期刊文献+
共找到599篇文章
< 1 2 30 >
每页显示 20 50 100
Spatiotemporal Variability in Extreme Temperature Events in an Arid-Semiarid Region of China and Their Teleconnections with Large-Scale Atmospheric Circulation 被引量:2
1
作者 Lin Zhang Yanfeng Liu +1 位作者 Menggui Jin Xing Liang 《Journal of Earth Science》 SCIE CAS CSCD 2023年第4期1201-1217,共17页
With a warming climate,temperature extremes have been a main global issue in recent decades due to their potential influence on the sustainable development of human life and natural ecosystems.In this study,12 indicat... With a warming climate,temperature extremes have been a main global issue in recent decades due to their potential influence on the sustainable development of human life and natural ecosystems.In this study,12 indicators of extreme temperature events are used to evaluate the spatiotemporal distribution,periodic structure and teleconnections with large-scale atmospheric circulation in Xinjiang,Northwest China by combining wavelet coherence(WTC) analysis based on continuous wavelet transform(CWT) analysis with the sequential Mann-Kendall test.We find that over the past six decades,the climate in Xinjiang has become warmer and has suffered from increases in the frequency of warm extremes and decreases in the frequency of cold extremes.Warm extremes have mainly occurred in the southern Tianshan Mountains surrounding the Tarim Basin and western part of the Taklamakan Desert,and cold extremes have primarily occurred in the southwestern Altai Mountains and northern foot of the Tianshan Mountains.Extreme temperature events,including warm extremes,cold extremes,and other temperature indices,have significant interannual variability,with the main oscillation periods at smaller(2–4-year band),intermediate(4–7-year band),and greater time scales in recent decades.Furthermore,cold-extreme indices,including frost days,cool days,and cool nights all show a clear changepoint during 1990–1997 at the 95% confidence level,and both ice days and cold spell duration indicator have a potential changepoint during 1981–1986.However,the changing points for warmextreme indices are detected during 1992–1998.The temperature variables are significantly correlated with the EI Ni?o-Southern Oscillation(ENSO) and Arctic Oscillation(AO),but less well correlated with the Pacific Decadal Oscillation(PDO).The phase difference in the WTC spectra is not uniform between temperature extremes and climatic oscillations.Our findings will have important implications for local governments in taking effective measures to mitigate the potential effects of regional climate warming due to human activities in Xinjiang. 展开更多
关键词 extreme temperature events spatiotemporal variability large-scale atmospheric circu-lation inland arid-semiarid region wavelet analysis climate change.
原文传递
The Centre for China and Globalisation(CCG)Attends the 60th Munich Security Conference(MSC)and Hosts Side Event
2
《International Understanding》 2024年第1期45-45,共1页
The Centre for China and Globalisation(CCG)hosted a side event on February 17 titled"China,Europe,and the United States:Climate Cooperation in an Era of Great Power Politics"at the Munich Security Conference... The Centre for China and Globalisation(CCG)hosted a side event on February 17 titled"China,Europe,and the United States:Climate Cooperation in an Era of Great Power Politics"at the Munich Security Conference(MSC)2024,which was convened from February 16 to 18,2024 in Munich,Germany. 展开更多
关键词 security event MSC CCG
在线阅读 下载PDF
Classification of wintertime large-scale tilted ridges over the Eurasian continent and their influences on surface air temperature 被引量:1
3
作者 Da-Wei LIN Cholaw BUEH Zuo-Wei XIE 《Atmospheric and Oceanic Science Letters》 CSCD 2018年第5期404-411,共8页
