期刊文献+
共找到629,800篇文章
< 1 2 250 >
每页显示 20 50 100
Cyber Resilience through Real-Time Threat Analysis in Information Security
1
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information security Network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security Architecture
下载PDF
Mathematical Wave Functions and 3D Finite Element Modelling of the Electron and Positron
2
作者 Declan Traill 《Journal of Applied Mathematics and Physics》 2024年第4期1134-1162,共29页
The wave/particle duality of particles in Physics is well known. Particles have properties that uniquely characterize them from one another, such as mass, charge and spin. Charged particles have associated Electric an... The wave/particle duality of particles in Physics is well known. Particles have properties that uniquely characterize them from one another, such as mass, charge and spin. Charged particles have associated Electric and Magnetic fields. Also, every moving particle has a De Broglie wavelength determined by its mass and velocity. This paper shows that all of these properties of a particle can be derived from a single wave function equation for that particle. Wave functions for the Electron and the Positron are presented and principles are provided that can be used to calculate the wave functions of all the fundamental particles in Physics. Fundamental particles such as electrons and positrons are considered to be point particles in the Standard Model of Physics and are not considered to have a structure. This paper demonstrates that they do indeed have structure and that this structure extends into the space around the particle’s center (in fact, they have infinite extent), but with rapidly diminishing energy density with the distance from that center. The particles are formed from Electromagnetic standing waves, which are stable solutions to the Schrödinger and Classical wave equations. This stable structure therefore accounts for both the wave and particle nature of these particles. In fact, all of their properties such as mass, spin and electric charge, can be accounted for from this structure. These particle properties appear to originate from a single point at the center of the wave function structure, in the same sort of way that the Shell theorem of gravity causes the gravity of a body to appear to all originate from a central point. This paper represents the first two fully characterized fundamental particles, with a complete description of their structure and properties, built up from the underlying Electromagnetic waves that comprise these and all fundamental particles. 展开更多
关键词 ELECTRON POSITRON Wave Function Solution Electromagnetic Spin Mass Charge Proof Fundamental Particle Properties Quantum Mechanics Classical Physics Computer 3D Model Schrödinger Equation RMS KLEIN GORDON Electric Magnetic Lorentz Invariant Hertzian Vector Point Potential Field Density Phase Flow Attraction REPULSION Shell Theorem Ehrenfest VIRIAL Normalization Harmonic Oscillator
下载PDF
Cyberspace Security Using Adversarial Learning and Conformal Prediction
3
作者 Harry Wechsler 《Intelligent Information Management》 2015年第4期195-222,共28页
This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactic... This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion. 展开更多
关键词 Active LEARNING Adversarial LEARNING Anomaly DETECTION Change DETECTION CONFORMAL PREDICTION Cyber security Data Mining DENIAL and Deception Human Factors INSIDER Threats Intrusion DETECTION Meta-Reasoning Moving Target Defense Performance Evaluation Randomness Semi-Supervised LEARNING Sequence Analysis Statistical LEARNING Transduction
下载PDF
Foreign Grain Security Mechanisms and Implications for China 被引量:1
4
作者 Shuhua CAO Lei NIE Weipeng MA 《Asian Agricultural Research》 2014年第3期1-5,10,共6页
With constant growth of China's population and increasingly serious situation of farmland protection,the grain security has become a hot issue of China.This study firstly elaborated grain security measures in grai... With constant growth of China's population and increasingly serious situation of farmland protection,the grain security has become a hot issue of China.This study firstly elaborated grain security measures in grain exporters,such as the United States,Australia,and EU,and grain importers such as Japan,South Korea and India.In line with these security measures,it analyzed implementation background of these policies.Finally,combining social and economic development situations and natural resource endowment of China,it revealed the implications of these measures for China and came up with policy recommendations for China's grain security. 展开更多
关键词 GRAIN security FOREIGN COUNTRIES China mechanism F
下载PDF
Oxidation Kinetics of Aluminum Powders in a Gas Fluidized Bed Reactor in the Potential Application of Surge Arresting Materials
