期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
基于logs2intrusions与Web Log Explorer的综合取证分析研究 被引量:1
1
作者 杨晶 赵鑫 芦天亮 《信息网络安全》 CSCD 2017年第3期33-38,共6页
随着互联网应用的迅猛增长,其受到的安全威胁也越来越严重,尤其是网络入侵攻击事件造成了极大的危害。目前,对入侵行为检测的一种必要手段是对日志数据进行分析,网站日志文件是记录Web服务器接收处理请求以及运行时错误等各种原始信息... 随着互联网应用的迅猛增长,其受到的安全威胁也越来越严重,尤其是网络入侵攻击事件造成了极大的危害。目前,对入侵行为检测的一种必要手段是对日志数据进行分析,网站日志文件是记录Web服务器接收处理请求以及运行时错误等各种原始信息的文件,但目前来看网络日志文件的作用还有待进一步提升。文章分析了logs2intrusions、Web Log Explorer、光年SEO日志分析系统、逆火网站分析器这四种日志分析工具的特性,提出了基于logs2intrusions和Web Log Explorer两个工具优势的综合取证分析技术,实现了对大批量入侵攻击日志数据的快速分析处理,提高了对网络入侵攻击行为识别的准确率。 展开更多
关键词 网络入侵检测 logs2intrusions WebLogExplorer 系统日志
在线阅读 下载PDF
Multi-agent cooperative intrusion response in mobile adhoc networks 被引量:6
2
作者 Yi Ping Zou Futai +1 位作者 Jiang Xinghao Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期785-794,共10页
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- s... The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation. 展开更多
关键词 computer networks SECURITY mobile agent mobile adhoc networks intrusion detection intrusion response
在线阅读 下载PDF
Effects of water intrusion and loading rate on mechanical properties of and crack propagation in coal–rock combinations 被引量:12
3
作者 陈田 姚强岭 +4 位作者 卫斐 种照辉 周健 王常彬 李静 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第2期423-431,共9页
Tackling the problems of underground water storage in collieries in arid regions requires knowledge of the effect of water intrusion and loading rate on the mechanical properties of and crack development in coal–rock... Tackling the problems of underground water storage in collieries in arid regions requires knowledge of the effect of water intrusion and loading rate on the mechanical properties of and crack development in coal–rock combinations. Fifty-four coal–rock combinations were prepared and split equally into groups containing different moisture contents(dry, natural moisture and saturated) to conduct acoustic emission testing under uniaxial compression with loading rates ranging from 0.1 mm/min to 0.6 mm/min. The results show that the peak stress and strength-softening modulus, elastic modulus, strain-softening modulus, and post-peak modulus partly decrease with increasing moisture content and loading rate. In contrast, peak strain increases with increasing moisture content and fluctuates with rising loading rate. More significantly, the relationship between stiffness and stress, combined with accumulated counts of acoustic emission, can be used to precisely predict all phases of crack propagation. This is helpful in studying the impact of moisture content and loading rate on crack propagation and accurately calculating mechanical properties. We also determined that the stress thresholds of crack closure, crack initiation, and crack damage do not vary with changes of moisture content and loading rate, constituting 15.22%, 32.20%, and 80.98% of peak stress, respectively. These outcomes assist in developing approaches to water storage in coal mines, determining the necessary width of waterproof coal–rock pillars, and methods of supporting water-enriched roadways, while also advances understanding the mechanical properties of coal–rock combinations and laws of crack propagation. 展开更多
关键词 water intrusion loading rate mechanical properties coal-rock combination crack propagation stress threshold
在线阅读 下载PDF
An infrared target intrusion detection method based on feature fusion and enhancement 被引量:13
4
作者 Xiaodong Hu Xinqing Wang +3 位作者 Xin Yang Dong Wang Peng Zhang Yi Xiao 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2020年第3期737-746,共10页
Infrared target intrusion detection has significant applications in the fields of military defence and intelligent warning.In view of the characteristics of intrusion targets as well as inspection difficulties,an infr... Infrared target intrusion detection has significant applications in the fields of military defence and intelligent warning.In view of the characteristics of intrusion targets as well as inspection difficulties,an infrared target intrusion detection algorithm based on feature fusion and enhancement was proposed.This algorithm combines static target mode analysis and dynamic multi-frame correlation detection to extract infrared target features at different levels.Among them,LBP texture analysis