期刊文献+
共找到60篇文章
< 1 2 3 >
每页显示 20 50 100
A Survey on Channel Measurements and Models for Underground MIMO Communication Systems
1
作者 Asad Saleem Yejun He +1 位作者 Guoxin Zheng Zhining Chen 《China Communications》 SCIE CSCD 2023年第8期103-119,共17页
The high reliability of the communication system is critical in metro and mining applications for personal safety,channel optimization,and improving operational performance.This paper surveys the progress of wireless ... The high reliability of the communication system is critical in metro and mining applications for personal safety,channel optimization,and improving operational performance.This paper surveys the progress of wireless communication systems in underground environments such as tunnels and mines from 1920 to 2022,including the evolution of primitive technology,advancements in channel modelling,and realization of various wireless propagation channels.In addition,the existing and advanced channel modeling strategies,which include the evolution of different technologies and their applications;mathematical,analytical,and experimental techniques for radio propagation;and significance of the radiation characteristics,antenna placement,and physical environment of multiple-input multiple-output(MIMO)communication systems,are analyzed.The given study introduces leaky coaxial cable(LCX)and distributed antenna system(DAS)designs for improving narrowband and wideband channel capacity.The paper concludes by figuring out open research areas for the future technologies. 展开更多
关键词 leaky coaxial cable(LCX) long-term evolution for metro(LTE-M) multiple-input multipleoutput(MIMO)systems propagation modeling
下载PDF
Mechanical characteristics and reservoir stimulation mechanisms of the Gulong shale oil reservoirs, the northern Songliao Basin
2
作者 Si-Wei Meng Jia-Ping Tao +6 位作者 Tian-Jiao Li Dong-Xu Li Su-Ling Wang Liu Yang Xin Liu Li-Hao Liang He Liu 《Petroleum Science》 SCIE EI CAS CSCD 2024年第3期2023-2036,共14页
Shale oil of the Qingshankou Formation of the Gulong Sag,the northern Songliao Basin,represents the first attempt at large-scale development of pure-shale-type shale oil in China.By integrating the multiscale refined ... Shale oil of the Qingshankou Formation of the Gulong Sag,the northern Songliao Basin,represents the first attempt at large-scale development of pure-shale-type shale oil in China.By integrating the multiscale refined reservoir characterization with macro-micro-scale mechanical testing,it is clarified that the Gulong shale is characterized by high clay mineral content,high rock plasticity,highly-developed bedding,and prominent mechanical anisotropy.A three-dimensional(3D)fracture propagation model of hydraulic fracturing was built for the Gulong shale,which fully captures the hydraulic fracture distribution pattern affected by the high bedding density,in-situ stress,and fracturing treatment parameters.Our research showed that due to influences of bedding,hydraulic fracturing in the Gulong shale forms a complex fracture morphology featuring the main fracture with multiple perpendicular branches that have different lengths(like the outdoor directional TV antenna);however,the vertical propagation of fractures is inhibited,and the fracture height is commonly less than 10 m.The limited stimulated reservoir volume(SRV)is the main problem facing the fracturing stimulation of the Gulong shale oil.Bedding density has vital effects on fracture morphology,so case-specific fracturing designs shall be developed for shale intervals with different bedding development degrees.For reservoirs with welldeveloped bedding,it is suggested to properly increase the perforation cluster spacing and raise the volume and proportions of viscous fluids of the pad,so as to effectively promote vertical fracture propagation and improve reservoir stimulation performance.This study integrates multi-scale fine reservoir characterization and macro-micro-scale mechanical testing,as well as the construction and numerical simulation of hydraulic fracturing models for high-density layered shale reservoirs,providing a new approach and methodological framework for the fracturing research of high-density layered shale reservoirs. 展开更多
关键词 Shale oil Hydraulic fracturing High bedding density Fracture propagation model
下载PDF
SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks
3
作者 Jiehao Ye Wen Cheng +3 位作者 Xiaolong Liu Wenyi Zhu Xuan’ang Wu Shigen Shen 《Computers, Materials & Continua》 SCIE EI 2024年第5期2743-2769,共27页
