期刊文献+
共找到60篇文章
< 1 2 3 >
每页显示 20 50 100
How the Information and Communications Technology Threaten Our Privacy: The Case of Email and P2P Propagation Models 被引量:1
1
作者 Han-Wei Hsiao Cathy S. Lin Kun-Yu Chert 《Computer Technology and Application》 2011年第10期765-773,共9页
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat... With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy. 展开更多
关键词 Information privacy propagation model EMAIL peer-to-peer (P2P)
下载PDF
Research on the Propagation Models and Defense Techniques of Internet Worms
2
作者 Tian-Yun Huang 《Journal of Electronic Science and Technology of China》 2008年第1期32-38,共7页
Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give... Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out. 展开更多
关键词 Defense system Internet worm network security propagation model
下载PDF
An Improved Coupling of Numerical and Physical Models for Simulating Wave Propagation 被引量:1
3
作者 阳志文 柳淑学 李金宣 《China Ocean Engineering》 SCIE EI CSCD 2014年第1期1-16,共16页
An improved coupling of numerical and physical models for simulating 2D wave propagation is developed in this paper. In the proposed model, an unstructured finite element model (FEM) based Boussinesq equations is ap... An improved coupling of numerical and physical models for simulating 2D wave propagation is developed in this paper. In the proposed model, an unstructured finite element model (FEM) based Boussinesq equations is applied for the numerical wave simulation, and a 2D piston-type wavemaker is used for the physical wave generation. An innovative scheme combining fourth-order Lagrange interpolation and Runge-Kutta scheme is described for solving the coupling equation. A Transfer function modulation method is presented to minimize the errors induced from the hydrodynamic invalidity of the coupling model and/or the mechanical capability of the wavemaker in area where nonlinearities or dispersion predominate. The overall performance and applicability of the coupling model has been experimentally validated by accounting for both regular and irregular waves and varying bathymetry. Experimental results show that the proposed numerical scheme and transfer function modulation method are efficient for the data transfer from the numerical model to the physical model up to a deterministic level. 展开更多
关键词 coupling numerical model physical model wave propagation transfer function modulation
下载PDF
A Survey on Channel Measurements and Models for Underground MIMO Communication Systems
4
作者 Asad Saleem Yejun He +1 位作者 Guoxin Zheng Zhining Chen 《China Communications》 SCIE CSCD 2023年第8期103-119,共17页
The high reliability of the communication system is critical in metro and mining applications for personal safety,channel optimization,and improving operational performance.This paper surveys the progress of wireless ... The high reliability of the communication system is critical in metro and mining applications for personal safety,channel optimization,and improving operational performance.This paper surveys the progress of wireless communication systems in underground environments such as tunnels and mines from 1920 to 2022,including the evolution of primitive technology,advancements in channel modelling,and realization of various wireless propagation channels.In addition,the existing and advanced channel modeling strategies,which include the evolution of different technologies and their applications;mathematical,analytical,and experimental techniques for radio propagation;and significance of the radiation characteristics,antenna placement,and physical environment of multiple-input multiple-output(MIMO)communication systems,are analyzed.The given study introduces leaky coaxial cable(LCX)and distributed antenna system(DAS)designs for improving narrowband and wideband channel capacity.The paper concludes by figuring out open research areas for the future technologies. 展开更多
关键词 leaky coaxial cable(LCX) long-term evolution for metro(LTE-M) multiple-input multipleoutput(MIMO)systems propagation modeling
下载PDF
A Rigorous Analysis of Vehicle-to-Vehicle Range Performance in a Rural Channel Propagation Scenario as a Function of Antenna Type and Location via Simulation and Field Trails
5
作者 Ran Liu Daniel N.Aloi 《China Communications》 SCIE CSCD 2023年第11期131-141,共11页