can be used to effectively identify the posterior feature patterns which have been contained in the target library,while motion frame difference method can detect the moving regions of the image,improve the integrity of target regions such as camouflage,sheltering and deformation.In order to integrate the advantages of the two methods,the enhanced convolutional neural network was designed and the feature images obtained by the two methods were fused and enhanced.The enhancement module of the network strengthened and screened the targets,and realized the background suppression of infrared images.Based on the experiments,the effect of the proposed method and the comparison method on the background suppression and detection performance was evaluated,and the results showed that the SCRG and BSF values of the method in this paper had a better performance in multiple data sets,and it’s detection performance was far better than the comparison algorithm.The experiment results indicated that,compared with traditional infrared target detection methods,the proposed method could detect the infrared invasion target more accurately,and suppress the background noise more effectively. 展开更多
关键词 Target intrusion detection Convolutional neural network Feature fusion Infrared target
在线阅读 下载PDF
Intrusion detection based on system calls and homogeneous Markov chains 被引量:8
5
作者 Tian Xinguang Duan Miyi +1 位作者 Sun Chunlai Li Wenfa 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第3期598-605,共8页
A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain ... A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain model to characterize the normal behavior of a privileged program, and associates the states of the Markov chain with the unique system calls in the training data. At the detection stage, the probabilities that the Markov chain model supports the system call sequences generated by the program are computed. A low probability indicates an anomalous sequence that may result from intrusive activities. Then a decision rule based on the number of anomalous sequences in a locality frame is adopted to classify the program's behavior. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for on-line detection. It has been applied to practical host-based intrusion detection systems. 展开更多
关键词 intrusion detection Markov chain anomaly detection system call.
在线阅读 下载PDF
Distributed intrusion detection for mobile ad hoc networks 被引量:7
6
作者 Yi Ping Jiang Xinghao +1 位作者 Wu Yue Liu Ning 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期851-859,共9页
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to... Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments. 展开更多
关键词 mobile ad hoc networks routing protocol SECURITY intrusion detection timed automata.
在线阅读 下载PDF
Grey-theory based intrusion detection model 被引量:3
7
作者 Qin Boping Zhou Xianwei Yang Jun Song Cunyi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第1期230-235,共6页
To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theor... To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theory has merits of fewer requirements on original data scale, less limitation of the distribution pattern and simpler algorithm in modeling. With these merits GTIDS constructs model according to partial time sequence for rapid detect on intrusive act in secure system. In this detection model rate of false drop and false retrieval are effectively reduced through twice modeling and repeated detect on target data. Furthermore, GTIDS framework and specific process of modeling algorithm are presented. The affectivity of GTIDS is proved through emulated experiments comparing snort and next-generation intrusion detection expert system (NIDES) in SRI international. 展开更多
关键词 network security intrusion detection grey theory model.
在线阅读 下载PDF
Detecting network intrusions by data mining and variable-length sequence pattern matching 被引量:2
8
作者 Tian Xinguang Duan Miyi +1 位作者 Sun Chunlai Liu Xin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期405-411,共7页
Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux... Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance. 展开更多
关键词 intrusion detection anomaly detection system call data mining variable-length pattern
在线阅读 下载PDF