The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which ... The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which brings about large-scale data processing requirements,edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions.However,the defense mechanism of Edge Computing-enabled IoT Nodes(ECIoTNs)is still weak due to their limited resources,so that they are susceptible to malicious software spread,which can compromise data confidentiality and network service availability.Facing this situation,we put forward an epidemiology-based susceptible-curb-infectious-removed-dead(SCIRD)model.Then,we analyze the dynamics of ECIoTNs with different infection levels under different initial conditions to obtain the dynamic differential equations.Additionally,we establish the presence of equilibrium states in the SCIRD model.Furthermore,we conduct an analysis of the model’s stability and examine the conditions under which malicious software will either spread or disappear within Edge Computing-enabled IoT(ECIoT)networks.Lastly,we validate the efficacy and superiority of the SCIRD model through MATLAB simulations.These research findings offer a theoretical foundation for suppressing the propagation of malicious software in ECIoT networks.The experimental results indicate that the theoretical SCIRD model has instructive significance,deeply revealing the principles of malicious software propagation in ECIoT networks.This study solves a challenging security problem of ECIoT networks by determining the malicious software propagation threshold,which lays the foundation for buildingmore secure and reliable ECIoT networks. 展开更多
关键词 Edge computing Internet of Things malicious software propagation model HETEROGENEITY
下载PDF
How the Information and Communications Technology Threaten Our Privacy: The Case of Email and P2P Propagation Models 被引量:1
4
作者 Han-Wei Hsiao Cathy S. Lin Kun-Yu Chert 《Computer Technology and Application》 2011年第10期765-773,共9页
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat... With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy. 展开更多
关键词 Information privacy propagation model EMAIL peer-to-peer (P2P)
下载PDF
An Improved Coupling of Numerical and Physical Models for Simulating Wave Propagation 被引量:1
5
作者 阳志文 柳淑学 李金宣 《China Ocean Engineering》 SCIE EI CSCD 2014年第1期1-16,共16页
An improved coupling of numerical and physical models for simulating 2D wave propagation is developed in this paper. In the proposed model, an unstructured finite element model (FEM) based Boussinesq equations is ap... An improved coupling of numerical and physical models for simulating 2D wave propagation is developed in this paper. In the proposed model, an unstructured finite element model (FEM) based Boussinesq equations is applied for the numerical wave simulation, and a 2D piston-type wavemaker is used for the physical wave generation. An innovative scheme combining fourth-order Lagrange interpolation and Runge-Kutta scheme is described for solving the coupling equation. A Transfer function modulation method is presented to minimize the errors induced from the hydrodynamic invalidity of the coupling model and/or the mechanical capability of the wavemaker in area where nonlinearities or dispersion predominate. The overall performance and applicability of the coupling model has been experimentally validated by accounting for both regular and irregular waves and varying bathymetry. Experimental results show that the proposed numerical scheme and transfer function modulation method are efficient for the data transfer from the numerical model to the physical model up to a deterministic level. 展开更多
关键词 coupling numerical model physical model wave propagation transfer function modulation
下载PDF
Research on the Propagation Models and Defense Techniques of Internet Worms
6
作者 Tian-Yun Huang 《Journal of Electronic Science and Technology of China》 2008年第1期32-38,共7页
Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give... Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out. 展开更多
关键词 Defense system Internet worm network security propagation model
下载PDF
Non-LOS target localization via millimeter-wave automotive radar
7
作者 LIU Zhaoyu ZHANG Wenli +4 位作者 ZHENG Jingyue GUO Shisheng CUI Guolong KONG Lingjiang LIANG Kun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第5期1171-1181,共11页