5
作者 Hong Shih 《Materials Sciences and Applications》 2019年第3期253-292,共40页
In this technical paper, the oxidation mechanism and kinetics of aluminum powders are discussed in great details. The potential applications of spherical aluminum powders after oxidation to be part of the surging arre... In this technical paper, the oxidation mechanism and kinetics of aluminum powders are discussed in great details. The potential applications of spherical aluminum powders after oxidation to be part of the surging arresting materials are discussed. Theoretical calculations of oxidation of spherical aluminum powders in a typical gas fluidization bed are demonstrated. Computer software written by the author is used to carry out the basic calculations of important parameters of a gas fluidization bed at different temperatures. A mathematical model of the dynamic system in a gas fluidization bed is developed and the analytical solution is obtained. The mathematical model can be used to estimate aluminum oxide thickness at a defined temperature. The mathematical model created in this study is evaluated and confirmed consistently with the experimental results on a gas fluidization bed. Detail technical discussion of the oxidation mechanism of aluminum is carried out. The mathematical deviations of the mathematical modeling have demonstrated in great details. This mathematical model developed in this study and validated with experimental results can bring a great value for the quantitative analysis of a gas fluidization bed in general from a theoretical point of view. It can be applied for the oxidation not only for aluminum spherical powders, but also for other spherical metal powders. The mathematical model developed can further enhance the applications of gas fluidization technology. In addition to the development of mathematical modeling of a gas fluidization bed reactor, the formation of oxide film through diffusion on both planar and spherical aluminum surfaces is analyzed through a thorough mathematical deviation using diffusion theory and Laplace transformation. The dominant defects and their impact to oxidation of aluminum are also discussed in detail. The well-controlled oxidation film on spherical metal powders such as aluminum and other metal spherical powders can potentially become an important part of switch devices of surge arresting materials, in general. 展开更多
关键词 Aluminum Spherical Power GAS FLUIDIZATION Bed Oxidation mechanism Oxide Growth Rate Gibbs Free Energy Ellingham Diagram Mathematical Modeling Dynamic System Plasma DIFFUSION DIFFUSION Coefficient Crystallographic Defect Vacancy Pressure Temperature Flow Laplace Transform Equation Boundary Condition Ficks Second Law Software Experimental Theoretical SURGE ARRESTING MATERIALS Analytical Solution
下载PDF
A retrospective view on the history of natural sciences in XX-XXI
6
作者 Vladislav Sergeyevich Olkhovsky 《Natural Science》 2010年第3期228-245,共18页
The presented paper is dedicated to a new ret-rospective view on the history of natural sci-ences in XX-XXI cc, partially including the sci-ence philosophy (mainly, the problems of the scientific realism, i.e. the cor... The presented paper is dedicated to a new ret-rospective view on the history of natural sci-ences in XX-XXI cc, partially including the sci-ence philosophy (mainly, the problems of the scientific realism, i.e. the correspondence of science to reality) and also a novel scheme for different classes of sciences with different ob-jects and paradigms. There are analyzed the chosen “great” and “grand” problems of phys-ics (including the comprehension of quantum mechanics, with a recently elaborated new chapter, connected with time as a quantum obs- ervable and time analysis of quantum processes) and also of natural sciences as a whole. The particular attention is paid to the interpretation questions and slightly to the aspects, inevitably connected with the world- views of the res- earchers (which do often constitute a part of the interpretation questions). 展开更多
关键词 SCIENCE history SCIENCE realism paradigm PROBLEM of interpretation and comprehension of QUANTUM mechanics the WAVE-FUNCTION collapse the Einstein-Podolsky-Rosen paradox TIME as a QUANTUM observable canonically conjugated to energy maximal hermitian TIME operator TIME analysis of QUANTUM processes relationship be-tween physics and biology PROBLEM of origin of biologic life REDUCTIONISM cosmologic PROBLEM Big Bang anthropic principle
下载PDF
Pyroptosis,ferroptosis,and autophagy in spinal cord injury:regulatory mechanisms and therapeutic targets
7
作者 Qingcong Zheng Du Wang +1 位作者 Rongjie Lin Weihong Xu 《Neural Regeneration Research》 SCIE CAS 2025年第10期2787-2806,共20页
