期刊文献+
共找到322篇文章
< 1 2 17 >
每页显示 20 50 100
试论“侵入”及语码转换成本
1
作者 于凤 《职业技术》 2011年第3期83-84,共2页
随着英语的国际地位不断提高及英语使用的普及和日常化,在全球众多的非英语地域内形成了"一种语言夹杂另一种语言(英语)"的特殊现象,即语言"侵入"现象。这一现象在语言学理论中被归为语码的句内转换。针对语码转换... 随着英语的国际地位不断提高及英语使用的普及和日常化,在全球众多的非英语地域内形成了"一种语言夹杂另一种语言(英语)"的特殊现象,即语言"侵入"现象。这一现象在语言学理论中被归为语码的句内转换。针对语码转换现象,语言学界进行了一定的研究和探讨。但是笔者认为,语码转换的种类繁多,而已有的研究并非"详略得当",即未针对每种原因所引起的不同的语码转换以及其所产生的影响的良劣和强弱,给予程度不同的重视和力度不同的研究。针对以往的研究并未将这一方面的工作做足之现状,本文将按照"分类研究、对症下药"的研究方法,以近期一部热播电影中的语言"侵入"为例,以产生语言"侵入"的原因为区分标准进行研究和阐述,旨在为提高汉语的国际地位、增强国人乃至世界对汉语的认同度,净化汉语的语言环境,贡献微薄之力。 展开更多
关键词 语言“侵入” 语码转换 成本 原因 影响
下载PDF
大学英语“浸入式”教学新模式的构建与实施
2
作者 杨渝 陈仁英 《上海中医药大学学报》 CAS 2007年第5期9-11,共3页
在国"外浸入式("jin ru)教学模式指导下,对大学英语教学尝试性引入让听说"侵入"(qin ru)读写的模式,即以"听说"为突破"口侵入"读写的教学模式,并进行了为期两年的课题研究。教学实践表明,这&qu... 在国"外浸入式("jin ru)教学模式指导下,对大学英语教学尝试性引入让听说"侵入"(qin ru)读写的模式,即以"听说"为突破"口侵入"读写的教学模式,并进行了为期两年的课题研究。教学实践表明,这"种浸入式"教学新模式可以在保证学生读写水平的情况下大大提升学生的听、说交际能力,从而提升学生的学习兴趣和自信心,为大学英语教学改革提供了有益的尝试。 展开更多
关键词 大学英语教学 “浸入式” 教学法 “侵入” 模式
下载PDF
Mechanical behavior of red sandstone under cyclic point loading 被引量:7
3
作者 周子龙 吴志波 +2 位作者 李夕兵 李响 马春德 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2015年第8期2708-2717,共10页
The mechanical properties of red sandstone subjected to cyclic point loading were investigated. Tests were conducted using MTS servohydraulic landmark test system, under cyclic loadings with constant amplitudes and in... The mechanical properties of red sandstone subjected to cyclic point loading were investigated. Tests were conducted using MTS servohydraulic landmark test system, under cyclic loadings with constant amplitudes and increasing multi-level amplitudes. The frequencies range from 0.1 to 5 Hz and lower limit load ratios range from 0 to 0.60. Laboratory investigations were performed to find the effect of the frequency and the lower limit load ratio on the fatigue life and hysteresis properties of sandstone. The results show that the fatigue life of sandstone decreases first and then increases with the increase of frequency and lower limit load ratio. Under the same cycle number, the spacing between hysteresis loops increases with rising frequency and decreasing lower limit load ratio. The existence of “training” and “memory” effects in red sandstone under cyclic point loading was proved. 展开更多
关键词 red sandstone cyclic point loading fatigue life hysteresis loop PENETRATION training effect memory effect
下载PDF
Model and method of permeability evaluation based on mud invasion effects 被引量:3
4
作者 周峰 胡祥云 +2 位作者 孟庆鑫 胡旭东 刘志远 《Applied Geophysics》 SCIE CSCD 2015年第4期482-492,626,共12页
The evaluation of permeability in reservoir assessment is a complex problem. Thus, it is difficult to perform direct evaluation permeability with conventional well-logging methods. Considering that reservoir permeabil... The evaluation of permeability in reservoir assessment is a complex problem. Thus, it is difficult to perform direct evaluation permeability with conventional well-logging methods. Considering that reservoir permeability significantly affects mud invasion during drilling, we derive a mathematical model to assess the reservoir permeability based on mud invasion. A numerical model is first used to simulate the process of mud invasion and mud cake growth. Then, based on Darcy's law, an approximation is derived to associate the depth of mud invasion with reservoir permeability. A mathematical model is constructed to evaluate the reservoir permeability as a function of the mud invasion depth in time-lapse logging. Sensitivity analyses of the reservoir porosity, permeability, and water saturation are performed, and the results suggest that the proposed model and method are well suited for oil layers or oil-water layers of low porosity and low permeability. Numerical simulations using field logging and coring data suggest that the evaluated and assumed permeability data agree, validating the proposed model and method. 展开更多