This paper considers the non-line-of-sight(NLOS)vehicle localization problem by using millimeter-wave(MMW)automotive radar.Several preliminary attempts for NLOS vehicle detection are carried out and achieve good resul... This paper considers the non-line-of-sight(NLOS)vehicle localization problem by using millimeter-wave(MMW)automotive radar.Several preliminary attempts for NLOS vehicle detection are carried out and achieve good results.Firstly,an electromagnetic(EM)wave NLOS multipath propagation model for vehicle scene is established.Subsequently,with the help of available multipath echoes,a complete NLOS vehicle localiza-tion algorithm is proposed.Finally,simulation and experimental results validate the effectiveness of the established EM wave propagation model and the proposed NLOS vehicle localization algorithm. 展开更多
关键词 millimeter-wave(MMW)automotive radar multipath propagation model non-line-of-sight(NLOS)vehicle localization
下载PDF
A Rigorous Analysis of Vehicle-to-Vehicle Range Performance in a Rural Channel Propagation Scenario as a Function of Antenna Type and Location via Simulation and Field Trails
8
作者 Ran Liu Daniel N.Aloi 《China Communications》 SCIE CSCD 2023年第11期131-141,共11页
Vehicle-to-Everything(V2X) communications will be an essential part of the technology in future autonomous drive decision systems.A fundamental procedure is to establish a robust communication channel between end-to-e... Vehicle-to-Everything(V2X) communications will be an essential part of the technology in future autonomous drive decision systems.A fundamental procedure is to establish a robust communication channel between end-to-end devices.Due to the antenna placed at different positions on vehicles,the existing cellular electro-magnetic(EM) wave propagation modelling does not fit properly for V2X direct communication application.In order to figure out a feasible understanding of this problem,this paper focuses on the propagation channel analysis in a rural Vehicle-to-Vehicle(V2V) scenario for vehicular communication with antenna position experiments at different heights.By adopting the ray-tracing algorithm,a rural scenario simulation model is built up via the use of a commercial-off-the-shelf(COTS) EM modelling software package,that computes the path loss received power and delay spread for a given propagation channel.Next,a real-world vehicle measurement campaign was performed to verify the simulation results.The simulated and measured receiver power was in good agreement with each other,and the results of this study considered two antenna types located at three different relative heights between the two vehicles.This research provides constructive guidance for the V2V antenna characteristics,antenna placement and vehicle communication channel analysis. 展开更多
关键词 antenna simulation and measurement propagation channel modeling ray-tracing simula-tion V2V scenario propagation
下载PDF
Combining the genetic algorithms with artificial neural networks for optimization of board allocating 被引量:2
9
作者 曹军 张怡卓 岳琪 《Journal of Forestry Research》 SCIE CAS CSCD 2003年第1期87-88,共2页
This paper introduced the Genetic Algorithms (GAs) and Artificial Neural Networks (ANNs), which have been widely used in optimization of allocating. The combination way of the two optimizing algorithms was used in boa... This paper introduced the Genetic Algorithms (GAs) and Artificial Neural Networks (ANNs), which have been widely used in optimization of allocating. The combination way of the two optimizing algorithms was used in board allocating of furniture production. In the experiment, the rectangular flake board of 3650 mm 1850 mm was used as raw material to allocate 100 sets of Table Bucked. The utilizing rate of the board reached 94.14 % and the calculating time was only 35 s. The experiment result proofed that the method by using the GA for optimizing the weights of the ANN can raise the utilizing rate of the board and can shorten the time of the design. At the same time, this method can simultaneously searched in many directions, thus greatly in-creasing the probability of finding a global optimum. 展开更多
关键词 Artificial neural network Genetic algorithms Back propagation model (BP model) OPTIMIZATION
下载PDF
Crack evolution behavior of rocks under confining pressures and its propagation model before peak stress 被引量:10
10
作者 ZUO Jian-ping CHEN Yan LIU Xiao-li 《Journal of Central South University》 SCIE EI CAS CSCD 2019年第11期3045-3056,共12页
