr.2024.01.001","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2024.01.001","url":null,"abstract":"<div><p>The U.S. National Institute of Standards and Technology (NIST) published the Community Resilience Planning Guide in 2016. The NIST Guide advocates for a participatory process for developing a performance measurement framework for the jurisdiction's resilience against a scenario hazard. The framework centers around tables of expected and desired recovery times for selected community assets, such as electricity, water, and natural gas infrastructures. The NIST Guide does not provide a method for estimating the expected recovery times. However, building high-fidelity computer models for such estimations requires substantial resources that even larger jurisdictions cannot cost-justify. The most promising approach to recovery time estimation is to systematically use data elicited from people to tap into the wisdom of the (knowledgeable) crowd. This paper describes a novel research-through-design project to enable the computer-supported elicitation of recovery time series data. This work is the first in the literature to examine people's ability to estimate recovery curves and how design influences such estimations. Its main contribution to resilience planning is three-fold: development of a new elicitation tool called Restimate, understanding its potential user base, and providing insights into how it can facilitate resilience planning. Restimate is the first tool to enable evidence-based expert elicitation in any community with limited resources for resilience planning. Beyond resilience planning, those who facilitate high-stakes planning activities under large uncertainties (e.g., mission-critical system design and planning) will benefit from a similar research-through-design process.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 47-63"},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000045/pdfft?md5=efcbd9e2f5868035b756e8a77d1fd347&pid=1-s2.0-S2666449624000045-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139714984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A model for aircraft cabin evacuation considering passenger type 考虑乘客类型的机舱疏散模型
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-01-13 DOI: 10.1016/j.jnlssr.2023.12.002
Yaping Ma , Jinfeng Yuan , Lingling Tan , Quanyi Liu , Mengling Li

Pedestrian safety evacuation in aircraft cabins has been a challenging problem because of the aircraft's unique characteristics, such as the diversity of passengers and the restricted evacuation environment. It is difficult to reproduce evacuation activities in aircraft cabin due to safety concerns and cost constraints. To fill this gap, an improved cellular automaton model of crowd evacuation for aircraft cabin is established by incorporating the characteristics of cabin space structures and passenger attributes. Passengers are divided into healthy individual passengers and disabled-healthy group passengers, whose movement mechanisms are quantified. Based on the constructed model, simulation experiments are conducted using the configuration cabin layout of B737-800 as an example. The results show that the evacuation time is prolonged with increased passenger density and the number of disabled passengers. Moreover, the overall evacuation time is insignificantly affected by whether disabled-healthy group passengers' seats are close to the aisle or window, and the evacuation efficiency is best when their seats are evenly distributed in the cabin. The evacuation time is the shortest when all cabin doors are open, and pedestrians are evacuated the slowest when the central emergency doors are closed. This study provides valuable insights into effective strategies for pedestrian evacuation and crowd emergency management of civil aircraft.

