期刊文献+
共找到14,408篇文章
< 1 2 250 >
每页显示 20 50 100
Geochronology,Petrology and Geochemistry of Xingdi No.3 Mafic-Ultramafic Intrusions in the Northeastern Tarim Craton,NW China 被引量:2
1
作者 XIA Zhaode XIA Mingzhe JIANG Changyi 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2017年第2期500-514,共15页
The Xingdi mafic-ultramafic intrusions occur in the northeastern margin of the Tarim craton. The Xingdi No. 3 intrusion is the smallest of four intrusions, with an exposed area of 1.7 km2, and the zircon U-Pb age of t... The Xingdi mafic-ultramafic intrusions occur in the northeastern margin of the Tarim craton. The Xingdi No. 3 intrusion is the smallest of four intrusions, with an exposed area of 1.7 km2, and the zircon U-Pb age of the intrusion is 752±4 Ma. The intrusion consists of gabbros, pyroxenites and peridotites, and exhibits a crystallization sequence of the main rock-forming minerals as olivine, orthopyroxene, clinopyroxene and plagioclase. Mineralization occurred at or near the boundaries of the intrusion between pyroxenites and peridotites, and appears as a layered or lenticular shape about 500 m long and 4–15 m wide. The primary sulfides have a relatively simple mineralogy dominated by pyrrhotite-pentlandite-chalcopyrite assemblages, which occur as droplet, star-like and graphic texture and locally sideronitic structures. Geochronological and geochemistry investigations suggest that the Xingdi mafic-ultramafic intrusions and coeval volcanic rock in the Kuluktag area of the Tarim craton formed in an intracontinental breakup environment. Based on the composition of the dominant rockforming minerals and covariant relationships of other oxides versus Mg O, the parental magma of the Xingdi No.3 intrusion belongs to high-Mg tholeiitic basaltic magmas with Mg O of 10.78 wt%. The Xingdi No.3 intrusive rocks are characterized by light REE enrichment relative to heavy REE, negative Nb-Ta anomalies, low 143Nd/144Nd ratios(from 0.511183 to 0.511793) and high initial 87Sr/86Sr ratios(from 0.7051 to 0.7113). The magma was derived from the enriched-lithospheric mantle and was contaminated during emplacement. According to rock assemblages, mineralization, olivine characteristics, geochemical characteristics and mass balance, there are better copper-nickel ore prospects in the Xingdi No.3 intrusion than in the other three intrusions in the area. 展开更多
关键词 mafic-ultramafic GEOCHRONOLOGY GEOCHEMISTRY copper-nickel ore prospects Xingdi No.3 intrusion Tarim craton Xinjiang the Northern margin of Tibetean Proto-Tethys
下载PDF
Himalayas as a global hot spot of springtime stratospheric intrusions:Insight from isotopic signatures in sulfate aerosols
2
作者 Kun Wang ShiChang Kang +9 位作者 Mang Lin PengFei Chen ChaoLiu Li XiuFeng Yin Shohei Hattori Teresa L.Jackson JunHua Yang YiXi Liu Naohiro Yoshida Mark HThiemens 《Research in Cold and Arid Regions》 CSCD 2024年第1期5-13,共9页
Downward transport of stratospheric air into the troposphere(identified as stratospheric intrusions)could potentially modify the radiation budget and chemical of the Earth's surface atmosphere.As the highest and l... Downward transport of stratospheric air into the troposphere(identified as stratospheric intrusions)could potentially modify the radiation budget and chemical of the Earth's surface atmosphere.As the highest and largest plateau on earth,the Tibetan Plateau including the Himalayas couples to global climate,and has attracted widespread attention due to rapid warming and cryospheric shrinking.Previous studies recognized strong stratospheric intrusions in the Himalayas but are poorly understood due to limited direct evidences and the complexity of the meteorological dynamics of the third pole.Cosmogenic^(35)S is a radioactive isotope predominately produced in the lower stratosphere and has been demonstrated as a sensitive chemical tracer to detect stratospherically sourced air mass in the planetary boundary layer.Here,we report 6-month(April–September 2018)observation of^(35)S in atmospheric sulfate aerosols(^(35)SO_(4)^(2-))collected from a remote site in the Himalayas to reveal the stratospheric intrusion phenomenon as well as its potential impacts in this region.Throughout the sampling campaign,the^(35)SO_(4)^(2-)concentrations show an average of 1,070±980 atoms/m^(3).In springtime,the average is 1,620±730 atoms/m^(3),significantly higher than the global existing data measured so far.The significant enrichments of^(35)SO_(4)^(2-)measured in this study verified the hypothesis that the Himalayas is a global hot spot of stratospheric intrusions,especially during the springtime as a consequence of its unique geology and atmospheric couplings.In combined with the ancillary evidences,e.g.,oxygen-17 anomaly in sulfate and modeling results,we found that the stratospheric intrusions have a profound impact on the surface ozone concentrations over the study region,and potentially have the ability to constrain how the mechanisms of sulfate oxidation are affected by a change in plateau atmospheric properties and conditions.This study provides new observational constraints on stratospheric intrusions in the Himalayas,which would further provide additional information for a deeper understanding on the environment and climatic changes over the Tibetan Plateau. 展开更多