The understanding of crack propagation characteristics and law of rocks during the loading process is of great significance for the exploitation and support of rock engineering.In this study,the crack propagation beha... The understanding of crack propagation characteristics and law of rocks during the loading process is of great significance for the exploitation and support of rock engineering.In this study,the crack propagation behavior of rocks in triaxial compression tests was investigated in detail.The main conclusions were as follows:1)According to the evolution characteristics of crack axial strain,the differential stress?strain curve of rocks under triaxial compressive condition can be divided into three phases which are linear elastic phase,crack propagation phase,post peak phase,respectively;2)The proposed models are applied to comparison with the test data of rocks under triaxial compressive condition and different temperatures.The theoretical data calculated by the models are in good agreement with the laboratory data,indicating that the proposed model can be applied to describing the crack propagation behavior and the nonlinear properties of rocks under triaxial compressive condition;3)The inelastic compliance and crack initiation strain in the proposed model have a decrease trend with the increase of confining pressure and temperature.Peak crack axial strain increases nonlinearly with the inelastic compliance and the increase rate increases gradually.Crack initiation strain has a linear relation with peak crack axial strain. 展开更多
关键词 crack strain crack propagation behavior crack propagation model stress strain relationship
下载PDF
The estimation of lower refractivity uncertainty from radar sea clutter using the Bayesian-MCMC method 被引量:6
11
作者 盛峥 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第2期580-585,共6页
The estimation of lower atmospheric refractivity from radar sea clutter(RFC) is a complicated nonlinear optimization problem.This paper deals with the RFC problem in a Bayesian framework.It uses the unbiased Markov ... The estimation of lower atmospheric refractivity from radar sea clutter(RFC) is a complicated nonlinear optimization problem.This paper deals with the RFC problem in a Bayesian framework.It uses the unbiased Markov Chain Monte Carlo(MCMC) sampling technique,which can provide accurate posterior probability distributions of the estimated refractivity parameters by using an electromagnetic split-step fast Fourier transform terrain parabolic equation propagation model within a Bayesian inversion framework.In contrast to the global optimization algorithm,the Bayesian-MCMC can obtain not only the approximate solutions,but also the probability distributions of the solutions,that is,uncertainty analyses of solutions.The Bayesian-MCMC algorithm is implemented on the simulation radar sea-clutter data and the real radar seaclutter data.Reference data are assumed to be simulation data and refractivity profiles are obtained using a helicopter.The inversion algorithm is assessed(i) by comparing the estimated refractivity profiles from the assumed simulation and the helicopter sounding data;(ii) the one-dimensional(1D) and two-dimensional(2D) posterior probability distribution of solutions. 展开更多
关键词 refractivity from clutter terrain parabolic equation propagation model Bayesian-Markov chain Monte Carlo uncertainty analysis
下载PDF
Experimental and modelling study of the solubility of CO_2 in various CaCl_2 solutions at different temperatures and pressures 被引量:3
12
作者 Alireza Bastami Mohammad Allahgholi Peyman Pourafshary 《Petroleum Science》 SCIE CAS CSCD 2014年第4期569-577,共9页
Study of the thermodynamic behaviour of CaCl2-H2O-CO2 systems is important in different scientific areas in the chemical and petroleum engineering fields. For example, a system including salt- H20-CO2 is a common syst... Study of the thermodynamic behaviour of CaCl2-H2O-CO2 systems is important in different scientific areas in the chemical and petroleum engineering fields. For example, a system including salt- H20-CO2 is a common system in CO2 geological storage. During carbonate matrix acidizing, this mixture also appears as the spent acid. Hence, study of the behaviour of this system and the solubility of CO2 in CaCl2 brine in different thermodynamic conditions is critical. In this study, CO2 solubility in 0, 1.90 and 4.80 mol/L CaCl2 solutions at 328.15 to 375.15 K and 68.9 to 206.8 bar were measured. These values are normal for oil reservoirs. A popular thermodynamic model is available in the literature for estimating the CO2 solubility in pure water and NaC1 solutions. In this paper, the available model was modified by experimental work to be applicable for CaCl2 as well. Based on the measured data, the component interaction parameters in the base model were adjusted for a CaCl2-H2O-CO2 system. The developed model could predict CO2 solubility in different conditions with remarkable accuracy, particularly for high concentration solutions and at high pressures. This improvement is up to 65% better than in the base model. This model can be used in Darcy scale models for predicting wormhole propagation during carbonate matrix acidizing. 展开更多