This study investigates the major patterns of large-scale tilted ridges(LSTRS)over the Eurasian continent and their connections with large-scale surface air temperature during boreal winter.A total number of 134 LSTR ... This study investigates the major patterns of large-scale tilted ridges(LSTRS)over the Eurasian continent and their connections with large-scale surface air temperature during boreal winter.A total number of 134 LSTR events with zonal extent exceeding 90°of longitude on the peak day are identified.Using self-organizing map(SOM),the LSTRs are classified into five clusters that are characterized by different spatial distributions and orientations.The leading two clusters are closely associated with extensive and persistent cold events over different places.Considering the first cluster,LSTRs extend from the Ural Mountains to Northeast Asia and are favorable for the amplification and southeastward extension of the Siberian high.Therefore,this cluster is closely associated with the occurrence of extensive and persistent cold events in china.In comparison with the first cluster,the LSTRs of second group are situated to the west,with starting points from the Kola Peninsula,and cause extensive and persistent cold events over Eastern Europe,central Asia,and central Siberia.The results suggest that the vertical coupling between LSTRs and the corresponding anomalous sea level pressure is crucial for the persistent cold temperature events associated with the leading two SOM clusters. 展开更多
关键词 large-scale tilted ridges self-organizing map extensive and persistent cold event Siberian high
在线阅读 下载PDF
Highly Secure Residents Life Event Management System Based on Blockchain by Hyperledger Fabric 被引量:1
4
作者 Ragouguelaba Agoda Koussema Hirohide Haga 《Journal of Computer and Communications》 2021年第9期38-55,共18页
This article describes the design and implementation of Residents Life Event Management System (hereinafter called as RLEMS) with high level reliability and security by blockchain technology. The data access environme... This article describes the design and implementation of Residents Life Event Management System (hereinafter called as RLEMS) with high level reliability and security by blockchain technology. The data access environment provided by blockchain is highly secure and trustworthy. In Blockchain system, some data fragments are grouped into one piece called as <i>blocks</i>, and all blocks are connected to create a chain of blocks in database. When blocks are connected, hash value is used to connect blocks properly. Blockchain technology enables highly secure and reliable data management system under relatively poor ICT environment. For example, developing countries such as African countries do not have sufficient ICT environment. Therefore adopting blockchain technology is suitable for such countries. Based on this consideration, we have started to build RLEMS on the blockchain system. In previous work, we used the MultiChain as a blockchain platform. However, as MultiChain platform is mainly for private blockchain system, it is not suitable for government-level data management system. Therefore, we tried to use another blockchain framework. We selected Hyperledger Fabric which was developed by Linux Foundation. It enables to implement all styles of blockchain system. This article describes the design and implementation of RLEMS by using Hyperledger Fabric. Furthermore, to provide the best user experience, we also built the web application interface with Java web application framework named PrimeFace. The implementation of a prototype revealed that the Hyperledger Fabric blockchain technology is more suitable than MultiChain. 展开更多
关键词 Blockchain secure Database Life event Management Web Application
在线阅读 下载PDF
Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network
5
作者 徐光伟 史有群 +2 位作者 朱明 吴国文 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期50-52,共3页
Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy a... Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated. 展开更多
关键词 Ad Hoc security auditing access control of devices sign of devices property of event.
