首页 > 最新文献

安全科学与韧性(英文)最新文献

英文 中文
AI for science: Predicting infectious diseases 人工智能促进科学预测传染病
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-03-15 DOI: 10.1016/j.jnlssr.2024.02.002
Alexis Pengfei Zhao , Shuangqi Li , Zhidong Cao , Paul Jen-Hwa Hu , Jiaojiao Wang , Yue Xiang , Da Xie , Xi Lu

The global health landscape has been persistently challenged by the emergence and re-emergence of infectious diseases. Traditional epidemiological models, rooted in the early 20th century, have provided foundational insights into disease dynamics. However, the intricate web of modern global interactions and the exponential growth of available data demand more advanced predictive tools. This is where AI for Science (AI4S) comes into play, offering a transformative approach by integrating artificial intelligence (AI) into infectious disease prediction. This paper elucidates the pivotal role of AI4S in enhancing and, in some instances, superseding traditional epidemiological methodologies. By harnessing AI's capabilities, AI4S facilitates real-time monitoring, sophisticated data integration, and predictive modeling with enhanced precision. The comparative analysis highlights the stark contrast between conventional models and the innovative strategies enabled by AI4S. In essence, AI4S represents a paradigm shift in infectious disease research. It addresses the limitations of traditional models and paves the way for a more proactive and informed response to future outbreaks. As we navigate the complexities of global health challenges, AI4S stands as a beacon, signifying the next phase of evolution in disease prediction, characterized by increased accuracy, adaptability, and efficiency.

全球卫生状况一直受到传染病出现和再次出现的挑战。植根于 20 世纪初的传统流行病学模型为人们提供了对疾病动态的基本见解。然而,错综复杂的现代全球互动网络和指数级增长的可用数据需要更先进的预测工具。这就是人工智能促进科学(AI4S)发挥作用的地方,它通过将人工智能(AI)整合到传染病预测中,提供了一种变革性的方法。本文阐明了 AI4S 在增强传统流行病学方法方面的关键作用,在某些情况下,它甚至可以取代传统流行病学方法。通过利用人工智能的能力,AI4S 可促进实时监测、复杂的数据整合和更精确的预测建模。对比分析凸显了传统模式与 AI4S 带来的创新战略之间的鲜明对比。从本质上讲,AI4S 代表了传染病研究模式的转变。它解决了传统模型的局限性,为更积极、更明智地应对未来的疫情爆发铺平了道路。在我们应对复杂的全球健康挑战时,AI4S 就像一座灯塔,标志着疾病预测的下一阶段发展,其特点是更高的准确性、适应性和效率。
{"title":"AI for science: Predicting infectious diseases","authors":"Alexis Pengfei Zhao ,&nbsp;Shuangqi Li ,&nbsp;Zhidong Cao ,&nbsp;Paul Jen-Hwa Hu ,&nbsp;Jiaojiao Wang ,&nbsp;Yue Xiang ,&nbsp;Da Xie ,&nbsp;Xi Lu","doi":"10.1016/j.jnlssr.2024.02.002","DOIUrl":"10.1016/j.jnlssr.2024.02.002","url":null,"abstract":"<div><p>The global health landscape has been persistently challenged by the emergence and re-emergence of infectious diseases. Traditional epidemiological models, rooted in the early 20th century, have provided foundational insights into disease dynamics. However, the intricate web of modern global interactions and the exponential growth of available data demand more advanced predictive tools. This is where AI for Science (AI4S) comes into play, offering a transformative approach by integrating artificial intelligence (AI) into infectious disease prediction. This paper elucidates the pivotal role of AI4S in enhancing and, in some instances, superseding traditional epidemiological methodologies. By harnessing AI's capabilities, AI4S facilitates real-time monitoring, sophisticated data integration, and predictive modeling with enhanced precision. The comparative analysis highlights the stark contrast between conventional models and the innovative strategies enabled by AI4S. In essence, AI4S represents a paradigm shift in infectious disease research. It addresses the limitations of traditional models and paves the way for a more proactive and informed response to future outbreaks. As we navigate the complexities of global health challenges, AI4S stands as a beacon, signifying the next phase of evolution in disease prediction, characterized by increased accuracy, adaptability, and efficiency.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 2","pages":"Pages 130-146"},"PeriodicalIF":0.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266644962400015X/pdfft?md5=e98d804486d0967444d73fd9de22a294&pid=1-s2.0-S266644962400015X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140281542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring innovative techniques for damage control during natural disasters 探索自然灾害期间损害控制的创新技术
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-03-14 DOI: 10.1016/j.jnlssr.2024.02.004
Moinak Maiti , Parthajit Kayal

The study critically examines the principles, mechanisms, and effectiveness of different damage control techniques in dealing with natural disasters, emphasizing their pivotal role in minimizing casualties and economic losses. Each of these damage control techniques is mapped based on their applications and relevance in the key areas of natural disaster management. By utilizing various real-world instances, the present study shows that the effective implementation of various innovative techniques is shaping the space of natural disaster management in a global context. The integration of different innovative techniques into the existing natural disaster management system has improved the survival rate, economic performance, and sustainable development. The study finds that innovative disaster financing models, clear strategies, and creating awareness among communities can improve the overall efficiency of innovative techniques that are currently used for damage control during natural disaster events. Despite the substantial advantages of these creative strategies, the study acknowledges challenges such as financial constraints, unclear policy goals, and community adaptation requirements. The study also indicates that in the future, automatic damage restoration, quick prototyping, and additive engineering will play a vital role in controlling damage from catastrophic events, while it acknowledges limitations in temporal scope, generalizability, and financial constraints.