Regulated cell death is a form of cell death that is actively controlled by biomolecules.Several studies have shown that regulated cell death plays a key role after spinal cord injury.Pyroptosis and ferroptosis are ne... Regulated cell death is a form of cell death that is actively controlled by biomolecules.Several studies have shown that regulated cell death plays a key role after spinal cord injury.Pyroptosis and ferroptosis are newly discovered types of regulated cell deaths that have been shown to exacerbate inflammation and lead to cell death in damaged spinal cords.Autophagy,a complex form of cell death that is interconnected with various regulated cell death mechanisms,has garnered significant attention in the study of spinal cord injury.This injury triggers not only cell death but also cellular survival responses.Multiple signaling pathways play pivotal roles in influencing the processes of both deterioration and repair in spinal cord injury by regulating pyroptosis,ferroptosis,and autophagy.Therefore,this review aims to comprehensively examine the mechanisms underlying regulated cell deaths,the signaling pathways that modulate these mechanisms,and the potential therapeutic targets for spinal cord injury.Our analysis suggests that targeting the common regulatory signaling pathways of different regulated cell deaths could be a promising strategy to promote cell survival and enhance the repair of spinal cord injury.Moreover,a holistic approach that incorporates multiple regulated cell deaths and their regulatory pathways presents a promising multi-target therapeutic strategy for the management of spinal cord injury. 展开更多
关键词 AUTOPHAGY cell death ferroptosis INFLAMMATION pathological mechanisms PYROPTOSIS regulated cell death regulatory pathways spinal cord injury therapeutic targets
下载PDF
Countermeasures for Establishing a Long-term Security Mechanism for Landless Farmers
8
作者 Jiefang ZHU 《Asian Agricultural Research》 2020年第1期25-27,31,共4页
In the process of urbanization,farmers will inevitably lose their land,which is resulted from the large-scale requisition of rural collective land.The imperfect social security system in rural areas has resulted in a ... In the process of urbanization,farmers will inevitably lose their land,which is resulted from the large-scale requisition of rural collective land.The imperfect social security system in rural areas has resulted in a large number of landless farmers being transformed into urban poor people.Therefore,proper resettlement of landless farmers and the establishment of a long-term security mechanism for ensuring the basic livelihood of landless farmers are important issues that need to be resolved in the process of China’s social and economic development. 展开更多
关键词 Landless FARMERS LONG-TERM security mechanism COUNTERMEASURES
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
9
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing Information security Cloud Infrastructure Offerings Cloud Migration security Measures Data Breaches Cloud Service Providers CYBERsecurity Cloud security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud security Tools
下载PDF
Design of Anti-Collision Integrated Security Mechanism Based on Chaotic Sequence in UHF RFID System 被引量:5
10
作者 YUE Keqiang SUN Lingling +1 位作者 QIN Xing ZHENG Zhonghua 《China Communications》 SCIE CSCD 2014年第3期137-147,共11页
Collision and security issues are considered as barriers to RFID applications.In this paper,a parallelizable anti-collision based on chaotic sequence combined dynamic frame slotted aloha to build a high-efficiency RFI... Collision and security issues are considered as barriers to RFID applications.In this paper,a parallelizable anti-collision based on chaotic sequence combined dynamic frame slotted aloha to build a high-efficiency RFID system is proposed.In the tags parallelizable identification,we design a Discrete Markov process to analyze the success identification rate.Then a mutual authentication security protocol merging chaotic anti-collision is presented.The theoretical analysis and simulation results show that the proposed identification scheme has less than 45.1%of the identification time slots compared with the OVSF-system when the length of the chaos sequence is 31.The success identification rate of the proposed chaotic anti-collision can achieve 63%when the number of the tag is100.We test the energy consumption of the presented authentication protocol,which can simultaneously solve the anti-collision and security of the UHF RFID system. 展开更多
关键词 ANTI-COLLISION security chaoticsequence discrete Markov process performance analysis
下载PDF
Hydrocarbon generation and storage mechanisms of deepwater shelf shales of Ordovician Wufeng Formation–Silurian Longmaxi Formation in Sichuan Basin, China 被引量:11
11
