53 resultados para Intrusion

em Chinese Academy of Sciences Institutional Repositories Grid Portal


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The evolution of the upward migration of the magma is a nonlinear and unstable problem in mathematics. It is difficult to solve it. And using the numerical method, the solution is relatively tedious and time-consuming. This paper introduces a method of the instantaneous point source to solve the linear and unstable heat conduction equation during the infinite period of time instead of the solution of the nonlinear and unstable heat conduction equation. The results obtained by this method coincide with those by the numerical method, meaning that this method offers a simple way to solve the nonlinear and unstable heat conduction equation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Salt water intrusion occurred frequently during dry season in Modaomen waterway of the Pearl River Estuary. With the development of region's economy and urbanization, the salt tides affect the region's water supply more and more seriously in recent years. Regulation and allocation of freshwater resources of the upper rivers of the estuary to suppress the salt tides is becoming important measures for ensuring the water supply security of the region in dry season. The observation data analysis showed that the flow value at the Wuzhou hydrometric station on the upper Xijiang river had a good correlation with the salinity in Modaomen estuary. Thus the flow rate of Wuzhou has been used as a control variable for suppression of salt tides in Modaomen estuary. However, the runoff at Wuzhou mainly comes from the discharge of Longtan reservoir on the upper reaches of Xijiang river and the runoff in the interval open valley between Longtan and Wuzhou sections. As the long distance and many tributaries as well as the large non-controlled watershed between this two sections, the reservoir water scheduling has a need for reasonable considering of interaction between the reservoir regulating discharge and the runoff process of the interval open watershed while the deployment of suppression flow at Wuzhou requires longer lasting time and high precision for the salt tide cycles. For this purpose, this study established a runoff model for Longtan - Wuzhou interval drainage area and by model calculations and observation data analysis, helped to understand the response patterns of the flow rate at Wuzhou to the water discharge of Longtan under the interval water basin runoff participating conditions. On this basis, further discussions were taken on prediction methods of Longtan reservoir discharge scheduling scheme for saline intrusion suppression and provided scientific and typical implementation programs for effective suppression flow process at the Wuzhou section.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To discuss the intrusion of the Kuroshio into the SCS, we examined the mixing between the North Pacific and South China Sea (SCS) waters based on in-situ CTD data collected in August and September 2008 and the moored ADCP data taken from mid September 2008 to early July 2009. The CTD survey included four meridional sections from 119A degrees E to 122A degrees E around the Luzon Strait, during which pressure, temperature, and salinity were measured. The CTD data show that the isopycnal surface tilted from the SCS to the North Pacific; and it was steeper in the lower layers than in the upper ones. Meanwhile, we found strong vertical mixing taken place in the areas near 121A degrees E. The Kuroshio in high temperature and salinity intruded westward through Luzon Strait. The frequency of buoyancy was one order of magnitude greater than that of the common ones in the ocean, suggesting stronger stratification in the northeastern SCS. On the other hand, the long-term ADCP data show that before late October 2008, the direction of water flow in the SCS was eastward, and from November 2008 to late February 2009, it turned northwestward in the layers shallower than 150 m, while remained unchanged in deep layers from 200 to 450 m. From March to June 2009, the direction shifted with increasing depth from northward to southward, akin to the Ekman spiral. EOF analysis of the current time series revealed dominant empirical modes: the first mode corresponded to the mean current and showed that the Kuroshio intrusion occurred in the upper layers only from late December to early March. The temporal coefficient of the first and the second mode indicated clearly a dominant signal in a quasi-seasonal cycle.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To study the relationship between sediment transportation and saltwater intrusion in the Changjiang (Yangtze) estuary, a three-dimensional numerical model for temperature, salinity, velocity field, and suspended sediment concentration was established based on the ECOMSED model. Using this model, sediment transportation in the flood season of 2005 was simulated for the Changjiang estuary. A comparison between simulated results and observation data for the tidal level, flow velocity and direction, salinity and suspended sediment concentration indicated that they were consistent in overall. Based on model verification, the simulation of saltwater intrusion and its effect on sediment in the Changjiang estuary was analyzed in detail. The saltwater intrusion in the estuary including the formation, evolution, and disappearance of saltwater wedge and the induced vertical circulation were reproduced, and the crucial impact of the wedge on cohesive and non-cohesive suspended sediment distribution and transportation were successfully simulated. The result shows that near the salinity front, the simulated concentrations of both cohesive and non-cohesive suspended sediment at the surface layer had a strong relationship with the simulated velocity, especially when considering a 1-hour lag. However, in the bottom layer, there was no obvious correlation between them, because the saltwater wedge and its inducing vertical circulation may have resuspended loose sediment on the bed, thus forming a high-concentration area near the bottom even if the velocity near the bottom was very low during the transition phase from flood to ebb.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