本研究批判性地探讨了各种损害控制技术在应对自然灾害中的原理、机制和效果,强调了它们在最大限度地减少人员伤亡和经济损失方面的关键作用。根据这些损害控制技术在自然灾害管理关键领域中的应用和相关性,对每一种损害控制技术进行了分析。通过利用各种现实世界的实例,本研究表明,各种创新技术的有效实施正在塑造全球范围内的自然灾害管理空间。将不同的创新技术融入现有的自然灾害管理系统,提高了生存率、经济效益和可持续发展。研究发现,创新的灾害融资模式、明确的战略以及在社区中树立意识,可以提高目前在自然灾害事件中用于损害控制的创新技术的整体效率。尽管这些创新战略具有很大的优势,但研究也承认存在一些挑战,如资金限制、政策目标不明确以及社区适应性要求等。研究还表明,未来,自动损害修复、快速原型设计和快速成型工程将在控制灾难性事件造成的损害方面发挥重要作用,同时也承认在时间范围、通用性和资金限制方面存在局限性。
{"title":"Exploring innovative techniques for damage control during natural disasters","authors":"Moinak Maiti ,&nbsp;Parthajit Kayal","doi":"10.1016/j.jnlssr.2024.02.004","DOIUrl":"10.1016/j.jnlssr.2024.02.004","url":null,"abstract":"<div><p>The study critically examines the principles, mechanisms, and effectiveness of different damage control techniques in dealing with natural disasters, emphasizing their pivotal role in minimizing casualties and economic losses. Each of these damage control techniques is mapped based on their applications and relevance in the key areas of natural disaster management. By utilizing various real-world instances, the present study shows that the effective implementation of various innovative techniques is shaping the space of natural disaster management in a global context. The integration of different innovative techniques into the existing natural disaster management system has improved the survival rate, economic performance, and sustainable development. The study finds that innovative disaster financing models, clear strategies, and creating awareness among communities can improve the overall efficiency of innovative techniques that are currently used for damage control during natural disaster events. Despite the substantial advantages of these creative strategies, the study acknowledges challenges such as financial constraints, unclear policy goals, and community adaptation requirements. The study also indicates that in the future, automatic damage restoration, quick prototyping, and additive engineering will play a vital role in controlling damage from catastrophic events, while it acknowledges limitations in temporal scope, generalizability, and financial constraints.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 2","pages":"Pages 147-155"},"PeriodicalIF":0.0,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000173/pdfft?md5=d9f27cf83cda5df06f88a07917a4a9a9&pid=1-s2.0-S2666449624000173-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140271564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised intrusion detection system for in-vehicle communication networks 车载通信网络无监督入侵检测系统
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-02-22 DOI: 10.1016/j.jnlssr.2023.12.004
Kabilan N , Vinayakumar Ravi , V Sowmya

In-vehicle communication has been optimized day to day to keep updated of the technologies. Control area network (CAN) is used as a standard communication method because of its efficient and reliable connection. However, CAN is prone to several network level attacks because of its lack in security mechanisms. Various methods have been introduced to incorporate this in CAN. We proposed an unsupervised method of intrusion detection for in-vehicle communication networks by combining the optimal feature extracting ability of autoencoders and more precise clustering using fuzzy C-means (FCM). The proposed method is light weight and requires less computation time. We performed an extensive experiment and achieved an accuracy of 75.51 % with the ML350 in-vehicle intrusion dataset. By experimental result, the proposed method also works better for other intrusion detection problems like wireless intrusion detection datasets such as WNS-DS with accuracy of 84.05 % and network intrusion detection datasets such as KDDCup with accuracy 60.63 % , UNSW_NB15 with accuracy 73.62 % and Information Security Center of Excellence (ISCX) with accuracy 74.83 %. Overall, the proposed method outperforms the existing methods and avoids labeled datasets when training an in-vehicle intrusion detection model. The results of the experiment of our proposed method performed on various intrusion detection datasets indicate that the proposed approach is generalized and robust in detecting intrusions and can be effectively deployed in real time to monitor CAN traffic in vehicles and proactively alert during attacks.

