Co-combustion of methane(CH4)and acid gas(AG)is required to sustain the temperature in Claus reaction furnace.In this study,oxy-fuel combustion of methane and acid gas has been experimentally studied in a diffusion fl...Co-combustion of methane(CH4)and acid gas(AG)is required to sustain the temperature in Claus reaction furnace.In this study,oxy-fuel combustion of methane and acid gas has been experimentally studied in a diffusion flame.Three equivalence ratios(ER=1.0,1.5,2.0)and CH_(4)-addition ratios(CH_(4)/AG=0.3,0.5,0.7)were examined and the flame was interpreted by analyzing the distributions of the temperature and species concentration along central axial.CH_(4)-AG diffusion flame could be classified into three sections namely initial reaction,oxidation and complex reaction sections.Competitive oxidation of CH_(4)and H_(2)S was noted in the first section wherein H_(2)S was preferred and both were mainly proceeding decomposition and partial oxidation.SO_(2)was formed at oxidation section together with obvious presence of H2 and CO.However,H2 and CO were inclined to be sustained under fuel rich condition in the complex reaction section.Reducing ER and increasing CH4/AG contributed to higher temperature,H_(2)S and CH_(4)oxidation and CO_(2)reactivity.Hence a growing trend for CH_(4)and AG to convert into H_(2),CO and SO_(2)could be witnessed.And this factor enhanced the generation of CS2 and COS in the flame inner core by interactions of CH4 and CO_(2)with sulfur species.COS was formed through the interactions of CO and CO_(2)with sulfur species.The CS_(2)production directly relied on reaction of CH_(4)with sulfur species.The concentration of COS was greater than CS_(2)since CS_(2)was probably inhibited due to the presence of H_(2).COS and CS_(2)could be consumed by further oxidation or other complex reactions.展开更多
Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to i...Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion.展开更多
Cardiac tumors are rare.However,cardiac metastases can occur in up to 10%of patients with cancer.Among cardiac neoplasms,metastases are much more common than primary cardiac tumors.[1]Metastatic cardiac neoplasms most...Cardiac tumors are rare.However,cardiac metastases can occur in up to 10%of patients with cancer.Among cardiac neoplasms,metastases are much more common than primary cardiac tumors.[1]Metastatic cardiac neoplasms most frequently metastasize from the respiratory system.展开更多
基金supported by the National Natural Science Foundation of China(21978092).
文摘Co-combustion of methane(CH4)and acid gas(AG)is required to sustain the temperature in Claus reaction furnace.In this study,oxy-fuel combustion of methane and acid gas has been experimentally studied in a diffusion flame.Three equivalence ratios(ER=1.0,1.5,2.0)and CH_(4)-addition ratios(CH_(4)/AG=0.3,0.5,0.7)were examined and the flame was interpreted by analyzing the distributions of the temperature and species concentration along central axial.CH_(4)-AG diffusion flame could be classified into three sections namely initial reaction,oxidation and complex reaction sections.Competitive oxidation of CH_(4)and H_(2)S was noted in the first section wherein H_(2)S was preferred and both were mainly proceeding decomposition and partial oxidation.SO_(2)was formed at oxidation section together with obvious presence of H2 and CO.However,H2 and CO were inclined to be sustained under fuel rich condition in the complex reaction section.Reducing ER and increasing CH4/AG contributed to higher temperature,H_(2)S and CH_(4)oxidation and CO_(2)reactivity.Hence a growing trend for CH_(4)and AG to convert into H_(2),CO and SO_(2)could be witnessed.And this factor enhanced the generation of CS2 and COS in the flame inner core by interactions of CH4 and CO_(2)with sulfur species.COS was formed through the interactions of CO and CO_(2)with sulfur species.The CS_(2)production directly relied on reaction of CH_(4)with sulfur species.The concentration of COS was greater than CS_(2)since CS_(2)was probably inhibited due to the presence of H_(2).COS and CS_(2)could be consumed by further oxidation or other complex reactions.
文摘Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion.
文摘Cardiac tumors are rare.However,cardiac metastases can occur in up to 10%of patients with cancer.Among cardiac neoplasms,metastases are much more common than primary cardiac tumors.[1]Metastatic cardiac neoplasms most frequently metastasize from the respiratory system.