With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat...With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.展开更多
Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give...Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out.展开更多
An improved coupling of numerical and physical models for simulating 2D wave propagation is developed in this paper. In the proposed model, an unstructured finite element model (FEM) based Boussinesq equations is ap...An improved coupling of numerical and physical models for simulating 2D wave propagation is developed in this paper. In the proposed model, an unstructured finite element model (FEM) based Boussinesq equations is applied for the numerical wave simulation, and a 2D piston-type wavemaker is used for the physical wave generation. An innovative scheme combining fourth-order Lagrange interpolation and Runge-Kutta scheme is described for solving the coupling equation. A Transfer function modulation method is presented to minimize the errors induced from the hydrodynamic invalidity of the coupling model and/or the mechanical capability of the wavemaker in area where nonlinearities or dispersion predominate. The overall performance and applicability of the coupling model has been experimentally validated by accounting for both regular and irregular waves and varying bathymetry. Experimental results show that the proposed numerical scheme and transfer function modulation method are efficient for the data transfer from the numerical model to the physical model up to a deterministic level.展开更多
The high reliability of the communication system is critical in metro and mining applications for personal safety,channel optimization,and improving operational performance.This paper surveys the progress of wireless ...The high reliability of the communication system is critical in metro and mining applications for personal safety,channel optimization,and improving operational performance.This paper surveys the progress of wireless communication systems in underground environments such as tunnels and mines from 1920 to 2022,including the evolution of primitive technology,advancements in channel modelling,and realization of various wireless propagation channels.In addition,the existing and advanced channel modeling strategies,which include the evolution of different technologies and their applications;mathematical,analytical,and experimental techniques for radio propagation;and significance of the radiation characteristics,antenna placement,and physical environment of multiple-input multiple-output(MIMO)communication systems,are analyzed.The given study introduces leaky coaxial cable(LCX)and distributed antenna system(DAS)designs for improving narrowband and wideband channel capacity.The paper concludes by figuring out open research areas for the future technologies.展开更多
Vehicle-to-Everything(V2X) communications will be an essential part of the technology in future autonomous drive decision systems.A fundamental procedure is to establish a robust communication channel between end-to-e...Vehicle-to-Everything(V2X) communications will be an essential part of the technology in future autonomous drive decision systems.A fundamental procedure is to establish a robust communication channel between end-to-end devices.Due to the antenna placed at different positions on vehicles,the existing cellular electro-magnetic(EM) wave propagation modelling does not fit properly for V2X direct communication application.In order to figure out a feasible understanding of this problem,this paper focuses on the propagation channel analysis in a rural Vehicle-to-Vehicle(V2V) scenario for vehicular communication with antenna position experiments at different heights.By adopting the ray-tracing algorithm,a rural scenario simulation model is built up via the use of a commercial-off-the-shelf(COTS) EM modelling software package,that computes the path loss received power and delay spread for a given propagation channel.Next,a real-world vehicle measurement campaign was performed to verify the simulation results.The simulated and measured receiver power was in good agreement with each other,and the results of this study considered two antenna types located at three different relative heights between the two vehicles.This research provides constructive guidance for the V2V antenna characteristics,antenna placement and vehicle communication channel analysis.展开更多
Shale oil of the Qingshankou Formation of the Gulong Sag,the northern Songliao Basin,represents the first attempt at large-scale development of pure-shale-type shale oil in China.By integrating the multiscale refined ...Shale oil of the Qingshankou Formation of the Gulong Sag,the northern Songliao Basin,represents the first attempt at large-scale development of pure-shale-type shale oil in China.By integrating the multiscale refined reservoir characterization with macro-micro-scale mechanical testing,it is clarified that the Gulong shale is characterized by high clay mineral content,high rock plasticity,highly-developed bedding,and prominent mechanical anisotropy.A three-dimensional(3D)fracture propagation model of hydraulic fracturing was built for the Gulong shale,which fully captures the hydraulic fracture distribution pattern affected by the high bedding density,in-situ stress,and fracturing treatment parameters.Our research showed that due to influences of bedding,hydraulic fracturing in the Gulong shale forms a complex fracture morphology featuring the main fracture with multiple perpendicular branches that have different lengths(like the outdoor directional TV antenna);however,the vertical propagation of fractures is inhibited,and the fracture height is commonly less than 10 m.The limited stimulated reservoir volume(SRV)is the main problem facing the fracturing stimulation of the Gulong shale oil.Bedding density has vital effects on fracture morphology,so case-specific fracturing designs shall be developed for shale intervals with different bedding development degrees.For reservoirs with welldeveloped bedding,it is suggested to properly increase the perforation cluster spacing and raise the volume and proportions of viscous fluids of the pad,so as to effectively promote vertical fracture propagation and improve reservoir stimulation performance.This study integrates multi-scale fine reservoir characterization and macro-micro-scale mechanical testing,as well as the construction and numerical simulation of hydraulic fracturing models for high-density layered shale reservoirs,providing a new approach and methodological framework for the fracturing research of high-density layered shale reservoirs.展开更多