随着技术的更新,车载通信也在不断优化。控制区域网络(CAN)因其高效可靠的连接而被用作标准通信方法。然而,由于缺乏安全机制,CAN 很容易受到一些网络级攻击。为了在 CAN 中加入安全机制,人们引入了各种方法。我们提出了一种无监督的车载通信网络入侵检测方法,该方法结合了自动编码器的最佳特征提取能力和使用模糊 C-means (FCM) 的更精确聚类。所提出的方法重量轻、计算时间短。我们进行了大量实验,在 ML350 车载入侵数据集上取得了 75.51 % 的准确率。根据实验结果,提出的方法在其他入侵检测问题上也有较好的效果,如无线入侵检测数据集 WNS-DS,准确率为 84.05 %;网络入侵检测数据集 KDDCup,准确率为 60.63 %;UNSW_NB15,准确率为 73.62 %;信息安全卓越中心(ISCX),准确率为 74.83 %。总体而言,在训练车载入侵检测模型时,建议的方法优于现有方法,并避免了标记数据集。我们提出的方法在各种入侵检测数据集上的实验结果表明,所提出的方法在检测入侵方面具有通用性和鲁棒性,可有效地用于实时监控车辆中的 CAN 流量,并在受到攻击时主动发出警报。
{"title":"Unsupervised intrusion detection system for in-vehicle communication networks","authors":"Kabilan N ,&nbsp;Vinayakumar Ravi ,&nbsp;V Sowmya","doi":"10.1016/j.jnlssr.2023.12.004","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2023.12.004","url":null,"abstract":"<div><p>In-vehicle communication has been optimized day to day to keep updated of the technologies. Control area network (CAN) is used as a standard communication method because of its efficient and reliable connection. However, CAN is prone to several network level attacks because of its lack in security mechanisms. Various methods have been introduced to incorporate this in CAN. We proposed an unsupervised method of intrusion detection for in-vehicle communication networks by combining the optimal feature extracting ability of autoencoders and more precise clustering using fuzzy C-means (FCM). The proposed method is light weight and requires less computation time. We performed an extensive experiment and achieved an accuracy of 75.51 % with the ML350 in-vehicle intrusion dataset. By experimental result, the proposed method also works better for other intrusion detection problems like wireless intrusion detection datasets such as WNS-DS with accuracy of 84.05 % and network intrusion detection datasets such as KDDCup with accuracy 60.63 % , UNSW_NB15 with accuracy 73.62 % and Information Security Center of Excellence (ISCX) with accuracy 74.83 %. Overall, the proposed method outperforms the existing methods and avoids labeled datasets when training an in-vehicle intrusion detection model. The results of the experiment of our proposed method performed on various intrusion detection datasets indicate that the proposed approach is generalized and robust in detecting intrusions and can be effectively deployed in real time to monitor CAN traffic in vehicles and proactively alert during attacks.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 2","pages":"Pages 119-129"},"PeriodicalIF":0.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000070/pdfft?md5=c270f1be76c12ff19f65027e63889cd9&pid=1-s2.0-S2666449624000070-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140328614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A probabilistic model based on the peak-over-threshold approach for risk assessment of airport controllers' performance 基于阈值峰值法的机场管制员绩效风险评估概率模型
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-02-20 DOI: 10.1016/j.jnlssr.2024.02.001
Lili Zu , Yijie Lu , Min Dong

Airport tower control plays an instrumental role in ensuring airport safety. However, obtaining objective, quantitative safety evaluations is challenging due to the unavailability of pertinent human operation data. This study introduces a probabilistic model that combines aircraft dynamics and the peak-over-threshold (POT) approach to assess the safety performance of airport controllers. We applied the POT approach to model reaction times extracted from a radiotelephony dataset via a voice event detection algorithm. The model couples the risks of tower control and aircraft operation to analyze the influence of human factors. Using data from radiotelephony communications and the Base of Aircraft Data (BADA) database, we compared risk levels across scenarios. Our findings revealed heightened airport control risks under low demand (0.374) compared to typical conditions (0.197). Furthermore, the risks associated with coupling under low demand exceeded those under typical demand, with the final approach stage presenting the highest risk (4.929×107). Our model underscores the significance of human factors and the implications of mental disconnects between pilots and controllers for safety risks. Collectively, these consistent findings affirm the reliability of our probabilistic model as an evaluative tool for evaluating the safety performance of airport tower controllers. The results also illuminate the path toward quantitative real-time safety evaluations for airport controllers within the industry. We recommend that airport regulators focus on the performance of airport controllers, particularly during the final approach stage.

机场塔台控制在确保机场安全方面发挥着重要作用。然而,由于无法获得相关的人类操作数据,因此获得客观、定量的安全评估具有挑战性。本研究引入了一个概率模型,该模型结合了飞机动力学和阈值峰值(POT)方法,用于评估机场管制员的安全性能。我们将 POT 方法应用于通过语音事件检测算法从无线电话数据集中提取的反应时间建模。该模型将塔台控制和飞机操作的风险结合起来,分析人为因素的影响。利用无线电通话通信数据和飞机数据基础 (BADA) 数据库,我们比较了各种情况下的风险水平。我们的研究结果表明,在低需求(0.374)与典型条件(0.197)相比,机场控制风险更高。此外,低需求下与耦合相关的风险超过了典型需求下的风险,其中最后进近阶段的风险最高(4.929×10-7)。我们的模型强调了人为因素的重要性,以及飞行员和管制员之间心理脱节对安全风险的影响。总之,这些一致的研究结果肯定了我们的概率模型作为机场塔台管制员安全绩效评估工具的可靠性。这些结果也为行业内对机场管制员进行量化实时安全评估指明了道路。我们建议机场监管机构关注机场管制员的表现,尤其是在最后进近阶段。
{"title":"A probabilistic model based on the peak-over-threshold approach for risk assessment of airport controllers' performance","authors":"Lili Zu ,&nbsp;Yijie Lu ,&nbsp;Min Dong","doi":"10.1016/j.jnlssr.2024.02.001","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2024.02.001","url":null,"abstract":"<div><p>Airport tower control plays an instrumental role in ensuring airport safety. However, obtaining objective, quantitative safety evaluations is challenging due to the unavailability of pertinent human operation data. This study introduces a probabilistic model that combines aircraft dynamics and the peak-over-threshold (POT) approach to assess the safety performance of airport controllers. We applied the POT approach to model reaction times extracted from a radiotelephony dataset via a voice event detection algorithm. The model couples the risks of tower control and aircraft operation to analyze the influence of human factors. Using data from radiotelephony communications and the Base of Aircraft Data (BADA) database, we compared risk levels across scenarios. Our findings revealed heightened airport control risks under low demand (0.374) compared to typical conditions (0.197). Furthermore, the risks associated with coupling under low demand exceeded those under typical demand, with the final approach stage presenting the highest risk (<span><math><mrow><mn>4.929</mn><mo>×</mo><msup><mrow><mn>10</mn></mrow><mrow><mo>−</mo><mn>7</mn></mrow></msup></mrow></math></span>). Our model underscores the significance of human factors and the implications of mental disconnects between pilots and controllers for safety risks. Collectively, these consistent findings affirm the reliability of our probabilistic model as an evaluative tool for evaluating the safety performance of airport tower controllers. The results also illuminate the path toward quantitative real-time safety evaluations for airport controllers within the industry. We recommend that airport regulators focus on the performance of airport controllers, particularly during the final approach stage.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 110-118"},"PeriodicalIF":0.0,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000057/pdfft?md5=9d6786b81f15945e52ed0553f0807e58&pid=1-s2.0-S2666449624000057-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139986215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-voting system using cloud-based hybrid blockchain technology 使用云端混合区块链技术的电子投票系统
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-02-20 DOI: 10.1016/j.jnlssr.2024.01.002
Beulah Jayakumari , S Lilly Sheeba , Maya Eapen , Jani Anbarasi , Vinayakumar Ravi , A. Suganya , Malathy Jawahar

