期刊文献+
共找到889篇文章
< 1 2 45 >
每页显示 20 50 100
An Active Deception Defense Model Based on Address Mutation and Fingerprint Camouflage
1
作者 Wang Shuo Chu Jiang +3 位作者 Pei Qingqi Shao Feng Yuan Shuai Zhong Xiaoge 《China Communications》 SCIE CSCD 2024年第7期212-223,共12页
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M... The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation. 展开更多
关键词 address mutation deception defense fingerprint camouflage moving target defense probabilistic model
下载PDF
A Well Productivity Model for Multi-Layered Marine and Continental Transitional Reservoirs with Complex Fracture Networks
2
作者 Huiyan Zhao Xuezhong Chen +3 位作者 Zhijian Hu Man Chen Bo Xiong Jianying Yang 《Fluid Dynamics & Materials Processing》 EI 2024年第6期1313-1330,共18页
Using the typical characteristics of multi-layered marine and continental transitional gas reservoirs as a basis,a model is developed to predict the related well production rate.This model relies on the fractal theory... Using the typical characteristics of multi-layered marine and continental transitional gas reservoirs as a basis,a model is developed to predict the related well production rate.This model relies on the fractal theory of tortuous capillary bundles and can take into account multiple gas flow mechanisms at the micrometer and nanometer scales,as well as the flow characteristics in different types of thin layers(tight sandstone gas,shale gas,and coalbed gas).Moreover,a source-sink function concept and a pressure drop superposition principle are utilized to introduce a coupled flow model in the reservoir.A semi-analytical solution for the production rate is obtained using a matrix iteration method.A specific well is selected for fitting dynamic production data,and the calculation results show that the tight sandstone has the highest gas production per unit thickness compared with the other types of reservoirs.Moreover,desorption and diffusion of coalbed gas and shale gas can significantly contribute to gas production,and the daily production of these two gases decreases rapidly with decreasing reservoir pressure.Interestingly,the gas production from fractures exhibits an approximately U-shaped distribution,indicating the need to optimize the spacing between clusters during hydraulic fracturing to reduce the area of overlapping fracture control.The coal matrix water saturation significantly affects the coalbed gas production,with higher water saturation leading to lower production. 展开更多
关键词 Marine-continental transitional reservoir multi-layered reservoir seepage mechanisms apparent permeability hydraulic horizontal well productivity model
下载PDF
A flexible ultra-broadband multi-layered absorber working at 2 GHz-40 GHz printed by resistive ink
3
作者 汪涛 闫玉伦 +3 位作者 陈巩华 李迎 胡俊 毛剑波 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期329-333,共5页
A flexible extra broadband metamaterial absorber(MMA)stacked with five layers working at 2 GHz–40 GHz is investigated.Each layer is composed of polyvinyl chloride(PVC),polyimide(PI),and a frequency selective surface(... A flexible extra broadband metamaterial absorber(MMA)stacked with five layers working at 2 GHz–40 GHz is investigated.Each layer is composed of polyvinyl chloride(PVC),polyimide(PI),and a frequency selective surface(FSS),which is printed on PI using conductive ink.To investigate this absorber,both one-dimensional analogous circuit analysis and three-dimensional full-wave simulation based on a physical model are provided.Various crucial electromagnetic properties,such as absorption,effective impedance,complex permittivity and permeability,electric current distribution and magnetic field distribution at resonant peak points,are studied in detail.Analysis shows that the working frequency of this absorber covers entire S,C,X,Ku,K and Ka bands with a minimum thickness of 0.098λ_(max)(λ_(max) is the maximum wavelength in the absorption band),and the fractional bandwidth(FBW)reaches 181.1%.Moreover,the reflection coefficient is less than-10 dB at 1.998 GHz–40.056 GHz at normal incidence,and the absorptivity of the plane wave is greater than 80%when the incident angle is smaller than 50°.Furthermore,the proposed absorber is experimentally validated,and the experimental results show good agreement with the simulation results,which demonstrates the potential applicability of this absorber at 2 GHz–40 GHz. 展开更多
关键词 extra broadband physical model flexible metamaterial absorber multi-layer frequency selective surface
下载PDF
Adversarial attacks and defenses for digital communication signals identification
4
作者 Qiao Tian Sicheng Zhang +1 位作者 Shiwen Mao Yun Lin 《Digital Communications and Networks》 SCIE CSCD 2024年第3期756-764,共9页
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become ... As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and industry.However,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial attacks.Adversarial examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong results.Therefore,the security of AI models for the digital communication signals identification is the premise of its efficient and credible applications.In this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial principle.Next we present more detailed adversarial indicators to evaluate attack and defense behavior.Finally,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research. 展开更多