关键词 HIMALAYAS Stratospheric intrusions Cosmogenic^(35)SO_(4)^(2-) Ozone Atmospheric oxidation
下载PDF
Sm-Nd age of syncollisional mafic-ultramafic intrusions in the Dabie Mountains 被引量:3
3
作者 Yonghong Nie Shuguang Li 《Chinese Science Bulletin》 SCIE EI CAS 1998年第2期160-163,共4页
A Sm_Nd age of (228±42) Ma with initial ε Nd =-16.4 for the Renjiawan pyroxenite intrusion in the North Dabie terrane is reported. This age with another Sm_Nd age of (230±44) Ma for the Zhujiapu pyroxenite ... A Sm_Nd age of (228±42) Ma with initial ε Nd =-16.4 for the Renjiawan pyroxenite intrusion in the North Dabie terrane is reported. This age with another Sm_Nd age of (230±44) Ma for the Zhujiapu pyroxenite in the same terrane documents that the pyroxenite in the North Dabie terrane are formed during continental subduction time of the Yangtze craton in the Triassic. 展开更多
关键词 DABIE Mountains mafic_ultramafic intrusions Sm_Nd chronology syncollisional IGNEOUS rocks.
全文增补中
Geochemical Characteristics and Metallogenesis of the Qingkuangshan Ni-Cu-PGE Mineralized Mafic-Ultramafic Intrusion in Huili County, Sichuan Province, SW China 被引量:5
4
作者 ZHU Feilin TAO Yan +1 位作者 HU Ruizhong MA Yansheng 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2012年第3期590-607,共18页
The Qingkuangshan Ni-Cu-PGE deposit, located in the Xiaoguanhe region of Huili County, Sichuan Province, is one of several Ni-Cu-PGE deposits in the Emeishan Large Igneous Province (ELIP). The ore-bearing intrusion ... The Qingkuangshan Ni-Cu-PGE deposit, located in the Xiaoguanhe region of Huili County, Sichuan Province, is one of several Ni-Cu-PGE deposits in the Emeishan Large Igneous Province (ELIP). The ore-bearing intrusion is a mafic-ultramafic body. This paper reports major elements, trace elements and platinum-group elements in different types of rocks and sulfide-mineralized samples in the intrusion. These data are used to evaluate the source mantle characteristics, the degree of mantle partial melting, the composition of parental magma and the ore-forming processes. The results show that Qingkuangshan intrusion is part of the ELIP. The rocks have trace element ratios similar to the coeval Emeishan basalts. The primitive mantle-normalized patterns of Ni-Cu-PGE have positive slopes, and the ratios of Pd/Ir are lower than 22. The PGE compositions of sulfide ores and associated rocks are characterized by Ru depletion. The PGE contents in bulk sulfides are slightly depleted relative to Ni and Cu, which is similar to the Yangliuping Ni-Cu-PGE deposit. The composition of the parental magma for the intrusion is estimated to contain about 14.65 wt% MgO, 48.66 wt% SiO2 and 15.48 wt% FeOt, and the degree of mantle partial melting is estimated to be about 20%. In comparison with other typical Ni-Cu-PGE deposits in the ELIP, the Qingkuangshan Ni-Cu-PGE deposit has lower PGE contents than the Jinbaoshan PGE deposit, but has higher PGE contents than the Limahe and Baimazhai Ni-Cu deposit, and has similar PGE contents to the Yangliuping Ni-Cu-PGE deposit. The moderate PGE depletions in the bulk sulfide of the Qingkuanghan deposit suggest that the parental magma of the host intrusion may have undergone minor sulfide segregation at depth. The mixing calculations suggests that an average of 10% crustal contamination in the magma, which may have been the main cause of sulfide saturation in the magma. We propose that sulfide segregation from a moderately PGE depleted magma took place prior to magma emplacement at Qingkuangshan, that small amounts of immiscible sulfide droplets and olivine and chromite crystals were suspended in the ascending magma, and that the suspended materials settled down when the magma passed trough the Qingkuangshan conduit. The Qingkuangshan sulfide-bearing intrusion is interpreted to a feeder of Emeishan flood basalts in the region. 展开更多
关键词 Magmatic sulfide deposit mafic-ultramafic intrusion PGE Qingkuangshan Emeishan Large Igneous Province
下载PDF
Geochemical and Petrological Studies on the Early Carboniferous Sidingheishan Mafic-Ultramafic Iintrusion in the Southern Margin of the Central Asian Orogenic Belt,NW China 被引量:3
5
作者 SUN Tao QIAN Zhuangzhi +5 位作者 THAKURTA Joyashish YANG Shenghong XU Gang DUAN Jun GAO Bo WANG Jing 《Acta Geologica Sinica(English Edition)》 CAS CSCD 2018年第3期952-971,共20页