Vehicle-to-Everything(V2X) communications will be an essential part of the technology in future autonomous drive decision systems.A fundamental procedure is to establish a robust communication channel between end-to-e... Vehicle-to-Everything(V2X) communications will be an essential part of the technology in future autonomous drive decision systems.A fundamental procedure is to establish a robust communication channel between end-to-end devices.Due to the antenna placed at different positions on vehicles,the existing cellular electro-magnetic(EM) wave propagation modelling does not fit properly for V2X direct communication application.In order to figure out a feasible understanding of this problem,this paper focuses on the propagation channel analysis in a rural Vehicle-to-Vehicle(V2V) scenario for vehicular communication with antenna position experiments at different heights.By adopting the ray-tracing algorithm,a rural scenario simulation model is built up via the use of a commercial-off-the-shelf(COTS) EM modelling software package,that computes the path loss received power and delay spread for a given propagation channel.Next,a real-world vehicle measurement campaign was performed to verify the simulation results.The simulated and measured receiver power was in good agreement with each other,and the results of this study considered two antenna types located at three different relative heights between the two vehicles.This research provides constructive guidance for the V2V antenna characteristics,antenna placement and vehicle communication channel analysis. 展开更多
关键词 antenna simulation and measurement propagation channel modeling ray-tracing simula-tion V2V scenario propagation
下载PDF
Mechanical characteristics and reservoir stimulation mechanisms of the Gulong shale oil reservoirs, the northern Songliao Basin
6
作者 Si-Wei Meng Jia-Ping Tao +6 位作者 Tian-Jiao Li Dong-Xu Li Su-Ling Wang Liu Yang Xin Liu Li-Hao Liang He Liu 《Petroleum Science》 SCIE EI CAS CSCD 2024年第3期2023-2036,共14页
Shale oil of the Qingshankou Formation of the Gulong Sag,the northern Songliao Basin,represents the first attempt at large-scale development of pure-shale-type shale oil in China.By integrating the multiscale refined ... Shale oil of the Qingshankou Formation of the Gulong Sag,the northern Songliao Basin,represents the first attempt at large-scale development of pure-shale-type shale oil in China.By integrating the multiscale refined reservoir characterization with macro-micro-scale mechanical testing,it is clarified that the Gulong shale is characterized by high clay mineral content,high rock plasticity,highly-developed bedding,and prominent mechanical anisotropy.A three-dimensional(3D)fracture propagation model of hydraulic fracturing was built for the Gulong shale,which fully captures the hydraulic fracture distribution pattern affected by the high bedding density,in-situ stress,and fracturing treatment parameters.Our research showed that due to influences of bedding,hydraulic fracturing in the Gulong shale forms a complex fracture morphology featuring the main fracture with multiple perpendicular branches that have different lengths(like the outdoor directional TV antenna);however,the vertical propagation of fractures is inhibited,and the fracture height is commonly less than 10 m.The limited stimulated reservoir volume(SRV)is the main problem facing the fracturing stimulation of the Gulong shale oil.Bedding density has vital effects on fracture morphology,so case-specific fracturing designs shall be developed for shale intervals with different bedding development degrees.For reservoirs with welldeveloped bedding,it is suggested to properly increase the perforation cluster spacing and raise the volume and proportions of viscous fluids of the pad,so as to effectively promote vertical fracture propagation and improve reservoir stimulation performance.This study integrates multi-scale fine reservoir characterization and macro-micro-scale mechanical testing,as well as the construction and numerical simulation of hydraulic fracturing models for high-density layered shale reservoirs,providing a new approach and methodological framework for the fracturing research of high-density layered shale reservoirs. 展开更多
关键词 Shale oil Hydraulic fracturing High bedding density Fracture propagation model
下载PDF
SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks
7
作者 Jiehao Ye Wen Cheng +3 位作者 Xiaolong Liu Wenyi Zhu Xuan’ang Wu Shigen Shen 《Computers, Materials & Continua》 SCIE EI 2024年第5期2743-2769,共27页
The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which ... The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which brings about large-scale data processing requirements,edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions.However,the defense mechanism of Edge Computing-enabled IoT Nodes(ECIoTNs)is still weak due to their limited resources,so that they are susceptible to malicious software spread,which can compromise data confidentiality and network service availability.Facing this situation,we put forward an epidemiology-based susceptible-curb-infectious-removed-dead(SCIRD)model.Then,we analyze the dynamics of ECIoTNs with different infection levels under different initial conditions to obtain the dynamic differential equations.Additionally,we establish the presence of equilibrium states in the SCIRD model.Furthermore,we conduct an analysis of the