作者 GUO Xusheng LI Yuping +5 位作者 BORJIGEN Tenger WANG Qiang YUAN Tao SHEN Baojian MA Zhongliang WEI Fubin 《Petroleum Exploration and Development》 2020年第1期204-213,共10页
As the hydrocarbon generation and storage mechanisms of high quality shales of Upper Ordovician Wufeng Formation– Lower Silurian Longmaxi Formation remain unclear, based on geological conditions and experimental mode... As the hydrocarbon generation and storage mechanisms of high quality shales of Upper Ordovician Wufeng Formation– Lower Silurian Longmaxi Formation remain unclear, based on geological conditions and experimental modelling of shale gas formation, the shale gas generation and accumulation mechanisms as well as their coupling relationships of deep-water shelf shales in Wufeng–Longmaxi Formation of Sichuan Basin were analyzed from petrology, mineralogy, and geochemistry. The high quality shales of Wufeng–Longmaxi Formation in Sichuan Basin are characterized by high thermal evolution, high hydrocarbon generation intensity, good material base, and good roof and floor conditions;the high quality deep-water shelf shale not only has high biogenic silicon content and organic carbon content, but also high porosity coupling. It is concluded that:(1) The shales had good preservation conditions and high retainment of crude oil in the early times, and the shale gas was mainly from cracking of crude oil.(2) The biogenic silicon(opal A) turned into crystal quartz in early times of burial diagenesis, lots of micro-size intergranular pores were produced in the same time;moreover, the biogenic silicon frame had high resistance to compaction, thus it provided the conditions not only for oil charge in the early stage, but also for formation and preservation of nanometer cellular-like pores, and was the key factor enabling the preservation of organic pores.(3) The high quality shale of Wufeng–Longmaxi Formation had high brittleness, strong homogeneity, siliceous intergranular micro-pores and nanometer organic pores, which were conducive to the formation of complicated fissure network connecting the siliceous intergranular nano-pores, and thus high and stable production of shale gas. 展开更多
关键词 hydrocarbon generation and STORAGE mechanism Upper ORDOVICIAN Wufeng FORMATION Lower SILURIAN Longmaxi FORMATION deep-water SHELF siliceous shale Sichuan Basin pore preservation
下载PDF
Genomic Instability in Cancer II: 4N-Skewed (90°) Reductive Division via Fragile Sites to Fitness Increase for Solid and Hematological Cancer Beginnings 被引量:2
12
作者 Kirsten H. Walen 《Journal of Cancer Therapy》 2019年第7期537-564,共28页
The objective herein was to connect the ontogeny process of diplochromosomal, amitotic, 4n-skewed division-system, to cytogenetic deficiency lesions in satellite, repetitive DNAs, especially in the chromosomal fragile... The objective herein was to connect the ontogeny process of diplochromosomal, amitotic, 4n-skewed division-system, to cytogenetic deficiency lesions in satellite, repetitive DNAs, especially in the chromosomal fragile sites, some 100 distributed over the genome. These latter studies had shown that chemical induced replication-stress led to un-replicated lesions in these fragile sites, which from inaccurate repair processes caused genomic instability. In the chain of events of the ontogeny process to the special tetraploidy, it was proposed that primary damaged human cells could undergo replication stress from repair-process present during cell replication, a suggestion verified by X-ray damaged cells producing the unstable fragile sites (see text). The cancer-importance for therapy is recognition of cell cycle change for the 4n derivative fitness-gained, diploid progeny cells. An open question is whether RB controlling G1 to S-period is mutated at this suggested tumorigenesis initiating phase, and if so, with what consequences for therapy. The fragile site studies further showed that repair of repetitive DNAs could produce two types of genomic changes: single gene mutations and CNVs, which were here shown to be chromosomally located on “borders” to repairing satellite lesions. This genomic placement was found to correspond to mutations identified in tumor sequencing (p53, Rb, MYC), favoring a bad luck location for their cancer “mutational nature”. The CNVs in cancers, are here seen as molecular expressions of long-known cytogenetic HSRs and DMs also with demonstrated origin from amplifications of single genes. Over-expression of oncogenes was hinted of being from duplications, but Drosophila genetics demonstrated the opposite, gene inactivation. The reduced eye-size from dominant, BAR-Ultra-Bar-eye phenotypes, was caused by duplications, inactivating the genetic system for eye-size. The finding of CNVs showing “evasion” of the immune system suggests, inactivation of immune-determining genetics. Since mutated genes on borders to satellite DNAs are a fact in hematological cancers, the 4n-skewed division-system is suggested to replace debated leukemogenesis with fitness-gain from molecular mutations. For these cancers the question is how normal bone marrow cells attain genomic damage for special tetraploidy, which was referred to studies of cells moving in artificial marrow-like substrate, needing serious attention. 展开更多