关键词 mud invasion mud cake permeability evaluation Darcy's law
下载PDF
Ecological adaptation of Eupatorium adenophorum populations to light intensity 被引量:6
5
作者 孙晓玉 陆兆华 +2 位作者 李鹏辉 姜骑山 梁震 《Journal of Forestry Research》 SCIE CAS CSCD 2006年第2期116-120,共5页
Eupatorium adenophorum is one of main invasive plants in China and has caused great economic losses. A study was conducted to determine the biomass allocation, leaf morphology and growth response of E. adenophorum see... Eupatorium adenophorum is one of main invasive plants in China and has caused great economic losses. A study was conducted to determine the biomass allocation, leaf morphology and growth response of E. adenophorum seedlings that grew under five different intensities (relative irradiances RI 10%, 20 %, 30%, 55%, 100%) for 14 months. Results reveal that the species shows typical leaf morphological adaptation to different light conditions. The total biomass of seedlings increased with the increase of light intensity from 10% to 55% RI but decreased at RI 100% (full sunlight). Height growth increased with the increase of light intensity from 10% to 30% RI but decreased when light intensity was over 30% RI. At low light levels, plants enhanced light availability by means of increasing biomass allocation to leaves and formation of larger, thinner leaves with high specific leaf area (SLA), leading to a high leaf area ratio (LAR) and high stem strips length (SSL). The mean relative growth rate (RGR) of the plant increased with the light intensity increase and attained the maximum at 55% RI. The growth of seedlings at 30%-55% RI was much better than that at full light condition. This might be an adaptive strategy that supports the vigorous invasiveness of this species, because a high-shaded canopy could prevent other plant species from surviving and growing. This study indicates that E. adenophorum could adapt to different light conditions, especially to low light habit. This can explain its greater invasiveness. 展开更多
关键词 Ecological adaptation Eupatorium adenophorum INVASIVENESS Light intensity
下载PDF
Review on studies of Eupatorium adenophorum--an important invasive species in China 被引量:20
6
作者 孙晓玉 陆兆华 桑卫国 《Journal of Forestry Research》 SCIE CAS CSCD 2004年第4期319-322,共4页
Eupatorium adenophorum Spreng. was introduced in Yunnan Province of China around 1940. Since then it has been spreading rapidly, particularly in the southern and southwestern parts of China and caused serious economic... Eupatorium adenophorum Spreng. was introduced in Yunnan Province of China around 1940. Since then it has been spreading rapidly, particularly in the southern and southwestern parts of China and caused serious economic loss. The biological research and inte-grated control on E. adenophorum were carried out from 1980's in Yunnan Province. Together with other 15 invasive external species, the weed has been listed in the White Paper by The State Environmental Protection Administration of China. This paper briefly reviews the studies on natural distribution, biological character, ecological character, chemical component, hazard, potential application and the control of E. adenophorum. The research direction for this invasive external species in future was also discussed. 展开更多
关键词 Eupatorium adenophorum Crofton weed Invasive species Biological character Integrated control Natural distribution Hazards China
下载PDF
Prevention and Utilization of Invasive Plants of Agriculture and Forestry in Guangdong Province 被引量:4
7
作者 黄泽文 练惠通 +4 位作者 王禾军 张波 罗映鹏 邓建基 向安强 《Agricultural Science & Technology》 CAS 2014年第5期846-849,共4页