With the invention of Internet-enabled devices, cloud and blockchain-based technologies, an online voting system can smoothly carry out election processes. During pandemic situations, citizens tend to develop panic about mass gatherings, which may influence the decrease in the number of votes. This urges a reliable, flexible, transparent, secure, and cost-effective voting system. The proposed online voting system using cloud-based hybrid blockchain technology eradicates the flaws that persist in the existing voting system, and it is carried out in three phases: the registration phase, vote casting phase and vote counting phase. A timestamp-based authentication protocol with digital signature validates voters and candidates during the registration and vote casting phases. Using smart contracts, third-party interventions are eliminated, and the transactions are secured in the blockchain network. Finally, to provide accurate voting results, the practical Byzantine fault tolerance (PBFT) consensus mechanism is adopted to ensure that the vote has not been modified or corrupted. Hence, the overall performance of the proposed system is significantly better than that of the existing system. Further performance was analyzed based on authentication delay, vote alteration, response time, and latency.

随着互联网设备、云技术和区块链技术的发明,在线投票系统可以顺利开展选举工作。在大流行病情况下,公民往往会对大规模集会产生恐慌,这可能会影响投票数量的减少。这就需要一个可靠、灵活、透明、安全且具有成本效益的投票系统。所提出的在线投票系统采用基于云的混合区块链技术,根除了现有投票系统存在的缺陷,该系统分三个阶段进行:登记阶段、投票阶段和计票阶段。在登记和投票阶段,基于时间戳的数字签名认证协议对选民和候选人进行验证。通过使用智能合约,消除了第三方干预,并确保了区块链网络中交易的安全性。最后,为了提供准确的投票结果,采用了实用拜占庭容错(PBFT)共识机制,以确保投票未被修改或破坏。因此,拟议系统的整体性能明显优于现有系统。进一步的性能分析基于认证延迟、投票更改、响应时间和延迟。
{"title":"E-voting system using cloud-based hybrid blockchain technology","authors":"Beulah Jayakumari ,&nbsp;S Lilly Sheeba ,&nbsp;Maya Eapen ,&nbsp;Jani Anbarasi ,&nbsp;Vinayakumar Ravi ,&nbsp;A. Suganya ,&nbsp;Malathy Jawahar","doi":"10.1016/j.jnlssr.2024.01.002","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2024.01.002","url":null,"abstract":"<div><p>With the invention of Internet-enabled devices, cloud and blockchain-based technologies, an online voting system can smoothly carry out election processes. During pandemic situations, citizens tend to develop panic about mass gatherings, which may influence the decrease in the number of votes. This urges a reliable, flexible, transparent, secure, and cost-effective voting system. The proposed online voting system using cloud-based hybrid blockchain technology eradicates the flaws that persist in the existing voting system, and it is carried out in three phases: the registration phase, vote casting phase and vote counting phase. A timestamp-based authentication protocol with digital signature validates voters and candidates during the registration and vote casting phases. Using smart contracts, third-party interventions are eliminated, and the transactions are secured in the blockchain network. Finally, to provide accurate voting results, the practical Byzantine fault tolerance (PBFT) consensus mechanism is adopted to ensure that the vote has not been modified or corrupted. Hence, the overall performance of the proposed system is significantly better than that of the existing system. Further performance was analyzed based on authentication delay, vote alteration, response time, and latency.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 102-109"},"PeriodicalIF":0.0,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000069/pdfft?md5=3f8ecb21cf6c18772a6fba45e0bdbc41&pid=1-s2.0-S2666449624000069-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139985765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restimate: Recovery Estimation Tool for Resilience Planning 重新估算:复原力规划的复原力估算工具
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-02-08 DOI: 10.1016/j.jnlssr.2024.01.001
Scott Miles , Megan Ly , Nick Terry , Youngjun Choe

The U.S. National Institute of Standards and Technology (NIST) published the Community Resilience Planning Guide in 2016. The NIST Guide advocates for a participatory process for developing a performance measurement framework for the jurisdiction's resilience against a scenario hazard. The framework centers around tables of expected and desired recovery times for selected community assets, such as electricity, water, and natural gas infrastructures. The NIST Guide does not provide a method for estimating the expected recovery times. However, building high-fidelity computer models for such estimations requires substantial resources that even larger jurisdictions cannot cost-justify. The most promising approach to recovery time estimation is to systematically use data elicited from people to tap into the wisdom of the (knowledgeable) crowd. This paper describes a novel research-through-design project to enable the computer-supported elicitation of recovery time series data. This work is the first in the literature to examine people's ability to estimate recovery curves and how design influences such estimations. Its main contribution to resilience planning is three-fold: development of a new elicitation tool called Restimate, understanding its potential user base, and providing insights into how it can facilitate resilience planning. Restimate is the first tool to enable evidence-based expert elicitation in any community with limited resources for resilience planning. Beyond resilience planning, those who facilitate high-stakes planning activities under large uncertainties (e.g., mission-critical system design and planning) will benefit from a similar research-through-design process.