Novel design concepts for network intrusion systems based on dendritic cells processes 被引量:2
9
作者 RICHARD M R 谭冠政 +1 位作者 ONGALO P N F CHERUIYOT W 《Journal of Central South University》 SCIE EI CAS 2013年第8期2175-2185,共11页
An abstraction and an investigation to the worth of dendritic cells (DCs) ability to collect, process and present antigens are presented. Computationally, this ability is shown to provide a feature reduction mechanism... An abstraction and an investigation to the worth of dendritic cells (DCs) ability to collect, process and present antigens are presented. Computationally, this ability is shown to provide a feature reduction mechanism that could be used to reduce the complexity of a search space, a mechanism for development of highly specialized detector sets as well as a selective mechanism used in directing subsets of detectors to be activated when certain danger signals are present. It is shown that DCs, primed by different danger signals, provide a basis for different anomaly detection pathways. Different antigen-peptides are developed based on different danger signals present, and these peptides are presented to different adaptive layer detectors that correspond to the given danger signal. Experiments are then undertaken that compare current approaches, where a full antigen structure and the whole repertoire of detectors are used, with the proposed approach. Experiment results indicate that such an approach is feasible and can help reduce the complexity of the problem by significant levels. It also improves the efficiency of the system, given that only a subset of detectors are involved during the detection process. Having several different sets of detectors increases the robustness of the resulting system. Detectors developed based on peptides are also highly discriminative, which reduces the false positives rates, making the approach feasible for a real time environment. 展开更多
关键词 artificial immune systems network intrusion detection anomaly detection feature reduction negative selectionalgorithm danger model
在线阅读 下载PDF
FLBS: Fuzzy lion Bayes system for intrusion detection in wireless communication network 被引量:2
10
作者 NARENDRASINH B Gohil VDEVYAS Dwivedi 《Journal of Central South University》 SCIE EI CAS CSCD 2019年第11期3017-3033,共17页
An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detecti... An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detection system (IDS). In this paper, the fuzzy lion Bayes system (FLBS) is proposed for intrusion detection mechanism. Initially, the data set is grouped into a number of clusters by the fuzzy clustering algorithm. Here, the Naive Bayes classifier is integrated with the lion optimization algorithm and the new lion naive Bayes (LNB) is created for optimally generating the probability measures. Then, the LNB model is applied to each data group, and the aggregated data is generated. After generating the aggregated data, the LNB model is applied to the aggregated data, and the abnormal nodes are identified based on the posterior probability function. The performance of the proposed FLBS system is evaluated using the KDD Cup 99 data and the comparative analysis is performed by the existing methods for the evaluation metrics accuracy and false acceptance rate (FAR). From the experimental results, it can be shown that the proposed system has the maximum performance, which shows the effectiveness of the proposed system in the intrusion detection. 展开更多
关键词 intrusion detection wireless communication network fuzzy clustering naive Bayes classifier lion naive Bayes system
在线阅读 下载PDF
Network Intrusion Detection Model Based on Ensemble of Denoising Adversarial Autoencoder 被引量:1
11
作者 KE Rui XING Bin +1 位作者 SI Zhan-jun ZHANG Ying-xue 《印刷与数字媒体技术研究》 CAS 北大核心 2024年第5期185-194,218,共11页
Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research si... Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research significance for network security.Due to the strong generalization of invalid features during training process,it is more difficult for single autoencoder intrusion detection model to obtain effective results.A network intrusion detection model based on the Ensemble of Denoising Adversarial Autoencoder(EDAAE)was proposed,which had higher accuracy and reliability compared to the traditional anomaly detection model.Using the adversarial learning idea of Adversarial Autoencoder(AAE),the discriminator module was added to the original model,and the encoder part was used as the generator.The distribution of the hidden space of the data generated by the encoder matched with the distribution of the original data.The generalization of the model to the invalid features was also reduced to improve the detection accuracy.At the same time,the denoising autoencoder and integrated operation was introduced to prevent overfitting in the adversarial learning process.Experiments on the CICIDS2018 traffic dataset showed that the proposed intrusion detection model achieves an Accuracy of 95.23%,which out performs traditional self-encoders and other existing intrusion detection models methods in terms of overall performance. 展开更多
关键词 intrusion detection Noise-Reducing autoencoder Generative adversarial networks Integrated learning
在线阅读 下载PDF
Design and implementation of self-protection agent for network-based intrusion detection system 被引量:3
12
作者 ZHU Shu-ren(朱树人) LI Wei-qin(李伟琴) 《Journal of Central South University of Technology》 2003年第1期69-73,共5页
Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection ag... Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection agents were designed, which have the distributed architecture,cooperate with the agents in intrusion detection in a loose-coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self-protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network-based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and cannot apperceive the existence of network-based intrusion detection system. The communication between every part is secure. In the low layer, the packet streams are controlled to avoid the buffer leaks exist ing in some system service process and back-door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively. 展开更多
关键词 intrusion DETECTION SYSTEM (IDS) network-based intrusion DETECTION system(NIDS) SELF-PROTECTION AGENT IP filter
在线阅读 下载PDF
HERT as an Efficient Tool to Study the Seawater Intrusion Effect During Tsunami in Karaikal Area,South India
13
作者 Rekapalli Rajesh V.Sarma +1 位作者 T.Naveen G.Padalu 《地学前缘》 EI CAS CSCD 北大核心 2009年第S1期10-10,共1页
There are a variety of scientific techniques useful to know the subsurface resistivity in order to estimate the saline water intrusion effect during tsunami.The electrical resistivity methods involve the measurement o... There are a variety of scientific techniques useful to know the subsurface resistivity in order to estimate the saline water intrusion effect during tsunami.The electrical resistivity methods involve the measurement of the apparent resistivity of the soil and rock as a function of depth(vertical resistivity sounding) or lateral position(resistivity profiling).The resistivity of the soil is a complicated function of porosity, permeability,ionic content of pore fluids and 展开更多
关键词 seawater intrusion RESISTIVITY SOUNDING HERT SALINITY
在线阅读 下载PDF
An Adaptive Clustering Algorithm for Intrusion Detection
14
作者 QIU Juli 《现代电子技术》 2007年第2期130-132,共3页
In this paper,we introduce an adaptive clustering algorithm for intrusion detection based on wavecluster which was introduced by Gholamhosein in 1999 and used with success in image processing.Because of the non-statio... In this paper,we introduce an adaptive clustering algorithm for intrusion detection based on wavecluster which was introduced by Gholamhosein in 1999 and used with success in image processing.Because of the non-stationary characteristic of network traffic,we extend and develop an adaptive wavecluster algorithm for intrusion detection.Using the multiresolution property of wavelet transforms,we can effectively identify arbitrarily shaped clusters at different scales and degrees of detail,moreover,applying wavelet transform removes the noise from the original feature space and make more accurate cluster found.Experimental results on KDD-99 intrusion detection dataset show the efficiency and accuracy of this algorithm.A detection rate above 96% and a false alarm rate below 3% are achieved. 展开更多
关键词 CLUSTERING data mining intrusion detection wavelet transforms
在线阅读 下载PDF
Trace Element Geochemistry of the Baishiquan and Pobei Intrusions,Xinjiang,NW China:Petrogenisis Implications
