For the interaction relation between geological object and engineering object in some fields related to water conservancy and hydropower, a unified modeling idea was proposed. On the basis of summarizing both advantag...For the interaction relation between geological object and engineering object in some fields related to water conservancy and hydropower, a unified modeling idea was proposed. On the basis of summarizing both advantages and disadvantages of existing modeling methods, an automatic unified modeling method of both engineering and geological objects based on tri-prism(TP) model was presented. Through the lossless correction algorithm of deviated drill holes contained in this method, the real deviated drill holes could be corrected into the equivalent virtual vertical ones. And the correction accuracy fully meets the requirements of unified modeling. With the virtual vertical drilling data, TIN construction of both cover layer and other stratums would be built in order to obtain the 3D geological model. Then, the engineering design data would be introduced into the 3D geological model for achieving unified modeling. For this process, the volume subdividing and restructuring principles were introduced to deal with the spatial relationships between engineering object and geological object. In order to improve the efficiency of unified modeling, the reconstruction of TIN based on constraint information was also applied in this method. At last, the feasibility and validation of the unified modeling method as well as its relevant key algorithms were verified by specific experiments and analysis of results.展开更多
The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum...The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum policy in the corresponding security level. Through the random survey on the information assets of multiple departments, this paper proposes the relative deviation distance of security policy configuration as risk measure parameter based on the distance of information-state transition(DIT) theory. By quantitatively analyzing the information asset weight, deviation degree and DIT, we establish the evaluation model for information system. With example analysis, the results prove that this method conducts effective risk evaluation on the information system intuitively and reliably, avoids the threat caused by subjective measurement, and shows performance benefits compared with existing solutions. It is not only theoretically but also practically feasible to realize the scientific analysis of security risk for the information system.展开更多
基金Project(BK2012812)supported by the Natural Science Foundation of Jiangsu Province,ChinaProject(51079053)supported by the National Natural Science Foundation of China+2 种基金Project(KYLX_0493)supported by the Scientific Research and Innovation Program for College Graduates of Jiangsu Province,ChinaProject(2014B38814)supported by the Fundamental Research Funds for Central Universities,ChinaProject(2014.1526)supported by the Open Research Fund Program of Key Laboratory of Geological Information of Ministry of Land and Resources,China
文摘For the interaction relation between geological object and engineering object in some fields related to water conservancy and hydropower, a unified modeling idea was proposed. On the basis of summarizing both advantages and disadvantages of existing modeling methods, an automatic unified modeling method of both engineering and geological objects based on tri-prism(TP) model was presented. Through the lossless correction algorithm of deviated drill holes contained in this method, the real deviated drill holes could be corrected into the equivalent virtual vertical ones. And the correction accuracy fully meets the requirements of unified modeling. With the virtual vertical drilling data, TIN construction of both cover layer and other stratums would be built in order to obtain the 3D geological model. Then, the engineering design data would be introduced into the 3D geological model for achieving unified modeling. For this process, the volume subdividing and restructuring principles were introduced to deal with the spatial relationships between engineering object and geological object. In order to improve the efficiency of unified modeling, the reconstruction of TIN based on constraint information was also applied in this method. At last, the feasibility and validation of the unified modeling method as well as its relevant key algorithms were verified by specific experiments and analysis of results.
基金Supported by the National Natural Science Foundation of China(61662009)the Education Reform Project in Guizhou Province(SJJG201404)the Natural Science Foundation of Guizhou Province Education Department(KY(2015)367)
文摘The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum policy in the corresponding security level. Through the random survey on the information assets of multiple departments, this paper proposes the relative deviation distance of security policy configuration as risk measure parameter based on the distance of information-state transition(DIT) theory. By quantitatively analyzing the information asset weight, deviation degree and DIT, we establish the evaluation model for information system. With example analysis, the results prove that this method conducts effective risk evaluation on the information system intuitively and reliably, avoids the threat caused by subjective measurement, and shows performance benefits compared with existing solutions. It is not only theoretically but also practically feasible to realize the scientific analysis of security risk for the information system.