The Sidingheishan mafic-ultramafic intrusion is located in the eastern part of the Northern Tianshan Mountain, along the southern margin of the Central Asian Orogenic Belt in northern Xinjiang autonomous region of Chi... The Sidingheishan mafic-ultramafic intrusion is located in the eastern part of the Northern Tianshan Mountain, along the southern margin of the Central Asian Orogenic Belt in northern Xinjiang autonomous region of China. The Sidingheishan intrusion is mainly composed of wehrlite, olivine websterite, olivine gabbro, gabbro and hornblende gabbro. At least two pulses of magma were involved in the formation of the intrusion. The first pulse of magma produced an olivine-free unit and the second pulse produced an olivine-bearing unit. The magmas intruded the Devonian granites and granodiorites.An age of 351.4±5.8 Ma(Early Carboniferous) for the Sidingheishan intrusion has been determined by U-Pb SHRIMP analysis of zircon grains separated from the olivine gabbro unit. A U-Pb age of 359.2±6.4 Ma from the gabbro unit has been obtained by LA-ICP-MS. Olivine of the Sidingheishan intrusion reaches 82.52 mole% Fo and 1414 ppm Ni. On the basis of olivine-liquid equilibria, it has been calculated that the MgO and FeO included in the parental magma of a wehrlite sample were approximately10.43 wt% and 13.14 wt%, respectively. The Sidingheishan intrusive rocks are characterized by moderate enrichments in Th and Sm, slight enrichments in light REE, and depletions in Nb, Ta, Zr and Hf. The εNd(t) values in the rock units vary from +6.70 to +9.64, and initial87Sr/86Sr ratios range between 0.7035 and0.7042. Initial206Pb/204Pb,207Pb/204Pb and208Pb/204Pb values fall in the ranges of 17.23-17.91,15.45-15.54 and 37.54-38.09 respectively. These characteristics are collectively similar to the Heishan intrusion and the Early Carboniferous subduction related volcanic rocks in the Santanghu Basin, North Tianshan and Beishan area. The low(La/Gd)PMvalues between 0.26 and 1.77 indicate that the magma of the Sidingheishan intrusion was most likely derived from a depleted spinel-peridotite mantle.(Th/Nb)PMratios from 0.59 to 20.25 indicate contamination of the parental magma in the upper crust.Crystallization modeling methods suggest that the parental magma of the Sidingheishan intrusion was generated by flush melting of the asthenosphere and subsequently there was about 10 vol%contamination from a granitic melt. This was followed by about 5 vol% assimilation of upper crustal rocks. Thus, the high-Mg basaltic parental magma of Sidingheishan intrusion is interpreted to have formed from partial melting of the asthenosphere during the break-off of a subducted slab. 展开更多
关键词 break-off of subducted slab zircon U-Pb dating whole-rock Sr-Nd-Pb isotopes mafic-ultramafic intrusion southern margin of Central Asian Orogenic Belt China
下载PDF
Geochemical characteristics and tectonic setting of the Tuerkubantao mafic-ultramafic intrusion in West Junggar,Xinjiang,China 被引量:4
6
作者 Yufeng Deng Feng Yuan +3 位作者 Taofa Zhou Chao Xu Dayu Zhang Xuji Guo 《Geoscience Frontiers》 SCIE CAS CSCD 2015年第2期141-152,共12页
Mineral chemistry, whole-rock major oxide, and trace element compositions have been determined for the Tuerkubantao mafic-ultramafic intrusion, in order to understand the early Paleozoic tectonic evolution of the West... Mineral chemistry, whole-rock major oxide, and trace element compositions have been determined for the Tuerkubantao mafic-ultramafic intrusion, in order to understand the early Paleozoic tectonic evolution of the West Junggar orogenic belt at the southern margin of the Central Asian orogenic belt. The Tuerkubantao mafic-ultramafic intrusion is a well-differentiated complex comprising peridotite, olivine pyroxenite, gabbro, and diorite. The ultramafic rocks are mostly seen in the central part of the intrusion and surrounded by mafic rocks. The Tuerkubantao intrusive rocks are characterized by enrichment of large ion lithophile elements and depleted high field strength elements relative to N-MORB. In addition, the Tuerkubantao intrusion displays relatively low Th/U and Nb/U (1.13-2.98 and 2.53-7.02, respectively) and high La/Nb and Ba/Nb (1.15 4.19 and 37.7-79.82, respectively). These features indicate that the primary magma of the intrusion was derived from partial melting of a previously metasomatized mantle source in a subduction setting. The trace element patterns of peridotites, gabbros, and diorite in the Tuerkubantao intrusion have sub-parallel trends, suggesting that the different rock types are related to each other by differentiation of the same primary magma. The intrusive contact between peridotite and gabbro clearly suggest that the Tuerkubantao is not a fragment of an ophiolite. However, the Tuerkubantao intrusion displays many similarities with Alaskan-type mafic-ultramafic intrusions along major sutures of Phanerozoic orogenic belts. Common features include their geodynamic setting, internal lithological zoning, and geochemistry. The striking similarities indicate that the middle Devonian Tuerkubantao intrusion likely formed in a subduction-related setting similar to that of the Alaskan-type intrusions. In combination with the Devonian magmatism and porphyry mineralization, we propose that subduction of the oceanic slab has widely existed in the expansive oceans during the Devonian around the Junggar block. 展开更多
关键词 Alaskan-type complexes Subduction setting Metasomatized mantle Tuerkubantao mafic-ultramafic intrusion West Junggar
下载PDF
IDS-INT:Intrusion detection system using transformer-based transfer learning for imbalanced network traffic 被引量:3
7
作者 Farhan Ullah Shamsher Ullah +1 位作者 Gautam Srivastava Jerry Chun-Wei Lin 《Digital Communications and Networks》 SCIE CSCD 2024年第1期190-204,共15页