Guangdong has become a major"window" for invasive plants, and the largest zone, where cross-border and intercontinental migration frequencies reach the peak. The invasive plants in Guangdong are dominated by Mikania... Guangdong has become a major"window" for invasive plants, and the largest zone, where cross-border and intercontinental migration frequencies reach the peak. The invasive plants in Guangdong are dominated by Mikania micrantha, Eichhornia crassipes, Alternanthera philoxeroides, Eupatorium odoratum, and Wedelia trilobata. It is an important way for treating the invasive plants by exploring the prevention methods and making ful use of the characteristics of the invasive plants, and it is of great significance to prevent and utilize alien species in a scientific and effective way in order to control the invasive plants with minimal cost. 展开更多
关键词 Invasive plants GUANGDONG Prevention and utilization Agriculture and forestry
下载PDF
Intrusion detection model based on deep belief nets 被引量:6
8
作者 高妮 高岭 +2 位作者 贺毅岳 高全力 任杰 《Journal of Southeast University(English Edition)》 EI CAS 2015年第3期339-346,共8页
This paper focuses on the intrusion classification of huge amounts of data in a network intrusion detection system. An intrusion detection model based on deep belief nets (DBN) is proposed to conduct intrusion detec... This paper focuses on the intrusion classification of huge amounts of data in a network intrusion detection system. An intrusion detection model based on deep belief nets (DBN) is proposed to conduct intrusion detection,and the principles regarding DBN are discussed.The DBN is composed of a multiple unsupervised restricted Boltzmann machine (RBM) and a supervised back propagation (BP)network.First,the DBN in the proposed model is pre-trained in a fast and greedy way,and each RBM is trained by the contrastive divergence algorithm.Secondly,the whole network is fine-tuned by the supervised BP algorithm,which is employed for classifying the low-dimensional features of the intrusion data generated by the last RBM layer simultaneously.The experimental results on the KDD CUP 1999 dataset demonstrate that the DBN using the RBM network with three or more layers outperforms the self-organizing maps (SOM)and neural network (NN)in intrusion classification.Therefore,the DBN is an efficient approach for intrusion detection in high-dimensional space. 展开更多
关键词 intrusion detection deep belief nets restricted Boltzmann machine deep learning
下载PDF
Ecological Assessment on the Introduced Sonneratia caseolaris and S. apetala at the Mangrove Forest of Shenzhen Bay, China 被引量:16
9
作者 昝启杰 王伯荪 +1 位作者 王勇军 李鸣光 《Acta Botanica Sinica》 CSCD 2003年第5期544-551,共8页
yTwo exotic species, Sonneratia caseolaris (L.) Engl. and S. apetala B. Ham., were introduced to Futian Mangrove Forest Nature Reserve, Shenzhen Bay, in 1993 for afforestation. Winter cold caused frigid harm but did n... yTwo exotic species, Sonneratia caseolaris (L.) Engl. and S. apetala B. Ham., were introduced to Futian Mangrove Forest Nature Reserve, Shenzhen Bay, in 1993 for afforestation. Winter cold caused frigid harm but did not appear to be an obstacle to the introduction. The cold tolerance of the parental and filial generation increased in several years. The two Sonneratia spp. could propagate by seeds and disperse in Shenzhen Bay. While the two species grew faster than indigenous species, at the same time they promoted the growth of indigenous species, but they could not replace indigenous mangrove species. Suitable habitat was more important than the distance from the source in the natural spreading for the two species. The niche of the two species did not overlap with the niche of indigenous species. The two species did not self regenerate, although they could disperse on localized area in Shenzhen Bay. Therefore, it was unlikely that the two species would pose ecological disaster. 展开更多
关键词 Sonneratia caseolaris Sonneratia apetala ecological adaptability ecological invasion
下载PDF
Relationship Between Histopathology and Clinical Prognosis of Invasive Pituitary Adenoma 被引量:2
10