关键词 Digital communication signals identification AI model Adversarial attacks Adversarial defenses Adversarial indicators
下载PDF
The role of polyurethane foam compressible layer in the mechanical behaviour of multi-layer yielding supports for deep soft rock tunnels
5
作者 Haibo Wang Fuming Wang +3 位作者 Chengchao Guo Lei Qin Jun Liu Tongming Qu 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第11期4554-4569,共16页
The polyurethane foam(PU)compressible layer is a viable solution to the problem of damage to the secondary lining in squeezing tunnels.Nevertheless,the mechanical behaviour of the multi-layer yielding supports has not... The polyurethane foam(PU)compressible layer is a viable solution to the problem of damage to the secondary lining in squeezing tunnels.Nevertheless,the mechanical behaviour of the multi-layer yielding supports has not been thoroughly investigated.To fill this gap,large-scale model tests were conducted in this study.The synergistic load-bearing mechanics were analyzed using the convergenceconfinement method.Two types of multi-layer yielding supports with different thicknesses(2.5 cm,3.75 cm and 5 cm)of PU compressible layers were investigated respectively.Digital image correlation(DIC)analysis and acoustic emission(AE)techniques were used for detecting the deformation fields and damage evolution of the multi-layer yielding supports in real-time.Results indicated that the loaddisplacement relationship of the multi-layer yielding supports could be divided into the crack initiation,crack propagation,strain-hardening,and failure stages.Compared with those of the stiff support,the toughness,deformability and ultimate load of the yielding supports were increased by an average of 225%,61%and 32%,respectively.Additionally,the PU compressible layer is positioned between two primary linings to allow the yielding support to have greater mechanical properties.The analysis of the synergistic bearing effect suggested that the thickness of PU compressible layer and its location significantly affect the mechanical properties of the yielding supports.The use of yielding supports with a compressible layer positioned between the primary and secondary linings is recommended to mitigate the effects of high geo-stress in squeezing tunnels. 展开更多
关键词 multi-layer yielding supports Polyurethane foam compressible layer Synergistic mechanism Large-scale model test Deep soft rock tunnels
下载PDF
GUARDIAN: A Multi-Tiered Defense Architecture for Thwarting Prompt Injection Attacks on LLMs
6
作者 Parijat Rai Saumil Sood +1 位作者 Vijay K. Madisetti Arshdeep Bahga 《Journal of Software Engineering and Applications》 2024年第1期43-68,共26页
This paper introduces a novel multi-tiered defense architecture to protect language models from adversarial prompt attacks. We construct adversarial prompts using strategies like role emulation and manipulative assist... This paper introduces a novel multi-tiered defense architecture to protect language models from adversarial prompt attacks. We construct adversarial prompts using strategies like role emulation and manipulative assistance to simulate real threats. We introduce a comprehensive, multi-tiered defense framework named GUARDIAN (Guardrails for Upholding Ethics in Language Models) comprising a system prompt filter, pre-processing filter leveraging a toxic classifier and ethical prompt generator, and pre-display filter using the model itself for output screening. Extensive testing on Meta’s Llama-2 model demonstrates the capability to block 100% of attack prompts. The approach also auto-suggests safer prompt alternatives, thereby bolstering language model security. Quantitatively evaluated defense layers and an ethical substitution mechanism represent key innovations to counter sophisticated attacks. The integrated methodology not only fortifies smaller LLMs against emerging cyber threats but also guides the broader application of LLMs in a secure and ethical manner. 展开更多
关键词 Large Language models (LLMs) Adversarial Attack Prompt Injection Filter defense Artificial Intelligence Machine Learning CYBERSECURITY
下载PDF
Threat Modeling and Application Research Based on Multi-Source Attack and Defense Knowledge
7
作者 Shuqin Zhang Xinyu Su +2 位作者 Peiyu Shi Tianhui Du Yunfei Han 《Computers, Materials & Continua》 SCIE EI 2023年第10期349-377,共29页
Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to u... Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment. 展开更多
关键词 Multi-source data fusion threat modeling threat propagation path knowledge graph intelligent defense decision-making
下载PDF
Chained Dual-Generative Adversarial Network:A Generalized Defense Against Adversarial Attacks 被引量:1
8
作者 Amitoj Bir Singh Lalit Kumar Awasthi +3 位作者 Urvashi Mohammad Shorfuzzaman Abdulmajeed Alsufyani Mueen Uddin 《Computers, Materials & Continua》 SCIE EI 2023年第2期2541-2555,共15页