关键词 Solubility of CO2-CaCl2 carbonate acidizing spent acid wormhole propagation modelling solubility measurement
下载PDF
Correlation and trust mechanism-based rumor propagation model in complex social networks 被引量:4
13
作者 Xian-Li Sun You-Guo Wang Lin-Qing Cang 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第5期88-100,共13页
In real life, the rumor propagation is influenced by many factors. The complexity and uncertainty of human psychology make the diffusion model more challenging to depict. In order to establish a comprehensive propagat... In real life, the rumor propagation is influenced by many factors. The complexity and uncertainty of human psychology make the diffusion model more challenging to depict. In order to establish a comprehensive propagation model, in this paper, we take some psychological factors into consideration to mirror rumor propagation. Firstly, we use the Ridenour model to combine the trust mechanism with the correlation mechanism and propose a modified rumor propagation model. Secondly, the mean-field equations which describe the dynamics of the modified SIR model on homogenous and heterogeneous networks are derived. Thirdly, a steady-state analysis is conducted for the spreading threshold and the final rumor size. Fourthly, we investigate rumor immunization strategies and obtain immunization thresholds. Next, simulations on different networks are carried out to verify the theoretical results and the effectiveness of the immunization strategies.The results indicate that the utilization of trust and correlation mechanisms leads to a larger final rumor size and a smaller terminal time. Moreover, different immunization strategies have disparate effectiveness in rumor propagation. 展开更多
关键词 rumor propagation model Ridenour model immunization strategy
下载PDF
Deep Learning Applications for COVID-19 Analysis:A State-of-the-Art Survey 被引量:2
14
作者 Wenqian Li Xing Deng +1 位作者 Haijian Shao Xia Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第10期65-98,共34页
The COVID-19 has resulted in catastrophic situation and the deaths of millions of people all over the world.In this paper,the predictions of epidemiological propagation models,such as SIR and SEIR,are introduced to an... The COVID-19 has resulted in catastrophic situation and the deaths of millions of people all over the world.In this paper,the predictions of epidemiological propagation models,such as SIR and SEIR,are introduced to analyze the earlier COVID-19 propagation.The deep learning methods combined with transfer learning are familiar with classification-detection approaches based on chest X-ray and CT images are presented in detail.Besides,deep learning approaches have also been applied to lung ultrasound(LUS),which has been shown to be more sensitive than chest X-ray and CT images in detecting COVID-19.In the absence of a vaccine,the machine learning-related approaches are applied to analyze vaccine candidates in the realm of biology and medicine.The telehealth system played a major role in combating the pandemic from all aspects and reducing contact with patients during this period.Natural language processing-related methods are utilized to analyze tweets related to the COVID-19 epidemic on social media,and further analyze public sentiment and subject modeling,so as to arrange corresponding measures to appease public sentiment.In particular,this survey is to summarize and analyze the contributions made in various fields during the COVID-19 pandemic by considering both the contribution of deep learning in chest X-ray and CT images,as well as the application of the latest LUS during the COVID-19 pandemic.Telehealth and the importance of public sentiment analysis during a pandemic were also described in detail. 展开更多
关键词 COVID-19 epidemiological propagation models deep learning transfer learning classification-detection lung ultrasound telehealth system
下载PDF
New model of propagation rates of long crack due to structure fatigue 被引量:2
15
作者 刘建涛 杜平安 +1 位作者 黄明镜 周晴 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2009年第5期575-584,共10页
