804 research outputs found

    Research on the Complexity Characteristics of Urban Metro Network Based on Complex Network Theory

    Get PDF
    It is to provide decision support for later planning of metro network. Firstly, the space-L method is used to model the metro network topology. Secondly, four different indicators are used to analyze the complexity of metro network. The results show that the degree of metro network nodes in Xuzhou is generally low, and the degree distribution and power distribution are quite different. The network has no scale network properties. In Xuzhou metro network, the path between random station pairs is long, and the degree of node aggregation is low. There is a positive correlation between degree and betweenness, which can make more accurate importance assessment of the site

    Information fusion-based cybersecurity threat detection for intelligent transportation system

    Get PDF
    Intelligent Transportation Systems (ITS) are sophisticated systems that leverage various technologies to increase the safety, efficiency, and sustainability of transportation. By relying on wireless communication and data collected from diverse sensors, ITS is vulnerable to cybersecurity threats. With the increasing number of attacks on ITS worldwide, detecting and addressing cybersecurity threats has become critically important. This need will only intensify with the impending arrival of autonomous vehicles. One of the primary challenges is identifying critical ITS assets that require protection and understanding the vulnerabilities that cyber attackers can exploit. Additionally, creating a standard profile for ITS is challenging due to the dynamic traffic pattern, which exhibits changes in the movement of vehicles over time. To address these challenges, this paper proposes an information fusion-based cybersecurity threat detection method. Specifically, we employ the Kalman filter for noise reduction, Dempster-Shafer decision theory and Shannon’s entropy for assessing the probabilities of traffic conditions being normal, intruded, and uncertain. We utilised Simulation of Urban Mobility (SUMO) to simulate the Melbourne CBD map and historical traffic data from the Victorian transport authority. Our simulation results reveal that information fusion with three sensor data is more effective in detecting normal traffic conditions. On the other hand, for detecting anomalies, information fusion with two sensor data is more efficient

    Reverse Intervention for Dealing with Malicious Information in Online Social Networks

    Get PDF
    Malicious information is often hidden in the massive data flow of online social networks. In “We Media'' era, if the system is closed without intervention, malicious information may spread to the entire network quickly, which would cause severe economic and political losses. This paper adopts a reverse intervention strategy from the perspective of topology control, so that the spread of malicious information could be suppressed at a minimum cost. Noting that as the information spreads, social networks often present a community structure and multiple malicious information promoters may appear. Therefore, this paper adopts a divide and conquer strategy and proposes an intervention algorithm based on subgraph partitioning, in which we search for some influential nodes to block or release clarification. The main algorithm consists of two main phases. Firstly, a subgraph partitioning method based on community structure is given to quickly extract the community structure of the information dissemination network. Secondly, a node blocking and clarification publishing algorithm based on the Jordan Center is proposed in the obtained subgraphs. Experiments show that the proposed algorithm can effectively suppress the spread of malicious information with a low time complexity compared with the benchmark algorithms

    The acceptability of counter-terrorism measures on urban mass transit in the UK

    Get PDF
    The security and safety of urban mass transit systems continues to draw a great deal of government, media and public attention. The bombings in Madrid, London and Mumbai, suggest that new and “acceptable” approaches to counterterrorism may become important components of how urban mass transit systems are designed and operated in the future. Technical developments in security and counter-terrorism can provide a wide range of non-intrusive or overt design solutions to counter-terrorism. However, in implementing these design solutions the whole system performance needs to be considered. Undertaking qualitative research with a wide range of stakeholders (including the public, transit system designers and operators) the potential acceptability of certain technological approaches is assessed. Analysis of the findings suggests five broad acceptability factors governed by five influence variables. The acceptability factors include that counter-terrorism measures are more acceptable to transit designers and operators if they are tied in with complementary personal security and safety features, and are more acceptable to transit operators and the general public if they do not restrict the free flow of passengers through the transit network. These perspectives are dependent upon influence variables including whether there was a recent attack on a UK transit system and the Government’s present ‘level of threat’ from terrorist attack. The impact of these findings is discussed along with suggestions for future research into acceptable counter-terrorism measures for transport

    Study on the application of information technology in inland maritime supervision

    Get PDF

    Aeronautical Decision Making in Helicopter Emergency Medical Systems (HEMS): The Effect of Mission Orientation and Local Base Finances on the Go/No Go Decision