Neural networks play a significant role in the field of image classification.When an input image is modified by adversarial attacks,the changes are imperceptible to the human eye,but it still leads to misclassificatio... Neural networks play a significant role in the field of image classification.When an input image is modified by adversarial attacks,the changes are imperceptible to the human eye,but it still leads to misclassification of the images.Researchers have demonstrated these attacks to make production self-driving cars misclassify StopRoad signs as 45 Miles Per Hour(MPH)road signs and a turtle being misclassified as AK47.Three primary types of defense approaches exist which can safeguard against such attacks i.e.,Gradient Masking,Robust Optimization,and Adversarial Example Detection.Very few approaches use Generative Adversarial Networks(GAN)for Defense against Adversarial Attacks.In this paper,we create a new approach to defend against adversarial attacks,dubbed Chained Dual-Generative Adversarial Network(CD-GAN)that tackles the defense against adversarial attacks by minimizing the perturbations of the adversarial image using iterative oversampling and undersampling using GANs.CD-GAN is created using two GANs,i.e.,CDGAN’s Sub-ResolutionGANandCDGAN’s Super-ResolutionGAN.The first is CDGAN’s Sub-Resolution GAN which takes the original resolution input image and oversamples it to generate a lower resolution neutralized image.The second is CDGAN’s Super-Resolution GAN which takes the output of the CDGAN’s Sub-Resolution and undersamples,it to generate the higher resolution image which removes any remaining perturbations.Chained Dual GAN is formed by chaining these two GANs together.Both of these GANs are trained independently.CDGAN’s Sub-Resolution GAN is trained using higher resolution adversarial images as inputs and lower resolution neutralized images as output image examples.Hence,this GAN downscales the image while removing adversarial attack noise.CDGAN’s Super-Resolution GAN is trained using lower resolution adversarial images as inputs and higher resolution neutralized images as output images.Because of this,it acts as an Upscaling GAN while removing the adversarial attak noise.Furthermore,CD-GAN has a modular design such that it can be prefixed to any existing classifier without any retraining or extra effort,and 2542 CMC,2023,vol.74,no.2 can defend any classifier model against adversarial attack.In this way,it is a Generalized Defense against adversarial attacks,capable of defending any classifier model against any attacks.This enables the user to directly integrate CD-GANwith an existing production deployed classifier smoothly.CD-GAN iteratively removes the adversarial noise using a multi-step approach in a modular approach.It performs comparably to the state of the arts with mean accuracy of 33.67 while using minimal compute resources in training. 展开更多
关键词 Adversarial attacks GAN-based adversarial defense image classification models adversarial defense
下载PDF
Blast wave characteristics of multi-layer composite charge:Theoretical analysis,numerical simulation,and experimental validation 被引量:1
9
作者 Jun-bao Li Wei-bing Li +2 位作者 Xiao-wen Hong Jia-xin Yu Jian-jun Zhu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第1期91-102,共12页
This article investigates the characteristics of shock wave overpressure generated by multi-layer composite charge under different detonation modes.Combining dimensional analysis and the explosion mechanism of the cha... This article investigates the characteristics of shock wave overpressure generated by multi-layer composite charge under different detonation modes.Combining dimensional analysis and the explosion mechanism of the charge,a peak overpressure prediction model for the composite charge under singlepoint detonation and simultaneous detonation was established.The effects of the charge structure and initiation method on the overpressure field characteristics were investigated in AUTODYN simulation.The accuracy of the prediction model and the reliability of the numerical simulation method were subsequently verified in a series of static explosion experiments.The results reveal that the mass of the inner charge was the key factor determining the peak overpressure of the composite charge under single-point detonation.The peak overpressure in the radial direction improved apparently with an increase in the aspect ratio of the charge.The overpressure curves in the axial direction exhibited a multi-peak phenomenon,and the secondary peak overpressure even exceeded the primary peak at distances of 30D and 40D(where D is the charge diameter).The difference in peak overpressure among azimuth angles of 0-90°gradually decreased with an increase in the propagation distance of the shock wave.The coupled effect of the detonation energy of the inner and outer charge under simultaneous detonation improved the overpressure in both radial and axial directions.The difference in peak overpressure obtained from model prediction and experimental measurements was less than 16.4%. 展开更多
关键词 Blast wave characteristics multi-layer composite charge Dimensional analysis AUTODYN mapping model Explosion experiment
下载PDF
Ripple-effect analysis for operational architecture of air defense systems with supernetwork modeling 被引量:5
10
作者 Zhigang Zou Fuxian Liu +2 位作者 Shiman Sun Lu Xia Chengli Fan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第2期249-264,共16页