By comparison of the characteristics of existing models for long fatigue crack propagation rates, a new model, called the generalized passivation-lancet model for long fatigue crack propagation rates (GPLFCPR), and ... By comparison of the characteristics of existing models for long fatigue crack propagation rates, a new model, called the generalized passivation-lancet model for long fatigue crack propagation rates (GPLFCPR), and a general formula for characterizing the process of crack growth rates are proposed based on the passivation-lancet theory. The GPLFCPR model overcomes disadvantages of the existing models and can describe the rules of the entire fatigue crack growth process from the cracking threshold to the critical fracturing point effectively with explicit physical meaning. It also reflects the influence of material characteristics, such as strength parameters, fracture parameters and heat treatment. Experimental results obtained by testing LZ50 steel, AlZnMgCu0.5, 0.5Cr0.5Mo0.25V steel, etc., show good consistency with the new model. The GPLFCPR model is valuable in theoretical research and practical applications. 展开更多
关键词 long fatigue crack THRESHOLD cyclic stress ratio fracture roughness propagation model
下载PDF
Numerical Simulations for Stochastic Computer Virus Propagation Model 被引量:2
16
作者 Muhammad Shoaib Arif Ali Raza +4 位作者 Muhammad Rafiq Mairaj Bibi Javeria Nawaz Abbasi Amna Nazeer Umer Javed 《Computers, Materials & Continua》 SCIE EI 2020年第1期61-77,共17页
We are presenting the numerical simulations for the stochastic computer virus propagation model in this manuscript.We are comparing the solutions of stochastic and deterministic computer virus models.Outcomes of a thr... We are presenting the numerical simulations for the stochastic computer virus propagation model in this manuscript.We are comparing the solutions of stochastic and deterministic computer virus models.Outcomes of a threshold number R0 hold in stochastic computer virus model.If R_(0)<1 then in such a condition virus controlled in the computer population while R_(0)>1 shows virus rapidly spread in the computer population.Unfortunately,stochastic numerical techniques fail to cope with large step sizes of time.The suggested structure of the stochastic non-standard finite difference technique can never violate the dynamical properties.On this basis,we can suggest a collection of strategies for removing virus’s propagation in the computer population. 展开更多
关键词 Computer virus propagation model Stochastic modelling Stochastic processes Stochastic techniques Convergence analysis
下载PDF
Malicious Code Modeling and Analysis in Weighted Scale-Free Networks 被引量:2
17
作者 WANG Changguang WANG Fangwei +1 位作者 ZHANG Yangkai MA Jianfengi 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期51-54,共4页
We study the detailed malicious code propagating process in scale-free networks with link weights that denotes traffic between two nodes. It is found that the propagating velocity reaches a peak rapidly then decays in... We study the detailed malicious code propagating process in scale-free networks with link weights that denotes traffic between two nodes. It is found that the propagating velocity reaches a peak rapidly then decays in a power-law form, which is different from the well-known result in unweighted network case. Simulation results show that the nodes with larger strength are preferential to be infected, but the hierarchical dynamics are not clearly found. The simulation results also show that larger dispersion of weight of networks leads to slower propagating, which indicates that malicious code propagates more quickly in unweighted scale-free networks than in weighted scale-free networks under the same condition. These results show that not only the topology of networks but also the link weights affect the malicious propagating process. 展开更多
关键词 malicious code weighted scale-free networks propagation model
下载PDF
Propagation modeling of ocean-scattered low-elevation GPS signals for maritime tropospheric duct inversion 被引量:1
18
作者 张金鹏 吴振森 +2 位作者 赵振维 张玉生 王波 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第10期600-613,共14页
