期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
A Case Study of Impact of FY-2C Satellite Data in Cloud Analysis to Improve Short-Range Precipitation Forecast 被引量:6
1
作者 LIU Rui-Xia CHEN Hong-Bin +1 位作者 CHEN De-Hui XU Guo-Qiang 《Atmospheric and Oceanic Science Letters》 CSCD 2014年第6期527-533,共7页
Chinese FengYun-2C(FY-2C) satellite data were combined into the Local Analysis and Prediction System(LAPS) model to obtain three-dimensional cloud parameters and rain content. These parameters analyzed by LAPS were us... Chinese FengYun-2C(FY-2C) satellite data were combined into the Local Analysis and Prediction System(LAPS) model to obtain three-dimensional cloud parameters and rain content. These parameters analyzed by LAPS were used to initialize the Global/Regional Assimilation and Prediction System model(GRAPES) in China to predict precipitation in a rainstorm case in the country. Three prediction experiments were conducted and were used to investigate the impacts of FY-2C satellite data on cloud analysis of LAPS and on short range precipitation forecasts. In the first experiment, the initial cloud fields was zero value. In the second, the initial cloud fields were cloud liquid water, cloud ice, and rain content derived from LAPS without combining the satellite data. In the third experiment, the initial cloud fields were cloud liquid water, cloud ice, and rain content derived from LAPS including satellite data. The results indicated that the FY-2C satellite data combination in LAPS can show more realistic cloud distributions, and the model simulation for precipitation in 1–6 h had certain improvements over that when satellite data and complex cloud analysis were not applied. 展开更多
关键词 FY-2C satellite data cloud analysis precipitation forecast impact study
下载PDF
Comparison of seismic fragility analysis methods for arch dams
2
作者 Jin Aiyun Qiu Yixiang Wang Jinting 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2023年第1期173-189,共17页
This study focuses on the seismic fragility analysis of arch dams.The multiple stripe analysis(MSA),cloud analysis(CLA),and incremental dynamic analysis(IDA)methods are compared.A comprehensive dam-reservoir-foundatio... This study focuses on the seismic fragility analysis of arch dams.The multiple stripe analysis(MSA),cloud analysis(CLA),and incremental dynamic analysis(IDA)methods are compared.A comprehensive dam-reservoir-foundation rock system,which considers the opening of contraction joints,the nonlinearity of dam concrete and foundation rock,the radiation damping effect of semi-unbounded foundation,and the compressibility of reservoir water,is used as a numerical example.225,80,and 15 earthquake records are selected for MSA,CLA,and IDA,respectively.The results show that MSA provides satisfactory fragility analysis,while both CLA and IDA have assumptions that may lead to deviations.Therefore,MSA is the most reliable method among the three methods and is recommended for the fragility analysis of arch dams.It is also shown that the choice of demand level affects the reliability of fragility curves and the effect of the material uncertainty on the fragility of the dam is not significant. 展开更多
关键词 arch dam seismic fragility analysis cloud analysis incremental dynamic analysis multiple stripe analysis
下载PDF
Aggregate Point Cloud Geometric Features for Processing
3
作者 Yinghao Li Renbo Xia +4 位作者 Jibin Zhao Yueling Chen Liming Tao Hangbo Zou Tao Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期555-571,共17页
As 3D acquisition technology develops and 3D sensors become increasingly affordable,large quantities of 3D point cloud data are emerging.How to effectively learn and extract the geometric features from these point clo... As 3D acquisition technology develops and 3D sensors become increasingly affordable,large quantities of 3D point cloud data are emerging.How to effectively learn and extract the geometric features from these point clouds has become an urgent problem to be solved.The point cloud geometric information is hidden in disordered,unstructured points,making point cloud analysis a very challenging problem.To address this problem,we propose a novel network framework,called Tree Graph Network(TGNet),which can sample,group,and aggregate local geometric features.Specifically,we construct a Tree Graph by explicit rules,which consists of curves extending in all directions in point cloud feature space,and then aggregate the features of the graph through a cross-attention mechanism.In this way,we incorporate more point cloud geometric structure information into the representation of local geometric features,which makes our network perform better.Our model performs well on several basic point clouds processing tasks such as classification,segmentation,and normal estimation,demonstrating the effectiveness and superiority of our network.Furthermore,we provide ablation experiments and visualizations to better understand our network. 展开更多
关键词 Deep learning point-based models point cloud analysis 3D shape analysis point cloud processing
下载PDF
Safety Risk Assessment of Overturning Construction of Towering Structure Based on Cloud Matter–Element Coupled Model
4
作者 Yingxue Sang Fengxia Han +2 位作者 Qing Liu Liang Qiao Shouxi Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1973-1998,共26页