    Get PDF
    Helicopter Emergency Medical Services (HEMS) is among the most dangerous type of flying in the United States today. In 2008 it was safer to fly medical evacuation missions in Iraq and Afghanistan than in the Continental United States. This study is designed to test whether the financial performance of the local base and a hyper mission orientation have a negative effect on aeronautical decision making among HEMS crews. A Likert type survey was administered to HEMS pilots and medical crews to ascertain their thoughts and feelings regarding the two questions under investigation. While the data clearly showed that poor financial performance at the base level and an acute desire to complete the mission do not have a negative effect on aeronautical decision making among HEMS crews, it did reveal a distinct divide among attitudes between pilots and medical crews

    ENERGY RESILIENCE IMPACT OF SUPPLY CHAIN NETWORK DISRUPTION TO MILITARY MICROGRIDS

    Get PDF
    The ability to provide uninterrupted power to military installations is paramount in executing a country's national defense strategy. Microgrid architectures increase installation energy resilience through redundant local generation sources and the capability for grid independence. However, deliberate attacks from near-peer competitors can disrupt the associated supply chain network, thereby affecting mission-critical loads. Utilizing an integrated discrete-time Markov chain and dynamic Bayesian network approach, we investigate disruption propagation throughout a supply chain network and quantify its mission impact on an islanded microgrid. We propose a novel methodology and an associated metric we term "energy resilience impact" to identify and address supply-chain disruption risks to energy security. A case study of a fictional military installation is presented to demonstrate how installation energy managers can adopt this methodology for the design and improvement of military microgrids.Outstanding ThesisLieutenant, United States NavyApproved for public release. Distribution is unlimited

    Combat Network Synchronization of UCAV Formation Based on RTBA Model

    Get PDF
    The paper aims at developing an efficient method to acquire a proper UCAV formation structure with robust and synchronized features. Here we introduce the RTBA (Route Temporary Blindness Avoidance) model to keep the structure stable and the HPSO (hybrid particle swarm optimization) method is given to find an optimal synchronized formation. The major contributions include the following: (1) setting up the dynamic hierarchy topologic structure of UCAV formation; (2) the RTB phenomenon is described and the RTBA model is put forward; (3) the node choosing rules are used to keep the invulnerability of the formation and the detective information quantifying method is given to measure the effectiveness of the connected nodes; and (4) the hybrid particle swarm optimization method is given to find an optimal synchronized topologic structure. According to the related principles and models, the simulations are given in the end, and the results show that the simplification of the model is available in engineering, and the RTBA model is useful to solve the real problems in combat in some degree

    Case For Consultation: A Managers Perspective

    Get PDF
    This research supports the hypothesis that consultation, team work and congruence is a strategy to reduce risk, and that effective consultation reduces the potential for outrage when things do not go to plan. The research sought the opinion of managers on these matters, and if they were aware of own-biases that undermine the effectiveness in which they engage, and of antidotes to such “hazardous thoughts”. To understand what influences consultation (“upwards listening” as such) we conducted 4 preliminary one-on-one interviews. We then surveyed a total of 20 senior managers and other stakeholders in the coal mining industry, in an on-line survey. 100% of respondents (17/17) believe that access to information improves chances of making a correct decision; 78% of respondents (13/17) believe that managers are conscious of a socially divide (class-stratification) from subordinates; 100% of respondents (17/17) believe that managers must consult with employees in order to reduce Occupational Health and Safety (OH&S) risk; 58% (11/19) believe that someone should be held to account for an OH&S disaster; 94% (15/16) believe that distributed decision making results in more resilient operations; 65% (11/17) agree that it is important for employees to have representatives to act as a channel of communication with management on safety and health matters; 71% (11/17) believe that elected safety and health representatives are likely to abuse their powers if they are a member of a union; 82% (14/17) believe that very close co-operation between mine managers, the Mines Inspectorate, and the workmen's inspectors reduces OH&S risk. The research demonstrated that managers are conscious of own-biases, and of behaviour that is capable of undermining consultation and system safety. Managers also understand why mismanagement of information can be promoted by others as prima-facie-evidence-of-neglect, or malfeasance, when disaster strikes. It is hypothesised that managers in safety system are akin to jurors in the judicial system; ethics apply, and both managers and jurors are expected to represent the interests of community, not themselves
    • 

    corecore