A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a... A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcategory of attack,host information,malicious scripts,etc.In terms of network perspectives,network traffic may contain an imbalanced number of harmful attacks when compared to normal traffic.It is challenging to identify a specific attack due to complex features and data imbalance issues.To address these issues,this paper proposes an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic(IDS-INT).IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced data.First,detailed information about each type of attack is gathered from network interaction descriptions,which include network nodes,attack type,reference,host information,etc.Second,the transformer-based transfer learning approach is developed to learn detailed feature representation using their semantic anchors.Third,the Synthetic Minority Oversampling Technique(SMOTE)is implemented to balance abnormal traffic and detect minority attacks.Fourth,the Convolution Neural Network(CNN)model is designed to extract deep features from the balanced network traffic.Finally,the hybrid approach of the CNN-Long Short-Term Memory(CNN-LSTM)model is developed to detect different types of attacks from the deep features.Detailed experiments are conducted to test the proposed approach using three standard datasets,i.e.,UNsWNB15,CIC-IDS2017,and NSL-KDD.An explainable AI approach is implemented to interpret the proposed method and develop a trustable model. 展开更多
关键词 Network intrusion detection Transfer learning Features extraction Imbalance data Explainable AI CYBERSECURITY
下载PDF
A Data Intrusion Tolerance Model Based on an Improved Evolutionary Game Theory for the Energy Internet 被引量:1
8
作者 Song Deng Yiming Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第6期3679-3697,共19页
Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suf... Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources. 展开更多
关键词 Energy Internet intrusion tolerance game theory racial competition adaptive intrusion response
下载PDF
Metallogenic characteristics of Shitoukengde intrusion and its implications for Ni-Co-(Cu)sulfide mineralization in East Kunlun
9
作者 Xue-peng Duan Fan-cong Meng +1 位作者 Zong-qi Wang Xiao-fei Yu 《China Geology》 CAS CSCD 2024年第4期714-729,共16页
Xiarihamu deposit is the only super-large Ni-Co deposit found in East Kunlun orogenic belt(EKOB)until present.Shitoukengde(STKD)intrusion is considered to have the potential to become a large Ni-Co deposit in East Kun... Xiarihamu deposit is the only super-large Ni-Co deposit found in East Kunlun orogenic belt(EKOB)until present.Shitoukengde(STKD)intrusion is considered to have the potential to become a large Ni-Co deposit in East Kunlun.In order to discuss the metallogenic potential,this study present petrographical,geochemical data,and zircon U-Pb dating for the STKD intrusion.The STKD intrusion is hosted within mafic-ultramafic rocks which contain peridotite,pyroxenite and gabbro,and mainly intruded into the marble of the Paleoproterozoic Jinshuikou Group.Harzburgite and orthopyroxenite are the main country rocks for the Cu-Ni sulfide mineralization.Combine with the positiveε_(Hf)(t)values(+1.1 to+8.6)of zircons,the enrichment of LILEs,depletion of HFSEs,and lower Ce/Pb ratios of whole rocks indicate that the parental magma was originated from the depleted asthenospheric mantle and experienced 5%–15%crustal contamination.Troctolite formed during the Early Devonian and it has weighted mean^(206)Pb/^(238)U age of 412 Ma.Regional background information has indicated that the post-collisional extension setting has already existed during the Early Devonian,leading to the formation of STKD intrusion and Cu-Ni sulfide mineralization.STKD intrusion may have the potential to be one economic Cu-Ni sulfide deposit but seems unlikely to be a super-large one. 展开更多
关键词 Troctolite Zircon U-Pb mafic-ultramafic intrusion Depleted asthenospheric mantle Cu-Ni sulfide mineralization East Kunlun orogenic belt Shitoukengde
下载PDF
Feature extraction for machine learning-based intrusion detection in IoT networks 被引量:1
10
作者 Mohanad Sarhan Siamak Layeghy +2 位作者 Nour Moustafa Marcus Gallagher Marius Portmann 《Digital Communications and Networks》 SCIE CSCD 2024年第1期205-216,共12页
A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems(NIDSs).Consequently,network interruptions and loss of sensitive data have ... A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems(NIDSs).Consequently,network interruptions and loss of sensitive data have occurred,which led to an active research area for improving NIDS technologies.In an analysis of related works,it was observed that most researchers aim to obtain better classification results by using a set of untried combinations of Feature Reduction(FR)and Machine Learning(ML)techniques on NIDS datasets.However,these datasets are different in feature sets,attack types,and network design.Therefore,this paper aims to discover whether these techniques can be generalised across various datasets.Six ML models are utilised:a Deep Feed Forward(DFF),Convolutional Neural Network(CNN),Recurrent Neural Network(RNN),Decision Tree(DT),Logistic Regression(LR),and