美国国家标准与技术研究院(NIST)于 2016 年发布了《社区复原力规划指南》。NIST 指南提倡采用参与式流程,为辖区抵御情景灾害的能力制定绩效衡量框架。该框架以选定社区资产(如电力、水和天然气基础设施)的预期和期望恢复时间表为中心。NIST 指南没有提供估算预期恢复时间的方法。然而,建立用于此类估算的高保真计算机模型需要大量资源,即使是较大的辖区也无法在成本上得到合理的补偿。最有前途的恢复时间估算方法是系统地使用从人们那里获得的数据,利用(知识渊博的)群众的智慧。本文介绍了一个新颖的 "通过设计进行研究 "项目,该项目可在计算机支持下获取恢复时间序列数据。这是文献中首次研究人们估算恢复曲线的能力以及设计如何影响这种估算。它对恢复能力规划的主要贡献有三个方面:开发了一种名为 Restimate 的新激发工具,了解了其潜在用户群,并就该工具如何促进恢复能力规划提供了见解。Restimate 是第一个能够在资源有限的社区进行基于证据的专家征询的工具。除抗灾规划外,那些在巨大不确定性条件下促进高风险规划活动(如关键任务系统设计和规划)的人也将受益于类似的 "通过设计进行研究 "的流程。
{"title":"Restimate: Recovery Estimation Tool for Resilience Planning","authors":"Scott Miles ,&nbsp;Megan Ly ,&nbsp;Nick Terry ,&nbsp;Youngjun Choe","doi":"10.1016/j.jnlssr.2024.01.001","DOIUrl":"https://doi.org/10.1016/j.jnlssr.2024.01.001","url":null,"abstract":"<div><p>The U.S. National Institute of Standards and Technology (NIST) published the Community Resilience Planning Guide in 2016. The NIST Guide advocates for a participatory process for developing a performance measurement framework for the jurisdiction's resilience against a scenario hazard. The framework centers around tables of expected and desired recovery times for selected community assets, such as electricity, water, and natural gas infrastructures. The NIST Guide does not provide a method for estimating the expected recovery times. However, building high-fidelity computer models for such estimations requires substantial resources that even larger jurisdictions cannot cost-justify. The most promising approach to recovery time estimation is to systematically use data elicited from people to tap into the wisdom of the (knowledgeable) crowd. This paper describes a novel research-through-design project to enable the computer-supported elicitation of recovery time series data. This work is the first in the literature to examine people's ability to estimate recovery curves and how design influences such estimations. Its main contribution to resilience planning is three-fold: development of a new elicitation tool called Restimate, understanding its potential user base, and providing insights into how it can facilitate resilience planning. Restimate is the first tool to enable evidence-based expert elicitation in any community with limited resources for resilience planning. Beyond resilience planning, those who facilitate high-stakes planning activities under large uncertainties (e.g., mission-critical system design and planning) will benefit from a similar research-through-design process.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 47-63"},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000045/pdfft?md5=efcbd9e2f5868035b756e8a77d1fd347&pid=1-s2.0-S2666449624000045-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139714984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A model for aircraft cabin evacuation considering passenger type 考虑乘客类型的机舱疏散模型
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-01-13 DOI: 10.1016/j.jnlssr.2023.12.002
Yaping Ma , Jinfeng Yuan , Lingling Tan , Quanyi Liu , Mengling Li

Pedestrian safety evacuation in aircraft cabins has been a challenging problem because of the aircraft's unique characteristics, such as the diversity of passengers and the restricted evacuation environment. It is difficult to reproduce evacuation activities in aircraft cabin due to safety concerns and cost constraints. To fill this gap, an improved cellular automaton model of crowd evacuation for aircraft cabin is established by incorporating the characteristics of cabin space structures and passenger attributes. Passengers are divided into healthy individual passengers and disabled-healthy group passengers, whose movement mechanisms are quantified. Based on the constructed model, simulation experiments are conducted using the configuration cabin layout of B737-800 as an example. The results show that the evacuation time is prolonged with increased passenger density and the number of disabled passengers. Moreover, the overall evacuation time is insignificantly affected by whether disabled-healthy group passengers' seats are close to the aisle or window, and the evacuation efficiency is best when their seats are evenly distributed in the cabin. The evacuation time is the shortest when all cabin doors are open, and pedestrians are evacuated the slowest when the central emergency doors are closed. This study provides valuable insights into effective strategies for pedestrian evacuation and crowd emergency management of civil aircraft.