model’s stability and examine the conditions under which malicious software will either spread or disappear within Edge Computing-enabled IoT(ECIoT)networks.Lastly,we validate the efficacy and superiority of the SCIRD model through MATLAB simulations.These research findings offer a theoretical foundation for suppressing the propagation of malicious software in ECIoT networks.The experimental results indicate that the theoretical SCIRD model has instructive significance,deeply revealing the principles of malicious software propagation in ECIoT networks.This study solves a challenging security problem of ECIoT networks by determining the malicious software propagation threshold,which lays the foundation for buildingmore secure and reliable ECIoT networks. 展开更多
关键词 Edge computing Internet of Things malicious software propagation model HETEROGENEITY
下载PDF
Propagation Model Optimization Based on Ion Motion Optimization Algorithm for Efficient Deployment of eLTE Network
8
作者 Deussom Djomadji Eric Michel Tsague Njatsa Austene Beldine Tonye Emmanuel 《Journal of Computer and Communications》 2022年第11期171-196,共26页
Propagation models are the foundation for radio planning in mobile networks. They are widely used during feasibility studies and initial network deployment, or during network extensions, particularly in new cities. Th... Propagation models are the foundation for radio planning in mobile networks. They are widely used during feasibility studies and initial network deployment, or during network extensions, particularly in new cities. They can be used to calculate the power of the signal received by a mobile terminal, evaluate the coverage radius, and calculate the number of cells required to cover a given area. This paper takes into account the standard K factors model and then uses the Ion motion optimization (IMO) algorithm to set up a propagation model adapted to the physical environment of each of the Cameroonian cities of Yaoundé and Bertoua for different frequencies and technologies. Drive tests were made on the CDMA network in the city of Yaoundé on one hand and on an LTE TDD network in the city of Bertoua on the other hand. IMO is used as the optimization algorithm to deduct a propagation model which fits the environment of the two considered towns. The calculation of the root-mean-square error (RMSE) between the actual data from the drive tests and the prediction data from the implemented model allows the validation of the obtained results. A comparative study made between the RMSE value obtained by the new model and those obtained by the Okumura-Hata and K factors standard models, allowed us to conclude that the new model obtained in each of these two cities is better and more representative of our local environment than the Okumura-Hata currently implemented. The implementation shows that IMO can perform well and solve this kind of optimization problem;the newly obtained models can be used for radio planning in the cities of Yaounde and Bertoua in Cameroon. 展开更多
关键词 Drive Test IMO propagation models Root Mean Square Error
下载PDF
Crack evolution behavior of rocks under confining pressures and its propagation model before peak stress 被引量:10
9
作者 ZUO Jian-ping CHEN Yan LIU Xiao-li 《Journal of Central South University》 SCIE EI CAS CSCD 2019年第11期3045-3056,共12页
The understanding of crack propagation characteristics and law of rocks during the loading process is of great significance for the exploitation and support of rock engineering.In this study,the crack propagation beha... The understanding of crack propagation characteristics and law of rocks during the loading process is of great significance for the exploitation and support of rock engineering.In this study,the crack propagation behavior of rocks in triaxial compression tests was investigated in detail.The main conclusions were as follows:1)According to the evolution characteristics of crack axial strain,the differential stress?strain curve of rocks under triaxial compressive condition can be divided into three phases which are linear elastic phase,crack propagation phase,post peak phase,respectively;2)The proposed models are applied to comparison with the test data of rocks under triaxial compressive condition and different temperatures.The theoretical data calculated by the models are in good agreement with the laboratory data,indicating that the proposed model can be applied to describing the crack propagation behavior and the nonlinear properties of rocks under triaxial compressive condition;3)The inelastic compliance and crack initiation strain in the proposed model have a decrease trend with the increase of confining pressure and temperature.Peak crack axial strain increases nonlinearly with the inelastic compliance and the increase rate increases gradually.Crack initiation strain has a linear relation with peak crack axial strain. 展开更多