15
作者 SONG Xie-Yan,XIE Wei,DENG Yu-Feng(State Key Laboratory of Ore Deposit Geochemistry,Institute of Geochemistry,Chinese Academy of Sciences,Guiyang 550002,China) 《矿物学报》 CAS CSCD 北大核心 2011年第S1期391-391,共1页
The Baishiquan and Pobei Early Permian mafic-ultramafic intrusions were emplaced into Proterozoic metamorphic rocks in the Central Tianshan and the Beishan Fold Belt,northern Xinjiang,NW China.The Baishiquan intrusion... The Baishiquan and Pobei Early Permian mafic-ultramafic intrusions were emplaced into Proterozoic metamorphic rocks in the Central Tianshan and the Beishan Fold Belt,northern Xinjiang,NW China.The Baishiquan intrusion comprises mainly gabbro,and mela-gabbro sills occur within and along the margins of the gabbro body.In the Pobei intrusion,two distinct gabbroic packages,a lower gabbro and the main gabbro,are intruded and overlain by small cumulate wehrlite bodies. 展开更多
关键词 OIB Trace Element Geochemistry of the Baishiquan and Pobei intrusions Xinjiang NW China
在线阅读 下载PDF
金川Ⅰ号岩体橄榄石Ni-MgO相互关系及其地质意义 被引量:26
16
作者 陈列锰 宋谢炎 +3 位作者 Danyushevsky LV 肖加飞 李士彬 官建祥 《岩石学报》 SCIE EI CAS CSCD 北大核心 2009年第12期3369-3378,共10页
金川超镁铁质岩体赋存着仅次于加拿大Sudbury和俄罗斯Noril'sk-Talnakh的世界第三大在采铜镍硫化物矿床,岩体以一系列的NE向断层为界分成四个小岩体,由西至东依次为:Ⅲ、Ⅰ、Ⅱ、Ⅳ岩体。Ⅰ号岩体主要由二辉橄榄岩、含辉橄榄岩和橄... 金川超镁铁质岩体赋存着仅次于加拿大Sudbury和俄罗斯Noril'sk-Talnakh的世界第三大在采铜镍硫化物矿床,岩体以一系列的NE向断层为界分成四个小岩体,由西至东依次为:Ⅲ、Ⅰ、Ⅱ、Ⅳ岩体。Ⅰ号岩体主要由二辉橄榄岩、含辉橄榄岩和橄榄二辉岩构成,橄榄石在各岩相中均为保存较好的主要造岩矿物。本文研究得到金川Ⅰ号岩体上部二辉橄榄岩和含辉橄榄岩中橄榄石的镁橄榄石Fo值介于83.9~85.7,而其Ni含量为1396×10^(-6)~2043×10^(-6),大多低于从S不饱和玄武岩浆中结晶出采的橄榄石的Ni含量。模拟计算结果表明橄榄石较低的Ni含量是因为橄榄石结晶的同时,发生了强烈的硫化物熔离;橄榄石的Fo-Ni关系还因与晶间硅酸盐熔浆的物质交换而发生改变。模拟计算还证明大约有30%的晶间硅酸盐岩浆与橄榄石发生Fe-Mg物质交换反应,导致早结晶橄榄石的Fo值减少了1~1.5。同时,橄榄石较小的Fo值变化表明,在橄榄石结晶和硫化物熔离过程中,不断有新的岩浆贯入和补充。 展开更多
关键词 金川 超镁铁质岩体 镁橄榄石 相互关系 地质意义 intrusion Correlation North China CRATON fractional crystallization 二辉橄榄岩 硫化物熔离 Chemical composition 物质交换 模拟计算 结晶 铜镍硫化物矿床 玄武岩浆 含量 硅酸盐 during
在线阅读 下载PDF
烧结矿微孔隙的分形特征 被引量:3
17
作者 张玉柱 张庆军 +2 位作者 莫文玲 刘丽妹 孟华栋 《烧结球团》 北大核心 2005年第4期1-4,共4页
烧结矿的孔隙是烧结矿的重要性质之一,但由于烧结矿的多相性和不均匀性,使得孔隙结构的研究极其复杂。为了有效地研究烧结矿的孔隙特征,本文采用了压汞测试法进行孔隙测定,应用分形几何的观点完成资料处理,试图从一个全新的角度来分析... 烧结矿的孔隙是烧结矿的重要性质之一,但由于烧结矿的多相性和不均匀性,使得孔隙结构的研究极其复杂。为了有效地研究烧结矿的孔隙特征,本文采用了压汞测试法进行孔隙测定,应用分形几何的观点完成资料处理,试图从一个全新的角度来分析材料的烧结机理。研究表明,烧结矿的微孔隙具有多层次的自相似性,通过孔隙结构分形维数的计算可以建立烧结矿强度和微孔隙分维的关系,烧结矿的分形特征和烧结过程中孔隙的形成机理有关。 展开更多
关键词 分形 烧结矿 多孔介质 MIP(mercury intrusion poroslmetry) 烧结矿强度 分形特征 微孔隙 孔隙结构
在线阅读 下载PDF
Characteristics and formation of high quality reservoirs in sediment gravity flows of Gangzhong area,Huanghua depression 被引量:2
18
作者 杨有星 金振奎 +3 位作者 卢言霞 刁丽颖 王濮 刘春慧 《Journal of Central South University》 SCIE EI CAS 2014年第2期745-752,共8页
Reservoirs can be developed in the sediment gravity flows.However,high quality reservoirs are found widespread in sediment gravity flows of Gangzhong area,Huanghua depression,Bohai Bay Basin,East China.Characteristics... Reservoirs can be developed in the sediment gravity flows.However,high quality reservoirs are found widespread in sediment gravity flows of Gangzhong area,Huanghua depression,Bohai Bay Basin,East China.Characteristics and formation of these reservoirs are key problems to be solved.Through comprehensive analysis of thin section petrography,scanning electron microscopy and X-ray diffraction,two distinct rules were obtained.1) These high quality reservoirs have apparent characteristics:lithology consists mainly of medium-fine grained sands; moderately-well sorted and rounded; intergranular pores dominating >70% of the entire pores,surface per unit pore volume reaches 15%; average porosity is 21% and average permeability is 55×10-3 μm2.2) Types of sedimentary microfacies and dissolution strongly control on the formation of high quality reservoirs.Main channels and sandy braided bars have the best reservoir properties.Because that sediments are mainly medium-fine grained sands in high-energy environments.The favorable primary porosity and permeability may promote calcite cementation and help to produce more secondary pores.Besides,at the depth of 2500-3200 m,basically matching threshold of oil generation,organic acid expelled when organic matter became mature,and H+ released during clay mineral transformation.These both result in the dissolution of calcite cements and create large volume pores,then physical properties improve correspondingly.Moreover,deep hydrothermal fluid intrusion may also have impacts on the development of secondary pores. 展开更多
