The mining sector historically drove the global economy but at the expense of severe environmental and health repercussions,posing sustainability challenges[1]-[3].Recent advancements on artificial intelligence(AI)are...The mining sector historically drove the global economy but at the expense of severe environmental and health repercussions,posing sustainability challenges[1]-[3].Recent advancements on artificial intelligence(AI)are revolutionizing mining through robotic and data-driven innovations[4]-[7].While AI offers mining industry advantages,it is crucial to acknowledge the potential risks associated with its widespread use.Over-reliance on AI may lead to a loss of human control over mining operations in the future,resulting in unpredictable consequences.展开更多
Evolutionary algorithms(EAs)have been used in high utility itemset mining(HUIM)to address the problem of discover-ing high utility itemsets(HUIs)in the exponential search space.EAs have good running and mining perform...Evolutionary algorithms(EAs)have been used in high utility itemset mining(HUIM)to address the problem of discover-ing high utility itemsets(HUIs)in the exponential search space.EAs have good running and mining performance,but they still require huge computational resource and may miss many HUIs.Due to the good combination of EA and graphics processing unit(GPU),we propose a parallel genetic algorithm(GA)based on the platform of GPU for mining HUIM(PHUI-GA).The evolution steps with improvements are performed in central processing unit(CPU)and the CPU intensive steps are sent to GPU to eva-luate with multi-threaded processors.Experiments show that the mining performance of PHUI-GA outperforms the existing EAs.When mining 90%HUIs,the PHUI-GA is up to 188 times better than the existing EAs and up to 36 times better than the CPU parallel approach.展开更多
The angle α between the fault strike and the axial direction of the roadway produces different damage characteristics. In this paper, the research methodology includes theoretical analyses, numerical simulations and ...The angle α between the fault strike and the axial direction of the roadway produces different damage characteristics. In this paper, the research methodology includes theoretical analyses, numerical simulations and field experiments in the context of the Daqiang coal mine located in Shenyang, China. The stability control countermeasure of "pre-splitting cutting roof + NPR anchor cable"(PSCR-NPR) is simultaneously proposed. According to the different deformation characteristics of the roadway, the faults are innovatively classified into three types, with α of type I being 0°-30°, α of type II being 30°-60°, and α of type III being 60°-90°. The full-cycle stress evolution paths during mining roadway traverses across different types of faults are investigated by numerical simulation. Different pinch angles α lead to high stress concentration areas at different locations in the surrounding rock. The non-uniform stress field formed in the shallow surrounding rock is an important reason for the instability of the roadway. The pre-cracked cut top shifted the high stress region to the deep rock mass and formed a low stress region in the shallow rock mass. The high prestressing NPR anchor cable transforms the non-uniform stress field of the shallow surrounding rock into a uniform stress field. PSCR-NPR is applied in the fault-through roadway of Daqiang mine. The low stress area of the surrounding rock was enlarged by 3-7 times, and the cumulative convergence was reduced by 45%-50%. It provides a reference for the stability control of the deep fault-through mining roadway.展开更多
Since the impoundment of Three Gorges Reservoir(TGR)in 2003,numerous slopes have experienced noticeable movement or destabilization owing to reservoir level changes and seasonal rainfall.One case is the Outang landsli...Since the impoundment of Three Gorges Reservoir(TGR)in 2003,numerous slopes have experienced noticeable movement or destabilization owing to reservoir level changes and seasonal rainfall.One case is the Outang landslide,a large-scale and active landslide,on the south bank of the Yangtze River.The latest monitoring data and site investigations available are analyzed to establish spatial and temporal landslide deformation characteristics.Data mining technology,including the two-step clustering and Apriori algorithm,is then used to identify the dominant triggers of landslide movement.In the data mining process,the two-step clustering method clusters the candidate triggers and displacement rate into several groups,and the Apriori algorithm generates correlation criteria for the cause-and-effect.The analysis considers multiple locations of the landslide and incorporates two types of time scales:longterm deformation on a monthly basis and short-term deformation on a daily basis.This analysis shows that the deformations of the Outang landslide are driven by both rainfall and reservoir water while its deformation varies spatiotemporally mainly due to the difference in local responses to hydrological factors.The data mining results reveal different dominant triggering factors depending on the monitoring frequency:the monthly and bi-monthly cumulative rainfall control the monthly deformation,and the 10-d cumulative rainfall and the 5-d cumulative drop of water level in the reservoir dominate the daily deformation of the landslide.It is concluded that the spatiotemporal deformation pattern and data mining rules associated with precipitation and reservoir water level have the potential to be broadly implemented for improving landslide prevention and control in the dam reservoirs and other landslideprone areas.展开更多