由于飞机的独特性,如乘客的多样性和有限的疏散环境,飞机客舱内的行人安全疏散一直是一个具有挑战性的问题。出于安全考虑和成本限制,很难再现机舱内的疏散活动。为填补这一空白,本文结合机舱空间结构特点和乘客属性,建立了改进的机舱人群疏散蜂窝自动机模型。模型将乘客分为健康个体乘客和残障健康群体乘客,并量化了他们的移动机制。在所建模型的基础上,以 B737-800 型飞机的配置客舱布局为例进行了仿真实验。结果表明,随着乘客密度和残疾乘客数量的增加,疏散时间也会延长。此外,残障健康组乘客的座位是靠近过道还是靠近窗口对整体疏散时间的影响不大,当他们的座位在客舱内均匀分布时,疏散效率最佳。当机舱门全部打开时,疏散时间最短;当中央应急门关闭时,行人疏散速度最慢。这项研究为民用飞机行人疏散和人群应急管理的有效策略提供了宝贵的见解。
{"title":"A model for aircraft cabin evacuation considering passenger type","authors":"Yaping Ma ,&nbsp;Jinfeng Yuan ,&nbsp;Lingling Tan ,&nbsp;Quanyi Liu ,&nbsp;Mengling Li","doi":"10.1016/j.jnlssr.2023.12.002","DOIUrl":"10.1016/j.jnlssr.2023.12.002","url":null,"abstract":"<div><p>Pedestrian safety evacuation in aircraft cabins has been a challenging problem because of the aircraft's unique characteristics, such as the diversity of passengers and the restricted evacuation environment. It is difficult to reproduce evacuation activities in aircraft cabin due to safety concerns and cost constraints. To fill this gap, an improved cellular automaton model of crowd evacuation for aircraft cabin is established by incorporating the characteristics of cabin space structures and passenger attributes. Passengers are divided into healthy individual passengers and disabled-healthy group passengers, whose movement mechanisms are quantified. Based on the constructed model, simulation experiments are conducted using the configuration cabin layout of B737-800 as an example. The results show that the evacuation time is prolonged with increased passenger density and the number of disabled passengers. Moreover, the overall evacuation time is insignificantly affected by whether disabled-healthy group passengers' seats are close to the aisle or window, and the evacuation efficiency is best when their seats are evenly distributed in the cabin. The evacuation time is the shortest when all cabin doors are open, and pedestrians are evacuated the slowest when the central emergency doors are closed. This study provides valuable insights into effective strategies for pedestrian evacuation and crowd emergency management of civil aircraft.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 83-90"},"PeriodicalIF":0.0,"publicationDate":"2024-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266644962400001X/pdfft?md5=2b7c167babf9fa412bbefbe329883b94&pid=1-s2.0-S266644962400001X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139540497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and resilient improved image steganography using hybrid fuzzy neural network with fuzzy logic 利用带模糊逻辑的混合模糊神经网络改进图像隐写术的安全性和弹性
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-01-12 DOI: 10.1016/j.jnlssr.2023.12.003
Sachin Dhawan , Hemanta Kumar Bhuyan , Subhendu Kumar Pani , Vinayakumar Ravi , Rashmi Gupta , Arun Rana , Alanoud Al Mazroa

The exponential growth in communication networks, data technology, advanced libraries, and mainly World Wide Web services has played a pivotal role in facilitating the retrieval of various types of information as needed. However, this progress has also led to security concerns related to the transmission of confidential data. Nevertheless, safeguarding these data during communication through insecure channels is crucial for obvious reasons. The emergence of steganography offers a robust approach to concealing confidential information, such as images, audio tracks, text files, and video files, in suitable media carriers. A novel technique is envisioned based on back-propagation learning. According to the proposed method, a hybrid fuzzy neural network (HFNN) is applied to the output obtained from the least significant bit substitution of secret data using pixel value differences and exploiting the modification direction. Through simulation and test results, it has been observed that the proposed methodology achieves secure steganography and superior visual quality. During the experiments, we observed that for the secret image of the cameraman, the PSNR & MSE values of the proposed technique are 61.963895 and 0.041361, respectively.

通信网络、数据技术、先进的图书馆以及主要是万维网服务的指数式增长在促进按需检索各类信息方面发挥了关键作用。然而,这一进步也引发了与机密数据传输有关的安全问题。然而,出于显而易见的原因,在通过不安全渠道进行通信时保护这些数据是至关重要的。隐写术的出现为在合适的媒体载体中隐藏机密信息(如图像、音轨、文本文件和视频文件)提供了一种强有力的方法。我们设想了一种基于反向传播学习的新技术。根据所提出的方法,混合模糊神经网络(HFNN)被应用于利用像素值差异和修改方向对秘密数据进行最小有效位替换后得到的输出。通过仿真和测试结果,我们发现所提出的方法实现了安全的隐写和卓越的视觉质量。在实验过程中,我们观察到对于摄影师的秘密图像,拟议技术的 PSNR 值和 MSE 值分别为 61.963895 和 0.041361。
{"title":"Secure and resilient improved image steganography using hybrid fuzzy neural network with fuzzy logic","authors":"Sachin Dhawan ,&nbsp;Hemanta Kumar Bhuyan ,&nbsp;Subhendu Kumar Pani ,&nbsp;Vinayakumar Ravi ,&nbsp;Rashmi Gupta ,&nbsp;Arun Rana ,&nbsp;Alanoud Al Mazroa","doi":"10.1016/j.jnlssr.2023.12.003","DOIUrl":"10.1016/j.jnlssr.2023.12.003","url":null,"abstract":"<div><p>The exponential growth in communication networks, data technology, advanced libraries, and mainly World Wide Web services has played a pivotal role in facilitating the retrieval of various types of information as needed. However, this progress has also led to security concerns related to the transmission of confidential data. Nevertheless, safeguarding these data during communication through insecure channels is crucial for obvious reasons. The emergence of steganography offers a robust approach to concealing confidential information, such as images, audio tracks, text files, and video files, in suitable media carriers. A novel technique is envisioned based on back-propagation learning. According to the proposed method, a hybrid fuzzy neural network (HFNN) is applied to the output obtained from the least significant bit substitution of secret data using pixel value differences and exploiting the modification direction. Through simulation and test results, it has been observed that the proposed methodology achieves secure steganography and superior visual quality. During the experiments, we observed that for the secret image of the cameraman, the PSNR &amp; MSE values of the proposed technique are 61.963895 and 0.041361, respectively.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 91-101"},"PeriodicalIF":0.0,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000033/pdfft?md5=556a7a7eb64422f764d2e1eb7ec44d4d&pid=1-s2.0-S2666449624000033-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139633944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A social computing method for energy safety 能源安全的社会计算方法
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2024-01-12 DOI: 10.1016/j.jnlssr.2023.12.001
Pengfei Zhao , Shuangqi Li , Zhidong Cao , Paul Jen-Hwa Hu , Daniel Dajun Zeng , Da Xie , Yichen Shen , Jiangfeng Li , Tianyi Luo