在线阅读 下载PDF
A tentative study on security management based on dangerous goods road transportation
6
作者 SHANG Yue 《Chinese Business Review》 2009年第3期59-63,共5页
The paper conducts analysis on the causes of dangerous goods road transportation accidents by applying analytic technique of security system science - Event Tree Analysis (ETA). By computing minimum cut and minimal ... The paper conducts analysis on the causes of dangerous goods road transportation accidents by applying analytic technique of security system science - Event Tree Analysis (ETA). By computing minimum cut and minimal path set of event tree and the important level of elementary event, the paper elicits the results that the factors of causing road transportation accident are multiple and its hazard is great while the paper also elicits the sorting of structural important level of elementary event. The paper offers the security countermeasures for dangerous goods road transportation which plays a vital role in safeguarding dangerous goods road transportation security. 展开更多
关键词 dangerous goods transportation event tree analysis technology transportation security
在线阅读 下载PDF
ICPS multi-target constrained comprehensive security control based on DoS attacks energy grading detection and compensation
7
作者 HAN Yinlong HAN Xiaowu 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2024年第4期518-531,共14页
Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,fr... Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,from the perspective of the defender,according to the differential impact of the system under DoS attacks of different energies,the DoS attacks energy grading detection standard was formulated,and the ICPS comprehensive security control framework was constructed.Secondly,a security transmission strategy based on event triggering was designed.Under the DoS attack energy classification detection mechanism,for large-energy attacks,the method based on time series analysis was considered to predict and compensate for lost data.Therefore,on the basis of passive and elastic response to small energy attacks,the active defense capability against DoS attacks was increased.Then by introducing the conecomplement linearization algorithm,the calculation methods of the state and fault estimation observer and the integrated safety controller were deduced,the goal of DoS attack active and passive hybrid intrusion tolerance and actuator failure active fault tolerance were realized.Finally,a simulation example of a four-capacity water tank system was given to verify the validity of the obtained conclusions. 展开更多
关键词 industry cyber-physical system(ICPS) Denial-of-Service(DoS)attacks energy grading detection security event triggering mechanism time series analysis methods cone complementary linearization
在线阅读 下载PDF
Fast-converging Deep Reinforcement Learning for Optimal Dispatch of Large-scale Power Systems Under Transient Security Constraints
8
作者 Tannan Xiao Ying Chen +2 位作者 Han Diao Shaowei Huang Chen Shen 《Journal of Modern Power Systems and Clean Energy》 2025年第5期1495-1506,共12页
Power system optimal dispatch with transient security constraints is commonly represented as transient securityconstrained optimal power flow(TSC-OPF).Deep reinforcement learning(DRL)-based TSC-OPF trains efficient de... Power system optimal dispatch with transient security constraints is commonly represented as transient securityconstrained optimal power flow(TSC-OPF).Deep reinforcement learning(DRL)-based TSC-OPF trains efficient decisionmaking agents that are adaptable to various scenarios and provide solution results quickly.However,due to the high dimensionality of the state space and action spaces,as well as the nonsmoothness of dynamic constraints,existing DRL-based TSCOPF solution methods face a significant challenge of the sparse reward problem.To address this issue,a fast-converging DRL method for optimal dispatch of large-scale power systems under transient security constraints is proposed in this paper.The Markov decision process(MDP)modeling of TSC-OPF is improved by reducing the observation space and smoothing the reward design,thus facilitating agent training.An improved deep deterministic policy gradient algorithm with curriculum learning,parallel exploration,and ensemble decision-making(DDPGCL-PE-ED)is introduced to drastically enhance the efficiency of agent training and the accuracy of decision-making.The effectiveness,efficiency,and accuracy of the proposed method are demonstrated through experiments in the IEEE 39-bus system and a practical 710-bus regional power grid.The source code of the proposed method is made public on GitHub. 展开更多