Rapid urbanization has led to a surge in the number of towering structures,and overturning is widely used because it can better accommodate the construction of shaped structures such as variable sections.The complexit... Rapid urbanization has led to a surge in the number of towering structures,and overturning is widely used because it can better accommodate the construction of shaped structures such as variable sections.The complexity of the construction process makes the construction risk have certain randomness,so this paper proposes a cloudbased coupled matter-element model to address the ambiguity and randomness in the safety risk assessment of overturning construction of towering structures.In the pretended model,the digital eigenvalues of the cloud model are used to replace the eigenvalues in the matter–element basic element,and calculate the cloud correlation of the risk assessment metrics through the correlation algorithm of the cloud model to build the computational model.Meanwhile,the improved hierarchical analysis method based on the cloud model is used to determine the weight of the index.The comprehensive evaluation scores of the evaluation event are then obtained through the weighted average method,and the safety risk level is determined accordingly.Through empirical analysis,(1)the improved hierarchical analysis method based on the cloud model can incorporate the data of multiple decisionmakers into the calculation formula to determine theweights,which makes the assessment resultsmore credible;(2)the evaluation results of the cloud-basedmatter-element coupledmodelmethod are basically consistent with those of the other two commonly used methods,and the confidence factor is less than 0.05,indicating that the cloudbased physical element coupled model method is reasonable and practical for towering structure overturning;(3)the cloud-based coupled element model method,which confirms the reliability of risk level by performing Spearman correlation on comprehensive assessment scores,can provide more comprehensive information of instances compared with other methods,and more comprehensively reflects the fuzzy uncertainty relationship between assessment indexes,which makes the assessment results more realistic,scientific and reliable. 展开更多
关键词 cloud matter-element model clouded hierarchical analysis method towering structure overturning formwork construction risk assessment
下载PDF
IoT-Enabled Autonomous System Collaboration for Disaster-Area Management 被引量:3
5
作者 Abenezer Girma Niloofar Bahadori +5 位作者 Mrinmoy Sarkar Tadewos G.Tadewos Mohammad R.Behnia M.Nabil Mahmoud Ali Karimoddini Abdollah Homaifar 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第5期1249-1262,共14页
Timely investigating post-disaster situations to locate survivors and secure hazardous sources is critical,but also very challenging and risky.Despite first responders putting their lives at risk in saving others,huma... Timely investigating post-disaster situations to locate survivors and secure hazardous sources is critical,but also very challenging and risky.Despite first responders putting their lives at risk in saving others,human-physical limits cause delays in response time,resulting in fatality and property damage.In this paper,we proposed and implemented a framework intended for creating collaboration between heterogeneous unmanned vehicles and first responders to make search and rescue operations safer and faster.The framework consists of unmanned aerial vehicles(UAVs),unmanned ground vehicles(UGVs),a cloud-based remote control station(RCS).A light-weight message queuing telemetry transport(MQTT)based communication is adopted for facilitating collaboration between autonomous systems.To effectively work under unfavorable disaster conditions,antenna tracker is developed as a tool to extend network coverage to distant areas,and mobile charging points for the UAVs are also implemented.The proposed framework’s performance is evaluated in terms of end-to-end delay and analyzed using architectural analysis and design language(AADL).Experimental measurements and simulation results show that the adopted communication protocol performs more efficiently than other conventional communication protocols,and the implemented UAV control mechanisms are functioning properly.Several scenarios are implemented to validate the overall effectiveness of the proposed framework and demonstrate possible use cases. 展开更多
关键词 Architectural analysis and design language(AADL)and cloud computing disaster area management internet of things(IoT) message queuing telemetry transport(MQTT) unmanned aerial vehicle(UAV) unmanned ground vehicle(UGV)
下载PDF
Application of a Three-dimensional Variational Method for Radar Reflectivity Data Correction in a Mudslide-inducing Rainstorm Simulation 被引量:1
6
作者 Hongli LI Xiangde XU 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2017年第4期469-481,共13页