The maritime tropospheric duct is a low-altitude anomalous refractivity structure over the ocean surface,and it can significantly affect the performance of many shore-based/shipboard radar and communication systems.We... The maritime tropospheric duct is a low-altitude anomalous refractivity structure over the ocean surface,and it can significantly affect the performance of many shore-based/shipboard radar and communication systems.We propose the idea that maritime tropospheric ducts can be retrieved from ocean forward-scattered low-elevation global positioning system(GPS) signals.Retrieval is accomplished by matching the measured power patterns of the signals to those predicted by the forward propagation model as a function of the modified refractivity profile.On the basis of a parabolic equation method and bistatic radar equation,we develop such a forward model for computing the trapped propagation characteristics of an ocean forward-scattered GPS signal within a tropospheric duct.A new GPS scattering initial field is defined for this model to start the propagation modeling.A preliminary test on the performance of this model is conducted using measured data obtained from a 2009-experiment in the South China Sea.Results demonstrate that this model can predict GPS propagation characteristics within maritime tropospheric ducts and serve as a forward model for duct inversion. 展开更多
关键词 global positioning system ocean surface scattering propagation modeling tropospheric duct inversion
下载PDF
Direct immune-SCIR public-opinion propagation model based on real-time online users 被引量:1
19
作者 Yun-Ming Wang Tian-Yi Guo +1 位作者 Wei-Dong Li Bo Chen 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第10期131-142,共12页
Current public-opinion propagation research usually focused on closed network topologies without considering the fluctuation of the number of network users or the impact of social factors on propagation. Thus, it rema... Current public-opinion propagation research usually focused on closed network topologies without considering the fluctuation of the number of network users or the impact of social factors on propagation. Thus, it remains difficult to accurately describe the public-opinion propagation rules of social networks. In order to study the rules of public opinion spread on dynamic social networks, by analyzing the activity of social-network users and the regulatory role of relevant departments in the spread of public opinion, concepts of additional user and offline rates are introduced, and the direct immune-susceptible, contacted, infected, and refractory (DI-SCIR) public-opinion propagation model based on real-time online users is established. The interventional force of relevant departments, credibility of real information, and time of intervention are considered, and a public-opinion propagation control strategy based on direct immunity is proposed. The equilibrium point and the basic reproduction number of the model are theoretically analyzed to obtain boundary conditions for public-opinion propagation. Simulation results show that the new model can accurately reflect the propagation rules of public opinion. When the basic reproduction number is less than 1, public opinion will eventually disappear in the network. Social factors can significantly influence the time and scope of public opinion spread on social networks. By controlling social factors, relevant departments can analyze the rules of public opinion spread on social networks to suppress the propagate of negative public opinion and provide a powerful tool to ensure security and stability of society. 展开更多
关键词 public opinion propagation model direct immunization real-time online users basic reproduction number
下载PDF
Science Letters:Model for cascading failures in congested Internet 被引量:1
20
作者 Jian WANG Yan-heng LIU +1 位作者 Jian-qi ZHU Yu JIAO 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第10期1331-1335,共5页
Cascading failures often occur in congested networks such as the Internet. A cascading failure can be described as a three-phase process: generation, diffusion, and dissipation of the congestion. In this account, we ... Cascading failures often occur in congested networks such as the Internet. A cascading failure can be described as a three-phase process: generation, diffusion, and dissipation of the congestion. In this account, we present a function that represents the extent of congestion on a given node. This approach is different from existing fimctions based on betweenness centrality. By introducing the concept of 'delay time', we designate an intergradation between permanent removal and nonremoval. We also construct an evaluation fimction of network efficiency, based on congestion, which measures the damage caused by cascading failures. Finally, we investigate the effects of network structure and size, delay time, processing ability and packet generation speed on congestion propagation. Also, we uncover the relationship between the cascade dynamics and some properties of the network such as structure and size. 展开更多
关键词 Complex network Cascading failures Congestion effects Propagation model
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部