由于飞机的独特性,如乘客的多样性和有限的疏散环境,飞机客舱内的行人安全疏散一直是一个具有挑战性的问题。出于安全考虑和成本限制,很难再现机舱内的疏散活动。为填补这一空白,本文结合机舱空间结构特点和乘客属性,建立了改进的机舱人群疏散蜂窝自动机模型。模型将乘客分为健康个体乘客和残障健康群体乘客,并量化了他们的移动机制。在所建模型的基础上,以 B737-800 型飞机的配置客舱布局为例进行了仿真实验。结果表明,随着乘客密度和残疾乘客数量的增加,疏散时间也会延长。此外,残障健康组乘客的座位是靠近过道还是靠近窗口对整体疏散时间的影响不大,当他们的座位在客舱内均匀分布时,疏散效率最佳。当机舱门全部打开时,疏散时间最短;当中央应急门关闭时,行人疏散速度最慢。这项研究为民用飞机行人疏散和人群应急管理的有效策略提供了宝贵的见解。
{"title":"A model for aircraft cabin evacuation considering passenger type","authors":"Yaping Ma ,&nbsp;Jinfeng Yuan ,&nbsp;Lingling Tan ,&nbsp;Quanyi Liu ,&nbsp;Mengling Li","doi":"10.1016/j.jnlssr.2023.12.002","DOIUrl":"10.1016/j.jnlssr.2023.12.002","url":null,"abstract":"<div><p>Pedestrian safety evacuation in aircraft cabins has been a challenging problem because of the aircraft's unique characteristics, such as the diversity of passengers and the restricted evacuation environment. It is difficult to reproduce evacuation activities in aircraft cabin due to safety concerns and cost constraints. To fill this gap, an improved cellular automaton model of crowd evacuation for aircraft cabin is established by incorporating the characteristics of cabin space structures and passenger attributes. Passengers are divided into healthy individual passengers and disabled-healthy group passengers, whose movement mechanisms are quantified. Based on the constructed model, simulation experiments are conducted using the configuration cabin layout of B737-800 as an example. The results show that the evacuation time is prolonged with increased passenger density and the number of disabled passengers. Moreover, the overall evacuation time is insignificantly affected by whether disabled-healthy group passengers' seats are close to the aisle or window, and the evacuation efficiency is best when their seats are evenly distributed in the cabin. The evacuation time is the shortest when all cabin doors are open, and pedestrians are evacuated the slowest when the central emergency doors are closed. This study provides valuable insights into effective strategies for pedestrian evacuation and crowd emergency management of civil aircraft.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 83-90"},"PeriodicalIF":0.0,"publicationDate":"2024-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266644962400001X/pdfft?md5=2b7c167babf9fa412bbefbe329883b94&pid=1-s2.0-S266644962400001X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139540497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and resilient improved image steganography using hybrid fuzzy neural network with fuzzy logic 利用带模糊逻辑的混合模糊神经网络改进图像隐写术的安全性和弹性
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-01-12 DOI: 10.1016/j.jnlssr.2023.12.003
Sachin Dhawan , Hemanta Kumar Bhuyan , Subhendu Kumar Pani , Vinayakumar Ravi , Rashmi Gupta , Arun Rana , Alanoud Al Mazroa

The exponential growth in communication networks, data technology, advanced libraries, and mainly World Wide Web services has played a pivotal role in facilitating the retrieval of various types of information as needed. However, this progress has also led to security concerns related to the transmission of confidential data. Nevertheless, safeguarding these data during communication through insecure channels is crucial for obvious reasons. The emergence of steganography offers a robust approach to concealing confidential information, such as images, audio tracks, text files, and video files, in suitable media carriers. A novel technique is envisioned based on back-propagation learning. According to the proposed method, a hybrid fuzzy neural network (HFNN) is applied to the output obtained from the least significant bit substitution of secret data using pixel value differences and exploiting the modification direction. Through simulation and test results, it has been observed that the proposed methodology achieves secure steganography and superior visual quality. During the experiments, we observed that for the secret image of the cameraman, the PSNR & MSE values of the proposed technique are 61.963895 and 0.041361, respectively.