Various types of radars with different horizontal and vertical detection ranges are deployed in China, particularly over complex terrain where radar blind zones are common. In this study, a new variational method is d... Various types of radars with different horizontal and vertical detection ranges are deployed in China, particularly over complex terrain where radar blind zones are common. In this study, a new variational method is developed to correct threedimensional radar reflectivity data based on hourly ground precipitation observations. The aim of this method is to improve the quality of observations of various types of radar and effectively assimilate operational Doppler radar observations. A mudslide-inducing local rainstorm is simulated by the WRF model with assimilation of radar reflectivity and radial velocity data using LAPS(Local Analysis and Prediction System). Experiments with different radar data assimilated by LAPS are performed. It is found that when radar reflectivity data are corrected using this variational method and assimilated by LAPS,the atmospheric conditions and cloud physics processes are reasonably described. The temporal evolution of radar reflectivity corrected by the variational method corresponds well to observed rainfall. It can better describe the cloud water distribution over the rainfall area and improve the cloud water analysis results over the central rainfall region. The LAPS cloud analysis system can update cloud microphysical variables and represent the hydrometeors associated with strong convective activities over the rainfall area well. Model performance is improved and the simulation of the dynamical processes and moisture transport is more consistent with observation. 展开更多
关键词 cloud analysis Doppler radar data rainstorm LAPS
下载PDF
MobSafe:Cloud Computing Based Forensic Analysis for Massive Mobile Applications Using Data Mining 被引量:2
7
作者 Jianlin Xu Yifan Yu +4 位作者 Zhen Chen Bin Cao Wenyu Dong Yu Guo Junwei Cao 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第4期418-427,共10页
With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Int... With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Internet, the apps replace the PC client software as the major target of malicious usage. In this paper, to improve the security status of current mobile apps, we propose a methodology to evaluate mobile apps based on cloud computing platform and data mining. We also present a prototype system named MobSafe to identify the mobile app's virulence or benignancy. Compared with traditional method, such as permission pattern based method, MobSafe combines the dynamic and static analysis methods to comprehensively evaluate an Android app. In the implementation, we adopt Android Security Evaluation Framework (ASEF) and Static Android Analysis Framework (SAAF), the two representative dynamic and static analysis methods, to evaluate the Android apps and estimate the total time needed to evaluate all the apps stored in one mobile app market. Based on the real trace from a commercial mobile app market called AppChina, we can collect the statistics of the number of active Android apps, the average number apps installed in one Android device, and the expanding ratio of mobile apps. As mobile app market serves as the main line of defence against mobile malwares, our evaluation results show that it is practical to use cloud computing platform and data mining to verify all stored apps routinely to filter out malware apps from mobile app markets. As the future work, MobSafe can extensively use machine learning to conduct automotive forensic analysis of mobile apps based on the generated multifaceted data in this stage. 展开更多
关键词 Android platform mobile malware detection cloud computing forensic analysis machine learning redis key-value store big data hadoop distributed file system data mining
原文传递
TIFAflow: Enhancing Traffic Archiving System with Flow Granularity for Forensic Analysis in Network Security 被引量:3
8
作者 Zhen Chen Linyun Ruan +2 位作者 Junwei Cao Yifan Yu Xin Jiang 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第4期406-417,共12页
The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves stora... The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves storage and analysis of network flow statistic. However, this approach loses much valuable information within the Internet traffic. With the advancement of commodity hardware, in particular the volume of storage devices and the speed of interconnect technologies used in network adapter cards and multi-core processors, it is now possible to capture 10 Gbps and beyond real-time network traffic using a commodity computer, such as n2disk. Also with the advancement of distributed file system (such as Hadoop, ZFS, etc.) and open cloud computing platform (such as OpenStack, CloudStack, and Eucalyptus, etc.), it is practical to store such large volume of traffic data and fully in-depth analyse the inside communication within an acceptable latency. In this paper, based on well- known TimeMachine, we present TIFAflow, the design and implementation of a novel system for archiving and querying network flows. Firstly, we enhance the traffic archiving system named TImemachine+FAstbit (TIFA) with flow granularity, i.e., supply the system with flow table and flow module. Secondly, based on real network traces, we conduct performance comparison experiments of TIFAflow with other implementations such as common database solution, TimeMachine and TIFA system. Finally, based on comparison results, we demonstrate that TIFAflow has a higher performance improvement in storing and querying performance than TimeMachine and TIFA, both in time and space metrics. 展开更多
关键词 network security traffic archival forensic analysis phishing attack bitmap database hadoop distributed file system cloud computing NoSQL
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部