The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which ...The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which brings about large-scale data processing requirements,edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions.However,the defense mechanism of Edge Computing-enabled IoT Nodes(ECIoTNs)is still weak due to their limited resources,so that they are susceptible to malicious software spread,which can compromise data confidentiality and network service availability.Facing this situation,we put forward an epidemiology-based susceptible-curb-infectious-removed-dead(SCIRD)model.Then,we analyze the dynamics of ECIoTNs with different infection levels under different initial conditions to obtain the dynamic differential equations.Additionally,we establish the presence of equilibrium states in the SCIRD model.Furthermore,we conduct an analysis of the model’s stability and examine the conditions under which malicious software will either spread or disappear within Edge Computing-enabled IoT(ECIoT)networks.Lastly,we validate the efficacy and superiority of the SCIRD model through MATLAB simulations.These research findings offer a theoretical foundation for suppressing the propagation of malicious software in ECIoT networks.The experimental results indicate that the theoretical SCIRD model has instructive significance,deeply revealing the principles of malicious software propagation in ECIoT networks.This study solves a challenging security problem of ECIoT networks by determining the malicious software propagation threshold,which lays the foundation for buildingmore secure and reliable ECIoT networks.展开更多
Propagation models are the foundation for radio planning in mobile networks. They are widely used during feasibility studies and initial network deployment, or during network extensions, particularly in new cities. Th...Propagation models are the foundation for radio planning in mobile networks. They are widely used during feasibility studies and initial network deployment, or during network extensions, particularly in new cities. They can be used to calculate the power of the signal received by a mobile terminal, evaluate the coverage radius, and calculate the number of cells required to cover a given area. This paper takes into account the standard K factors model and then uses the Ion motion optimization (IMO) algorithm to set up a propagation model adapted to the physical environment of each of the Cameroonian cities of Yaoundé and Bertoua for different frequencies and technologies. Drive tests were made on the CDMA network in the city of Yaoundé on one hand and on an LTE TDD network in the city of Bertoua on the other hand. IMO is used as the optimization algorithm to deduct a propagation model which fits the environment of the two considered towns. The calculation of the root-mean-square error (RMSE) between the actual data from the drive tests and the prediction data from the implemented model allows the validation of the obtained results. A comparative study made between the RMSE value obtained by the new model and those obtained by the Okumura-Hata and K factors standard models, allowed us to conclude that the new model obtained in each of these two cities is better and more representative of our local environment than the Okumura-Hata currently implemented. The implementation shows that IMO can perform well and solve this kind of optimization problem;the newly obtained models can be used for radio planning in the cities of Yaounde and Bertoua in Cameroon.展开更多
The understanding of crack propagation characteristics and law of rocks during the loading process is of great significance for the exploitation and support of rock engineering.In this study,the crack propagation beha...The understanding of crack propagation characteristics and law of rocks during the loading process is of great significance for the exploitation and support of rock engineering.In this study,the crack propagation behavior of rocks in triaxial compression tests was investigated in detail.The main conclusions were as follows:1)According to the evolution characteristics of crack axial strain,the differential stress?strain curve of rocks under triaxial compressive condition can be divided into three phases which are linear elastic phase,crack propagation phase,post peak phase,respectively;2)The proposed models are applied to comparison with the test data of rocks under triaxial compressive condition and different temperatures.The theoretical data calculated by the models are in good agreement with the laboratory data,indicating that the proposed model can be applied to describing the crack propagation behavior and the nonlinear properties of rocks under triaxial compressive condition;3)The inelastic compliance and crack initiation strain in the proposed model have a decrease trend with the increase of confining pressure and temperature.Peak crack axial strain increases nonlinearly with the inelastic compliance and the increase rate increases gradually.Crack initiation strain has a linear relation with peak crack axial strain.展开更多
In real life, the rumor propagation is influenced by many factors. The complexity and uncertainty of human psychology make the diffusion model more challenging to depict. In order to establish a comprehensive propagat...In real life, the rumor propagation is influenced by many factors. The complexity and uncertainty of human psychology make the diffusion model more challenging to depict. In order to establish a comprehensive propagation model, in this paper, we take some psychological factors into consideration to mirror rumor propagation. Firstly, we use the Ridenour model to combine the trust mechanism with the correlation mechanism and propose a modified rumor propagation model. Secondly, the mean-field equations which describe the dynamics of the modified SIR model on homogenous and heterogeneous networks are derived. Thirdly, a steady-state analysis is conducted for the spreading threshold and the final rumor size. Fourthly, we investigate rumor immunization strategies and obtain immunization thresholds. Next, simulations on different networks are carried out to verify the theoretical results and the effectiveness of the immunization strategies.The results indicate that the utilization of trust and correlation mechanisms leads to a larger final rumor size and a smaller terminal time. Moreover, different immunization strategies have disparate effectiveness in rumor propagation.展开更多
By comparison of the characteristics of existing models for long fatigue crack propagation rates, a new model, called the generalized passivation-lancet model for long fatigue crack propagation rates (GPLFCPR), and ...By comparison of the characteristics of existing models for long fatigue crack propagation rates, a new model, called the generalized passivation-lancet model for long fatigue crack propagation rates (GPLFCPR), and a general formula for characterizing the process of crack growth rates are proposed based on the passivation-lancet theory. The GPLFCPR model overcomes disadvantages of the existing models and can describe the rules of the entire fatigue crack growth process from the cracking threshold to the critical fracturing point effectively with explicit physical meaning. It also reflects the influence of material characteristics, such as strength parameters, fracture parameters and heat treatment. Experimental results obtained by testing LZ50 steel, AlZnMgCu0.5, 0.5Cr0.5Mo0.25V steel, etc., show good consistency with the new model. The GPLFCPR model is valuable in theoretical research and practical applications.展开更多