作者 李勇 舒凯 +3 位作者 董芳永 万锋 雷霆 李龄 《The Chinese-German Journal of Clinical Oncology》 CAS 2005年第3期179-182,190-191,共6页
Objective: To study the relationship between histopathology and clinical prognosis of invasive pituitary adenoma subjected to transsphenoidal surgery. Methods: The enrolled were 82 patients with invasive pituitary ade... Objective: To study the relationship between histopathology and clinical prognosis of invasive pituitary adenoma subjected to transsphenoidal surgery. Methods: The enrolled were 82 patients with invasive pituitary adenomas undergoing transsphenoidal surgery during Jan. 2000 - May 2003 in our department with full MR imaging findings, pathology data and follow-up information. The follow-up duration was 5-30 months. Results: MR imaging findings of invasive pituitary adenoma included: depression of the sellar floor, involvement of sphenoid sinus and cavernous sinus, breakthrough of diaphragma sellae, encasement of internal carotid artery, etc. Pathological examination revealed that the invasion rate of dura in sella turcica was the highest among the structures around tumor. Pituitary adenoma apoplexy was found in 20 cases (24.4%). The total removal rate for PRL-secreting adenomas was significantly lower than that for non-secreting adenomas (P<0.01), but non-, GH-, ACTH-secreting adenomas had no significant differences. The recurrence rate of PRL-secreting adenomas was higher than that of non- and GH-secreting adenomas (P<0.05). Conclusion: Among invasive pituitary adenomas, the therapeutic effects of non-and GH-secreting pituitary adenomas are better than that of PRL-secreting adenomas. Invasive biological behaviors of invasive pituitary adenomas result in radical operation failure and postoperative recurrence. 展开更多
关键词 pituitary adenoma INVASION transsphenoidal surgery MRI HISTOPATHOLOGY
下载PDF
Optimal configuration of firewall, IDS and vulnerability scan by game theory 被引量:7
11
作者 赵柳榕 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2011年第2期144-147,共4页
The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash... The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail. 展开更多
关键词 economics of information systems FIREWALL intrusion detection system (IDS) vulnerability scan securityportfolio strategy
下载PDF
Expression of HMGB1 Protein in Human Cervical Squamous Epithelium Carcinoma 被引量:4
12
作者 付欣 杜晓琴 郝权 《Chinese Journal of Clinical Oncology》 CSCD 2008年第1期53-57,共5页
OBJECTIVE To investigate the expression of the high mobility group boxl(HMGB1) in human cervical squamous epithelial carcinoma (CSEC) and to explore the relationship of HMGB1 expression to the differentiation degr... OBJECTIVE To investigate the expression of the high mobility group boxl(HMGB1) in human cervical squamous epithelial carcinoma (CSEC) and to explore the relationship of HMGB1 expression to the differentiation degree, size, invasion and metastasis of CSEC. METHODS Immunohistochemical staining of tissue microarrays and Western blot analysis were conducted to detect the expression of HMGB1 in the following tissue samples: 30 carcinoma in situ, 90 invasive CSEC without metastasis, 30 invasive CSEC with metastasis, 30 cases of normal cervical squamous epithelia. RESULTS The positive-expression rate of HMGB1 was 58.7% (88/150) in CSEC, showing a significant difference compared to normal cervical squamous epithelia. The expression of HMGB1 was correlated with tumor size, invasion and metastasis of CSEC (respectively, P〈0.01), but had no relationship with the degree of differentiation (P〉0.05). CONCLUSION The over-expression of HMGB1 in CSEC might be a useful parameter as an indication of tumor invasion, metastasis, prognosis and overall biological behavior of human CSEC, as well as a noval target site for gene therapy. 展开更多
关键词 cervical squamous epithelium carcinoma (CSEC) high mobility group box1 HMGB1 IMMUNOHISTOCHEMISTRY Western blot tumor invasion.
