期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
An automatic unified modeling method of geological object and engineering object based on tri-prism(TP) 被引量:1
1
作者 张荣春 李浩 +1 位作者 吴铭飞 王亚芹 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第4期1419-1426,共8页
For the interaction relation between geological object and engineering object in some fields related to water conservancy and hydropower, a unified modeling idea was proposed. On the basis of summarizing both advantag... For the interaction relation between geological object and engineering object in some fields related to water conservancy and hydropower, a unified modeling idea was proposed. On the basis of summarizing both advantages and disadvantages of existing modeling methods, an automatic unified modeling method of both engineering and geological objects based on tri-prism(TP) model was presented. Through the lossless correction algorithm of deviated drill holes contained in this method, the real deviated drill holes could be corrected into the equivalent virtual vertical ones. And the correction accuracy fully meets the requirements of unified modeling. With the virtual vertical drilling data, TIN construction of both cover layer and other stratums would be built in order to obtain the 3D geological model. Then, the engineering design data would be introduced into the 3D geological model for achieving unified modeling. For this process, the volume subdividing and restructuring principles were introduced to deal with the spatial relationships between engineering object and geological object. In order to improve the efficiency of unified modeling, the reconstruction of TIN based on constraint information was also applied in this method. At last, the feasibility and validation of the unified modeling method as well as its relevant key algorithms were verified by specific experiments and analysis of results. 展开更多
关键词 tri-prism(TP) model unified modeling deviated drill holes correction volume subdividing constraint information
下载PDF
Risk Analysis of Information System Security Based on Distance of Information-State Transition 被引量:2
2
作者 ZHOU Chao PAN Ping +1 位作者 MAO Xinyue HUANG Liang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第3期210-218,共9页
The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum... The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum policy in the corresponding security level. Through the random survey on the information assets of multiple departments, this paper proposes the relative deviation distance of security policy configuration as risk measure parameter based on the distance of information-state transition(DIT) theory. By quantitatively analyzing the information asset weight, deviation degree and DIT, we establish the evaluation model for information system. With example analysis, the results prove that this method conducts effective risk evaluation on the information system intuitively and reliably, avoids the threat caused by subjective measurement, and shows performance benefits compared with existing solutions. It is not only theoretically but also practically feasible to realize the scientific analysis of security risk for the information system. 展开更多
关键词 distance of information-state transition(DIT) deviation distance information asset risk analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部