通信网络、数据技术、先进的图书馆以及主要是万维网服务的指数式增长在促进按需检索各类信息方面发挥了关键作用。然而,这一进步也引发了与机密数据传输有关的安全问题。然而,出于显而易见的原因,在通过不安全渠道进行通信时保护这些数据是至关重要的。隐写术的出现为在合适的媒体载体中隐藏机密信息(如图像、音轨、文本文件和视频文件)提供了一种强有力的方法。我们设想了一种基于反向传播学习的新技术。根据所提出的方法,混合模糊神经网络(HFNN)被应用于利用像素值差异和修改方向对秘密数据进行最小有效位替换后得到的输出。通过仿真和测试结果,我们发现所提出的方法实现了安全的隐写和卓越的视觉质量。在实验过程中,我们观察到对于摄影师的秘密图像,拟议技术的 PSNR 值和 MSE 值分别为 61.963895 和 0.041361。
{"title":"Secure and resilient improved image steganography using hybrid fuzzy neural network with fuzzy logic","authors":"Sachin Dhawan ,&nbsp;Hemanta Kumar Bhuyan ,&nbsp;Subhendu Kumar Pani ,&nbsp;Vinayakumar Ravi ,&nbsp;Rashmi Gupta ,&nbsp;Arun Rana ,&nbsp;Alanoud Al Mazroa","doi":"10.1016/j.jnlssr.2023.12.003","DOIUrl":"10.1016/j.jnlssr.2023.12.003","url":null,"abstract":"<div><p>The exponential growth in communication networks, data technology, advanced libraries, and mainly World Wide Web services has played a pivotal role in facilitating the retrieval of various types of information as needed. However, this progress has also led to security concerns related to the transmission of confidential data. Nevertheless, safeguarding these data during communication through insecure channels is crucial for obvious reasons. The emergence of steganography offers a robust approach to concealing confidential information, such as images, audio tracks, text files, and video files, in suitable media carriers. A novel technique is envisioned based on back-propagation learning. According to the proposed method, a hybrid fuzzy neural network (HFNN) is applied to the output obtained from the least significant bit substitution of secret data using pixel value differences and exploiting the modification direction. Through simulation and test results, it has been observed that the proposed methodology achieves secure steganography and superior visual quality. During the experiments, we observed that for the secret image of the cameraman, the PSNR &amp; MSE values of the proposed technique are 61.963895 and 0.041361, respectively.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 91-101"},"PeriodicalIF":0.0,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000033/pdfft?md5=556a7a7eb64422f764d2e1eb7ec44d4d&pid=1-s2.0-S2666449624000033-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139633944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A social computing method for energy safety 能源安全的社会计算方法
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-01-12 DOI: 10.1016/j.jnlssr.2023.12.001
Pengfei Zhao , Shuangqi Li , Zhidong Cao , Paul Jen-Hwa Hu , Daniel Dajun Zeng , Da Xie , Yichen Shen , Jiangfeng Li , Tianyi Luo

Information and communication technologies enable the transformation of traditional energy systems into cyber-physical energy systems (CPESs), but such systems have also become popular targets of cyberattacks. Currently, available methods for evaluating the impacts of cyberattacks suffer from limited resilience, efficacy, and practical value. To mitigate their potentially disastrous consequences, this study suggests a two-stage, discrepancy-based optimization approach that considers both preparatory actions and response measures, integrating concepts from social computing. The proposed Kullback-Leibler divergence-based, distributionally robust optimization (KDR) method has a hierarchical, two-stage objective function that incorporates the operating costs of both system infrastructures (e.g., energy resources, reserve capacity) and real-time response measures (e.g., load shedding, demand-side management, electric vehicle charging station management). By incorporating social computing principles, the optimization framework can also capture the social behavior and interactions of energy consumers in response to cyberattacks. The preparatory stage entails day-ahead operational decisions, leveraging insights from social computing to model and predict the behaviors of individuals and communities affected by potential cyberattacks. The mitigation stage generates responses designed to contain the consequences of the attack by directing and optimizing energy use from the demand side, taking into account the social context and preferences of energy consumers, to ensure resilient, economically efficient CPES operations. Our method can determine optimal schemes in both stages, accounting for the social dimensions of the problem. An original disaster mitigation model uses an abstract formulation to develop a risk-neutral model that characterizes cyberattacks through KDR, incorporating social computing techniques to enhance the understanding and response to cyber threats. This approach can mitigate the impacts more effectively than several existing methods, even with limited data availability. To extend this risk-neutral model, we incorporate conditional value at risk as an essential risk measure, capturing the uncertainty and diverse impact scenarios arising from social computing factors. The empirical results affirm that the KDR method, which is enriched with social computing considerations, produces resilient, economically efficient solutions for managing the impacts of cyberattacks on a CPES. By integrating social computing principles into the optimization framework, it becomes possible to better anticipate and address the social and behavioral aspects associated with cyberattacks on CPESs, ultimately improving the overall resilience and effectiveness of the system's response measures.