Information and communication technologies enable the transformation of traditional energy systems into cyber-physical energy systems (CPESs), but such systems have also become popular targets of cyberattacks. Currently, available methods for evaluating the impacts of cyberattacks suffer from limited resilience, efficacy, and practical value. To mitigate their potentially disastrous consequences, this study suggests a two-stage, discrepancy-based optimization approach that considers both preparatory actions and response measures, integrating concepts from social computing. The proposed Kullback-Leibler divergence-based, distributionally robust optimization (KDR) method has a hierarchical, two-stage objective function that incorporates the operating costs of both system infrastructures (e.g., energy resources, reserve capacity) and real-time response measures (e.g., load shedding, demand-side management, electric vehicle charging station management). By incorporating social computing principles, the optimization framework can also capture the social behavior and interactions of energy consumers in response to cyberattacks. The preparatory stage entails day-ahead operational decisions, leveraging insights from social computing to model and predict the behaviors of individuals and communities affected by potential cyberattacks. The mitigation stage generates responses designed to contain the consequences of the attack by directing and optimizing energy use from the demand side, taking into account the social context and preferences of energy consumers, to ensure resilient, economically efficient CPES operations. Our method can determine optimal schemes in both stages, accounting for the social dimensions of the problem. An original disaster mitigation model uses an abstract formulation to develop a risk-neutral model that characterizes cyberattacks through KDR, incorporating social computing techniques to enhance the understanding and response to cyber threats. This approach can mitigate the impacts more effectively than several existing methods, even with limited data availability. To extend this risk-neutral model, we incorporate conditional value at risk as an essential risk measure, capturing the uncertainty and diverse impact scenarios arising from social computing factors. The empirical results affirm that the KDR method, which is enriched with social computing considerations, produces resilient, economically efficient solutions for managing the impacts of cyberattacks on a CPES. By integrating social computing principles into the optimization framework, it becomes possible to better anticipate and address the social and behavioral aspects associated with cyberattacks on CPESs, ultimately improving the overall resilience and effectiveness of the system's response measures.