关键词 Centrifugal 90° Turn CENTROSOME Absence Mitotic Slippage Process Diplochromosomes Mutator mechanism Satellite DNA MUTATIONS Fragile Site Instability Repair MUTATIONS Copy Number Variants CHROMOSOME Nuclear Domains HEMATOLOGIC TRANSLOCATIONS Density Bone Marrow Substrate Abnormal Laminar Proteins Chromosome/Gene UPD Haplo-Insufficiency
下载PDF
A Research on Improvement of Hadoop Security Mechanism
13
《International English Education Research》 2013年第12期90-92,共3页
. Hadoop, as an open-source cloud computing framework, is increasingly applied in many fields, while the weakness of security mechanism now becomes one of the main problems hindering its development. This paper first ... . Hadoop, as an open-source cloud computing framework, is increasingly applied in many fields, while the weakness of security mechanism now becomes one of the main problems hindering its development. This paper first analyzes the current security mechanisms of Hadoop, then through study of Hadoop's security mechanism and analysis of security risk in its current ~,ersion, proposes a corresponding solution based on secure multicast to resovle the security risks. All these could provide certain technical supports for the enterprises in their Hadoop applications with new security needs. 展开更多
关键词 HADOOP security mechanism HDFS MapReduce Secure multicast REKEYING
下载PDF
Decoding molecular mechanisms:brain aging and Alzheimer's disease
14
作者 Mahnoor Hayat Rafay Ali Syed +9 位作者 Hammad Qaiser Mohammad Uzair Khalid Al-Regaiey Roaa Khallaf Lubna Abdullah Mohammed Albassam Imdad Kaleem Xueyi Wang Ran Wang Mehwish SBhatti Shahid Bashir 《Neural Regeneration Research》 SCIE CAS 2025年第8期2279-2299,共21页
The complex morphological,anatomical,physiological,and chemical mechanisms within the aging brain have been the hot topic of research for centuries.The aging process alters the brain structure that affects functions a... The complex morphological,anatomical,physiological,and chemical mechanisms within the aging brain have been the hot topic of research for centuries.The aging process alters the brain structure that affects functions and cognitions,but the worsening of such processes contributes to the pathogenesis of neurodegenerative disorders,such as Alzheimer's disease.Beyond these observable,mild morphological shifts,significant functional modifications in neurotransmission and neuronal activity critically influence the aging brain.Understanding these changes is important for maintaining cognitive health,especially given the increasing prevalence of age-related conditions that affect cognition.This review aims to explore the age-induced changes in brain plasticity and molecular processes,differentiating normal aging from the pathogenesis of Alzheimer's disease,thereby providing insights into predicting the risk of dementia,particularly Alzheimer's disease. 展开更多
关键词 Alzheimers disease brain aging cognitive health DEMENTIA molecular mechanisms neuronal activity NEUROPLASTICITY NEUROTRANSMISSION
下载PDF
One-Electron-Addition to Pentavalent Phosphorus with the Phosphorus-Chlorine Bond as Acceptor Introducing a Fundamental Distinction in Substitution Mechanism between S<sub>N</sub>2(P) and S<sub>N</sub>2(C)
15
作者 Henk M.Buck 《Open Journal of Physical Chemistry》 2019年第3期182-191,共10页
An electron-addition, under single-crystal conditions, to pentavalent phosphorus compounds as Cl-P (=O, S) Y, Z with the P-Cl bond as electron-accepting group, is selected as an additional model for SN2(P) like reacti... An electron-addition, under single-crystal conditions, to pentavalent phosphorus compounds as Cl-P (=O, S) Y, Z with the P-Cl bond as electron-accepting group, is selected as an additional model for SN2(P) like reactions. It is demonstrated that the geometric information stored in the tetrahedral configuration (substrate) can be transmitted in the corresponding trigonal bipyramidal (TBP) state for nucleophilic substitution. In this article, we focus on these specific mechanistic aspects of carbon and phosphorus. We consider our study as a contribution to the significance of these (bio)chemical intermediates. 展开更多
关键词 Pentavalent PHOSPHORUS and Carbon Compounds σ%MUL%-Electron-Addition Single-Crystal Electron Spin Resonance (ESR) Model and Ab Initio Calculations Differences in SN2(C) vs. SN2(P) mechanism