关键词 Huanghua depression sediment gravity flows DIAGENESIS intergranular pores hydrothermal fluid intrusion
在线阅读 下载PDF
Macroscopic and microscopic mechanical behavior and seepage characteristics of coal under hydro-mechanical coupling 被引量:1
19
作者 GAO Ming-zhong GAO Zheng +6 位作者 YANG Ben-gao XIE Jing WANG Ming-yao HAO Hai-chun WU Yan ZHOU Lang WANG Jing-yu 《Journal of Central South University》 SCIE EI CAS CSCD 2024年第8期2765-2779,共15页
Understanding the physical,mechanical behavior,and seepage characteristics of coal under hydro-mechanical coupling holds significant importance for ensuring the stability of surrounding rock formations and preventing ... Understanding the physical,mechanical behavior,and seepage characteristics of coal under hydro-mechanical coupling holds significant importance for ensuring the stability of surrounding rock formations and preventing gas outbursts.Scanning electron microscopy,uniaxial tests,and triaxial tests were conducted to comprehensively analyze the macroscopic and microscopic physical and mechanical characteristics of coal under different soaking times.Moreover,by restoring the stress path and water injection conditions of the protective layer indoors,we explored the coal mining dynamic behavior and the evolution of permeability.The results show that water causes the micro-surface of coal to peel off and cracks to expand and develop.With the increase of soaking time,the uniaxial and triaxial strengths were gradually decreased with nonlinear trend,and decreased by 63.31%and 30.95%after soaking for 240 h,respectively.Under different water injection pressure conditions,coal permeability undergoes three stages during the mining loading process and ultimately increases to higher values.The peak stress of coal,the deviatoric stress and strain at the permeability surge point all decrease with increasing water injection pressure.The results of this research can help improve the understanding of the coal mechanical properties and seepage evolution law under hydro-mechanical coupling. 展开更多
关键词 COAL water intrusion mechanical properties PERMEABILITY macro and micro features
在线阅读 下载PDF
Numerical modelling for predicting corrosion initiation life of reinforced concrete square piles under reverse-seepage pressure 被引量:1
20
作者 WANG Rong-bo WU Wen-bing +3 位作者 HE Si-hong XIAO Liang WEN Min-jie MEI Guo-xiong 《Journal of Central South University》 SCIE EI CAS CSCD 2024年第10期3596-3611,共16页
Square piles of reinforced concrete(RC)in marine environments are susceptible to chloride-inducedcorrosion.A novel reverse-seepage technique(RST)is applied to square piles to block the intrusion of chlorides.Thisresea... Square piles of reinforced concrete(RC)in marine environments are susceptible to chloride-inducedcorrosion.A novel reverse-seepage technique(RST)is applied to square piles to block the intrusion of chlorides.Thisresearch introduces a computational model designed to predict the lifespan of corrosion initiation in reinforced concretesquare piles when applied reverse-seepage pressure.The model considers the impacts of chloride binding and the tripletime-dependence property among the permeability,the corrected surface chloride concentration,and the diffusioncoefficient.The proposed numerical model is solved using the alternating direction implicit(ADI)approach,and itsaccuracy and reliability are evaluated by contrasting the computational outcomes with the analytical solution andexperimental results.Furthermore,the primary factors contributing to the corrosion of reinforced concrete square pilesare analyzed.The results indicate that applying RST can decrease the chloride penetration depth and prolong the lifespanof corrosion initiation in square piles.The water-cement ratio and reverse seepage pressure are the most influentialfactors.A water pressure of 0.4 MPa can double the life of concrete,and the durable life of concrete with a water-cementratio of 0.3 can reach 100 years. 展开更多
关键词 reverse-seepage technique chloride ion intrusion alternating direction implicit method reinforced concrete square pile corrosion initiation life
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部