信息和通信技术使传统能源系统转变为网络物理能源系统(CPES),但此类系统也成为网络攻击的热门目标。目前,可用来评估网络攻击影响的方法在复原力、有效性和实用价值方面都很有限。为了减轻网络攻击可能带来的灾难性后果,本研究提出了一种基于差异的两阶段优化方法,该方法同时考虑了准备行动和响应措施,并融合了社会计算的概念。所提出的基于库尔贝-莱布勒发散的分布稳健优化(KDR)方法具有分层的两阶段目标函数,其中包含系统基础设施(如能源资源、储备能力)和实时响应措施(如负荷削减、需求侧管理、电动汽车充电站管理)的运营成本。通过结合社会计算原理,优化框架还可以捕捉能源消费者在应对网络攻击时的社会行为和互动。准备阶段需要提前一天做出运营决策,利用社会计算的洞察力来模拟和预测受潜在网络攻击影响的个人和社区的行为。在缓解阶段,考虑到能源消费者的社会背景和偏好,通过指导和优化需求方的能源使用,生成旨在控制攻击后果的应对措施,以确保具有弹性和经济效益的 CPES 运行。我们的方法可以确定这两个阶段的最优方案,同时考虑到问题的社会维度。一种独创的减灾模型采用抽象的表述方式,开发出一种风险中性模型,通过 KDR 描述网络攻击的特点,并结合社会计算技术,加强对网络威胁的理解和应对。与现有的几种方法相比,即使数据可用性有限,这种方法也能更有效地减轻影响。为了扩展这种风险中性模型,我们将条件风险值作为一种重要的风险度量,捕捉社会计算因素带来的不确定性和各种影响情景。实证结果证实,在 KDR 方法中加入社会计算因素后,该方法能产生具有弹性和经济效益的解决方案,用于管理网络攻击对 CPES 的影响。通过将社会计算原则纳入优化框架,可以更好地预测和解决与 CPES 网络攻击相关的社会和行为问题,最终提高系统响应措施的整体弹性和有效性。
{"title":"A social computing method for energy safety","authors":"Pengfei Zhao ,&nbsp;Shuangqi Li ,&nbsp;Zhidong Cao ,&nbsp;Paul Jen-Hwa Hu ,&nbsp;Daniel Dajun Zeng ,&nbsp;Da Xie ,&nbsp;Yichen Shen ,&nbsp;Jiangfeng Li ,&nbsp;Tianyi Luo","doi":"10.1016/j.jnlssr.2023.12.001","DOIUrl":"10.1016/j.jnlssr.2023.12.001","url":null,"abstract":"<div><p>Information and communication technologies enable the transformation of traditional energy systems into cyber-physical energy systems (CPESs), but such systems have also become popular targets of cyberattacks. Currently, available methods for evaluating the impacts of cyberattacks suffer from limited resilience, efficacy, and practical value. To mitigate their potentially disastrous consequences, this study suggests a two-stage, discrepancy-based optimization approach that considers both preparatory actions and response measures, integrating concepts from social computing. The proposed Kullback-Leibler divergence-based, distributionally robust optimization (KDR) method has a hierarchical, two-stage objective function that incorporates the operating costs of both system infrastructures (e.g., energy resources, reserve capacity) and real-time response measures (e.g., load shedding, demand-side management, electric vehicle charging station management). By incorporating social computing principles, the optimization framework can also capture the social behavior and interactions of energy consumers in response to cyberattacks. The preparatory stage entails day-ahead operational decisions, leveraging insights from social computing to model and predict the behaviors of individuals and communities affected by potential cyberattacks. The mitigation stage generates responses designed to contain the consequences of the attack by directing and optimizing energy use from the demand side, taking into account the social context and preferences of energy consumers, to ensure resilient, economically efficient CPES operations. Our method can determine optimal schemes in both stages, accounting for the social dimensions of the problem. An original disaster mitigation model uses an abstract formulation to develop a risk-neutral model that characterizes cyberattacks through KDR, incorporating social computing techniques to enhance the understanding and response to cyber threats. This approach can mitigate the impacts more effectively than several existing methods, even with limited data availability. To extend this risk-neutral model, we incorporate conditional value at risk as an essential risk measure, capturing the uncertainty and diverse impact scenarios arising from social computing factors. The empirical results affirm that the KDR method, which is enriched with social computing considerations, produces resilient, economically efficient solutions for managing the impacts of cyberattacks on a CPES. By integrating social computing principles into the optimization framework, it becomes possible to better anticipate and address the social and behavioral aspects associated with cyberattacks on CPESs, ultimately improving the overall resilience and effectiveness of the system's response measures.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 64-82"},"PeriodicalIF":0.0,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000021/pdfft?md5=ee0b546ba126233207f393bc1858e3fd&pid=1-s2.0-S2666449624000021-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139636635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Single image defogging via multi-exposure image fusion and detail enhancement 通过多曝光图像融合和细节增强实现单幅图像除雾
Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH Pub Date : 2023-12-22 DOI: 10.1016/j.jnlssr.2023.11.003
Wenjing Mao , Dezhi Zheng , Minze Chen , Juqiang Chen

Outdoor cameras play an important role in monitoring security and social governance. As a common weather phenomenon, haze can easily affect the quality of camera shooting, resulting in loss and distortion of image details. This paper proposes an improved multi-exposure image fusion defogging technique based on the artificial multi-exposure image fusion (AMEF) algorithm. First, the foggy image is adaptively exposed, and the fused image is subsequently obtained via multiple exposures. The fusion weight is determined by the saturation, contrast, and brightness. Finally, the image fused by a multi-scale Laplacian algorithm is enhanced with simple adaptive details to obtain a clearer defogging image. It is subjectively and objectively verified that this algorithm can obtain more image details and distinct picture colors without a priori information, effectively improving the defogging ability.

户外摄像机在监控安全和社会治理方面发挥着重要作用。雾霾作为一种常见的天气现象,很容易影响摄像机的拍摄质量,造成图像细节的丢失和失真。本文基于人工多重曝光图像融合(AMEF)算法,提出了一种改进的多重曝光图像融合除雾技术。首先,对雾图像进行自适应曝光,然后通过多次曝光获得融合图像。融合权重由饱和度、对比度和亮度决定。最后,利用多尺度拉普拉斯算法对融合后的图像进行简单的自适应细节增强,以获得更清晰的除雾图像。经过主观和客观的验证,该算法可以在没有先验信息的情况下获得更多的图像细节和鲜明的图像色彩,从而有效提高除雾能力。
{"title":"Single image defogging via multi-exposure image fusion and detail enhancement","authors":"Wenjing Mao ,&nbsp;Dezhi Zheng ,&nbsp;Minze Chen ,&nbsp;Juqiang Chen","doi":"10.1016/j.jnlssr.2023.11.003","DOIUrl":"10.1016/j.jnlssr.2023.11.003","url":null,"abstract":"<div><p>Outdoor cameras play an important role in monitoring security and social governance. As a common weather phenomenon, haze can easily affect the quality of camera shooting, resulting in loss and distortion of image details. This paper proposes an improved multi-exposure image fusion defogging technique based on the artificial multi-exposure image fusion (AMEF) algorithm. First, the foggy image is adaptively exposed, and the fused image is subsequently obtained via multiple exposures. The fusion weight is determined by the saturation, contrast, and brightness. Finally, the image fused by a multi-scale Laplacian algorithm is enhanced with simple adaptive details to obtain a clearer defogging image. It is subjectively and objectively verified that this algorithm can obtain more image details and distinct picture colors without a priori information, effectively improving the defogging ability.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 37-46"},"PeriodicalIF":0.0,"publicationDate":"2023-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449623000555/pdfft?md5=4f37c1a069f1184722bd5ba9365158c7&pid=1-s2.0-S2666449623000555-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139018021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
安全科学与韧性(英文)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1