Naive Bayes(NB).The accuracy of three Feature Extraction(FE)algorithms is detected;Principal Component Analysis(PCA),Auto-encoder(AE),and Linear Discriminant Analysis(LDA),are evaluated using three benchmark datasets:UNSW-NB15,ToN-IoT and CSE-CIC-IDS2018.Although PCA and AE algorithms have been widely used,the determination of their optimal number of extracted dimensions has been overlooked.The results indicate that no clear FE method or ML model can achieve the best scores for all datasets.The optimal number of extracted dimensions has been identified for each dataset,and LDA degrades the performance of the ML models on two datasets.The variance is used to analyse the extracted dimensions of LDA and PCA.Finally,this paper concludes that the choice of datasets significantly alters the performance of the applied techniques.We believe that a universal(benchmark)feature set is needed to facilitate further advancement and progress of research in this field. 展开更多
关键词 Feature extraction Machine learning Network intrusion detection system IOT
下载PDF
A Hybrid Intrusion Detection Method Based on Convolutional Neural Network and AdaBoost 被引量:1
11
作者 Wu Zhijun Li Yuqi Yue Meng 《China Communications》 SCIE CSCD 2024年第11期180-189,共10页
To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection... To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection method.Hence,we proposed an intrusion detection algorithm based on convolutional neural network(CNN)and AdaBoost algorithm.This algorithm uses CNN to extract the characteristics of network traffic data,which is particularly suitable for the analysis of continuous and classified attack data.The AdaBoost algorithm is used to classify network attack data that improved the detection effect of unbalanced data classification.We adopt the UNSW-NB15 dataset to test of this algorithm in the PyCharm environment.The results show that the detection rate of algorithm is99.27%and the false positive rate is lower than 0.98%.Comparative analysis shows that this algorithm has advantages over existing methods in terms of detection rate and false positive rate for small proportion of attack data. 展开更多
关键词 ADABOOST CNN detection rate false positive rate feature extraction intrusion detection
下载PDF
An Intelligent SDN-IoT Enabled Intrusion Detection System for Healthcare Systems Using a Hybrid Deep Learning and Machine Learning Approach 被引量:1
12
作者 R Arthi S Krishnaveni Sherali Zeadally 《China Communications》 SCIE CSCD 2024年第10期267-287,共21页
The advent of pandemics such as COVID-19 significantly impacts human behaviour and lives every day.Therefore,it is essential to make medical services connected to internet,available in every remote location during the... The advent of pandemics such as COVID-19 significantly impacts human behaviour and lives every day.Therefore,it is essential to make medical services connected to internet,available in every remote location during these situations.Also,the security issues in the Internet of Medical Things(IoMT)used in these service,make the situation even more critical because cyberattacks on the medical devices might cause treatment delays or clinical failures.Hence,services in the healthcare ecosystem need rapid,uninterrupted,and secure facilities.The solution provided in this research addresses security concerns and services availability for patients with critical health in remote areas.This research aims to develop an intelligent Software Defined Networks(SDNs)enabled secure framework for IoT healthcare ecosystem.We propose a hybrid of machine learning and deep learning techniques(DNN+SVM)to identify network intrusions in the sensor-based healthcare data.In addition,this system can efficiently monitor connected devices and suspicious behaviours.Finally,we evaluate the performance of our proposed framework using various performance metrics based on the healthcare application scenarios.the experimental results show that the proposed approach effectively detects and mitigates attacks in the SDN-enabled IoT networks and performs better that other state-of-art-approaches. 展开更多
关键词 deep neural network healthcare intrusion detection system IOT machine learning software-defined networks
下载PDF
Lacustrine shale oiliness influenced by diabase intrusions in the Paleogene Funing Formation,Subei Basin,China
13
作者 Biao Sun Xiao-Ping Liu +8 位作者 Jie Liu Qi-Dong Liu Hong-Liang Duan Shi-Li Liu Ming Guan Tian Liu Zu-Xian Hua Kai Sheng Yu-Jie Xing 《Petroleum Science》 SCIE EI CSCD 2023年第5期2683-2694,共12页