下载PDF
Investigation and Risk Assessment of Alien Invasive Plants in Riparian Zone of Dongjiang River 被引量:2
13
作者 付岚 赵鸣飞 +1 位作者 龚玲 刘全儒 《Agricultural Science & Technology》 CAS 2011年第12期1897-1904,共8页
[Objective] The aim was to conduct investigation and risk assessment of the alien invasive plants in riparian zone of Dongjiang River.[Method] The field survey was carried out by the combination methods of sampling pl... [Objective] The aim was to conduct investigation and risk assessment of the alien invasive plants in riparian zone of Dongjiang River.[Method] The field survey was carried out by the combination methods of sampling plots investigation and route survey,and the whole Dongjiang River was covered.52 sampling points were set in the main streams,and 87 sampling points in tributaries streams,624 quadrats were set in total;multi-index comprehensive evaluation method was adopted for the risk assessment with 6 first-level indexes and 25 second-level indexes.[Result] Through the investigation on the riparian zone of Dongjiang River for 2 years,51 species of alien invasive plants were found,belonging to 17 families and 38 genera.The risk level assessment results of these 51 species showed that 18 species,such as Ageratum conyzoides,belonged to high-level risk with over 60 points;26 species,such as Chenopodium ambrosioides,were between 30 and 60 points which belonged to middle-level risk;7 species,such as Paspalum dilatatum,with less than 30 points belonged to low-level risk.[Conclusion] Basic data on the protection,water environmental management and functional zoning of riparian zone of Dongjiang River were provided. 展开更多
关键词 Alien invasive plants Dongjiang River Risk assessment Multi-index comprehensive evaluation
下载PDF
The Application of Weighted Association Rules in Host-Based Intrusion Detection System 被引量:1
14
作者 曹元大 薛静锋 《Journal of Beijing Institute of Technology》 EI CAS 2002年第4期418-421,共4页
Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weight... Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed. 展开更多
关键词 network security intrusion detection system association rules WEIGHT
下载PDF
A Study on Alien Invasive Plants from the Interactive Mechanism between Species Niche and Material/Energy Flow 被引量:3
15
作者 陈剑 喻庆国 杨宇明 《Agricultural Science & Technology》 CAS 2011年第1期14-19,共6页
[Objective]This study was to reveal the essence of mechanism about how the alien invasive plants spread.[Method]Species niche and material/energy flow were used as basic research indicators to analyze the intrinsic me... [Objective]This study was to reveal the essence of mechanism about how the alien invasive plants spread.[Method]Species niche and material/energy flow were used as basic research indicators to analyze the intrinsic mechanism of alien plants invasion.[Result]Most of the invasive plants have not been explicitly defined and their effective control methods not brought forward.[Conclusion]Overrun of alien invasive plants depends on whether the niche of a species could be continuously met at spatial level.Based on this we put forward corresponding control measures,proposed an assumption to establish a cylinder-network model and discussed the definition of alien invasive plants. 展开更多
关键词 Species niche Material/energy flow Alien invasive plants Interactive mechanism
下载PDF
The Research of Ecological Nutritional Organs of Invasive Plants Structural Characteristics
16
作者 魏健 盖玉红 +3 位作者 蔡立格 曲红岩 王英伟 王光野 《Agricultural Science & Technology》 CAS 2011年第6期812-814,共3页
[Objective] The aim of this paper was to discuss the adaptability of ecological nutritional organs of invasive plants.[Method] By dint of high-definition display of plant tissue crystal method and paraffin section met... [Objective] The aim of this paper was to discuss the adaptability of ecological nutritional organs of invasive plants.[Method] By dint of high-definition display of plant tissue crystal method and paraffin section method,the vegetative organs root,stem and leaf cross-section of the organizational structure of Asteraceae Ambrosia trifida L.ragweed(Ambrosia trifida L.)in the suburbs of Changchun City in Jilin Province were inspected.[Result] The structural basis for ecological invasive plant Ambrosia trifida L.vegetative organs was mainly through strengthening the roots of water absorption and transporting function,increasing the water storage function of leaf and stem,reducing the water absorption of stem and leaf for plants to promote water absorption and to enhance the assimilation of leaves to achieve a variety of complex environmental conditions in the rapid growth and development in order to achieve an ecological invasion.[Conclusion] The study provided reference for the biological fundamental research of Ambrosia trifida L. 展开更多
关键词 Ambrosia trifida L.(Ambrosia trifida L.) CRYSTAL Ecological invasion Structural basis
下载PDF
INTERNET INTRUSION DETECTION MODEL BASED ON FUZZY DATA MINING
17
作者 陈慧萍 王建东 +1 位作者 叶飞跃 王煜 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2005年第3期247-251,共5页