信息和通信技术使传统能源系统转变为网络物理能源系统(CPES),但此类系统也成为网络攻击的热门目标。目前,可用来评估网络攻击影响的方法在复原力、有效性和实用价值方面都很有限。为了减轻网络攻击可能带来的灾难性后果,本研究提出了一种基于差异的两阶段优化方法,该方法同时考虑了准备行动和响应措施,并融合了社会计算的概念。所提出的基于库尔贝-莱布勒发散的分布稳健优化(KDR)方法具有分层的两阶段目标函数,其中包含系统基础设施(如能源资源、储备能力)和实时响应措施(如负荷削减、需求侧管理、电动汽车充电站管理)的运营成本。通过结合社会计算原理,优化框架还可以捕捉能源消费者在应对网络攻击时的社会行为和互动。准备阶段需要提前一天做出运营决策,利用社会计算的洞察力来模拟和预测受潜在网络攻击影响的个人和社区的行为。在缓解阶段,考虑到能源消费者的社会背景和偏好,通过指导和优化需求方的能源使用,生成旨在控制攻击后果的应对措施,以确保具有弹性和经济效益的 CPES 运行。我们的方法可以确定这两个阶段的最优方案,同时考虑到问题的社会维度。一种独创的减灾模型采用抽象的表述方式,开发出一种风险中性模型,通过 KDR 描述网络攻击的特点,并结合社会计算技术,加强对网络威胁的理解和应对。与现有的几种方法相比,即使数据可用性有限,这种方法也能更有效地减轻影响。为了扩展这种风险中性模型,我们将条件风险值作为一种重要的风险度量,捕捉社会计算因素带来的不确定性和各种影响情景。实证结果证实,在 KDR 方法中加入社会计算因素后,该方法能产生具有弹性和经济效益的解决方案,用于管理网络攻击对 CPES 的影响。通过将社会计算原则纳入优化框架,可以更好地预测和解决与 CPES 网络攻击相关的社会和行为问题,最终提高系统响应措施的整体弹性和有效性。
{"title":"A social computing method for energy safety","authors":"Pengfei Zhao ,&nbsp;Shuangqi Li ,&nbsp;Zhidong Cao ,&nbsp;Paul Jen-Hwa Hu ,&nbsp;Daniel Dajun Zeng ,&nbsp;Da Xie ,&nbsp;Yichen Shen ,&nbsp;Jiangfeng Li ,&nbsp;Tianyi Luo","doi":"10.1016/j.jnlssr.2023.12.001","DOIUrl":"10.1016/j.jnlssr.2023.12.001","url":null,"abstract":"<div><p>Information and communication technologies enable the transformation of traditional energy systems into cyber-physical energy systems (CPESs), but such systems have also become popular targets of cyberattacks. Currently, available methods for evaluating the impacts of cyberattacks suffer from limited resilience, efficacy, and practical value. To mitigate their potentially disastrous consequences, this study suggests a two-stage, discrepancy-based optimization approach that considers both preparatory actions and response measures, integrating concepts from social computing. The proposed Kullback-Leibler divergence-based, distributionally robust optimization (KDR) method has a hierarchical, two-stage objective function that incorporates the operating costs of both system infrastructures (e.g., energy resources, reserve capacity) and real-time response measures (e.g., load shedding, demand-side management, electric vehicle charging station management). By incorporating social computing principles, the optimization framework can also capture the social behavior and interactions of energy consumers in response to cyberattacks. The preparatory stage entails day-ahead operational decisions, leveraging insights from social computing to model and predict the behaviors of individuals and communities affected by potential cyberattacks. The mitigation stage generates responses designed to contain the consequences of the attack by directing and optimizing energy use from the demand side, taking into account the social context and preferences of energy consumers, to ensure resilient, economically efficient CPES operations. Our method can determine optimal schemes in both stages, accounting for the social dimensions of the problem. An original disaster mitigation model uses an abstract formulation to develop a risk-neutral model that characterizes cyberattacks through KDR, incorporating social computing techniques to enhance the understanding and response to cyber threats. This approach can mitigate the impacts more effectively than several existing methods, even with limited data availability. To extend this risk-neutral model, we incorporate conditional value at risk as an essential risk measure, capturing the uncertainty and diverse impact scenarios arising from social computing factors. The empirical results affirm that the KDR method, which is enriched with social computing considerations, produces resilient, economically efficient solutions for managing the impacts of cyberattacks on a CPES. By integrating social computing principles into the optimization framework, it becomes possible to better anticipate and address the social and behavioral aspects associated with cyberattacks on CPESs, ultimately improving the overall resilience and effectiveness of the system's response measures.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 64-82"},"PeriodicalIF":0.0,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000021/pdfft?md5=ee0b546ba126233207f393bc1858e3fd&pid=1-s2.0-S2666449624000021-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139636635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Single image defogging via multi-exposure image fusion and detail enhancement 通过多曝光图像融合和细节增强实现单幅图像除雾