关键词 large-scale power system optimal dispatch transient security optimal power flow reinforcement learning sparse reward
原文传递
Quantifying the contribution of triple compound extreme events to global yield loss of major staple crops from 1982 to 2016
9
作者 Kun Xiao Ying Sun +6 位作者 Wei Wu Xuewen Zhou Zhicheng Zhang Qiuyao Lai Chen Huang Zhenhua Xiong Qinchuan Xin 《Journal of Integrative Agriculture》 2025年第10期4078-4099,共22页
The increasing frequency of compound extreme events under ongoing climate change threatens global food security.Compared to individual extreme events,the simultaneous occurrence of multiple extreme events can exacerba... The increasing frequency of compound extreme events under ongoing climate change threatens global food security.Compared to individual extreme events,the simultaneous occurrence of multiple extreme events can exacerbate crop yield reductions,yet comprehensive assessments of these compound effects remain limited.To bridge this gap,we applied a linear mixed-effects model to quantify the impacts of individual extreme events(cold days(CD)and killing degree days(KDD))and triple compound extreme events(heatwave and low precipitation(HWLP)and hot-dry-windy(HDW))on the global yields of winter wheat,soybeans,and maize from 1982 to 2016.Our analysis indicated that regions severely impacted by extreme events(exceeding the 95%threshold)experienced total crop yield losses of more than 9.16,24.89,26.69,and 7.12%due to CD,KDD,HWLP,and HDW,respectively.The adverse effects of compound events were particularly pronounced during critical growth stages.HWLP results in yield losses of 9.4%for winter wheat and 6.8%for maize per 10 hours of exposure during the heading to harvesting stages,while soybean yields declined by 8.8%per 10 hours during the planting to three-true-leaf stage.Similarly,KDD caused a 7.4%yield reduction in winter wheat per 10°C day during the heading to harvesting stages,a 9.5%reduction in maize per 10°C day during the planting to jointing stages,and a 3.8%reduction in soybean per 10°C day during the planting to three-true-leaf stages.These findings underscore the substantial contribution of compound extreme events,which are often overlooked in existing risk assessments,in determining the global yields of major staple crops. 展开更多
关键词 food security crop yield loss compound extreme events climate change
在线阅读 下载PDF
Energy Security Planning for Hydrogen Fuel Cell Vehicles in Large-Scale Events:A Case Study of Beijing 2022 Winter Olympics 被引量:2
10
作者 Pinxi Wang Qing Xue +3 位作者 Jun Yang Hao Ma Yilun Li Xu Zhao 《Automotive Innovation》 EI CSCD 2022年第2期209-220,共12页
Energy security planning is fundamental to safeguarding the traffic operation in large-scale events.To guarantee the promo-tion of green,zero-carbon,and environmental-friendly hydrogen fuel cell vehicles(HFCVs)in larg... Energy security planning is fundamental to safeguarding the traffic operation in large-scale events.To guarantee the promo-tion of green,zero-carbon,and environmental-friendly hydrogen fuel cell vehicles(HFCVs)in large-scale events,a five-stage planning method is proposed considering the demand and supply potential of hydrogen energy.Specifically,to meet the requirements of the large-scale events’demand,a new calculation approach is proposed to calculate the hydrogen amount and the distribution of hydrogen stations.In addition,energy supply is guaranteed from four aspects,namely hydrogen produc-tion,hydrogen storage,hydrogen delivery,and hydrogen refueling.The emergency plan is established based on the overall support plan,which can realize multi-dimensional energy security.Furthermore,the planning method is demonstrative as it powers the Beijing 2022 Winter Olympics as the first“green”Olympic,providing both theoretical and practical evidence for the energy security planning of large-scale events.This study provides suggestions about ensuring the energy demand after the race,broadening the application scenarios,and accelerating the application of HFCVs. 展开更多