关键词 crack strain crack propagation behavior crack propagation model stress strain relationship
下载PDF
Correlation and trust mechanism-based rumor propagation model in complex social networks 被引量:4
10
作者 Xian-Li Sun You-Guo Wang Lin-Qing Cang 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第5期88-100,共13页
In real life, the rumor propagation is influenced by many factors. The complexity and uncertainty of human psychology make the diffusion model more challenging to depict. In order to establish a comprehensive propagat... In real life, the rumor propagation is influenced by many factors. The complexity and uncertainty of human psychology make the diffusion model more challenging to depict. In order to establish a comprehensive propagation model, in this paper, we take some psychological factors into consideration to mirror rumor propagation. Firstly, we use the Ridenour model to combine the trust mechanism with the correlation mechanism and propose a modified rumor propagation model. Secondly, the mean-field equations which describe the dynamics of the modified SIR model on homogenous and heterogeneous networks are derived. Thirdly, a steady-state analysis is conducted for the spreading threshold and the final rumor size. Fourthly, we investigate rumor immunization strategies and obtain immunization thresholds. Next, simulations on different networks are carried out to verify the theoretical results and the effectiveness of the immunization strategies.The results indicate that the utilization of trust and correlation mechanisms leads to a larger final rumor size and a smaller terminal time. Moreover, different immunization strategies have disparate effectiveness in rumor propagation. 展开更多
关键词 rumor propagation model Ridenour model immunization strategy
下载PDF
New model of propagation rates of long crack due to structure fatigue 被引量:2
11
作者 刘建涛 杜平安 +1 位作者 黄明镜 周晴 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2009年第5期575-584,共10页
By comparison of the characteristics of existing models for long fatigue crack propagation rates, a new model, called the generalized passivation-lancet model for long fatigue crack propagation rates (GPLFCPR), and ... By comparison of the characteristics of existing models for long fatigue crack propagation rates, a new model, called the generalized passivation-lancet model for long fatigue crack propagation rates (GPLFCPR), and a general formula for characterizing the process of crack growth rates are proposed based on the passivation-lancet theory. The GPLFCPR model overcomes disadvantages of the existing models and can describe the rules of the entire fatigue crack growth process from the cracking threshold to the critical fracturing point effectively with explicit physical meaning. It also reflects the influence of material characteristics, such as strength parameters, fracture parameters and heat treatment. Experimental results obtained by testing LZ50 steel, AlZnMgCu0.5, 0.5Cr0.5Mo0.25V steel, etc., show good consistency with the new model. The GPLFCPR model is valuable in theoretical research and practical applications. 展开更多
关键词 long fatigue crack THRESHOLD cyclic stress ratio fracture roughness propagation model
下载PDF
Numerical Simulations for Stochastic Computer Virus Propagation Model 被引量:2
12
作者 Muhammad Shoaib Arif Ali Raza +4 位作者 Muhammad Rafiq Mairaj Bibi Javeria Nawaz Abbasi Amna Nazeer Umer Javed 《Computers, Materials & Continua》 SCIE EI 2020年第1期61-77,共17页
We are presenting the numerical simulations for the stochastic computer virus propagation model in this manuscript.We are comparing the solutions of stochastic and deterministic computer virus models.Outcomes of a thr... We are presenting the numerical simulations for the stochastic computer virus propagation model in this manuscript.We are comparing the solutions of stochastic and deterministic computer virus models.Outcomes of a threshold number R0 hold in stochastic computer virus model.If R_(0)<1 then in such a condition virus controlled in the computer population while R_(0)>1 shows virus rapidly spread in the computer population.Unfortunately,stochastic numerical techniques fail to cope with large step sizes of time.The suggested structure of the stochastic non-standard finite difference technique can never violate the dynamical properties.On this basis,we can suggest a collection of strategies for removing virus’s propagation in the computer population. 展开更多
关键词 Computer virus propagation model Stochastic modelling Stochastic processes Stochastic techniques Convergence analysis
下载PDF
Propagation modeling of ocean-scattered low-elevation GPS signals for maritime tropospheric duct inversion 被引量:1
13
作者 张金鹏 吴振森 +2 位作者 赵振维 张玉生 王波 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第10期600-613,共14页
