期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Slope deformation partitioning and monitoring points optimization based on cluster analysis
1
作者 LI Yuan-zheng SHEN Jun-hui +3 位作者 ZHANG Wei-xin ZHANG Kai-qiang PENG Zhang-hai HUANG Meng 《Journal of Mountain Science》 SCIE CSCD 2023年第8期2405-2421,共17页
The scientific and fair positioning of monitoring locations for surface displacement on slopes is a prerequisite for early warning and forecasting.However,there is no specific provision on how to effectively determine... The scientific and fair positioning of monitoring locations for surface displacement on slopes is a prerequisite for early warning and forecasting.However,there is no specific provision on how to effectively determine the number and location of monitoring points according to the actual deformation characteristics of the slope.There are still some defects in the layout of monitoring points.To this end,based on displacement data series and spatial location information of surface displacement monitoring points,by combining displacement series correlation and spatial distance influence factors,a spatial deformation correlation calculation model of slope based on clustering analysis was proposed to calculate the correlation between different monitoring points,based on which the deformation area of the slope was divided.The redundant monitoring points in each partition were eliminated based on the partition's outcome,and the overall optimal arrangement of slope monitoring points was then achieved.This method scientifically addresses the issues of slope deformation zoning and data gathering overlap.It not only eliminates human subjectivity from slope deformation zoning but also increases the efficiency and accuracy of slope monitoring.In order to verify the effectiveness of the method,a sand-mudstone interbedded CounterTilt excavation slope in the Chongqing city of China was used as the research object.Twenty-four monitoring points deployed on this slope were monitored for surface displacement for 13 months.The spatial location of the monitoring points was discussed.The results show that the proposed method of slope deformation zoning and the optimized placement of monitoring points are feasible. 展开更多
关键词 Excavation slope Surface displacement monitoring Spatial deformation analysis Clustering analysis Slope deformation partitioning monitoring point optimization
下载PDF
Optimization of Well Position and Sampling Frequency for Groundwater Monitoring and Inverse Identification of Contamination Source Conditions Using Bayes’Theorem 被引量:1
2
作者 Shuangsheng Zhang Hanhu Liu +3 位作者 Jing Qiang Hongze Gao Diego Galar Jing Lin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2019年第5期373-394,共22页
Coupling Bayes’Theorem with a two-dimensional(2D)groundwater solute advection-diffusion transport equation allows an inverse model to be established to identify a set of contamination source parameters including sour... Coupling Bayes’Theorem with a two-dimensional(2D)groundwater solute advection-diffusion transport equation allows an inverse model to be established to identify a set of contamination source parameters including source intensity(M),release location(0 X,0 Y)and release time(0 T),based on monitoring well data.To address the issues of insufficient monitoring wells or weak correlation between monitoring data and model parameters,a monitoring well design optimization approach was developed based on the Bayesian formula and information entropy.To demonstrate how the model works,an exemplar problem with an instantaneous release of a contaminant in a confined groundwater aquifer was employed.The information entropy of the model parameters posterior distribution was used as a criterion to evaluate the monitoring data quantity index.The optimal monitoring well position and monitoring frequency were solved by the two-step Monte Carlo method and differential evolution algorithm given a known well monitoring locations and monitoring events.Based on the optimized monitoring well position and sampling frequency,the contamination source was identified by an improved Metropolis algorithm using the Latin hypercube sampling approach.The case study results show that the following parameters were obtained:1)the optimal monitoring well position(D)is at(445,200);and 2)the optimal monitoring frequency(Δt)is 7,providing that the monitoring events is set as 5 times.Employing the optimized monitoring well position and frequency,the mean errors of inverse modeling results in source parameters(M,X0,Y0,T0)were 9.20%,0.25%,0.0061%,and 0.33%,respectively.The optimized monitoring well position and sampling frequency canIt was also learnt that the improved Metropolis-Hastings algorithm(a Markov chain Monte Carlo method)can make the inverse modeling result independent of the initial sampling points and achieves an overall optimization,which significantly improved the accuracy and numerical stability of the inverse modeling results. 展开更多