关键词 Hydrogen fuel cell vehicles large-scale events Energy security plan Hydrogen calculation Layout of hydrogen refueling station
原文传递
基于Event-B方法的安全协议设计、建模与验证 被引量:3
11
作者 李梦君 潘国腾 欧国东 《软件学报》 EI CSCD 北大核心 2018年第11期3400-3411,共12页
随着软件精化验证方法以及Isabella/HOL、VCC等验证工具不断取得进展,研究者们开始采用精化方法和验证工具设计、建模安全协议和验证安全协议源程序的正确性.在介绍Event-B方法和验证工具Isabella/HOL、VCC的基础上,综述了基于Event-B... 随着软件精化验证方法以及Isabella/HOL、VCC等验证工具不断取得进展,研究者们开始采用精化方法和验证工具设计、建模安全协议和验证安全协议源程序的正确性.在介绍Event-B方法和验证工具Isabella/HOL、VCC的基础上,综述了基于Event-B方法的安全协议形式化设计、建模与源程序验证的典型研究工作,主要包括从需求规范到消息传递形式协议的安全协议精化设计、基于TPM(trusted platform module)的安全协议应用的精化建模以及从消息传递形式协议到代码的源程序精化验证. 展开更多
关键词 安全协议设计 安全协议建模与验证 精化 event-B方法
在线阅读 下载PDF
事件触发机制下网络化系统的模型预测控制研究综述
12
作者 黎黄菊 王建华 杜树新 《电子科技》 2026年第1期32-39,共8页
网络化系统的设计集成了控制系统、通信和实时计算等领域的相关技术方案。由于物理环境影响,网络控制系统中的通信带宽及计算资源均受限制,事件触发控制策略能够有效解决通信受限问题。采用事件触发策略后,在改变系统模型的同时影响了... 网络化系统的设计集成了控制系统、通信和实时计算等领域的相关技术方案。由于物理环境影响,网络控制系统中的通信带宽及计算资源均受限制,事件触发控制策略能够有效解决通信受限问题。采用事件触发策略后,在改变系统模型的同时影响了系统性能,采用模型预测控制方法能够提升系统的鲁棒性和安全性。文中综述了网络化控制系统中事件触发方案的建模及其与控制器协同设计方法的研究进展,分析介绍了动态事件触发、类切换事件触发、环形事件触发和随机事件触发等触发方案的数学模型,总结了网络化系统中事件触发机制联合设计控制器在实际中的应用,提出了网络化控制系统中基于事件触发的模型预测控制研究存在的问题和未来的研究方向。 展开更多
关键词 网络化控制系统 网络安全 事件触发采样与通信 动态事件触发 随机事件触发 环形事件触发 不确定性 模型预测控制
在线阅读 下载PDF
Multi-objective Robust Optimal Secure Operation Model of Large-scale Power Grid with Multiple Back-to-back Voltage Source Converter Based Systems Considering Short-circuit Current Limitation
13
作者 Weikun Liang Shunjiang Lin +2 位作者 Yuerong Yang Ziqing Yang Mingbo Liu 《Journal of Modern Power Systems and Clean Energy》 2025年第4期1151-1166,共16页
With the load growth and the power grid expansion,the problem of short-circuit current(SCC)exceeding the secure limit in large-scale power grids has become more serious,which poses great challenge to the optimal secur... With the load growth and the power grid expansion,the problem of short-circuit current(SCC)exceeding the secure limit in large-scale power grids has become more serious,which poses great challenge to the optimal secure operation.Aiming at the SCC limitations,we use multiple back-toback voltage source converter based(B2B VSC)systems to separate a large-scale AC power grid into two asynchronous power grids.A multi-objective robust optimal secure operation model of large-scale power grid with multiple B2B VSC systems considering the SCC limitation is established based on the AC power flow equations.The decision variables include the on/off states of synchronous generators,power output,terminal voltage,transmission switching,bus sectionalization,and modulation ratios of B2B VSC systems.The influence of inner current sources of renewable energy generators on the system SCC is also considered.To improve the computational efficiency,a mixedinteger convex programming(MICP)framework based on convex relaxation methods including the inscribed N-sided approximation for the nonlinear SCC limitation constraints is proposed.Moreover,combined with the column-and-constraint generation(C&CG)algorithm,a method to directly solve the compromise optimal solution(COS)of the multi-objective robust optimal secure operation model is proposed.Finally,the effectiveness and computational efficiency of the proposed solution method is demonstrated by an actual 4407-bus provincial power grid and the modified IEEE 39-bus power grid,which can reduce the consumed CPU time of solving the COS by more than 90%and obtain a better COS. 展开更多
关键词 large-scale power grid optimal secure operation short-circuit current(SCC)limitation BACK-TO-BACK voltage source converter convex relaxation multi-objective robust optimization
原文传递
Main Energy Paths and Energy Cascade Processes of the Two Types of Persistent Heavy Rainfall Events over the Yangtze River–Huaihe River Basin 被引量:6