We are presenting the numerical simulations for the stochastic computer virus propagation model in this manuscript.We are comparing the solutions of stochastic and deterministic computer virus models.Outcomes of a thr...We are presenting the numerical simulations for the stochastic computer virus propagation model in this manuscript.We are comparing the solutions of stochastic and deterministic computer virus models.Outcomes of a threshold number R0 hold in stochastic computer virus model.If R_(0)<1 then in such a condition virus controlled in the computer population while R_(0)>1 shows virus rapidly spread in the computer population.Unfortunately,stochastic numerical techniques fail to cope with large step sizes of time.The suggested structure of the stochastic non-standard finite difference technique can never violate the dynamical properties.On this basis,we can suggest a collection of strategies for removing virus’s propagation in the computer population.展开更多
The maritime tropospheric duct is a low-altitude anomalous refractivity structure over the ocean surface,and it can significantly affect the performance of many shore-based/shipboard radar and communication systems.We...The maritime tropospheric duct is a low-altitude anomalous refractivity structure over the ocean surface,and it can significantly affect the performance of many shore-based/shipboard radar and communication systems.We propose the idea that maritime tropospheric ducts can be retrieved from ocean forward-scattered low-elevation global positioning system(GPS) signals.Retrieval is accomplished by matching the measured power patterns of the signals to those predicted by the forward propagation model as a function of the modified refractivity profile.On the basis of a parabolic equation method and bistatic radar equation,we develop such a forward model for computing the trapped propagation characteristics of an ocean forward-scattered GPS signal within a tropospheric duct.A new GPS scattering initial field is defined for this model to start the propagation modeling.A preliminary test on the performance of this model is conducted using measured data obtained from a 2009-experiment in the South China Sea.Results demonstrate that this model can predict GPS propagation characteristics within maritime tropospheric ducts and serve as a forward model for duct inversion.展开更多
Current public-opinion propagation research usually focused on closed network topologies without considering the fluctuation of the number of network users or the impact of social factors on propagation. Thus, it rema...Current public-opinion propagation research usually focused on closed network topologies without considering the fluctuation of the number of network users or the impact of social factors on propagation. Thus, it remains difficult to accurately describe the public-opinion propagation rules of social networks. In order to study the rules of public opinion spread on dynamic social networks, by analyzing the activity of social-network users and the regulatory role of relevant departments in the spread of public opinion, concepts of additional user and offline rates are introduced, and the direct immune-susceptible, contacted, infected, and refractory (DI-SCIR) public-opinion propagation model based on real-time online users is established. The interventional force of relevant departments, credibility of real information, and time of intervention are considered, and a public-opinion propagation control strategy based on direct immunity is proposed. The equilibrium point and the basic reproduction number of the model are theoretically analyzed to obtain boundary conditions for public-opinion propagation. Simulation results show that the new model can accurately reflect the propagation rules of public opinion. When the basic reproduction number is less than 1, public opinion will eventually disappear in the network. Social factors can significantly influence the time and scope of public opinion spread on social networks. By controlling social factors, relevant departments can analyze the rules of public opinion spread on social networks to suppress the propagate of negative public opinion and provide a powerful tool to ensure security and stability of society.展开更多
In the context of global warming,precipitation forms are likely to transform from snowfall to rainfall with a more pronounced trend.The change in precipitation forms will inevitably affect the processes of regional ru...In the context of global warming,precipitation forms are likely to transform from snowfall to rainfall with a more pronounced trend.The change in precipitation forms will inevitably affect the processes of regional runoff generation and confluence as well as the annual distribution of runoff.Most researchers used precipitation data from the CMIP5 model directly to study future precipitation trends without distinguishing between snowfall and rainfall.CMIP5 models have been proven to have better performance in simulating temperature but poorer performance in simulating precipitation.To overcome the above limitations,this paper used a Back Propagation Neural Network(BNN)to predict the rainfall-to-precipitation ratio(RPR)in months experiencing freezing-thawing transitions(FTTs).We utilized the meteorological(air pressure,air temperature,evaporation,relative humidity,wind speed,sunshine hours,surface temperature),topographic(altitude,slope,aspect)and geographic(longitude,latitude)data from 28 meteorological stations in the Chinese Tianshan Mountains region(CTMR)from 1961 to 2018 to calculate the RPR and constructed an index system of impact factors.Based on the BNN,decision-making trial and evaluation laboratory method(BP-DEMATEL),the key factors driving the transformation of the RPR in the CTMR were identified.We found that temperature was the only key factor affecting the transformation of the RPR in the BP-DEMATEL model.Considering the relationship between temperature and the RPR,the future temperature under different representative concentration pathways(RCPs)(RCP2.6/RCP4.5/RCP8.5)provided by 21 CMIP5 models and the meteorological factors from meteorological stations were input into the BNN model to acquire the future RPR from 2011 to 2100.The results showed that under the three scenarios,the RPR in the number of months experiencing FTTs during 2011-2100 will be higher than that in the historical period(1981-2010)in the CTMR.Furthermore,in terms of spatial variation,the RPR values on the south slope will be larger than those on the north slope under the three emission scenarios.Moreover,the RPR values exhibited different variation characteristics under different emission scenarios.Under the low-emission scenario(RCP2.6),as time passed,the RPR values changed slightly at more stations.Under the mediumemission scenario(RCP4.5),the RPR increased in the whole CTMR and stabilized on the north slope by the end of this century.Under the high-emission scenario(RCP8.5),the RPR values increased significantly through the 21 st century in the whole CTMR.This study may help to provide a scientific management basis for agricultural production and hydrology.展开更多
