期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
固井质量评价面临的新问题及思路 被引量:4
1
作者 陈向军 李维彦 杨顺辉 《测井技术》 CAS CSCD 2015年第1期1-5,共5页
测井解释方法对于准确客观评价固井质量非常关键,常用的测井解释方法在评价特殊条件下的固井质量时存在许多困难,导致解释结果与实际情况差别较大。在现有固井质量测井资料基础上,讨论了一种新的解释思路及方法。利用裸眼井测井资料判... 测井解释方法对于准确客观评价固井质量非常关键,常用的测井解释方法在评价特殊条件下的固井质量时存在许多困难,导致解释结果与实际情况差别较大。在现有固井质量测井资料基础上,讨论了一种新的解释思路及方法。利用裸眼井测井资料判断地层,结合VDL波形并通过软件计算确定开窗时间;通过时-频分析区分套管波与地层波,分别计算其声波能量,用于评价界面胶结质量。将该方法应用于中国石化在伊朗雅达油田施工井的解释中,解释结果相对于现用方法与后续生产情况更相符。在双层套管与快速地层的条件下,新方法解释结论更加符合实际情况。 展开更多
关键词 固井质量 双层套管 快速地层 开窗时间 胶结质量 声波能量
下载PDF
Metaheuristic Lightweight Cryptography for Security Enhancement in Internet of Things
2
作者 Mahmoud Ragab Ehab Bahaudien Ashary 《Computers, Materials & Continua》 SCIE EI 2022年第8期3009-3023,共15页
The advancements made in Internet of Things(IoT)is projected to alter the functioning of healthcare industry in addition to increased penetration of different applications.However,data security and private are challen... The advancements made in Internet of Things(IoT)is projected to alter the functioning of healthcare industry in addition to increased penetration of different applications.However,data security and private are challenging tasks to accomplish in IoT and necessary measures to be taken to ensure secure operation.With this background,the current paper proposes a novel lightweight cryptography method for enhance the security in IoT.The proposed encryption algorithm is a blend of Cross Correlation Coefficient(CCC)and Black Widow Optimization(BWO)algorithm.In the presented encryption technique,CCC operation is utilized to optimize the encryption process of cryptography method.The projected encryption algorithm works in line with encryption and decryption processes.Optimal key selection is performed with the help of Artificial Intelligence(AI)tool named BWO algorithm.With the combination of AI technique and CCC operation,optimal security operation is improved in IoT.Using different sets of images collected from databases,the projected technique was validated in MATLAB on the basis of few performance metrics such as encryption time,decryption time,Peak Signal to Noise Ratio(PSNR),CC,Error,encryption time and decryption time.The results were compared with existing methods such as Elliptical Curve cryptography(ECC)and Rivest-Shamir-Adleman(RSA)and the supremacy of the projected method is established. 展开更多
关键词 Security images encryption time correlation coefficient black widow optimization artificial intelligence decryption time
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部