The maritime tropospheric duct is a low-altitude anomalous refractivity structure over the ocean surface,and it can significantly affect the performance of many shore-based/shipboard radar and communication systems.We... The maritime tropospheric duct is a low-altitude anomalous refractivity structure over the ocean surface,and it can significantly affect the performance of many shore-based/shipboard radar and communication systems.We propose the idea that maritime tropospheric ducts can be retrieved from ocean forward-scattered low-elevation global positioning system(GPS) signals.Retrieval is accomplished by matching the measured power patterns of the signals to those predicted by the forward propagation model as a function of the modified refractivity profile.On the basis of a parabolic equation method and bistatic radar equation,we develop such a forward model for computing the trapped propagation characteristics of an ocean forward-scattered GPS signal within a tropospheric duct.A new GPS scattering initial field is defined for this model to start the propagation modeling.A preliminary test on the performance of this model is conducted using measured data obtained from a 2009-experiment in the South China Sea.Results demonstrate that this model can predict GPS propagation characteristics within maritime tropospheric ducts and serve as a forward model for duct inversion. 展开更多
关键词 global positioning system ocean surface scattering propagation modeling tropospheric duct inversion
下载PDF
Direct immune-SCIR public-opinion propagation model based on real-time online users 被引量:1
14
作者 Yun-Ming Wang Tian-Yi Guo +1 位作者 Wei-Dong Li Bo Chen 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第10期131-142,共12页
Current public-opinion propagation research usually focused on closed network topologies without considering the fluctuation of the number of network users or the impact of social factors on propagation. Thus, it rema... Current public-opinion propagation research usually focused on closed network topologies without considering the fluctuation of the number of network users or the impact of social factors on propagation. Thus, it remains difficult to accurately describe the public-opinion propagation rules of social networks. In order to study the rules of public opinion spread on dynamic social networks, by analyzing the activity of social-network users and the regulatory role of relevant departments in the spread of public opinion, concepts of additional user and offline rates are introduced, and the direct immune-susceptible, contacted, infected, and refractory (DI-SCIR) public-opinion propagation model based on real-time online users is established. The interventional force of relevant departments, credibility of real information, and time of intervention are considered, and a public-opinion propagation control strategy based on direct immunity is proposed. The equilibrium point and the basic reproduction number of the model are theoretically analyzed to obtain boundary conditions for public-opinion propagation. Simulation results show that the new model can accurately reflect the propagation rules of public opinion. When the basic reproduction number is less than 1, public opinion will eventually disappear in the network. Social factors can significantly influence the time and scope of public opinion spread on social networks. By controlling social factors, relevant departments can analyze the rules of public opinion spread on social networks to suppress the propagate of negative public opinion and provide a powerful tool to ensure security and stability of society. 展开更多
关键词 public opinion propagation model direct immunization real-time online users basic reproduction number
下载PDF
Projected change in precipitation forms in the Chinese Tianshan Mountains based on the Back Propagation Neural Network Model 被引量:1
15
作者 REN Rui LI Xue-mei +2 位作者 LI Zhen LI Lan-hai HUANG Yi-yu 《Journal of Mountain Science》 SCIE CSCD 2022年第3期689-703,共15页
In the context of global warming,precipitation forms are likely to transform from snowfall to rainfall with a more pronounced trend.The change in precipitation forms will inevitably affect the processes of regional ru... In the context of global warming,precipitation forms are likely to transform from snowfall to rainfall with a more pronounced trend.The change in precipitation forms will inevitably affect the processes of regional runoff generation and confluence as well as the annual distribution of runoff.Most researchers used precipitation data from the CMIP5 model directly to study future precipitation trends without distinguishing between snowfall and rainfall.CMIP5 models have been proven to have better performance in simulating temperature but poorer performance in simulating precipitation.To overcome the above limitations,this paper used a Back Propagation Neural Network(BNN)to predict the