In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork model... In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork modeling approach for the OAADS is put for- ward by extending granular computing. Based on that operational units and links are equal to different information granularities, the supernetwork framework of the OAADS is constructed as a “four- network within two-layer” structure by forming dynamic operating coalitions, and measuring indexes of the ripple-effect analysis for the OAADS are given combining with Laplace spectral radius. In this framework, via analyzing multidimensional attributes which inherit relations between operational units in different granular scales, an extended granular computing is put forward integrating with a topological structure. Then the operation process within the supernetwork framework, including transformation relations be- tween two layers in the vertical view and mapping relations among functional networks in the horizontal view, is studied in quantity. As the application case shows, comparing with previous modeling approaches, the supernetwork model can validate and analyze the operation mechanism in the air defense architecture, and the ripple-effect analysis can be used to confirm the key operational unit with micro and macro viewpoints. 展开更多
关键词 operational architecture air defense system super-network model Laplace spectral radius ripple-effect analysis.
下载PDF
Three-Dimensional Modelling of a Multi-Layer Sandstone Reservoir: the Sebei Gas Field, China 被引量:6
11
作者 OU Chenghua WANG Xiaolu +1 位作者 LI Chaochun HE Yan 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2016年第1期209-221,共13页
Multi-layer sandstone reservoirs occur globally and are currently in international production. The 3D characteristics of these reservoirs are too complicated to be accurately delineated by general structural-facies-re... Multi-layer sandstone reservoirs occur globally and are currently in international production. The 3D characteristics of these reservoirs are too complicated to be accurately delineated by general structural-facies-reservoir modelling. In view of the special geological features, such as the vertical architecture of sandstone and mudstone interbeds, the lateral stable sedimentation and the strong heterogeneity of reservoir poroperm and fluid distribution, we developed a new three-stage and six-phase procedure for 3D characterization of multi-layer sandstone reservoirs. The procedure comprises two-phase structural modelling, two-phase facies modelling and modelling of two types of reservoir properties. Using this procedure, we established models of the formation structure, sand body structure and microfacies, reservoir facies and properties including porosity, permeability and gas saturation and provided a 3D fine-scale, systematic characterization of the Sebei multi-layer sandstone gas field, China. This new procedure, validated by the Sebei gas field, can be applied to characterize similar multi-layer sandstone reservoirs. 展开更多
关键词 multi-layer sandstone reservoir 3D characterization PROCEDURE Sebei gas field geological model reservoir modelling
下载PDF
Explosive synchronization of multi-layer complex networks based on star connection between layers with delay
12
作者 金彦亮 韩钱源 +2 位作者 郭润珠 高塬 沈礼权 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第10期343-349,共7页
Explosive synchronization(ES)is a kind of first-order jump phenomenon that exists in physical and biological systems.In recent years,researchers have focused on ES between single-layer and multi-layer networks.Most re... Explosive synchronization(ES)is a kind of first-order jump phenomenon that exists in physical and biological systems.In recent years,researchers have focused on ES between single-layer and multi-layer networks.Most research on complex networks with delay has focused on single-layer or double-layer networks,multi-layer networks are seldom explored.In this paper,we propose a Kuramoto model of frequency weights in multi-layer complex networks with delay and star connections between layers.Through theoretical analysis and numerical verification,the factors affecting the backward critical coupling strength are analyzed.The results show that the interaction between layers and the average node degree has a direct effect on the backward critical coupling strength of each layer network.The location of the delay,the size of the delay,the number of network layers,the number of nodes,and the network topology are revealed to have no direct impact on the backward critical coupling strength of the network.Delay is introduced to explore the influence of delay and other related parameters on ES. 展开更多
关键词 multi-layer networks Kuramoto model explosive synchronization DELAY
下载PDF
Multi-layer Tectonic Model for Intraplate Deformation and Plastic-Flow Network in the Asian Continental Lithosphere 被引量:4
13
作者 Wang Shengzu Institute of Geology, State Seismological Bureau, Beijing Liu Linqun 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 1993年第3期247-271,共25页