关键词 Contamination source identification monitoring well optimization Bayes’Theorem information entropy differential evolution algorithm Metropolis Hastings algorithm Latin hypercube sampling
下载PDF
Optimization of Shanghai marine environment monitoring sites by integrating spatial correlation and stratified heterogeneity 被引量:2
3
作者 FAN Haimei GAO Bingbo +1 位作者 XU Ren WANG Jinfeng 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2017年第2期111-121,共11页
The water quality grades of phosphate(PO4-P) and dissolved inorganic nitrogen(DIN) are integrated by spatial partitioning to fit the global and local semi-variograms of these nutrients. Leave-one-out cross validat... The water quality grades of phosphate(PO4-P) and dissolved inorganic nitrogen(DIN) are integrated by spatial partitioning to fit the global and local semi-variograms of these nutrients. Leave-one-out cross validation is used to determine the statistical inference method. To minimize absolute average errors and error mean squares,stratified Kriging(SK) interpolation is applied to DIN and ordinary Kriging(OK) interpolation is applied to PO4-P.Ten percent of the sites is adjusted by considering their impact on the change in deviations in DIN and PO4-P interpolation and the resultant effect on areas with different water quality grades. Thus, seven redundant historical sites are removed. Seven historical sites are distributed in areas with water quality poorer than Grade IV at the north and south branches of the Changjiang(Yangtze River) Estuary and at the coastal region north of the Hangzhou Bay. Numerous sites are installed in these regions. The contents of various elements in the waters are not remarkably changed, and the waters are mixed well. Seven sites that have been optimized and removed are set to water with quality Grades III and IV. Optimization and adjustment of unrestricted areas show that the optimized and adjusted sites are mainly distributed in regions where the water quality grade undergoes transition.Therefore, key sites for adjustment and optimization are located at the boundaries of areas with different water quality grades and seawater. 展开更多
关键词 area of water quality grade stratified Kriging(SK) leave-one-out cross validation method spatial simulated annealing method monitoring sites optimization
下载PDF
Preliminary Hydrogeologic Modeling and Optimal Monitoring Network Design for a Contaminated Abandoned Mine Site Area: Application of Developed Monitoring Network Design Software 被引量:3
4
作者 Bithin Datta Frederic Durand +4 位作者 Solemne Laforge Om Prakash Hamed K. Esfahani Sreenivasulu Chadalavada Ravi Naidu 《Journal of Water Resource and Protection》 2016年第1期46-64,共19页
In abandoned mine sites, i.e., mine sites where mining operations have ended, wide spread contaminations are often evident, but the potential sources and pathways of contamination especially through the subsurface, ar... In abandoned mine sites, i.e., mine sites where mining operations have ended, wide spread contaminations are often evident, but the potential sources and pathways of contamination especially through the subsurface, are difficult to identify due to inadequate and sparse geochemical measurements available. Therefore, it is essential to design and implement a planned monitoring net-work to obtain essential information required for establishing the potential contamination source locations, i.e., waste dumps, tailing dams, pits and possible pathways through the subsurface, and to design a remediation strategy for rehabilitation. This study presents an illustrative application of modeling the flow and transport processes and monitoring network design in a study area hydrogeologically resembling an abandoned mine site in Queensland, Australia. In this preliminary study, the contaminant transport process modeled does not incorporate the reactive geochemistry of the contaminants. The transport process is modeled considering a generic conservative contaminant for the illustrative purpose of showing the potential application of an optimal monitoring design methodology. This study aims to design optimal monitoring network to: 1) minimize the contaminant solute mass estimation error;2) locate the plume boundary;3) select the monitoring locations with (potentially) high concentrations. A linked simulation optimization based methodology is utilized for optimal monitoring network design. The methodology is applied utilizing a recently developed software package CARE-GWMND, developed at James Cook University for optimal monitoring network design. Given the complexity of the groundwater systems and the sparsity of pollutant concentration observation data from the field, this software is capable of simulating the groundwater flow and solute transport with spatial interpolation of data from a sparse set of available data, and it utilizes the optimization algorithm to determine optimum locations for implementing monitoring wells. 展开更多