The initiation and propagation of failure in intact rock are a matter of fundamental importance in rock engineering. At low confining pressures, tensile fracturing initiates in samples at 40%-60% of the uniaxial compr...The initiation and propagation of failure in intact rock are a matter of fundamental importance in rock engineering. At low confining pressures, tensile fracturing initiates in samples at 40%-60% of the uniaxial compressive strength and as loading continues, and these tensile fractures increase in density, ultimately coalescing and leading to strain localization and macro-scale shear failure of the samples. The Griffith theory of brittle failure provides a simplified model and a useful basis for discussion of this process. The Hoek-Brown failure criterion provides an acceptable estimate of the peak strength for shear failure but a cutoff has been added for tensile conditions. However, neither of these criteria adequately explains the progressive coalition of tensile cracks and the final shearing of the specimens at higher confining stresses. Grain-based numerical models, in which the grain size distributions as well as the physical properties of the component grains of the rock are incorporated, have proved to be very useful in studying these more complex fracture processes.展开更多
We present numerical modeling of SH-wave propagation for the recently proposed whole Moon model and try to improve our understanding of lunar seismic wave propagation. We use a hybrid PSM/FDM method on staggered grids...We present numerical modeling of SH-wave propagation for the recently proposed whole Moon model and try to improve our understanding of lunar seismic wave propagation. We use a hybrid PSM/FDM method on staggered grids to solve the wave equations and implement the calculation on a parallel PC cluster to improve the computing efficiency. Features of global SH-wave propagation are firstly discussed for a 100-km shallow and900-km deep moonquakes, respectively. Effects of frequency range and lateral variation of crust thickness are then investigated with various models. Our synthetic waveforms are finally compared with observed Apollo data to show the features of wave propagation that were produced by our model and those not reproduced by our models. Our numerical modeling show that the low-velocity upper crust plays significant role in the development of reverberating wave trains. Increasing frequency enhances the strength and duration of the reverberations.Surface multiples dominate wavefields for shallow event.Core–mantle reflections can be clearly identified for deep event at low frequency. The layered whole Moon model and the low-velocity upper crust produce the reverberating wave trains following each phases consistent with observation. However, more realistic Moon model should be considered in order to explain the strong and slow decay scattering between various phases shown on observation data.展开更多
Network structures and human behaviors are considered as two important factors in virus defense currently. However, due to ignorance of network security, normal users usually take simple activities, such as reinstalli...Network structures and human behaviors are considered as two important factors in virus defense currently. However, due to ignorance of network security, normal users usually take simple activities, such as reinstalling computer system, or using the computer recovery system to clear virus. How system recovery influences virus spreading is not taken into consideration currently. In this paper, a new virus propagation model considering the system recovery is proposed first, and then in its steady-state analysis, the virus propagation steady time and steady states are deduced. Experiment results show that models considering system recovery can effectively restrain virus propagation. Furthermore, algorithm with system recovery in BA scale-free network is proposed. Simulation result turns out that target immunization strategy with system recovery works better than traditional ones in BA network.展开更多
In daily lives,when emergencies occur,rumors will spread widely on the internet.However,it is quite difficult for the netizens to distinguish the truth of the information.The main reasons are the uncertainty of netiz...In daily lives,when emergencies occur,rumors will spread widely on the internet.However,it is quite difficult for the netizens to distinguish the truth of the information.The main reasons are the uncertainty of netizens’behavior and attitude,which make the transmission rates of these information among social network groups be not fixed.In this paper,we propose a stochastic rumor propagation model with general incidence function.The model can be described by a stochastic differential equation.Applying the Khasminskii method via a suitable construction of Lyapunov function,we first prove the existence of a unique solution for the stochastic model with probability one.Then we show the existence of a unique ergodic stationary distribution of the rumor model,which exhibits the ergodicity.We also provide some numerical simulations to support our theoretical results.The numerical results give us some possible methods to control rumor propagation.Firstly,increasing noise intensity can effectively reduce rumor propagation when R_(0)>1That is,after rumors spread widely on social network platforms,government intervention and authoritative media coverage will interfere with netizens’opinions,thus reducing the degree of rumor propagation.Secondly,speed up the rumor refutation,intensify efforts to refute rumors,and improve the scientific quality of netizen(i.e.,increase the value ofβand decrease the value ofαandγ),which can effectively curb the rumor propagation.展开更多
Magma is transported in brittle rock by diking.Diking plays a key role in tectonic phenomena such as continental rifting and plate divergence at mid-ocean ridges.In spite of the importance of understanding how magma is
文摘With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.
基金supported by the Research Fund for the National Committee of China under Grant No. 05XN09
文摘Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out.