rainfall-to-precipitation ratio(RPR)in months experiencing freezing-thawing transitions(FTTs).We utilized the meteorological(air pressure,air temperature,evaporation,relative humidity,wind speed,sunshine hours,surface temperature),topographic(altitude,slope,aspect)and geographic(longitude,latitude)data from 28 meteorological stations in the Chinese Tianshan Mountains region(CTMR)from 1961 to 2018 to calculate the RPR and constructed an index system of impact factors.Based on the BNN,decision-making trial and evaluation laboratory method(BP-DEMATEL),the key factors driving the transformation of the RPR in the CTMR were identified.We found that temperature was the only key factor affecting the transformation of the RPR in the BP-DEMATEL model.Considering the relationship between temperature and the RPR,the future temperature under different representative concentration pathways(RCPs)(RCP2.6/RCP4.5/RCP8.5)provided by 21 CMIP5 models and the meteorological factors from meteorological stations were input into the BNN model to acquire the future RPR from 2011 to 2100.The results showed that under the three scenarios,the RPR in the number of months experiencing FTTs during 2011-2100 will be higher than that in the historical period(1981-2010)in the CTMR.Furthermore,in terms of spatial variation,the RPR values on the south slope will be larger than those on the north slope under the three emission scenarios.Moreover,the RPR values exhibited different variation characteristics under different emission scenarios.Under the low-emission scenario(RCP2.6),as time passed,the RPR values changed slightly at more stations.Under the mediumemission scenario(RCP4.5),the RPR increased in the whole CTMR and stabilized on the north slope by the end of this century.Under the high-emission scenario(RCP8.5),the RPR values increased significantly through the 21 st century in the whole CTMR.This study may help to provide a scientific management basis for agricultural production and hydrology. 展开更多
关键词 Global warming Tianshan Mountains region Precipitation forms CMIP5 models Back propagation Neural Network Model
下载PDF
Fracture initiation and propagation in intact rock—A review 被引量:58
16
作者 E.Hoek C.D.Martin 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2014年第4期287-300,共14页
The initiation and propagation of failure in intact rock are a matter of fundamental importance in rock engineering. At low confining pressures, tensile fracturing initiates in samples at 40%-60% of the uniaxial compr... The initiation and propagation of failure in intact rock are a matter of fundamental importance in rock engineering. At low confining pressures, tensile fracturing initiates in samples at 40%-60% of the uniaxial compressive strength and as loading continues, and these tensile fractures increase in density, ultimately coalescing and leading to strain localization and macro-scale shear failure of the samples. The Griffith theory of brittle failure provides a simplified model and a useful basis for discussion of this process. The Hoek-Brown failure criterion provides an acceptable estimate of the peak strength for shear failure but a cutoff has been added for tensile conditions. However, neither of these criteria adequately explains the progressive coalition of tensile cracks and the final shearing of the specimens at higher confining stresses. Grain-based numerical models, in which the grain size distributions as well as the physical properties of the component grains of the rock are incorporated, have proved to be very useful in studying these more complex fracture processes. 展开更多
关键词 Tensile failure Crack propagation Griffith theory Hoek-Brown criterion Tension cutoff Crack coalescence Numerical models
下载PDF
Global SH-wave propagation in a 2D whole Moon model using the parallel hybrid PSM/FDM method 被引量:3
17
作者 Xianghua Jiang Yanbin Wang +1 位作者 Yanfang Qin Hiroshi Takenaka 《Earthquake Science》 CSCD 2015年第3期163-174,共12页
We present numerical modeling of SH-wave propagation for the recently proposed whole Moon model and try to improve our understanding of lunar seismic wave propagation. We use a hybrid PSM/FDM method on staggered grids... We present numerical modeling of SH-wave propagation for the recently proposed whole Moon model and try to improve our understanding of lunar seismic wave propagation. We use a hybrid PSM/FDM method on staggered grids to solve the wave equations and implement the calculation on a parallel PC cluster to improve the computing efficiency. Features of global SH-wave propagation are firstly discussed for a 100-km shallow and900-km deep moonquakes, respectively. Effects of frequency range and lateral variation of crust thickness are then investigated with various models. Our synthetic waveforms are finally compared with observed Apollo data to show the features of wave propagation that were produced by our model and those not reproduced by our models. Our numerical modeling show that the low-velocity upper crust plays significant role in the development of reverberating wave trains. Increasing frequency enhances the strength and duration of the reverberations.Surface multiples dominate wavefields for shallow event.Core–mantle reflections can be clearly identified for deep event at low frequency. The layered whole Moon model and the low-velocity upper crust produce the reverberating wave trains following each phases consistent with observation. However, more realistic Moon model should be considered in order to explain the strong and slow decay scattering between various phases shown on observation data. 展开更多