关键词 Groundwater Contamination Optimal monitoring Network Design Linked Simulation optimization Methodology Kriging Interpolation Mine Site Contamination
下载PDF
Integrated Sequential Groundwater Contaminant Source Characterization and Pareto-Optimal Monitoring Network Design Application for a Contaminated Aquifer Site
5
作者 Hamed K. Esfahani Adrian Heggie Bithin Datta 《Journal of Water Resource and Protection》 CAS 2022年第7期542-570,共29页
Accurate and reliable groundwater contaminant source characterization with limited contaminant concentration monitoring measurement data remains a challenging problem. This study presents an illustrative application o... Accurate and reliable groundwater contaminant source characterization with limited contaminant concentration monitoring measurement data remains a challenging problem. This study presents an illustrative application of developed methodologies to a real-life contaminated aquifer. The source characterization and optimal monitoring network design methodologies are used sequentially for a contaminated aquifer site located in New South Wales, Australia. Performance of the integrated optimal source characterization methodology combining linked simulation-optimization, fractal singularity mapping technique (FSMT) and Pareto optimal solutions is evaluated. This study presents an integrated application of optimal source characterization with spatiotemporal concentration measurement data obtained from sequentially designed monitoring networks. The proposed sequential source characterization and monitoring network design methodology shows efficiency in identifying the unknown source characteristics. The designed monitoring network achieves comparable efficiency and accuracy utilizing much smaller number of monitoring locations as compared to a more ideal scenario where concentration measurements from a very large number of widespread monitoring wells are available. The proposed methodology is potentially useful for efficient characterization of unknown contaminant sources in a complex contaminated aquifer site, where very little initial concentration measurement data are available. The illustrative application of the methodology to a real-life contaminated aquifer site demonstrates the capability and efficiency of the proposed methodology. 展开更多
关键词 Groundwater Source Characterization Optimal monitoring Network Design Fractal Singularity Mapping Technique
下载PDF
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs
6
作者 Armita Kazeminajafabadi Mahdi Imani 《Cybersecurity》 EI CSCD 2024年第1期1-15,共15页
Early attack detection is essential to ensure the security of complex networks,especially those in critical infrastructures.This is particularly crucial in networks with multi-stage attacks,where multiple nodes are co... Early attack detection is essential to ensure the security of complex networks,especially those in critical infrastructures.This is particularly crucial in networks with multi-stage attacks,where multiple nodes are connected to external sources,through which attacks could enter and quickly spread to other network elements.Bayesian attack graphs(BAGs)are powerful models for security risk assessment and mitigation in complex networks,which provide the probabilistic model of attackers’behavior and attack progression in the network.Most attack detection techniques developed for BAGs rely on the assumption that network compromises will be detected through routine monitoring,which is unrealistic given the ever-growing complexity of threats.This paper derives the optimal minimum mean square error(MMSE)attack detection and monitoring policy for the most general form of BAGs.By exploiting the structure of BAGs and their partial and imperfect monitoring capacity,the proposed detection policy achieves the MMSE optimality possible only for linear-Gaussian state space models using Kalman filtering.An adaptive resource monitoring policy is also introduced for monitoring nodes if the expected predictive error exceeds a user-defined value.Exact and efficient matrix-form computations of the proposed policies are provided,and their high performance is demonstrated in terms of the accuracy of attack detection and the most efficient use of available resources using synthetic Bayesian attack graphs with different topologies. 展开更多
关键词 Multi-stage attacks Bayesian attack graph Attack detection Optimal monitoring
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部