基金supported by the National Natural Science Foundation of China(Grant Nos.51079023 and 51221961)the National Basic Research Program of China(973 Program,Grant Nos.2013CB036101 and 2011CB013703)
文摘An improved coupling of numerical and physical models for simulating 2D wave propagation is developed in this paper. In the proposed model, an unstructured finite element model (FEM) based Boussinesq equations is applied for the numerical wave simulation, and a 2D piston-type wavemaker is used for the physical wave generation. An innovative scheme combining fourth-order Lagrange interpolation and Runge-Kutta scheme is described for solving the coupling equation. A Transfer function modulation method is presented to minimize the errors induced from the hydrodynamic invalidity of the coupling model and/or the mechanical capability of the wavemaker in area where nonlinearities or dispersion predominate. The overall performance and applicability of the coupling model has been experimentally validated by accounting for both regular and irregular waves and varying bathymetry. Experimental results show that the proposed numerical scheme and transfer function modulation method are efficient for the data transfer from the numerical model to the physical model up to a deterministic level.
文摘The high reliability of the communication system is critical in metro and mining applications for personal safety,channel optimization,and improving operational performance.This paper surveys the progress of wireless communication systems in underground environments such as tunnels and mines from 1920 to 2022,including the evolution of primitive technology,advancements in channel modelling,and realization of various wireless propagation channels.In addition,the existing and advanced channel modeling strategies,which include the evolution of different technologies and their applications;mathematical,analytical,and experimental techniques for radio propagation;and significance of the radiation characteristics,antenna placement,and physical environment of multiple-input multiple-output(MIMO)communication systems,are analyzed.The given study introduces leaky coaxial cable(LCX)and distributed antenna system(DAS)designs for improving narrowband and wideband channel capacity.The paper concludes by figuring out open research areas for the future technologies.
文摘Vehicle-to-Everything(V2X) communications will be an essential part of the technology in future autonomous drive decision systems.A fundamental procedure is to establish a robust communication channel between end-to-end devices.Due to the antenna placed at different positions on vehicles,the existing cellular electro-magnetic(EM) wave propagation modelling does not fit properly for V2X direct communication application.In order to figure out a feasible understanding of this problem,this paper focuses on the propagation channel analysis in a rural Vehicle-to-Vehicle(V2V) scenario for vehicular communication with antenna position experiments at different heights.By adopting the ray-tracing algorithm,a rural scenario simulation model is built up via the use of a commercial-off-the-shelf(COTS) EM modelling software package,that computes the path loss received power and delay spread for a given propagation channel.Next,a real-world vehicle measurement campaign was performed to verify the simulation results.The simulated and measured receiver power was in good agreement with each other,and the results of this study considered two antenna types located at three different relative heights between the two vehicles.This research provides constructive guidance for the V2V antenna characteristics,antenna placement and vehicle communication channel analysis.
基金supported by the General Program of National Natural Science Foundation of China(No.52274058)the“Enlisting and Leading”Science and Technology Project of Heilongjiang Province(No.RIPED-2022-JS-1740 and No.RIPED-2022JS-1853)the Central Program of Basic Science of the National Natural Science Foundation of China(No.72088101)。
文摘Shale oil of the Qingshankou Formation of the Gulong Sag,the northern Songliao Basin,represents the first attempt at large-scale development of pure-shale-type shale oil in China.By integrating the multiscale refined reservoir characterization with macro-micro-scale mechanical testing,it is clarified that the Gulong shale is characterized by high clay mineral content,high rock plasticity,highly-developed bedding,and prominent mechanical anisotropy.A three-dimensional(3D)fracture propagation model of hydraulic fracturing was built for the Gulong shale,which fully captures the hydraulic fracture distribution pattern affected by the high bedding density,in-situ stress,and fracturing treatment parameters.Our research showed that due to influences of bedding,hydraulic fracturing in the Gulong shale forms a complex fracture morphology featuring the main fracture with multiple perpendicular branches that have different lengths(like the outdoor directional TV antenna);however,the vertical propagation of fractures is inhibited,and the fracture height is commonly less than 10 m.The limited stimulated reservoir volume(SRV)is the main problem facing the fracturing stimulation of the Gulong shale oil.Bedding density has vital effects on fracture morphology,so case-specific fracturing designs shall be developed for shale intervals with different bedding development degrees.For reservoirs with welldeveloped bedding,it is suggested to properly increase the perforation cluster spacing and raise the volume and proportions of viscous fluids of the pad,so as to effectively promote vertical fracture propagation and improve reservoir stimulation performance.This study integrates multi-scale fine reservoir characterization and macro-micro-scale mechanical testing,as well as the construction and numerical simulation of hydraulic fracturing models for high-density layered shale reservoirs,providing a new approach and methodological framework for the fracturing research of high-density layered shale reservoirs.
基金in part by National Undergraduate Innovation and Entrepreneurship Training Program under Grant No.202310347039Zhejiang Provincial Natural Science Foundation of China under Grant No.LZ22F020002Huzhou Science and Technology Planning Foundation under Grant No.2023GZ04.