In order to improve rib stability,failure criteria and instability mode of a thick coal seam with inter-band rock layer are analysed in this study.A three-dimensional mechanical model is established for the rib by con...In order to improve rib stability,failure criteria and instability mode of a thick coal seam with inter-band rock layer are analysed in this study.A three-dimensional mechanical model is established for the rib by considering the rock layer.A safety factor is defined foy the rib,and it is observed that the safety factor exhibits a positive correlation with the thickness and strength of the inter-band rock.A calculation method for determining critical parameters of the rock layer is presented to ensure the rib stability.It is revealed that incomplete propagation of the fracture at the hard rock constitutes a fundamental prerequisite for ensuring the rib stability.The influence of the position of the inter-band rock in the coal seam on failure mechanism of the rib was thoroughly investigated by developing a series of physical models for the rib at the face area.The best position for the inter-band rock in the coal seam is at a height of 1.5 m away from the roof line,which tends to provide a good stability state for the rib.For different inter-band rock positions,two ways of controlling rib by increasing supports stiffness and flexible grouting reinforcement are proposed.展开更多
Mining-induced surface deformation disrupts ecological balance and impedes economic progress.This study employs SBAS-InSAR with 107-view of ascending and descending SAR data from Sentinel-1,spanning February 2017 to S...Mining-induced surface deformation disrupts ecological balance and impedes economic progress.This study employs SBAS-InSAR with 107-view of ascending and descending SAR data from Sentinel-1,spanning February 2017 to September 2020,to monitor surface deformation in the Fa’er Coal Mine,Guizhou Province.Analysis on the surface deformation time series reveals the relationship between underground mining and surface shifts.Considering geological conditions,mining activities,duration,and ranges,the study determines surface movement parameters for the coal mine.It asserts that mining depth significantly influences surface movement parameters in mountainous mining areas.Increasing mining depth elevates the strike movement angle on the deeper side of the burial depth by 22.84°,while decreasing by 7.74°on the shallower side.Uphill movement angles decrease by 4.06°,while downhill movement angles increase by 15.71°.This emphasizes the technology's suitability for local mining design,which lays the groundwork for resource development,disaster prevention,and ecological protection in analogous contexts.展开更多
In today’s highly competitive retail industry,offline stores face increasing pressure on profitability.They hope to improve their ability in shelf management with the help of big data technology.For this,on-shelf ava...In today’s highly competitive retail industry,offline stores face increasing pressure on profitability.They hope to improve their ability in shelf management with the help of big data technology.For this,on-shelf availability is an essential indicator of shelf data management and closely relates to customer purchase behavior.RFM(recency,frequency,andmonetary)patternmining is a powerful tool to evaluate the value of customer behavior.However,the existing RFM patternmining algorithms do not consider the quarterly nature of goods,resulting in unreasonable shelf availability and difficulty in profit-making.To solve this problem,we propose a quarterly RFM mining algorithmfor On-shelf products named OS-RFM.Our algorithmmines the high recency,high frequency,and high monetary patterns and considers the period of the on-shelf goods in quarterly units.We conducted experiments using two real datasets for numerical and graphical analysis to prove the algorithm’s effectiveness.Compared with the state-of-the-art RFM mining algorithm,our algorithm can identify more patterns and performs well in terms of precision,recall,and F1-score,with the recall rate nearing 100%.Also,the novel algorithm operates with significantly shorter running times and more stable memory usage than existing mining algorithms.Additionally,we analyze the sales trends of products in different quarters and seasonal variations.The analysis assists businesses in maintaining reasonable on-shelf availability and achieving greater profitability.展开更多
The contamination of heavy metal(loid)s at mining&metallurgical sites has been a major environmental challenge worldwide[1].Typically,large amounts of metal(loid)s-bearing wastes are generated at these sites,such ...The contamination of heavy metal(loid)s at mining&metallurgical sites has been a major environmental challenge worldwide[1].Typically,large amounts of metal(loid)s-bearing wastes are generated at these sites,such as smelting slag,combustion residues,mine tailings,wastewater,and exhaust gas[2].Due to their high mobility in the environment,the released heavy metal(loid)s can easily enter the soil and water environment,posing long-term and widespread threats to ecological and human health[3].展开更多
Measles,an infectious disease caused by the measles virus,remains a significant public health concern worldwide due to its highly contagious nature and potential for severe complications[1].In addition to symptoms suc...Measles,an infectious disease caused by the measles virus,remains a significant public health concern worldwide due to its highly contagious nature and potential for severe complications[1].In addition to symptoms such as high fever,cough,Koplik spots,and rash,measles can lead to serious complications including pneumonia and myocarditis,particularly in vulnerable populations such as young children[1,2].展开更多