In a large area of the east—central Asian continent there is a unified seismic network system composed of two families of large—seismic belts that intersect conjugately. Such a seismic network in the middle—upper c... In a large area of the east—central Asian continent there is a unified seismic network system composed of two families of large—seismic belts that intersect conjugately. Such a seismic network in the middle—upper crust is actually a response to the plastic flow network in the lower lithosphere including the lower crust and lithospheric mantle. The existence of the unified plastic flow system confirms that the driving force for intraplate tectonic deformation results mainly from the compression of the India plate, while the long-range transmission of the force is carried out chiefly by means of plastic flow. The plastic flow network has a control over the intraplate tectonic deformation. 展开更多
关键词 Continental lithosphere tectonic deformation multi-layer tectonic model large-scale seismic belt seismic network plastic flow network
下载PDF
Modeling Locking Angle of the Multi-layered Biaxial Weft Knitted Fabric in Shear Deformation 被引量:1
14
作者 张艳明 姜亚明 邱冠雄 《Journal of Donghua University(English Edition)》 EI CAS 2006年第1期130-135,共6页
This paper introduces the construction of the multi-layered biaxial weft knitted fabric (MBWK fabric) and studies the locking angle of this kind of fabric. Moreover, a locking angle model of the MBWK fabric is estab... This paper introduces the construction of the multi-layered biaxial weft knitted fabric (MBWK fabric) and studies the locking angle of this kind of fabric. Moreover, a locking angle model of the MBWK fabric is established for the first time according to its unique construction. Two kinds of locking angles are considered under different restraint conditions: the locking angle θ1 controlled by the inserting yarns and the locking angle θ2 controlled by the stitch yarns. It is concluded that the ultimate value of the locking angle θ is the larger one of the two angles. 展开更多
关键词 locking angle model multi-layered biaxial weft knitted fabrics.
下载PDF
Immune multi-agent model using vaccine for cooperative air-defense system of systems for surface warship formation based on danger theory 被引量:9
15
作者 Jun Wang Xiaozhe Zhao +2 位作者 Beiping Xu Wei Wang Zhiyong Niu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第6期946-953,共8页
Aiming at the problem on cooperative air-defense of surface warship formation, this paper maps the cooperative airdefense system of systems (SoS) for surface warship formation (CASoSSWF) to the biological immune s... Aiming at the problem on cooperative air-defense of surface warship formation, this paper maps the cooperative airdefense system of systems (SoS) for surface warship formation (CASoSSWF) to the biological immune system (BIS) according to the similarity of the defense mechanism and characteristics between the CASoSSWF and the BIS, and then designs the models of components and the architecture for a monitoring agent, a regulating agent, a killer agent, a pre-warning agent and a communicating agent by making use of the theories and methods of the artificial immune system, the multi-agent system (MAS), the vaccine and the danger theory (DT). Moreover a new immune multi-agent model using vaccine based on DT (IMMUVBDT) for the cooperative air-defense SoS is advanced. The immune response and immune mechanism of the CASoSSWF are analyzed. The model has a capability of memory, evolution, commendable dynamic environment adaptability and self-learning, and embodies adequately the cooperative air-defense mechanism for the CASoSSWF. Therefore it shows a novel idea for the CASoSSWF which can provide conception models for a surface warship formation operation simulation system. 展开更多
关键词 immune multi-agent model (IMM) VACCINE surface warship formation cooperative air-defense system of systems (CASoS) danger theory (DT)
下载PDF
NEW MODEL OF GAS FLOW PROBLEM IN MULTI-LAYERED GAS RESERVOIR AND APPLICATION
16
作者 李笑萍 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 1993年第12期1133-1141,共9页
In this paper, the new model of the real gas filtration problem has been presented multi-layered gas reservoir, when a gas well output and wellbore storage may be variable, and have obtained the exact solutions of pre... In this paper, the new model of the real gas filtration problem has been presented multi-layered gas reservoir, when a gas well output and wellbore storage may be variable, and have obtained the exact solutions of pressure distribution for each reservoir bed under three kinds of typical out-boundary conditions. As a special case, according to the new model have also obtained the qxact solutions of presssure distribution in homogeneous reservoir and is given important application in gas reservoir development. 展开更多
关键词 multi-layered gas reservoir gas flow model of real gas filtration
下载PDF
Multi-layer Evacuation Model: A solution of Emergency Evacuation
17
作者 JIANG Hui 《International English Education Research》 2019年第1期8-12,共5页