文摘The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which brings about large-scale data processing requirements,edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions.However,the defense mechanism of Edge Computing-enabled IoT Nodes(ECIoTNs)is still weak due to their limited resources,so that they are susceptible to malicious software spread,which can compromise data confidentiality and network service availability.Facing this situation,we put forward an epidemiology-based susceptible-curb-infectious-removed-dead(SCIRD)model.Then,we analyze the dynamics of ECIoTNs with different infection levels under different initial conditions to obtain the dynamic differential equations.Additionally,we establish the presence of equilibrium states in the SCIRD model.Furthermore,we conduct an analysis of the model’s stability and examine the conditions under which malicious software will either spread or disappear within Edge Computing-enabled IoT(ECIoT)networks.Lastly,we validate the efficacy and superiority of the SCIRD model through MATLAB simulations.These research findings offer a theoretical foundation for suppressing the propagation of malicious software in ECIoT networks.The experimental results indicate that the theoretical SCIRD model has instructive significance,deeply revealing the principles of malicious software propagation in ECIoT networks.This study solves a challenging security problem of ECIoT networks by determining the malicious software propagation threshold,which lays the foundation for buildingmore secure and reliable ECIoT networks.
文摘Propagation models are the foundation for radio planning in mobile networks. They are widely used during feasibility studies and initial network deployment, or during network extensions, particularly in new cities. They can be used to calculate the power of the signal received by a mobile terminal, evaluate the coverage radius, and calculate the number of cells required to cover a given area. This paper takes into account the standard K factors model and then uses the Ion motion optimization (IMO) algorithm to set up a propagation model adapted to the physical environment of each of the Cameroonian cities of Yaoundé and Bertoua for different frequencies and technologies. Drive tests were made on the CDMA network in the city of Yaoundé on one hand and on an LTE TDD network in the city of Bertoua on the other hand. IMO is used as the optimization algorithm to deduct a propagation model which fits the environment of the two considered towns. The calculation of the root-mean-square error (RMSE) between the actual data from the drive tests and the prediction data from the implemented model allows the validation of the obtained results. A comparative study made between the RMSE value obtained by the new model and those obtained by the Okumura-Hata and K factors standard models, allowed us to conclude that the new model obtained in each of these two cities is better and more representative of our local environment than the Okumura-Hata currently implemented. The implementation shows that IMO can perform well and solve this kind of optimization problem;the newly obtained models can be used for radio planning in the cities of Yaounde and Bertoua in Cameroon.
基金Project(51622404)supported by Outstanding Youth Science Foundation of the National Natural Science Foundation of ChinaProjects(51374215,11572343,51904092)supported by the National Natural Science Foundation of China+2 种基金Project(2016YFC0801404)supported by the State Key Research Development Program of ChinaProject(KCF201803)supported by Henan Key Laboratory for Green and Efficient Mining&Comprehensive Utilization of Mineral Resources,Henan Polytechnic University,ChinaProject supported by Beijing Excellent Young Scientists,China
文摘The understanding of crack propagation characteristics and law of rocks during the loading process is of great significance for the exploitation and support of rock engineering.In this study,the crack propagation behavior of rocks in triaxial compression tests was investigated in detail.The main conclusions were as follows:1)According to the evolution characteristics of crack axial strain,the differential stress?strain curve of rocks under triaxial compressive condition can be divided into three phases which are linear elastic phase,crack propagation phase,post peak phase,respectively;2)The proposed models are applied to comparison with the test data of rocks under triaxial compressive condition and different temperatures.The theoretical data calculated by the models are in good agreement with the laboratory data,indicating that the proposed model can be applied to describing the crack propagation behavior and the nonlinear properties of rocks under triaxial compressive condition;3)The inelastic compliance and crack initiation strain in the proposed model have a decrease trend with the increase of confining pressure and temperature.Peak crack axial strain increases nonlinearly with the inelastic compliance and the increase rate increases gradually.Crack initiation strain has a linear relation with peak crack axial strain.
基金Project supported by the National Natural Science Foundation of China (Grant No. 62071248)the Postgraduate Research Innovation Program of Jiangsu Province,China(Grant No. KYCX20 0730)。
文摘In real life, the rumor propagation is influenced by many factors. The complexity and uncertainty of human psychology make the diffusion model more challenging to depict. In order to establish a comprehensive propagation model, in this paper, we take some psychological factors into consideration to mirror rumor propagation. Firstly, we use the Ridenour model to combine the trust mechanism with the correlation mechanism and propose a modified rumor propagation model. Secondly, the mean-field equations which describe the dynamics of the modified SIR model on homogenous and heterogeneous networks are derived. Thirdly, a steady-state analysis is conducted for the spreading threshold and the final rumor size. Fourthly, we investigate rumor immunization strategies and obtain immunization thresholds. Next, simulations on different networks are carried out to verify the theoretical results and the effectiveness of the immunization strategies.The results indicate that the utilization of trust and correlation mechanisms leads to a larger final rumor size and a smaller terminal time. Moreover, different immunization strategies have disparate effectiveness in rumor propagation.
基金supported by the Military Pre-study Project of General Armament Department of China(No.YG060101C)
文摘By comparison of the characteristics of existing models for long fatigue crack propagation rates, a new model, called the generalized passivation-lancet model for long fatigue crack propagation rates (GPLFCPR), and a general formula for characterizing the process of crack growth rates are proposed based on the passivation-lancet theory. The GPLFCPR model overcomes disadvantages of the existing models and can describe the rules of the entire fatigue crack growth process from the cracking threshold to the critical fracturing point effectively with explicit physical meaning. It also reflects the influence of material characteristics, such as strength parameters, fracture parameters and heat treatment. Experimental results obtained by testing LZ50 steel, AlZnMgCu0.5, 0.5Cr0.5Mo0.25V steel, etc., show good consistency with the new model. The GPLFCPR model is valuable in theoretical research and practical applications.
