期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A joint absorbing boundary for the multiple-relaxation-time lattice Boltzmann method in seismic acoustic wavefield modeling
1
作者 chun-tao jiang Hui Zhou +2 位作者 Mu-Ming Xia Han-Ming Chen Jin-Xuan Tang 《Petroleum Science》 SCIE EI CAS CSCD 2023年第4期2113-2126,共14页
Conventional seismic wave forward simulation generally uses mathematical means to solve the macroscopic wave equation,and then obtains the corresponding seismic wavefield.Usually,when the subsurface structure is finel... Conventional seismic wave forward simulation generally uses mathematical means to solve the macroscopic wave equation,and then obtains the corresponding seismic wavefield.Usually,when the subsurface structure is finely constructed and the continuity of media is poor,this strategy is difficult to meet the requirements of accurate wavefield calculation.This paper uses the multiple-relaxation-time lattice Boltzmann method(MRT-LBM)to conduct the seismic acoustic wavefield simulation and verify its computational accuracy.To cope with the problem of severe reflections at the truncated boundaries,we analogize the viscous absorbing boundary and perfectly matched layer(PML)absorbing boundary based on the single-relaxation-time lattice Boltzmann(SRT-LB)equation to the MRT-LB equation,and further,propose a joint absorbing boundary through comparative analysis.We give the specific forms of the modified MRT-LB equation loaded with the joint absorbing boundary in the two-dimensional(2D)and three-dimensional(3D)cases,respectively.Then,we verify the effects of this absorbing boundary scheme on a 2D homogeneous model,2D modified British Petroleum(BP)gas-cloud model,and 3D homogeneous model,respectively.The results reveal that by comparing with the viscous absorbing boundary and PML absorbing boundary,the joint absorbing boundary has the best absorption performance,although it is a little bit complicated.Therefore,this joint absorbing boundary better solves the problem of truncated boundary reflections of MRT-LBM in simulating seismic acoustic wavefields,which is pivotal to its wide application in the field of exploration seismology. 展开更多
关键词 Multiple-relaxation-time Lattice Boltzmann method Seismic acoustic wavefield simulation Truncated Boundary reflection Joint absorbing boundary
下载PDF
Enhancing security of NVM-based main memory with dynamic Feistel network mapping
2
作者 Fang-ting HUANG Dan FENG +5 位作者 Wen XIA Wen ZHOU Yu-cheng ZHANG Min FU chun-tao jiang Yu-kun ZHOU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第7期847-863,共17页
As promising alternatives in building future main memory systems, emerging non-volatile memory(NVM) technologies can increase memory capacity in a cost-effective and power-efficient way. However, NVM is facing securit... As promising alternatives in building future main memory systems, emerging non-volatile memory(NVM) technologies can increase memory capacity in a cost-effective and power-efficient way. However, NVM is facing security threats due to its limited write endurance: a malicious adversary can wear out the cells and cause the NVM system to fail quickly. To address this issue, several wear-leveling schemes have been proposed to evenly distribute write traffic in a security-aware manner. In this study, we present a new type of timing attack, remapping timing attack(RTA), based on information leakage from the remapping latency difference in NVM. Our analysis and experimental results show that RTA can cause three of the latest wear-leveling schemes(i.e., region-based start-gap,security refresh, and multi-way wear leveling) to lose their effectiveness in several days(even minutes), causing failure of NVM. To defend against such an attack, we further propose a novel wear-leveling scheme called the ‘security region-based start-gap(security RBSG)', which is a two-stage strategy using a dynamic Feistel network to enhance the simple start-gap wear leveling with level-adjustable security assurance. The theoretical analysis and evaluation results show that the proposed security RBSG not only performs well when facing traditional malicious attacks, but also better defends against RTA. 展开更多
关键词 安全威胁 NVM 网络 存储器系统 记忆 安全保证 RTA 攻击
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部