14
作者 Yuanchun ZHANG Jianhua SUN Shenming FU 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2017年第2期129-143,共15页
Two types of persistent heavy rainfall events (PHREs) over the Yangtze River-Huaihe River Basin were determined in a recent statistical study: type A, whose precipitation is mainly located to the south of the Yangt... Two types of persistent heavy rainfall events (PHREs) over the Yangtze River-Huaihe River Basin were determined in a recent statistical study: type A, whose precipitation is mainly located to the south of the Yangtze River; and type B, whose precipitation is mainly located to the north of the river. The present study investigated these two PHRE types using a newly derived set of energy equations to show the scale interaction and main energy paths contributing to the persistence of the precipitation. The main results were as follows. The available potential energy (APE) and kinetic energy (KE) associated with both PHRE types generally increased upward in the troposphere, with the energy of the type-A PHREs stronger than that of the type-B PHREs (except for in the middle troposphere). There were two main common and universal energy paths of the two PHRE types: (1) the baroclinic energy conversion from APE to KE was the dominant energy source for the evolution of large-scale background circulations; and (2) the downscaled energy cascade processes of KE and APE were vital for sustaining the eddy flow, which directly caused the PHREs. The significant differences between the two PHRE types mainly appeared in the lower troposphere, where the baroclinic energy conversion associated with the eddy flow in type-A PHREs was from KE to APE, which reduced the intensity of the precipitation-related eddy flow; whereas, the conversion in type-B PHREs was from APE to KE, which enhanced the eddy flow. 展开更多
关键词 persistent heavy rainfall event energy cascade process large-scale background circulation precipitation-related eddy flow
在线阅读 下载PDF
Extensive Cold-Precipitation-Freezing Events in Southern China and Their Circulation Characteristics 被引量:9
15
作者 Jing-Bei PENG Cholaw BUEH Zuo-Wei XIE 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2021年第1期81-97,共17页
Concurrence of low temperature,precipitation and freezing weather in an extensive area would cause devastating impacts on local economy and society.We call such a combination of concurrent disastrous weather“extensiv... Concurrence of low temperature,precipitation and freezing weather in an extensive area would cause devastating impacts on local economy and society.We call such a combination of concurrent disastrous weather“extensive coldprecipitation-freezing”events(ECPFEs).In this study,the ECPFEs in southern China(15°−35°N,102°−123°E)are objectively defined by using daily surface observational data for the period 1951−2013.An ECPFE in southern China is defined if the low temperature area,precipitation area and freezing area concurrently exceed their respective thresholds for at least three consecutive days.The identified ECPFEs are shown to be reasonable and reliable,compared with those in previous studies.The circulation anomalies in ECPFEs are characterized by a large-scale tilted ridge and trough pairing over mid-and high-latitude Eurasia,and the intensified subtropical westerlies along the southern foot of the Tibetan Plateau and the anomalous anticyclonic circulation over the subtropical western Pacific.Comparative analysis reveals that the stable cold air from the north and the warm and moist air from the south converge,facilitating a favorable environment for the concurrence of extensive low-temperature,precipitation and freezing weather. 展开更多
关键词 extensive cold-precipitation-freezing event southern China large-scale tilted ridge and trough trough over the Bay of Bengal western Pacific subtropical high
在线阅读 下载PDF
Comparison of two types of persistent heavy rainfall events during sixteen warm seasons in the Sichuan Basin 被引量:3
16
作者 Yuanchun Zhang Jianhua Sun +3 位作者 Luqi Zhu Huan Tang Shuanglong Jin Xiaolin Liu 《Atmospheric and Oceanic Science Letters》 CSCD 2021年第6期48-53,共6页