文摘We are presenting the numerical simulations for the stochastic computer virus propagation model in this manuscript.We are comparing the solutions of stochastic and deterministic computer virus models.Outcomes of a threshold number R0 hold in stochastic computer virus model.If R_(0)<1 then in such a condition virus controlled in the computer population while R_(0)>1 shows virus rapidly spread in the computer population.Unfortunately,stochastic numerical techniques fail to cope with large step sizes of time.The suggested structure of the stochastic non-standard finite difference technique can never violate the dynamical properties.On this basis,we can suggest a collection of strategies for removing virus’s propagation in the computer population.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 61172031 and 41175012)
文摘The maritime tropospheric duct is a low-altitude anomalous refractivity structure over the ocean surface,and it can significantly affect the performance of many shore-based/shipboard radar and communication systems.We propose the idea that maritime tropospheric ducts can be retrieved from ocean forward-scattered low-elevation global positioning system(GPS) signals.Retrieval is accomplished by matching the measured power patterns of the signals to those predicted by the forward propagation model as a function of the modified refractivity profile.On the basis of a parabolic equation method and bistatic radar equation,we develop such a forward model for computing the trapped propagation characteristics of an ocean forward-scattered GPS signal within a tropospheric duct.A new GPS scattering initial field is defined for this model to start the propagation modeling.A preliminary test on the performance of this model is conducted using measured data obtained from a 2009-experiment in the South China Sea.Results demonstrate that this model can predict GPS propagation characteristics within maritime tropospheric ducts and serve as a forward model for duct inversion.
基金Project supported by the National Natural Science Foundation of China (Grant No. 61471080)the Equipment Development Department Research Foundation of China (Grant No. 61400010303)+2 种基金the Natural Science Research Project of Liaoning Education Department of China (Grant Nos. JDL2019019 and JDL2020002)the Surface Project for Natural Science Foundation in Guangdong Province of China (Grant No. 2019A1515011164)the Science and Technology Plan Project in Zhanjiang, China (Grant No. 2018A06001)。
文摘Current public-opinion propagation research usually focused on closed network topologies without considering the fluctuation of the number of network users or the impact of social factors on propagation. Thus, it remains difficult to accurately describe the public-opinion propagation rules of social networks. In order to study the rules of public opinion spread on dynamic social networks, by analyzing the activity of social-network users and the regulatory role of relevant departments in the spread of public opinion, concepts of additional user and offline rates are introduced, and the direct immune-susceptible, contacted, infected, and refractory (DI-SCIR) public-opinion propagation model based on real-time online users is established. The interventional force of relevant departments, credibility of real information, and time of intervention are considered, and a public-opinion propagation control strategy based on direct immunity is proposed. The equilibrium point and the basic reproduction number of the model are theoretically analyzed to obtain boundary conditions for public-opinion propagation. Simulation results show that the new model can accurately reflect the propagation rules of public opinion. When the basic reproduction number is less than 1, public opinion will eventually disappear in the network. Social factors can significantly influence the time and scope of public opinion spread on social networks. By controlling social factors, relevant departments can analyze the rules of public opinion spread on social networks to suppress the propagate of negative public opinion and provide a powerful tool to ensure security and stability of society.
基金financially supported by the National Natural Science Foundation of China(41761014,42161025,42101096)the Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDA20020201)the Foundation of A Hundred Youth Talents Training Program of Lanzhou Jiaotong University,and the Excellent Platform of Lanzhou Jiaotong University。
文摘In the context of global warming,precipitation forms are likely to transform from snowfall to rainfall with a more pronounced trend.The change in precipitation forms will inevitably affect the processes of regional runoff generation and confluence as well as the annual distribution of runoff.Most researchers used precipitation data from the CMIP5 model directly to study future precipitation trends without distinguishing between snowfall and rainfall.CMIP5 models have been proven to have better performance in simulating temperature but poorer performance in simulating precipitation.To overcome the above limitations,this paper used a Back Propagation Neural Network(BNN)to predict the rainfall-to-precipitation ratio(RPR)in months experiencing freezing-thawing transitions(FTTs).We utilized the meteorological(air pressure,air temperature,evaporation,relative humidity,wind speed,sunshine hours,surface temperature),topographic(altitude,slope,aspect)and geographic(longitude,latitude)data from 28 meteorological stations in the Chinese Tianshan Mountains region(CTMR)from 1961 to 2018 to calculate the RPR and constructed an index system of impact factors.Based on the BNN,decision-making trial and evaluation laboratory method(BP-DEMATEL),the key factors driving the transformation of the RPR in the CTMR were identified.We found that temperature was the only key factor affecting the transformation of the RPR in the BP-DEMATEL model.Considering the relationship between temperature and the RPR,the future temperature under different representative concentration pathways(RCPs)(RCP2.6/RCP4.5/RCP8.5)provided by 21 CMIP5 models and the meteorological factors from meteorological stations were input into the BNN model to acquire the future RPR from 2011 to 2100.The results showed that under the three scenarios,the RPR in the number of months experiencing FTTs during 2011-2100 will be higher than that in the historical period(1981-2010)in the CTMR.Furthermore,in terms of spatial variation,the RPR values on the south slope will be larger than those on the north slope under the three emission scenarios.Moreover,the RPR values exhibited different variation characteristics under different emission scenarios.Under the low-emission scenario(RCP2.6),as time passed,the RPR values changed slightly at more stations.Under the mediumemission scenario(RCP4.5),the RPR increased in the whole CTMR and stabilized on the north slope by the end of this century.Under the high-emission scenario(RCP8.5),the RPR values increased significantly through the 21 st century in the whole CTMR.This study may help to provide a scientific management basis for agricultural production and hydrology.
