804 research outputs found
Research on the Complexity Characteristics of Urban Metro Network Based on Complex Network Theory
It is to provide decision support for later planning of metro network. Firstly, the space-L method is used to model the metro network topology. Secondly, four different indicators are used to analyze the complexity of metro network. The results show that the degree of metro network nodes in Xuzhou is generally low, and the degree distribution and power distribution are quite different. The network has no scale network properties. In Xuzhou metro network, the path between random station pairs is long, and the degree of node aggregation is low. There is a positive correlation between degree and betweenness, which can make more accurate importance assessment of the site
Information fusion-based cybersecurity threat detection for intelligent transportation system
Intelligent Transportation Systems (ITS) are sophisticated systems that leverage various technologies to increase the safety, efficiency, and sustainability of transportation. By relying on wireless communication and data collected from diverse sensors, ITS is vulnerable to cybersecurity threats. With the increasing number of attacks on ITS worldwide, detecting and addressing cybersecurity threats has become critically important. This need will only intensify with the impending arrival of autonomous vehicles. One of the primary challenges is identifying critical ITS assets that require protection and understanding the vulnerabilities that cyber attackers can exploit. Additionally, creating a standard profile for ITS is challenging due to the dynamic traffic pattern, which exhibits changes in the movement of vehicles over time. To address these challenges, this paper proposes an information fusion-based cybersecurity threat detection method. Specifically, we employ the Kalman filter for noise reduction, Dempster-Shafer decision theory and Shannonâs entropy for assessing the probabilities of traffic conditions being normal, intruded, and uncertain. We utilised Simulation of Urban Mobility (SUMO) to simulate the Melbourne CBD map and historical traffic data from the Victorian transport authority. Our simulation results reveal that information fusion with three sensor data is more effective in detecting normal traffic conditions. On the other hand, for detecting anomalies, information fusion with two sensor data is more efficient
Reverse Intervention for Dealing with Malicious Information in Online Social Networks
Malicious information is often hidden in the massive data flow of online social networks. In âWe Media'' era, if the system is closed without intervention, malicious information may spread to the entire network quickly, which would cause severe economic and political losses. This paper adopts a reverse intervention strategy from the perspective of topology control, so that the spread of malicious information could be suppressed at a minimum cost. Noting that as the information spreads, social networks often present a community structure and multiple malicious information promoters may appear. Therefore, this paper adopts a divide and conquer strategy and proposes an intervention algorithm based on subgraph partitioning, in which we search for some influential nodes to block or release clarification. The main algorithm consists of two main phases. Firstly, a subgraph partitioning method based on community structure is given to quickly extract the community structure of the information dissemination network. Secondly, a node blocking and clarification publishing algorithm based on the Jordan Center is proposed in the obtained subgraphs. Experiments show that the proposed algorithm can effectively suppress the spread of malicious information with a low time complexity compared with the benchmark algorithms
The acceptability of counter-terrorism measures on urban mass transit in the UK
The security and safety of urban mass transit systems continues to draw a great deal of government, media and public attention.
The bombings in Madrid, London and Mumbai, suggest that new and âacceptableâ approaches to counterterrorism may become important components of how urban mass transit systems are designed and operated in the future.
Technical developments in security and counter-terrorism can provide a wide range of non-intrusive or overt design solutions to counter-terrorism.
However, in implementing these design solutions the whole system performance needs to be considered.
Undertaking qualitative research with a wide range of stakeholders (including the public, transit system designers and operators) the potential acceptability of certain technological approaches is assessed.
Analysis of the findings suggests five broad acceptability factors governed by five influence variables.
The acceptability factors include that counter-terrorism measures are more acceptable to transit designers and operators if they are tied in with complementary personal security and safety features, and are more acceptable to transit operators and the general public if they do not restrict the free flow of passengers through the transit network.
These perspectives are dependent upon influence variables including whether there was a recent attack on a UK transit system and the Governmentâs present âlevel of threatâ from terrorist attack.