Based on hourly precipitation from national surface stations,persistent heavy rainfall events(PHREs)over the Sichuan Basin(SCB)are explored during the warm season(May to September)from 2000 to 2015 to compare synoptic... Based on hourly precipitation from national surface stations,persistent heavy rainfall events(PHREs)over the Sichuan Basin(SCB)are explored during the warm season(May to September)from 2000 to 2015 to compare synoptic circulations and maintenance mechanisms between different PHRE types.There are two main types of PHREs:one is characterized by a rain belt west of 106°E over the SCB(WSB-PHREs),and the other features a rain belt east of 106°E over the SCB(ESB-PHREs).In total,there are 18 ESB-PHREs and 10 WSB-PHREs during the study period.Overall,the rain belts of WSB-PHREs are along the terrain distribution east of the Tibetan Plateau,while the precipitation intensity of ESB-PHREs is stronger.For the two types of PHREs,the shortwave trough over the SCB and the western Pacific subtropical high act as their favorable background environments,particularly for ESB-PHREs.The water vapor of WSB-PHREs is mainly transported from the South China Sea,whereas for ESB-PHREs the South China Sea and Bay of Bengal are their main moisture sources.The composite vorticity budgets of southwest vortices during their mature stage indicate that the convergence effect is a dominant factor for maintaining the two types of PHREs,and the strong vertical vorticity advection is also favorable,but the relative contribution of vertical advection is larger for WSB-PHREs. 展开更多
关键词 Southwest vortex Persistent heavy rainfall event large-scale circulation Vorticity budget
在线阅读 下载PDF
Adverse events in critical care: Search and active detection through the Trigger Tool 被引量:2
17
作者 Francisco J Molina Paula T Rivera +4 位作者 Alejandro Cardona Diana C Restrepo Oralia Monroy Daniel Rodas Juan G Barrientos 《World Journal of Critical Care Medicine》 2018年第1期9-15,共7页
AIM To investigate the incidence of disadvantageous events by using the Global Trigger Tool in an intensive care unit(ICU).METHODS A retrospective descriptive study was performed in a 12-bed university ICU in the city... AIM To investigate the incidence of disadvantageous events by using the Global Trigger Tool in an intensive care unit(ICU).METHODS A retrospective descriptive study was performed in a 12-bed university ICU in the city of Medellin, Colombia. Clinical charts of hospitalized patients were reviewed, between January 1 and December 31, 2016, with the following inclusion criteria: subjects aged over 18 years, with at least 24 h of hospitalization and who had a complete medical history that could be accessed. Interventions: Trained reviewers conducted a retros pective examination of medical charts searching for clue events that elicit investigation, in order to detect an unfavorable event. Measurements: Information was processed through SPSS softwareversion 21; for numerical variables, the mean was reported with standard deviation(SD). Percentages were calculated for qualitative variables. RESULTS Two hundred and forty-four triggers occurred, with 82.4% of subjects having presented with at least one and an average of 3.37 (SD 3.47). A total of 178 adverse events (AEs) took place in 48 individuals, with an incidence of 52.1%. On average, four events per patient were recorded, and for each unfortunate event, 1.98 triggers were presented. The most frequent displeasing issues were: pressure ulcers(17.6%), followed by complications or reactions to medical devices(4.3%), and lacerations or skin defects(3.7%); the least frequent was delayed diagnosis or treatment (0.56%). Thirty-eight point four percent of mishap events caused temporary damage that required intervention, and 48.9% of AEs were preventable. Comparison between AEs and admission diagnoses found that hypertension and sepsis were the only diagnoses that had statistical significance (P = 0.042 and 0.022, respectively).CONCLUSION Almost half of the unfavorable issues were classified as avoidable, which leaves a very wide field of work in terms of preventative activities. 展开更多
