[ Objective] The research aimed to evaluate ecological vulnerability of the vegetation in the Subei Lake watershed based on analytic hierarchy process (AHP). [ Method] From actual situation of the vegetation ecology...[ Objective] The research aimed to evaluate ecological vulnerability of the vegetation in the Subei Lake watershed based on analytic hierarchy process (AHP). [ Method] From actual situation of the vegetation ecology in the Subei Lake watershed, by the established evaluation index system of vegetation ecology, based on AHP, indicator weight at each layer was determined. Comprehensive index method was used to calculate ecological fragility degree of the vegetation in each evaluation unit to evaluate ecological vulnerability of the vegetation. [ Result] Ecological vulnera- bility of the vegetation was divided into four levels, such as extremely fragile, highly fragile, moderately fragile and lowly fragile in the Subei Lake watershed. The extremely fragile area, where buried depth of the groundwater level was generally less than 1.0 meter, distributed in beach zones near the Subei Lake, and its relationship between vegetation and groundwater was close. The lowly fragile areas scattered in the ridge zone around the Subei Lake watershed, where buried depth of the groundwater level was 10.0 -40.0 meters, and their relationship between vegetation growth and groundwater depth was not obvious. Buried depth of groundwater had the most sensitive influence on vegetation ecology, and it was the key factor between utilization of groundwater resources and eco-environment protection in the study area. E Conclusion] The researches provided scientific evidence for regional eco-environment protection, rational development and utilization of water resources, and coordinated development of economy and society.展开更多
Security mechanism detection is not only an important content of vulnerabilities evaluation but also the foundation of key strength test for wireless local area network (WLAN). This paper analyzes the specifications...Security mechanism detection is not only an important content of vulnerabilities evaluation but also the foundation of key strength test for wireless local area network (WLAN). This paper analyzes the specifications of WLAN security mechanisms and points out the defects in design of security mechanisms detection algorithm based on the standards. By capturing and analyzing a large number of Beacon frames from different vendor's access points (APs), we summarize the relevant fields and information elements in a Beacon frame, and present their values or status when an AP is set to every specific security mechanism. A detection algorithm of WLAN security mechanisms is proposed based on the experimental study result and the pseudo code of a reference implementation for the algorithm is designed. The validity of the algorithm is illustrated by examples, which shows it can detect every WLAN security mechanism accurately.展开更多
基金Supported by Big Investigation Item,Ministry of Land and Resources,China(1212010734002,1212010634204)
文摘[ Objective] The research aimed to evaluate ecological vulnerability of the vegetation in the Subei Lake watershed based on analytic hierarchy process (AHP). [ Method] From actual situation of the vegetation ecology in the Subei Lake watershed, by the established evaluation index system of vegetation ecology, based on AHP, indicator weight at each layer was determined. Comprehensive index method was used to calculate ecological fragility degree of the vegetation in each evaluation unit to evaluate ecological vulnerability of the vegetation. [ Result] Ecological vulnera- bility of the vegetation was divided into four levels, such as extremely fragile, highly fragile, moderately fragile and lowly fragile in the Subei Lake watershed. The extremely fragile area, where buried depth of the groundwater level was generally less than 1.0 meter, distributed in beach zones near the Subei Lake, and its relationship between vegetation and groundwater was close. The lowly fragile areas scattered in the ridge zone around the Subei Lake watershed, where buried depth of the groundwater level was 10.0 -40.0 meters, and their relationship between vegetation growth and groundwater depth was not obvious. Buried depth of groundwater had the most sensitive influence on vegetation ecology, and it was the key factor between utilization of groundwater resources and eco-environment protection in the study area. E Conclusion] The researches provided scientific evidence for regional eco-environment protection, rational development and utilization of water resources, and coordinated development of economy and society.
基金Supported by the National Natural Science Foundation of China(51377122)
文摘Security mechanism detection is not only an important content of vulnerabilities evaluation but also the foundation of key strength test for wireless local area network (WLAN). This paper analyzes the specifications of WLAN security mechanisms and points out the defects in design of security mechanisms detection algorithm based on the standards. By capturing and analyzing a large number of Beacon frames from different vendor's access points (APs), we summarize the relevant fields and information elements in a Beacon frame, and present their values or status when an AP is set to every specific security mechanism. A detection algorithm of WLAN security mechanisms is proposed based on the experimental study result and the pseudo code of a reference implementation for the algorithm is designed. The validity of the algorithm is illustrated by examples, which shows it can detect every WLAN security mechanism accurately.