The impact of these findings is discussed along with suggestions for future research into acceptable counter-terrorism measures for transport
Aeronautical Decision Making in Helicopter Emergency Medical Systems (HEMS): The Effect of Mission Orientation and Local Base Finances on the Go/No Go Decision
Helicopter Emergency Medical Services (HEMS) is among the most dangerous type of flying in the United States today. In 2008 it was safer to fly medical evacuation missions in Iraq and Afghanistan than in the Continental United States. This study is designed to test whether the financial performance of the local base and a hyper mission orientation have a negative effect on aeronautical decision making among HEMS crews. A Likert type survey was administered to HEMS pilots and medical crews to ascertain their thoughts and feelings regarding the two questions under investigation. While the data clearly showed that poor financial performance at the base level and an acute desire to complete the mission do not have a negative effect on aeronautical decision making among HEMS crews, it did reveal a distinct divide among attitudes between pilots and medical crews
ENERGY RESILIENCE IMPACT OF SUPPLY CHAIN NETWORK DISRUPTION TO MILITARY MICROGRIDS
The ability to provide uninterrupted power to military installations is paramount in executing a country's national defense strategy. Microgrid architectures increase installation energy resilience through redundant local generation sources and the capability for grid independence. However, deliberate attacks from near-peer competitors can disrupt the associated supply chain network, thereby affecting mission-critical loads. Utilizing an integrated discrete-time Markov chain and dynamic Bayesian network approach, we investigate disruption propagation throughout a supply chain network and quantify its mission impact on an islanded microgrid. We propose a novel methodology and an associated metric we term "energy resilience impact" to identify and address supply-chain disruption risks to energy security. A case study of a fictional military installation is presented to demonstrate how installation energy managers can adopt this methodology for the design and improvement of military microgrids.Outstanding ThesisLieutenant, United States NavyApproved for public release. Distribution is unlimited
Combat Network Synchronization of UCAV Formation Based on RTBA Model
The paper aims at developing an efficient method to acquire a proper UCAV formation structure with robust and synchronized features. Here we introduce the RTBA (Route Temporary Blindness Avoidance) model to keep the structure stable and the HPSO (hybrid particle swarm optimization) method is given to find an optimal synchronized formation. The major contributions include the following: (1) setting up the dynamic hierarchy topologic structure of UCAV formation; (2) the RTB phenomenon is described and the RTBA model is put forward; (3) the node choosing rules are used to keep the invulnerability of the formation and the detective information quantifying method is given to measure the effectiveness of the connected nodes; and (4) the hybrid particle swarm optimization method is given to find an optimal synchronized topologic structure. According to the related principles and models, the simulations are given in the end, and the results show that the simplification of the model is available in engineering, and the RTBA model is useful to solve the real problems in combat in some degree
Case For Consultation: A Managers Perspective
This research supports the hypothesis that consultation, team work and congruence is a strategy to reduce risk, and that effective consultation reduces the potential for outrage when things do not go to plan. The research sought the opinion of managers on these matters, and if they were aware of own-biases that undermine the effectiveness in which they engage, and of antidotes to such âhazardous thoughtsâ. To understand what influences consultation (âupwards listeningâ as such) we conducted 4 preliminary one-on-one interviews. We then surveyed a total of 20 senior managers and other stakeholders in the coal mining industry, in an on-line survey. 100% of respondents (17/17) believe that access to information improves chances of making a correct decision; 78% of respondents (13/17) believe that managers are conscious of a socially divide (class-stratification) from subordinates; 100% of respondents (17/17) believe that managers must consult with employees in order to reduce Occupational Health and Safety (OH&S) risk; 58% (11/19) believe that someone should be held to account for an OH&S disaster; 94% (15/16) believe that distributed decision making results in more resilient operations; 65% (11/17) agree that it is important for employees to have representatives to act as a channel of communication with management on safety and health matters; 71% (11/17) believe that elected safety and health representatives are likely to abuse their powers if they are a member of a union; 82% (14/17) believe that very close co-operation between mine managers, the Mines Inspectorate, and the workmen's inspectors reduces OH&S risk. The research demonstrated that managers are conscious of own-biases, and of behaviour that is capable of undermining consultation and system safety. Managers also understand why mismanagement of information can be promoted by others as prima-facie-evidence-of-neglect, or malfeasance, when disaster strikes. It is hypothesised that managers in safety system are akin to jurors in the judicial system; ethics apply, and both managers and jurors are expected to represent the interests of community, not themselves
Recommended from our members
A study of passengers' anxiety on the London Underground to help design its information environment
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonProvision of information has been used as a strategy to relive travel-related anxiety. This study is motivated by the successful attempts for reducing the anxiety. Although, passengersâ anxiety about using public transport (PT) has already been discussed, the London Underground passengersâ anxiety has rarely been a target of investigation in the academic literature. Anxiety associated with the Underground use is reported to be greater than other PT modes. Although the existing studies discussing PT passengersâ anxiety have attempted to provide solutions for anxiety reduction, few endeavours have been made to offer them based on the investigated causality between determinants of anxiety and its arousal. Thus, this study fills the gap by identifying antecedents, and verifying their effects on anxiety about the Underground use. This, in turn, furnishes theoretical grounds for designing content of information with an aim to relieve the anxiety in the circumstance that little data exists, which can be utilised for developing information for the purpose. To achieve the goal, two sets of phases have been engaged. First, a questionnaire (N=81) was conducted to identify anxiety triggers. The results revealed that they were other peopleâs anti-social behaviour, overcrowding, noise, and late-night travel. An expert group interview was carried out to investigate what efforts are made to support passengers in the anxiety inducing situations. Second, examination was performed to understand about the passengersâ anxiety based on theoretical knowledge about anxiety, and to determine its antecedents. A research model was formulated including six factors, perceived invulnerability, perceived physical ability, trust in other passengers (informal social control), confidence in the authorities, safety knowledge, and perceived uncontrollability. The effects were assessed through structural equation modelling, using questionnaire data (N=269). The results uncovered that perceived invulnerability, perceived physical ability, and confidence in the authorities have negative indirect effects on anxiety through perceived uncontrollability, and safety knowledge has a negative direct effect on anxiety. The confirmed anxiety buffering effects of the factors will be suggested to be used for developing content of information to help relieve the arousal. The study contributes to knowledge by identifying the determinants of the passengersâ anxiety, and testing their effects on anxiety, and to produce theoretical support to create service information environment which helps relieve the anxiety
- âŠ