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2023-12-22 DOI: 10.1016/j.jnlssr.2023.11.003
Wenjing Mao , Dezhi Zheng , Minze Chen , Juqiang Chen

Outdoor cameras play an important role in monitoring security and social governance. As a common weather phenomenon, haze can easily affect the quality of camera shooting, resulting in loss and distortion of image details. This paper proposes an improved multi-exposure image fusion defogging technique based on the artificial multi-exposure image fusion (AMEF) algorithm. First, the foggy image is adaptively exposed, and the fused image is subsequently obtained via multiple exposures. The fusion weight is determined by the saturation, contrast, and brightness. Finally, the image fused by a multi-scale Laplacian algorithm is enhanced with simple adaptive details to obtain a clearer defogging image. It is subjectively and objectively verified that this algorithm can obtain more image details and distinct picture colors without a priori information, effectively improving the defogging ability.

户外摄像机在监控安全和社会治理方面发挥着重要作用。雾霾作为一种常见的天气现象,很容易影响摄像机的拍摄质量,造成图像细节的丢失和失真。本文基于人工多重曝光图像融合(AMEF)算法,提出了一种改进的多重曝光图像融合除雾技术。首先,对雾图像进行自适应曝光,然后通过多次曝光获得融合图像。融合权重由饱和度、对比度和亮度决定。最后,利用多尺度拉普拉斯算法对融合后的图像进行简单的自适应细节增强,以获得更清晰的除雾图像。经过主观和客观的验证,该算法可以在没有先验信息的情况下获得更多的图像细节和鲜明的图像色彩,从而有效提高除雾能力。
{"title":"Single image defogging via multi-exposure image fusion and detail enhancement","authors":"Wenjing Mao ,&nbsp;Dezhi Zheng ,&nbsp;Minze Chen ,&nbsp;Juqiang Chen","doi":"10.1016/j.jnlssr.2023.11.003","DOIUrl":"10.1016/j.jnlssr.2023.11.003","url":null,"abstract":"<div><p>Outdoor cameras play an important role in monitoring security and social governance. As a common weather phenomenon, haze can easily affect the quality of camera shooting, resulting in loss and distortion of image details. This paper proposes an improved multi-exposure image fusion defogging technique based on the artificial multi-exposure image fusion (AMEF) algorithm. First, the foggy image is adaptively exposed, and the fused image is subsequently obtained via multiple exposures. The fusion weight is determined by the saturation, contrast, and brightness. Finally, the image fused by a multi-scale Laplacian algorithm is enhanced with simple adaptive details to obtain a clearer defogging image. It is subjectively and objectively verified that this algorithm can obtain more image details and distinct picture colors without a priori information, effectively improving the defogging ability.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 37-46"},"PeriodicalIF":0.0,"publicationDate":"2023-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449623000555/pdfft?md5=4f37c1a069f1184722bd5ba9365158c7&pid=1-s2.0-S2666449623000555-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139018021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the correlation between temperature and crime: A case-crossover study of eight cities in America 探索气温与犯罪之间的相关性:美国八个城市的案例交叉研究
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2023-12-17 DOI: 10.1016/j.jnlssr.2023.11.001
Jinming Hu , Xiaofeng Hu , Xin'ge Han , Yan Lin , Huanggang Wu , Bing Shen

Recent years have seen increasing academic interest in exploring the correlation between temperature and crime. However, it is uncertain whether similar long-term trends or seasonality (rather than causal effect) of temperature and crime is the major reason for the observed correlation between them. To explore whether there is still a correlation between temperature and crime when long-term trends and seasonal cycles are filtered out, we use the Kalman filter to decompose the time series of temperature and crimes, and then the fast Fourier transform is used to calculate the exact circle of their seasonality separately. Based on that, the box-plot method and linear regression are used to explore the correlation between temperature residuals and crime residuals. The results show that more than half of the crime types have similar seasonal cycles (approximately 1 year) to that of temperature. Moreover, the daily residual analyses show that temperature residuals have a positive correlation with assault and robbery residuals in all cities, whose average slopes are more than 0.1. The other four types of crimes vary greatly from case to case. The temperature residuals show a weak correlation with the residuals of some crime types.