利用二维数值模拟的方法研究了侧加热腔体内的自然对流.基于数值模拟结果,描述了水平热入侵流(intrusion)的整个演化过程,并对该过程的物理机制进行了讨论.结果表明:当热入侵流抵达腔体冷壁后,由于冷壁无法卷入所有的热入侵流,热入侵流在冷上角堆积并产生一个反向流动,在冷壁边界层附近形成一个顺时针涡,该涡在浮力效应驱动下可返回热壁,并在腔体的冷热壁之间形成了腔体尺度的流体振荡,即内重力波.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

CA(certificate authority)是PKI中的关键设施.CA的私有密钥一旦泄露,该CA签发的所有证书就只能全部作废.保护在线服务CA的私钥也就成为一个非常重要的课题.不是从保护系统或检测入侵出发来保证CA的安全,而是确保当少数部件被攻击或占领后,CA系统的机密信息并没有暴露.通过将私钥分发给不同的部件,并保证任何一个在线的部件无法恢复CA的私钥,从而保护了CA私钥的保密性.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

将密码协议与密码算法视为一个系统,建立了密码协议系统的一种安全模型.基于假设/保证的组合推理技术提出了新的假设/保证推理规则和假设/保证推理算法,证明了该规则的完备性,实现了密码协议系统的模型检查,并重点解决了系统分解问题、假设函数的设定问题、进程+逻辑的系统特性描述问题等难题.以kerberos密码协议系统为例,利用该安全模型和假设/保证推理技术对密码协议系统进行了安全验证.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

异常检测技术假设所有的入侵行为都会偏离正常行为模式.尝试寻找一种新的异常入侵检测模型改善准确性和效率.模型利用应用程序的系统调用序列,通过基因规划建立了正常行为模式.模型的一个例程管理一个进程.当它发现进程的实际系统调用序列模式偏离正常的行为模式时,会将进程设标记为入侵,并采取应急措施.还给出了基因规划的适应度计算方法以及两个生成下一代的基本算子.通过与现有一些模型的比较,该模型具有更好的准确性和更高的效率.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

移动自组网络是一种不需要基础设施的网络.在这种网络中,移动节点是自组织的,并且需要互相提供网络路由服务.自组网络非常容易受到攻击,特别是内部攻击.提出了一个基于模糊行为分析的入侵检测方案,以检测网络内部的路由攻击.利用邻接节点监测,通过分析节点路由行为与路由规范的偏差,发现恶意行为.在数据分析的过程中引入了模糊路由行为分析的方法,大大降低了误报率.仿真实验表明,该方案能有效地检测出路由入侵行为,而将误报率控制在一个较低的水平.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

随着网络技术的飞速发展,网络入侵检测系统需要处理大量的数据,处理能力的缺乏会引起入侵事件的漏报或误报,提高入侵检测系统的处理能力是目前急需解决的关键问题.AODIDS是一个由移动代理作为优化组件、多个分析结点及探测结点组成的可自动进行优化的分布式网络入侵检测系统.AODIDS的优化组件执行系统的性能评估,制定相应的优化策略,在规定的系统检测正确率的前提下平衡分配网络流量,从而尽可能地发挥整个系统的处理能力.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

利用系统漏洞实施攻击是目前计算机安全面临的主要威胁.本文提出了一种基于进程行为的异常检测模型.该模型引入了基于向量空间的相似度计算算法和反向进程频率等概念,区分了不同系统调用对定义正常行为的不同作用,提高了正常行为定义的准确性;该模型的检测算法针对入侵造成异常的局部性特点,采用了局部分析算法,降低了误报率.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

针对传统分布式入侵检测系统组件之间依赖程度大、系统不够健壮且入侵检测系统自身结构固定不能适应入侵的变化的问题,提出了一种基于Agent的自适应的分布式入侵检测系统(简称AAA-DIDS)·AAADIDS采用Agent概念重新构造系统的组件,改进了分布式入侵检测系统由于高层节点单一无冗余而产生的可靠性差的缺陷,从构造上克服了分布式入侵检测系统的脆弱性·同时,AAADIDS系统采用智能技术构建了自适应的入侵检测系统模型,增加了系统应对入侵行为变化的智能性·AAA-DIDS系统相对于传统的分布式入侵检测系统有效地提高了系统自身的可靠性和针对外界变化的适应能力·