The research on the correlation between hydrocarbon accumulations and magmatic activities has always attracted aroused much wide attention.Existing research has primarily the hydrocarbon generations capability of sour... The research on the correlation between hydrocarbon accumulations and magmatic activities has always attracted aroused much wide attention.Existing research has primarily the hydrocarbon generations capability of source rocks and the quality of reservoirs by diabase intrusions.whereas,rare systematic research has been conducted on the oiliness and enrichment mechanism.To be specific,the diabase intrusive zone,the contact metamorphic zone and the normal shale zone of the Funing Formation in the Gaoyou Sag,Subei Basin were taken as the object of this study.Moreover,in this study,the hydrocarbon generation quality,reservoir quality,and oil-bearing quality of diabase-metamorphic zone-normal shale were evaluated using X-ray diffractions,argon ion polishing-field emission scanning electron microscope,energy spectrum,rock slice/light-sheet microscopic observations,organic geochemical tests,N_(2) gas adsorption and 2D NMR tests.The results indicated that the intrusive zone,the metamorphic zone,and the normal zone were formed in order by the degree of effect of diabase intrusions.Secondly,the oil content of different parts exhibited significant heterogeneity due to the baking effect of diabase,and the metamorphic zone had the significantly better oil-bearing nature than the intrusive zone.Lastly,a distribution model was proposed for the diabase intrusive zone-metamorphic zone-normal surrounding rock zone. 展开更多
关键词 Shale reservoirs Diabase intrusion OILINESS Funing formation
下载PDF
Quaternary Intrusions from the Zhongjiannan Basin,South China Sea:Their Relationship with the Hainan Mantle Plume and Influence on Hydrocarbon Reservoirs
14
作者 HE Yanxin LIU Jianping +1 位作者 WANG Lei TIAN Wei 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2023年第1期376-392,共17页
The transportation of magma in sedimentary basins often occurs through extensive dyke-sill networks.The role of sills on the plumbing system in rifted margins and the impact of sills on hydrocarbon reservoirs of prosp... The transportation of magma in sedimentary basins often occurs through extensive dyke-sill networks.The role of sills on the plumbing system in rifted margins and the impact of sills on hydrocarbon reservoirs of prospective sedimentary basins has long been an area of great industrial interest and scientific debate.Based on 2D seismic reflection,we present data on how the sills emplaced to form a magmatic plumbing system of the volcanic system for the Zhongjiannan Basin(ZJNB).The results show that sixty-nine sills and fourteen forced folds have been identified.The distribution and geometry of the sills suggest that magma flowed from west to east and then ascended to near the surface.The onlap relationship of the forced folds indicates that the timing of magmatic activities can be constrained at ca.0.2 Ma.The spatial and temporal occurrences of intrusions imply that the strong post-rift magmatism in ZJNB was associated with the Hainan mantle plume arising from the core-mantle boundary.Furthermore,these forced folds could produce several types of hydrocarbon traps,due to accommodation through bending and uplift of the overlying rock and free surface,but it is critical to evaluate the effect of such emplacement when setting exploration targets. 展开更多
关键词 sill intrusions forced fold petroleum traps Hainan mantle plume Zhongjiannan basin
下载PDF
Characterization of Near Surface Intrusions in South-West Cameroon Zone Using Gravity Data: Mining and Geothermal Implications
15
作者 Ghislain Nkamgan Ndongmo Fidèle Koumetio +1 位作者 François Ngapgue Ernest Léontin Lemoubou 《Journal of Geoscience and Environment Protection》 2023年第9期268-296,共29页
The succession of tectonic phenomena in the South-West Cameroon area suggests that structures from the upper mantle infiltrated and took advantage of the cracks and fractures left by these phenomena to get closer to t... The succession of tectonic phenomena in the South-West Cameroon area suggests that structures from the upper mantle infiltrated and took advantage of the cracks and fractures left by these phenomena to get closer to the earth’s surface. However, the intrusive structures closest to the surface remain poorly known. The objective of this work is to improve the knowledge related to the interpretation of gravity data in order to characterise the near-surface intrusive bodies in the South-West Cameroon area, and then analyse their mining and geothermal implications. To achieve this objective, the indirect, inverse and normalized standard deviation (NSTD) methods were used. The NSTD method was used to detect the contours of the intrusive bodies. The indirect method (spectral analysis) was used to determine the depths of the interfaces of three intrusive bodies, one located on the Bipindi-Ebolowa I axis (G5), the other on the Eseka-Pouma axis (G8) and the last on the Bokito-Monatele axis (G11). The results obtained show roofs located between 0 and 0.61 km, between 0 and 0.37 km and between 0 and 0.73 km for the G5, G8 and G11 bodies, respectively. Finally, the application of the 2D inversion method allowed us to estimate the density contrasts of the intrusive bodies (G5, G8 and G11). The superposition of the intrusive bodies detected by the NSTD with the geological and mineral resources map, as well as an analysis of the results obtained, gave indications of interesting zones for mining prospecting and for the search for geothermal reservoirs. 展开更多
关键词 Bouguer Anomaly Spectral Analysis Inverse Method NSTD Method intrusive Body
下载PDF