近年来,学术界对探讨气温与犯罪之间的相关性越来越感兴趣。然而,尚不确定气温与犯罪之间类似的长期趋势或季节性(而非因果效应)是否是观察到的两者之间相关性的主要原因。为了探讨在滤除长期趋势和季节周期后,气温与犯罪之间是否仍然存在相关性,我们使用卡尔曼滤波器对气温和犯罪的时间序列进行分解,然后使用快速傅里叶变换分别计算它们的季节性精确圈。在此基础上,利用箱图法和线性回归法探讨气温残差与犯罪残差之间的相关性。结果表明,半数以上的犯罪类型与气温具有相似的季节周期(约 1 年)。此外,日残差分析表明,在所有城市中,气温残差与袭击和抢劫残差呈正相关,其平均斜率大于 0.1。其他四类犯罪在不同案件中的差异很大。气温残差与某些犯罪类型的残差显示出微弱的相关性。
{"title":"Exploring the correlation between temperature and crime: A case-crossover study of eight cities in America","authors":"Jinming Hu ,&nbsp;Xiaofeng Hu ,&nbsp;Xin'ge Han ,&nbsp;Yan Lin ,&nbsp;Huanggang Wu ,&nbsp;Bing Shen","doi":"10.1016/j.jnlssr.2023.11.001","DOIUrl":"10.1016/j.jnlssr.2023.11.001","url":null,"abstract":"<div><p>Recent years have seen increasing academic interest in exploring the correlation between temperature and crime. However, it is uncertain whether similar long-term trends or seasonality (rather than causal effect) of temperature and crime is the major reason for the observed correlation between them. To explore whether there is still a correlation between temperature and crime when long-term trends and seasonal cycles are filtered out, we use the Kalman filter to decompose the time series of temperature and crimes, and then the fast Fourier transform is used to calculate the exact circle of their seasonality separately. Based on that, the box-plot method and linear regression are used to explore the correlation between temperature residuals and crime residuals. The results show that more than half of the crime types have similar seasonal cycles (approximately 1 year) to that of temperature. Moreover, the daily residual analyses show that temperature residuals have a positive correlation with assault and robbery residuals in all cities, whose average slopes are more than 0.1. The other four types of crimes vary greatly from case to case. The temperature residuals show a weak correlation with the residuals of some crime types.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 13-36"},"PeriodicalIF":0.0,"publicationDate":"2023-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449623000531/pdfft?md5=ef4f4c46d1e5d5cc63651ba91d45e8d7&pid=1-s2.0-S2666449623000531-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138988188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-driven evacuation and rescue traffic optimization with rescue contraflow control 数据驱动的疏散和救援交通优化与救援逆流控制
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2023-12-14 DOI: 10.1016/j.jnlssr.2023.11.002
Zheng Liu , Jialin Liu , Xuecheng Shang , Xingang Li

In response to local sudden disasters, e.g., high-rise office or residential building fire disasters, road occupation can cause conflicts, and traffic directions may be opposite between evacuation vehicles and rescue vehicles; moreover, lane contraflow can be adopted to meet these surge traffic demands. However, lane contraflow that provides more roads for rescue vehicles reduces the traffic supply in the evacuation direction. It is unclear how to control the number of contraflow roads used by rescue vehicles to coordinate evacuation and rescue traffic operations. Here, we adjust the critical rescue traffic volume of reversing the normal road traffic direction to control rescue contraflow. Additionally, we propose a multiobjective mixed integer linear programming formulation for evacuation and rescue traffic optimization. Additionally, considering that the upper limit of the critical rescue traffic volume is unknown and that the proposed formulation includes multiple objectives and multi-priority vehicle classes, a three-stage solving algorithm is developed. Next, a large-scale evacuation and rescue traffic optimization result dataset is obtained for the Nguyen–Dupuis road network, and the impact of different rescue contraflow control plans on evacuation and rescue traffic is studied based on data-driven statistical analysis. The results show that by adjusting the optimal rescue traffic route, the critical rescue traffic volume for reversing the normal road traffic direction can reduce the interference of rescue traffic to evacuation traffic operation performance without reducing rescue traffic operation performance, and can be used to coordinate evacuation and rescue traffic operation under rescue contraflow.