下载PDF
On the Isotope-Like Effect for High-T<sub>c</sub>Superconductors in the Scenario of 2-Phonon Exchange Mechanism for Pairing
16
作者 G. P. Malik 《World Journal of Condensed Matter Physics》 2018年第3期109-114,共6页
By generalizing the isotope effect for elemental superconductors (SCs) to the case of pairing in the 2-phonon exchange mechanism for composite SCs, we give here an explanation of the well-known increase in the critica... By generalizing the isotope effect for elemental superconductors (SCs) to the case of pairing in the 2-phonon exchange mechanism for composite SCs, we give here an explanation of the well-known increase in the critical temperature (Tc) of Bi2Sr2CaCu2O8 from 95 K to 110 K and of Bi2Sr2Ca2Cu3O10 from 105 to 115 - 125 K when Bi and Sr in these are replaced by Tl and Ba, respectively. On this basis, we also give the estimated Tcs of some hypothetical SCs, assuming that they may be fabricated by substitutions similar to Bi → Tl and Sr → Ba. 展开更多
关键词 Isotope-Like EFFECT 2-Phonon Exchange mechanism Bi- and Tl-Based High-Tc SCS Suggestions for New Substitutions for Further Enhancement of Tc of the Bi-Based SCS
下载PDF
The genetic environmental transformation mechanism of coal and oil shale deposits in eastern China’s continental fault basins and the developmental characteristics of the area’s symbiotic assemblages——taking Huangxian Basin as an example 被引量:6
17
作者 Dong-Dong Wang Zeng-Xue Li +2 位作者 Hai-Yan Liu Da-Wei Lyu Guo-Qi Dong 《Petroleum Science》 SCIE CAS CSCD 2019年第3期469-491,共23页
Coal and oil shale are two common sedimentary energy sources which are often symbiotically developed in M esozoic- Cenozoic continental fault basins. However, the mechanisms and characteristics of the symbiotic develo... Coal and oil shale are two common sedimentary energy sources which are often symbiotically developed in M esozoic- Cenozoic continental fault basins. However, the mechanisms and characteristics of the symbiotic development are not yet clearly known. In this research study, the typical continental fault basins of eastern China were chosen as examples for the purpose of conducting an examination of the coal and oil shale symbiotic assemblage types, genetic environmental differences, and transformation mechanisms, as well as the development and occurrence characteristics o f different assemblage types. Through a large number of investigations, systematic experimental testing, and sequence stratigraphy studies, the following conclusions were obtained:(1) There were five types of coal and oil shale symbiotic assemblages observed in the continental fault basins,(2) The development of coal and oil shale deposits requires a warm and humid climate, stable structure, abundant organic matter supply, a certain water depth, and a lower terrestrial source debris supply. The observed differences were that the water depth conditions were diversified in the study area, as well as the sources, types, and content of the organic matter.(3) The rapid transformations of the coal and oil shale genetic environments were mainly controlled by the tectonic settings and climatic conditions, which were determined to control the changes in the water depths, salinity,redox conditions, and lake productivity of the genetic environments. Also, in the symbiotic assemblages, genetic environment changes had induced the development of oil shale deposits, which gradually evolved into coal genetic environments.(4) In the isochronous sequence stratigraphic framework of the coal and oil shale symbiotic assemblages, the lake expansion system tracts (EST) were determined to be the most beneficial to the growth o f all the types of assemblages and were characterized by more assemblage development phases and smaller bed thicknesses. From the early to the late stages of the EST, and from the lakesides to lake centers, the thicknesses of the coal seams in the symbiotic assemblages showed trends of thinning, while the thicknesses of the oil shale deposits exhibited increasing trends. The early stages of high stand system tracts were found to be beneficial to the development of the symbiotic assemblages of coal seams overlying the oil shale. This tract type generally presented large bed thicknesses and distribution ranges. The low stand system tract and the late high stand system tract were determined to be unconducive to the development of the symbiotic assemblages. 展开更多
关键词 COAL and oil shale SYMBIOTIC ASSEMBLAGES Genetic environments Conversion mechanism Sequence stratigraphic framework Occurrence CHARACTERISTICS CONTINENTAL fault BASIN
下载PDF
Study on Sinking-Sliding Failure Mechanism of Perilous Rock at Wangxia in Three Gorges of the Yangtze River, China
18
作者 Hong-Kai Chen Sheng-Juan Wang 《Journal of Geoscience and Environment Protection》 2017年第2期30-43,共14页