关键词 ADVERSE eventS Critical CARE TRIGGER TOOL COMPLICATIONS security
暂未订购
基于Event-B对存在网络攻击的安全协议的改进研究 被引量:1
18
作者 朱俊翔 张翔 《中国电子科学研究院学报》 北大核心 2020年第6期530-538,共9页
设计对指定类型的网络攻击具有防御能力的安全协议,通常是一项重要且具有挑战性的任务。即使知道安全协议容易受到某种攻击,对其进行合理的改进也并不容易。本研究提出了一个基于Event-B方法的通用框架,用来指导安全协议的修改,并验证... 设计对指定类型的网络攻击具有防御能力的安全协议,通常是一项重要且具有挑战性的任务。即使知道安全协议容易受到某种攻击,对其进行合理的改进也并不容易。本研究提出了一个基于Event-B方法的通用框架,用来指导安全协议的修改,并验证改进后的协议可以防御已知的网络攻击。首先用初始模型对攻击场景高度抽象,通过对抽象模型的精化,得到反映真实攻击过程的具体模型。然后将描述协议行为的事件从模型中分离出来,单独对其进行精化改进,如果改进后的协议事件重组的模型与具体模型不存在精化关系,则改进的合理性可以得到验证。最后通过NSPK协议被攻击的案例展示了本研究所提出方法的可用性。该框架可用于开发协议,以避免由逻辑漏洞引起的攻击,并验证协议补丁的正确性。 展开更多
关键词 形式化方法 精化理论 模型检测 event-B方法 安全协议设计 网络攻击
在线阅读 下载PDF
Event Normalization Through Dynamic Log Format Detection
19
作者 Amir Azodi David Jaeger +1 位作者 Feng Cheng Christoph Meinel 《ZTE Communications》 2014年第3期62-66,共5页
The analytical and monitoring capabilities of central event re-positories, such as log servers and intrusion detection sys-tems, are limited by the amount of structured information ex-tracted from the events they rece... The analytical and monitoring capabilities of central event re-positories, such as log servers and intrusion detection sys-tems, are limited by the amount of structured information ex-tracted from the events they receive. Diverse networks and ap-plications log their events in many different formats, and this makes it difficult to identify the type of logs being received by the central repository. The way events are logged by IT systems is problematic for developers of host-based intrusion-detection systems (specifically, host-based systems), develop-ers of security-information systems, and developers of event-management systems. These problems preclude the develop-ment of more accurate, intrusive security solutions that obtain results from data included in the logs being processed. We propose a new method for dynamically normalizing events into a unified super-event that is loosely based on the Common Event Expression standard developed by Mitre Corporation. We explain how our solution can normalize seemingly unrelat-ed events into a single, unified format. 展开更多
关键词 event normalization: intrusion detection event stream processing knowledge base security information and event management
在线阅读 下载PDF
Application Research on Two-Layer Threat Prediction Model Based on Event Graph
20
作者 Shuqin Zhang Xinyu Su +2 位作者 Yunfei Han Tianhui Du Peiyu Shi 《Computers, Materials & Continua》 SCIE EI 2023年第12期3993-4023,共31页
Advanced Persistent Threat(APT)is now the most common network assault.However,the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks.The... Advanced Persistent Threat(APT)is now the most common network assault.However,the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks.They cannot provide rapid and accurate early warning and decision responses to the present system state because they are inadequate at deducing the risk evolution rules of network threats.To address the above problems,firstly,this paper constructs the multi-source threat element analysis ontology(MTEAO)by integrating multi-source network security knowledge bases.Subsequently,based on MTEAO,we propose a two-layer threat prediction model(TL-TPM)that combines the knowledge graph and the event graph.The macro-layer of TL-TPM is based on the knowledge graph to derive the propagation path of threats among devices and to correlate threat elements for threat warning and decision-making;The micro-layer ingeniously maps the attack graph onto the event graph and derives the evolution path of attack techniques based on the event graph to improve the explainability of the evolution of threat events.The experiment’s results demonstrate that TL-TPM can completely depict the threat development trend,and the early warning results are more precise and scientific,offering knowledge and guidance for active defense. 展开更多
关键词 Knowledge graph multi-source data fusion network security threat modeling event graph absorbing Markov chain threat propagation path
在线阅读 下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部