The large-scale population accumulation in modem cities has become one of their important characteristics. With the development of urbanization in the world, the large-scale gathering activities are increasing, and th... The large-scale population accumulation in modem cities has become one of their important characteristics. With the development of urbanization in the world, the large-scale gathering activities are increasing, and the accidents caused by them are also rising. At the same time, the evacuation of visitors is faced with severe challenges in the event of an emergency such as terrorist attacks. The main problem for tourists is how to evacuate quickly and safely in an emergency. The Louvre is one of the largest and most visited art museums in the world.Visitors are large and come from all over the world, the volume of passengers varies greatly, and the interior architecture design is complicated, etc. These characteristics challenge the design of evacuation paths. Based on the consideration of these factors, we should develop the optimal evacuation scheme and minimize the accident risk and evacuation cost. 展开更多
关键词 EMERGENCY EVACUATION multi-layer EVACUATION model
下载PDF
Research on the Propagation Models and Defense Techniques of Internet Worms
18
作者 Tian-Yun Huang 《Journal of Electronic Science and Technology of China》 2008年第1期32-38,共7页
Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give... Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out. 展开更多
关键词 defense system Internet worm network security propagation model
下载PDF
Multi-agent decision support system for missile defense based on improved PSO algorithm 被引量:5
19
作者 Zilong Cheng Li Fan Yulin Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2017年第3期514-525,共12页
Ballistic missile defense system (BMDS) is important for its special role in ensuring national security and maintaining strategic balance. Research on modeling and simulation of the BMDS beforehand is essential as dev... Ballistic missile defense system (BMDS) is important for its special role in ensuring national security and maintaining strategic balance. Research on modeling and simulation of the BMDS beforehand is essential as developing a real one requires lots of manpower and resources. BMDS is a typical complex system for its nonlinear, adaptive and uncertainty characteristics. The agent-based modeling method is well suited for the complex system whose overall behaviors are determined by interactions among individual elements. A multi-agent decision support system (DSS), which includes missile agent, radar agent and command center agent, is established based on the studies of structure and function of BMDS. Considering the constraints brought by radar, intercept missile, offensive missile and commander, the objective function of DSS is established. In order to dynamically generate the optimal interception plan, the variable neighborhood negative selection particle swarm optimization (VNNSPSO) algorithm is proposed to support the decision making of DSS. The proposed algorithm is compared with the standard PSO, constriction factor PSO (CFPSO), inertia weight linear decrease PSO (LDPSO), variable neighborhood PSO (VNPSO) algorithm from the aspects of convergence rate, iteration number, average fitness value and standard deviation. The simulation results verify the efficiency of the proposed algorithm. The multi-agent DSS is developed through the Repast simulation platform and the constructed DSS can generate intercept plans automatically and support three-dimensional dynamic display of missile defense process. 展开更多
关键词 agent-based modeling missile defense system decision support system (DSS) variable neighborhood negative selection particle swarm optimization (PSO)
下载PDF
Energy Absorption Diagrams of Multi-layer Corrugated Boards 被引量:5
20
作者 王冬梅 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS 2010年第1期58-61,共4页
Based on the static compression experiments, the compressive stress-strain curve of multi-layer corrugated boards is simplified into three sections of linear elasticity, sub-buckling going with local collapse and dens... Based on the static compression experiments, the compressive stress-strain curve of multi-layer corrugated boards is simplified into three sections of linear elasticity, sub-buckling going with local collapse and densification. By considering the structure factors of multi-layer corrugated boards, the energy absorption model is obtained and characterized by the structure factors of corrugated cell-wall. The model is standardized by the solid modulus and it is universal for corrugated structures of different basis material. In the liner-elastic section, with the increase of the load, the energy absorption per unit volume of multi-layer corrugated boards gradually increases; in the sub-buckling section going with local collapse, the compression resistance of multi-layer corrugated boards goes on under a nearly constant load, but the energy absorption per unit volume rapidly increases with the increase of the compression strain. It is shown as an ascending curve in the energy absorption diagram. In the densification section, the corrugated sandwich core has no energy absorption capability. A good consistency is achieved between theoretical and experimental energy absorption curves. In designing the cushioning package, the cushioning properties can be evaluated by the theoretical model without more experiments. The suggested method to develop the energy absorption diagram for corrugated boards can be used to characterize the cushioning properties and optimize the structures of corrugated sandwich structures. 展开更多
关键词 multi-layer corrugated boards stress strain curve energy absorption diagram modelLING
下载PDF
上一页 1 2 45 下一页 到第
使用帮助 返回顶部