期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
广电网络用户侧网络安全风险分析及建设思路 被引量:1
1
作者 张帆 林园 《有线电视技术》 2019年第5期77-80,共4页
本文以黑客的视角对广电网络用户侧的终端和网络进行渗透评估,进一步梳理安全问题、提供整改方案,在此基础上,根据广电业务发展的趋势提出了网络安全建设发展思路。
关键词 网络安全 渗透评估 安全建议 建设思路
下载PDF
Model and method of permeability evaluation based on mud invasion effects 被引量:3
2
作者 周峰 胡祥云 +2 位作者 孟庆鑫 胡旭东 刘志远 《Applied Geophysics》 SCIE CSCD 2015年第4期482-492,626,共12页
The evaluation of permeability in reservoir assessment is a complex problem. Thus, it is difficult to perform direct evaluation permeability with conventional well-logging methods. Considering that reservoir permeabil... The evaluation of permeability in reservoir assessment is a complex problem. Thus, it is difficult to perform direct evaluation permeability with conventional well-logging methods. Considering that reservoir permeability significantly affects mud invasion during drilling, we derive a mathematical model to assess the reservoir permeability based on mud invasion. A numerical model is first used to simulate the process of mud invasion and mud cake growth. Then, based on Darcy's law, an approximation is derived to associate the depth of mud invasion with reservoir permeability. A mathematical model is constructed to evaluate the reservoir permeability as a function of the mud invasion depth in time-lapse logging. Sensitivity analyses of the reservoir porosity, permeability, and water saturation are performed, and the results suggest that the proposed model and method are well suited for oil layers or oil-water layers of low porosity and low permeability. Numerical simulations using field logging and coring data suggest that the evaluated and assumed permeability data agree, validating the proposed model and method. 展开更多
关键词 mud invasion mud cake permeability evaluation Darcy's law
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部