An intrusion detection (ID) model is proposed based on the fuzzy data mining method. A major difficulty of anomaly ID is that patterns of the normal behavior change with time. In addition, an actual intrusion with a... An intrusion detection (ID) model is proposed based on the fuzzy data mining method. A major difficulty of anomaly ID is that patterns of the normal behavior change with time. In addition, an actual intrusion with a small deviation may match normal patterns. So the intrusion behavior cannot be detected by the detection system.To solve the problem, fuzzy data mining technique is utilized to extract patterns representing the normal behavior of a network. A set of fuzzy association rules mined from the network data are shown as a model of “normal behaviors”. To detect anomalous behaviors, fuzzy association rules are generated from new audit data and the similarity with sets mined from “normal” data is computed. If the similarity values are lower than a threshold value,an alarm is given. Furthermore, genetic algorithms are used to adjust the fuzzy membership functions and to select an appropriate set of features. 展开更多
关键词 intrusion detection data mining fuzzy logic genetic algorithm anomaly detection
下载PDF
COMPARATIVE PERSPECTIVE OF THE URBAN PLANNING HISTORY OF QINGDAO: A MODERN PLANNING LAB OF CHINA
18
作者 龚清宇 《Transactions of Tianjin University》 EI CAS 1998年第1期92-97,共6页
The purpose of this paper is to explore the significance of Chinese invaded cities in the urban planning history through a comparative view of the modern urban planning theories and methodologies of Qingdao (Tsi... The purpose of this paper is to explore the significance of Chinese invaded cities in the urban planning history through a comparative view of the modern urban planning theories and methodologies of Qingdao (Tsingtau) and those of the developed world from the late 19th century to mid 20th century. After reviewing the German Plan in 1898~1906 and the Japanese Plan in 1941, the paper concludes that the basis grounds of the urban planning practices in Qingdao between 1897~1945 were of the realistic physical planning, rather than of the commonly assumed utopian garden city. Therefore, Qingdao, once being a modern planning lab objectively, helped forward the theories and methodologies of the world′s modern urban planning between the late 19th century and mid 20th century. 展开更多
关键词 modern urban planning lab comparative view invaded cities Qingdao
下载PDF
Analysis on the Hydrochemical Characteristics of Groundwater and the Formation Reason in Wadi Bay Area of Libya
19
作者 宋晓明 高翠萍 +1 位作者 Basher HM 杨悦锁 《Agricultural Science & Technology》 CAS 2010年第11期28-32,118,共6页
[Objective] The research aimed to analyze the formation reason of groundwater hydrochemical characteristics in the dry valley area of Wadi Bay of Libya and provide the scientific basis for the reasonable development u... [Objective] The research aimed to analyze the formation reason of groundwater hydrochemical characteristics in the dry valley area of Wadi Bay of Libya and provide the scientific basis for the reasonable development utilization and the environmental protection of groundwater.[Method] Took Wadi Bay area(dry valley)of Libya as the example,Piper trilinear graphic representation method,the descriptive statistics,the ion ratio coefficient method and the isotope evidence were used to systematically study the special hydrochemical characteristics of shallow groundwater in the arid climate condition in Wadi Bay area of Libya.[Result] The salt content of groundwater in the area was very high,and TDS was during 3.2-8.4 g/L.The main groundwater type was Cl·SO4-Na·Ca,then was Cl·SO4-Na·Ca·Mg.The concentrations of Cl-,Na+ and SO2-4,etc.in the groundwater in 70 km from the sea had the remarkable variation,but the concentrations of Mn2+,Ba2+,Si2+,NH+4 and NO-3 didn't have the same variation phenomenon.[Conclusion] The hydrochemical characteristics of shallow groundwater didn't relate to the dissolution infiltration reaction,the evaporation concentration effect and human activities.The major cause was the mixing effect of salt and fresh water in the invasion process of seawater. 展开更多
关键词 Hydrochemical characteristics of groundwater Seawater invasion Libya Arid area Wadi Bay
下载PDF
An analysis method of topological relations between Snort rules
20
作者 殷奕 汪芸 Takahashi Naohisa 《Journal of Southeast University(English Edition)》 EI CAS 2016年第1期21-28,共8页
It is difficult to knowall the relations between Snort rules. To deal with this problem, the topological relations between Snort rules are classified based on the set theory, and a method for calculating the topologic... It is difficult to knowall the relations between Snort rules. To deal with this problem, the topological relations between Snort rules are classified based on the set theory, and a method for calculating the topological relations between Snort rules is proposed. In the existing methods for analyzing the relations of Snort rules, the relations are usually determined only according to the header information of the Snort rules. Without considering the actions of Snort rules, the proposed method improves upon the existing methods and it can classify and calculate the topological relations between Snort rules according to both headers and options information of Snort rules. In addition, the proposed method is implemented by the functional language Haskell. The experimental results showthat the topological relations between Snort rules can be calculated rapidly and effectively. The proposed method also provides an important basis for conflict detection in the succeeding Snort rules. 展开更多
关键词 intrusion detection system(IDS) Snort rule functional programming language
下载PDF
上一页 1 2 17 下一页 到第
使用帮助 返回顶部