The giant perilous rock at Wangxia (named Wangxia perilous rock) is representative in Three Gorges of the Yangtze River, China, has threatened badly the navigation of the Yangtze River channel for a long period. The g... The giant perilous rock at Wangxia (named Wangxia perilous rock) is representative in Three Gorges of the Yangtze River, China, has threatened badly the navigation of the Yangtze River channel for a long period. The giant perilous rock is composed of siliceous limestone and argillaceous limestone, and includes two elements marking by W1 and W2, respectively. The W1 is an isolated pillar while the W2 is in clintheriform. The linking segment of dominant fissure in the W2 is composed by moniliform solution funnels at its back, and the locked segment of the dominant fissure at the base of the W2 is composed by two parts. For the locked part of the dominant fissure of the W2, the upper segment shows the same lithology with the perilous rock and it can be simplified as an elastic medium, for the lower segment composed by argillaceous shale and mudstone can be simplified as a strain-softening medium. Introducing the water-softened function, the constitutive curves with two kinds of medium materials for the locked segment in the dominant fissure of the W2 have been proposed. Based on energy principle, the cusp catastrophe model for perilous rock rupture is built and formulas for the transient elastic and impulsive acceleration and the elastic-impulsive velocity of perilous rock catastrophe rupture have been established. By the calculation, the elastic-impulsive acceleration for the catastrophe rupture of the W2 is 531.4 m/s2, while the average elastic-impulsive velocity is 2.608 m/s. Further, it is deduced that the elastic-impulsive velocity at the base of the W2 is about 5.2 m/s. For the transient ruture of the W2, there is a greater speed difference between the top and the base of the W2, which impels the giant perilous rock to be retroverted sliding rupture, coinciding with the fact. Undoubtedly, studies in this paper must play an important role to analyze the catastrophe rupture mechanism of giant perilous rocks at both banks in Three Gorges of the Yangtze River, China. 展开更多
关键词 Sinking-Sliding Failure mechanism Water-Softened Function CATASTROPHE Theory Energy Principle Giant Perilous Rock Three Gorges of the YANGTZE River China
下载PDF
Non-Homogeneous Stochastic Model for Cyber Security Predictions 被引量:1
19
作者 Pubudu Kalpani Kaluarachchi Chris P. Tsokos Sasith M. Rajasooriya 《Journal of Information Security》 2018年第1期12-24,共13页
Any computer system with known vulnerabilities can be presented using attack graphs. An attacker generally has a mission to reach a goal state that he expects to achieve. Expected Path Length (EPL) [1] in the context ... Any computer system with known vulnerabilities can be presented using attack graphs. An attacker generally has a mission to reach a goal state that he expects to achieve. Expected Path Length (EPL) [1] in the context of an attack graph describes the length or number of steps that the attacker has to take in achieving the goal state. However, EPL varies and it is based on the “state of vulnerabilities” [2] [3] in a given computer system. Any vulnerability throughout its life cycle passes through several stages that we identify as “states of the vulnerability life cycle” [2] [3]. In our previous studies we have developed mathematical models using Markovian theory to estimate the probability of a given vulnerability being in a particular state of its life cycle. There, we have considered a typical model of a computer network system with two computers subject to three vulnerabilities, and developed a method driven by an algorithm to estimate the EPL of this network system as a function of time. This approach is important because it allows us to monitor a computer system during the process of being exploited. Proposed non-homogeneous model in this study estimates the behavior of the EPL as a function of time and therefore act as an index of the risk associated with the network system getting exploited. 展开更多
关键词 VULNERABILITY Attack Graph MARKOV MODEL security Evaluation EXPECTED Path Length (EPL) Common VULNERABILITY SCORING System (CVSS) Non Homogeneous Stochastic MODEL
下载PDF
AN ACCURATE PREDICTION MODEL FOR COMPUTATIONAL OVERHEADS OF SECURITY MECHANISMS IN WIRELESS SENSOR NETWORKS
20
作者 Liu Wei Luo Rong Yang Huazhong 《Journal of Electronics(China)》 2009年第5期699-705,共7页
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ... In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms. 展开更多
关键词 Wireless Sensor Network WSN Cryptography algorithm security mechanism Computational overhead
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部