SHRIMP Zircon U-Pb Age of the Sidingheishan Mafic-Ultramafic Intrusion in the Southern Margin of the Central Asian Orogenic Belt,NW China and its Petrogenesis implication
16
作者 SUN Tao QIAN Zhuangzhi +3 位作者 XU Gang DUAN Jun LI Wanting ZHANG Aiping 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2017年第3期1155-1156,共2页
Objective The Sidingheishan mafic-ultramafic intrusion is located in the eastern part of the North Tianshan Mountains. This work used zircon U-Pb age data, bulk rock major and trace elements, Sr-Nd-Pb isotope data to ... Objective The Sidingheishan mafic-ultramafic intrusion is located in the eastern part of the North Tianshan Mountains. This work used zircon U-Pb age data, bulk rock major and trace elements, Sr-Nd-Pb isotope data to assess mantle source characteristics and crustal assimilation of the parental magma of the Sidingheishan intrusion. We have also discussed the tectonic evolution of the southern margin of the Central Asian Orogenic belt in the Late Paleozoic. 展开更多
关键词 PB TH from SHRIMP Zircon U-Pb Age of the Sidingheishan mafic-ultramafic intrusion in the Southern Margin of the Central Asian Orogenic Belt of in
下载PDF
Subducting passive continental margins with crustal (ultra)mafic intrusions: An underappreciated mechanism for recycling water back into the mantle
17
作者 CaiCai Pan XiaoBo He 《Earth and Planetary Physics》 CAS CSCD 2023年第5期576-581,共6页
It is well known that outer rise bending-assisted oceanic plate hydration is an important mechanism for transporting substantial amounts of water into the mantle.A key question is:Are there other equally or more impor... It is well known that outer rise bending-assisted oceanic plate hydration is an important mechanism for transporting substantial amounts of water into the mantle.A key question is:Are there other equally or more important water transport mechanisms?Here we propose,for the first time,that subducting passive continental margins,particularly those with crustal(ultra)mafic intrusions,play a critical role in recycling water back into the mantle.Evidence for this mechanism is the exceptionally high outer rise seismicity observed in a subducting passive continental margin(i.e.,the northeastern South China Sea continental margin)near the northern Manila trench,characterized by a high-velocity lower crust that has been attributed to(ultra)mafic intrusions.Our interpretation of this correlation between high outer rise seismicity and lower crust(ultra)mafic intrusions is that(ultra)mafic intrusions alter the crustal rheology and increase brittle deformation in the lower crust in this region,thereby promoting lithospheric fracturing and plate hydration,which is evidenced by increased outer rise seismicity. 展开更多
关键词 (ultra)mafic intrusion passive margin lithospheric fracturing outer rise plate hydration
下载PDF
Igneous intrusion contact metamorphic system and its reservoir characteristics:A case study of Paleogene Shahejie Formation in Nanpu sag of Bohai Bay Basin,China
18
作者 LI Wenke WU Xiaozhou +3 位作者 LI Yandong ZHANG Yan ZHANG Xin WANG Hai 《Petroleum Exploration and Development》 SCIE 2024年第2期320-336,共17页
Taking the Paleogene Shahejie Formation in Nanpu sag of Bohai Bay Basin as an example,this study comprehensively utilizes seismic,mud logging,well logging,physical property analysis and core thin section data to inves... Taking the Paleogene Shahejie Formation in Nanpu sag of Bohai Bay Basin as an example,this study comprehensively utilizes seismic,mud logging,well logging,physical property analysis and core thin section data to investigate the metamorphic reservoir formed by contact metamorphism after igneous rock intrusion.(1)A geological model of the igneous intrusion contact met amorphic system is proposed,which can be divided into five structural layers vertically:the intrusion,upper metamorphic aureole,lower metamorphic aureole,normal sedimentary layers on the roof and floor.(2)The intrusion is characterized by xenoliths indicating intrusive facies at the top,regular changes in rock texture and mineral crystallization from the center to the edge on a microscopic scale,and low-angle oblique penetrations of the intrusion through sedimentary strata on a macroscopic scale.The metamorphic aureole has characteristics such as sedimentary rocks as the host rock,typical palimpsest textures developed,various low-temperature thermal metamorphic minerals developed,and medium-low grade thermal metamorphic rocks as the lithology.(3)The reservoir in contact metamorphic aureole has two types of reservoir spaces:matrix pores and fractures.The matrix pores are secondary"intergranular pores"distributed around metamorphic minerals after thermal metamorphic transformation in metasandstones.The fractures are mainly structural fractures and intrusive compressive fractures in metamudstones.The reservoirs generally have three spatial distribution characteristics:layered,porphyritic and hydrocarbon impregnation along fracture.(4)The distribution of reservoirs in the metamorphic aureole is mainly controlled by the intensity of thermal baking.Furthermore,the distribution of favorable reservoirs is controlled by the coupling of favorable lithofacies and thermal contact metamorphism,intrusive compression and hydrothermal dissolution.The proposal and application of the geological model of the intrusion contact metamorphic system are expected to promote the discovery of exploration targets of contact metamorphic rock in Nanpu sag,and provide a reference for the study and exploration of deep contact metamorphic rock reservoirs in the Bohai Bay Basin. 展开更多