在应对局部突发性灾害(如高层办公楼或住宅楼火灾灾害)时,道路占用可能会引发冲突,疏散车辆和救援车辆之间的交通方向可能相反;此外,可以采用车道反向流来满足这些激增的交通需求。然而,车道反向流为救援车辆提供了更多道路,减少了疏散方向的交通供应。目前还不清楚如何控制救援车辆使用的逆流道路数量,以协调疏散和救援交通运行。在此,我们通过调整逆转正常道路交通方向的临界救援交通量来控制救援逆流。此外,我们还提出了疏散和救援交通优化的多目标混合整数线性规划公式。此外,考虑到临界救援交通量的上限是未知的,而且所提出的公式包括多目标和多优先级车辆类别,因此开发了一种三阶段求解算法。接着,获得了阮杜比路网的大规模疏散和救援交通优化结果数据集,并基于数据驱动的统计分析,研究了不同救援逆流控制方案对疏散和救援交通的影响。结果表明,通过调整最优救援交通路线,逆转正常道路交通方向的临界救援交通量可以在不降低救援交通运行性能的前提下,减少救援交通对疏散交通运行性能的干扰,可用于协调救援逆流下的疏散和救援交通运行。
{"title":"Data-driven evacuation and rescue traffic optimization with rescue contraflow control","authors":"Zheng Liu ,&nbsp;Jialin Liu ,&nbsp;Xuecheng Shang ,&nbsp;Xingang Li","doi":"10.1016/j.jnlssr.2023.11.002","DOIUrl":"10.1016/j.jnlssr.2023.11.002","url":null,"abstract":"<div><p>In response to local sudden disasters, e.g., high-rise office or residential building fire disasters, road occupation can cause conflicts, and traffic directions may be opposite between evacuation vehicles and rescue vehicles; moreover, lane contraflow can be adopted to meet these surge traffic demands. However, lane contraflow that provides more roads for rescue vehicles reduces the traffic supply in the evacuation direction. It is unclear how to control the number of contraflow roads used by rescue vehicles to coordinate evacuation and rescue traffic operations. Here, we adjust the critical rescue traffic volume of reversing the normal road traffic direction to control rescue contraflow. Additionally, we propose a multiobjective mixed integer linear programming formulation for evacuation and rescue traffic optimization. Additionally, considering that the upper limit of the critical rescue traffic volume is unknown and that the proposed formulation includes multiple objectives and multi-priority vehicle classes, a three-stage solving algorithm is developed. Next, a large-scale evacuation and rescue traffic optimization result dataset is obtained for the Nguyen–Dupuis road network, and the impact of different rescue contraflow control plans on evacuation and rescue traffic is studied based on data-driven statistical analysis. The results show that by adjusting the optimal rescue traffic route, the critical rescue traffic volume for reversing the normal road traffic direction can reduce the interference of rescue traffic to evacuation traffic operation performance without reducing rescue traffic operation performance, and can be used to coordinate evacuation and rescue traffic operation under rescue contraflow.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 1-12"},"PeriodicalIF":0.0,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449623000543/pdfft?md5=a313ae95ca5422cb9d3c008e9bcb6806&pid=1-s2.0-S2666449623000543-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139015413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
安全科学与韧性(英文)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1