关键词 Whole Moon model Seismic wavefield SH-wave propagation Hybrid method Parallel computing
下载PDF
System Recovery-Aware Virus Propagation Model and Its Steady-State Analysis 被引量:1
18
作者 Lin Sun Cai Fu +3 位作者 Ming Fu Deliang Xu Lansheng Han Deqing Zou 《China Communications》 SCIE CSCD 2016年第5期151-161,共11页
Network structures and human behaviors are considered as two important factors in virus defense currently. However, due to ignorance of network security, normal users usually take simple activities, such as reinstalli... Network structures and human behaviors are considered as two important factors in virus defense currently. However, due to ignorance of network security, normal users usually take simple activities, such as reinstalling computer system, or using the computer recovery system to clear virus. How system recovery influences virus spreading is not taken into consideration currently. In this paper, a new virus propagation model considering the system recovery is proposed first, and then in its steady-state analysis, the virus propagation steady time and steady states are deduced. Experiment results show that models considering system recovery can effectively restrain virus propagation. Furthermore, algorithm with system recovery in BA scale-free network is proposed. Simulation result turns out that target immunization strategy with system recovery works better than traditional ones in BA network. 展开更多
关键词 computer virus system recovery virus propagation model target immunization strategy
下载PDF
Ergodic stationary distribution of a stochastic rumor propagation model with general incidence function
19
作者 Yuhuai Zhang Jianjun Zhu 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第6期145-154,共10页
In daily lives,when emergencies occur,rumors will spread widely on the internet.However,it is quite difficult for the netizens to distinguish the truth of the information.The main reasons are the uncertainty of netiz... In daily lives,when emergencies occur,rumors will spread widely on the internet.However,it is quite difficult for the netizens to distinguish the truth of the information.The main reasons are the uncertainty of netizens’behavior and attitude,which make the transmission rates of these information among social network groups be not fixed.In this paper,we propose a stochastic rumor propagation model with general incidence function.The model can be described by a stochastic differential equation.Applying the Khasminskii method via a suitable construction of Lyapunov function,we first prove the existence of a unique solution for the stochastic model with probability one.Then we show the existence of a unique ergodic stationary distribution of the rumor model,which exhibits the ergodicity.We also provide some numerical simulations to support our theoretical results.The numerical results give us some possible methods to control rumor propagation.Firstly,increasing noise intensity can effectively reduce rumor propagation when R_(0)>1That is,after rumors spread widely on social network platforms,government intervention and authoritative media coverage will interfere with netizens’opinions,thus reducing the degree of rumor propagation.Secondly,speed up the rumor refutation,intensify efforts to refute rumors,and improve the scientific quality of netizen(i.e.,increase the value ofβand decrease the value ofαandγ),which can effectively curb the rumor propagation. 展开更多
关键词 rumor propagation model general incidence function It?’s formula ergodic stationary distribution
下载PDF
Mechanical Modeling of Dike Propagation: Methods, Recent Results and Links to Geophysics
20
作者 Eleonora RIVALTA Benoit TAISNE +1 位作者 Andrew BUNGER Richard KATZ 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2016年第S1期151-,共1页
Magma is transported in brittle rock by diking.Diking plays a key role in tectonic phenomena such as continental rifting and plate divergence at mid-ocean ridges.In spite of the importance of understanding how magma is
关键词 Mechanical Modeling of Dike propagation rock Recent Results and Links to Geophysics Methods
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部