关键词 intrusION contact metamorphic aureole intrusion contact metamorphic system reservoir characteristics CENOZOIC Paleogene Shahejie Formation Nanpu sag Bohai Bay Basin
下载PDF
Strengthening Network Security: Deep Learning Models for Intrusion Detectionwith Optimized Feature Subset and Effective Imbalance Handling
19
作者 Bayi Xu Lei Sun +2 位作者 Xiuqing Mao Chengwei Liu Zhiyi Ding 《Computers, Materials & Continua》 SCIE EI 2024年第2期1995-2022,共28页
In recent years,frequent network attacks have highlighted the importance of efficient detection methods for ensuring cyberspace security.This paper presents a novel intrusion detection system consisting of a data prep... In recent years,frequent network attacks have highlighted the importance of efficient detection methods for ensuring cyberspace security.This paper presents a novel intrusion detection system consisting of a data prepro-cessing stage and a deep learning model for accurately identifying network attacks.We have proposed four deep neural network models,which are constructed using architectures such as Convolutional Neural Networks(CNN),Bi-directional Long Short-Term Memory(BiLSTM),Bidirectional Gate Recurrent Unit(BiGRU),and Attention mechanism.These models have been evaluated for their detection performance on the NSL-KDD dataset.To enhance the compatibility between the data and the models,we apply various preprocessing techniques and employ the particle swarm optimization algorithm to perform feature selection on the NSL-KDD dataset,resulting in an optimized feature subset.Moreover,we address class imbalance in the dataset using focal loss.Finally,we employ the BO-TPE algorithm to optimize the hyperparameters of the four models,maximizing their detection performance.The test results demonstrate that the proposed model is capable of extracting the spatiotemporal features of network traffic data effectively.In binary and multiclass experiments,it achieved accuracy rates of 0.999158 and 0.999091,respectively,surpassing other state-of-the-art methods. 展开更多
关键词 intrusion detection CNN BiLSTM BiGRU ATTENTION
下载PDF
Cyber Security within Smart Cities:A Comprehensive Study and a Novel Intrusion Detection-Based Approach
20
作者 Mehdi Houichi Faouzi Jaidi Adel Bouhoula 《Computers, Materials & Continua》 SCIE EI 2024年第10期393-441,共49页
The expansion of smart cities,facilitated by digital communications,has resulted in an enhancement of the quality of life and satisfaction among residents.The Internet of Things(IoT)continually generates vast amounts ... The expansion of smart cities,facilitated by digital communications,has resulted in an enhancement of the quality of life and satisfaction among residents.The Internet of Things(IoT)continually generates vast amounts of data,which is subsequently analyzed to offer services to residents.The growth and development of IoT have given rise to a new paradigm.A smart city possesses the ability to consistently monitor and utilize the physical environment,providing intelligent services such as energy,transportation,healthcare,and entertainment for both residents and visitors.Research on the security and privacy of smart cities is increasingly prevalent.These studies highlight the cybersecurity risks and the challenges faced by smart city infrastructure in handling and managing personal data.To effectively uphold individuals’security and privacy,developers of smart cities must earn the trust of the public.In this article,we delve into the realms of privacy and security within smart city applications.Our comprehensive study commences by introducing architecture and various applications tailored to smart cities.Then,concerns surrounding security and privacy within these applications are thoroughly explored subsequently.Following that,we delve into several research endeavors dedicated to addressing security and privacy issues within smart city applications.Finally,we emphasize our methodology and present a case study illustrating privacy and security in smart city contexts.Our proposal consists of defining an Artificial Intelligence(AI)based framework that allows:Thoroughly documenting penetration attempts and cyberattacks;promptly detecting any deviations from security standards;monitoring malicious behaviors and accurately tracing their sources;and establishing strong controls to effectively repel and prevent such threats.Experimental results using the Edge-IIoTset(Edge Industrial Internet of Things Security Evaluation Test)dataset demonstrated good accuracy.They were compared to related state-of-theart works,which highlight the relevance of our proposal. 展开更多
关键词 Smart cities digital communications CYBERSECURITY PRIVACY intrusion detection
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部