文摘The initiation and propagation of failure in intact rock are a matter of fundamental importance in rock engineering. At low confining pressures, tensile fracturing initiates in samples at 40%-60% of the uniaxial compressive strength and as loading continues, and these tensile fractures increase in density, ultimately coalescing and leading to strain localization and macro-scale shear failure of the samples. The Griffith theory of brittle failure provides a simplified model and a useful basis for discussion of this process. The Hoek-Brown failure criterion provides an acceptable estimate of the peak strength for shear failure but a cutoff has been added for tensile conditions. However, neither of these criteria adequately explains the progressive coalition of tensile cracks and the final shearing of the specimens at higher confining stresses. Grain-based numerical models, in which the grain size distributions as well as the physical properties of the component grains of the rock are incorporated, have proved to be very useful in studying these more complex fracture processes.
基金supported by the National Natural Science Foundation of China(Grants 41374046 and41174034)
文摘We present numerical modeling of SH-wave propagation for the recently proposed whole Moon model and try to improve our understanding of lunar seismic wave propagation. We use a hybrid PSM/FDM method on staggered grids to solve the wave equations and implement the calculation on a parallel PC cluster to improve the computing efficiency. Features of global SH-wave propagation are firstly discussed for a 100-km shallow and900-km deep moonquakes, respectively. Effects of frequency range and lateral variation of crust thickness are then investigated with various models. Our synthetic waveforms are finally compared with observed Apollo data to show the features of wave propagation that were produced by our model and those not reproduced by our models. Our numerical modeling show that the low-velocity upper crust plays significant role in the development of reverberating wave trains. Increasing frequency enhances the strength and duration of the reverberations.Surface multiples dominate wavefields for shallow event.Core–mantle reflections can be clearly identified for deep event at low frequency. The layered whole Moon model and the low-velocity upper crust produce the reverberating wave trains following each phases consistent with observation. However, more realistic Moon model should be considered in order to explain the strong and slow decay scattering between various phases shown on observation data.
基金supported by China NSF(61572222, 61272405, 61272033, 61272451, 61472121)Fundamental Research Funds for the Central Universities and the open research fund of Zhejiang Provincial Key Lab of Data StorageTransmission Technology, Hangzhou Dianzi University(No. 201301)
文摘Network structures and human behaviors are considered as two important factors in virus defense currently. However, due to ignorance of network security, normal users usually take simple activities, such as reinstalling computer system, or using the computer recovery system to clear virus. How system recovery influences virus spreading is not taken into consideration currently. In this paper, a new virus propagation model considering the system recovery is proposed first, and then in its steady-state analysis, the virus propagation steady time and steady states are deduced. Experiment results show that models considering system recovery can effectively restrain virus propagation. Furthermore, algorithm with system recovery in BA scale-free network is proposed. Simulation result turns out that target immunization strategy with system recovery works better than traditional ones in BA network.
基金supported by the Funding for Outstanding Doctoral Dissertation in NUAA(Grant No.BCXJ18-09)the National Natural Science Foundation of China(Grant No.72071106)Postgraduate Research&Practice Innovation Program of Jiangsu Province,China(Grant No.KYCX180234)。
文摘In daily lives,when emergencies occur,rumors will spread widely on the internet.However,it is quite difficult for the netizens to distinguish the truth of the information.The main reasons are the uncertainty of netizens’behavior and attitude,which make the transmission rates of these information among social network groups be not fixed.In this paper,we propose a stochastic rumor propagation model with general incidence function.The model can be described by a stochastic differential equation.Applying the Khasminskii method via a suitable construction of Lyapunov function,we first prove the existence of a unique solution for the stochastic model with probability one.Then we show the existence of a unique ergodic stationary distribution of the rumor model,which exhibits the ergodicity.We also provide some numerical simulations to support our theoretical results.The numerical results give us some possible methods to control rumor propagation.Firstly,increasing noise intensity can effectively reduce rumor propagation when R_(0)>1That is,after rumors spread widely on social network platforms,government intervention and authoritative media coverage will interfere with netizens’opinions,thus reducing the degree of rumor propagation.Secondly,speed up the rumor refutation,intensify efforts to refute rumors,and improve the scientific quality of netizen(i.e.,increase the value ofβand decrease the value ofαandγ),which can effectively curb the rumor propagation.
文摘Magma is transported in brittle rock by diking.Diking plays a key role in tectonic phenomena such as continental rifting and plate divergence at mid-ocean ridges.In spite of the importance of understanding how magma is