Deep-sea mining activities can potentially release metals,which pose a toxicological threat to deep-sea ecosystems.Nevertheless,due to the remoteness and inaccessibility of the deep-sea biosphere,there is insufficient...Deep-sea mining activities can potentially release metals,which pose a toxicological threat to deep-sea ecosystems.Nevertheless,due to the remoteness and inaccessibility of the deep-sea biosphere,there is insufficient knowledge about the impact of metal exposure on its inhabitants.In this study,deep-sea mussel Gigantidas platifrons,a commonly used deep-sea toxicology model organism,was exposed to manganese(100,1000μg/L)or iron(500,5000μg/L)for 7 d,respectively.Manganese and iron were chosen for their high levels of occurrence within deep-sea deposits.Metal accumulation and a battery of biochemical biomarkers related to antioxidative stress in superoxide dismutase(SOD),catalase(CAT),malondialdehyde(MDA);immune function in alkaline phosphatase(AKP),acid phosphatase(ACP);and energy metabolism in pyruvate kinase(PK)and hexokinase(HK)were assessed in mussel gills.Results showed that deep-sea mussel G.platifrons exhibited a high capacity to accumulate Mn/Fe.In addition,most tested biochemical parameters were altered by metal exposure,demonstrating that metals could induce oxidative stress,suppress the immune system,and affect energy metabolism of deep-sea mussels.The integrated biomarker response(IBR)approach indicated that the exposure to Mn/Fe had a negative impact on deep-sea mussels,and Mn demonstrated a more harmful impact on deep-sea mussels than Fe.Additionally,SOD and CAT biomarkers had the greatest impact on IBR values in Mn treatments,while ACP and HK were most influential for the low-and high-dose Fe groups,respectively.This study represents the first application of the IBR approach to evaluate the toxicity of metals on deep-sea fauna and serves as a crucial framework for risk assessment of deep-sea mining-associated metal exposure.展开更多
The present study has been carried out on a total of 50 available plant species to assess their dust-capturing capacity and biochemical performances in and around open cast granite mine areas of Jhansi district and Bu...The present study has been carried out on a total of 50 available plant species to assess their dust-capturing capacity and biochemical performances in and around open cast granite mine areas of Jhansi district and Bundelkhand University campus treated as control site. Plant species existing under a polluted environment for a long time may be considered as potentially resistant species and recommended for green belt design in mining areas, especially to cope with dust pollution. Results showed the pollution level, especially of mining-originated dust particles holding capacity of leaves and effects of different biochemical parameters (Total Chlorophyll, Protein and Carotenoid) of existing plant species both from mining areas as well as from Bundelkhand University campus. Based on their performances, Tectona grandis L., Ficus hispida L., Calotropis procera Aiton., Butea monosperma Lam. and Ficus benghalensis L., etc. are highly tolerant species while Ficus infectoria L., Artocarpus heterophyllus Lam., Ipomoea purpurea L., Allianthus excelsa Roxb. and Bauhinia variegata L. are intermediate tolerant species. T. grandis had shown the highest dust-holding capacity (2.566 ± 0.0004 mg/cm2) whereas Albizia procera (0.018 ± 0.0002 mg/cm2) was found to be the lowest dust-holding capacity. Our findings also showed that the T. grandis and F. hispida have significant dust deposition with minimal effect of dust on their leaf chlorophyll (17.447 ± 0.019 mg/g and 14.703 ± 0.201 mg/g), protein (0.699 ± 0.001 mg/g and 0.604 ± 0.002 mg/g) and carotenoid (0.372 ± 0.003 mg/g and 0.354 ± 0.003 mg/g) content respectively among all selected plant species. Therefore, in the present investigation, plant species with high tolerance to high dust-holding capacity on their leaf surfaces are preferable for green corridors as open cast granite mines and their adjacent areas.展开更多
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize t...The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP.展开更多
Deepsea mining has been proposed since the 1960s to alleviate the lack of resources on land.Vertical hydraulic transport of collected ores from the seabed to the sea surface is considered the most promising method for...Deepsea mining has been proposed since the 1960s to alleviate the lack of resources on land.Vertical hydraulic transport of collected ores from the seabed to the sea surface is considered the most promising method for industrial applications.In the present study,an indoor model test of the vertical hydraulic transport of particles was conducted.A noncontact optical method has been proposed to measure the local characteristics of the particles inside a vertical pipe,including the local concentration and particle velocity.The hydraulic gradient of ore transport was evaluated with various particle size distributions,particle densities,feeding concentrations and mixture flow velocities.During transport,the local concentration is larger than the feeding concentration,whereas the particle velocity is less than the mixture velocity.The qualitative effects of the local concentration and local fluid velocity on the particle velocity and slip velocity were investigated.The local fluid velocity contributes significantly to particle velocity and slip velocity,whereas the effect of the local concentration is marginal.A higher feeding concentration and mixture flow velocity result in an increased hydraulic gradient.The effect of the particle size gradation is slight,whereas the particle density plays a crucial role in the transport.展开更多
Artisanal gold mining,a labor-intensive and antiquated technique,is a growing industry and the source of income for rural communities all over the world.However,artisanal gold mining has potential negative and long-te...Artisanal gold mining,a labor-intensive and antiquated technique,is a growing industry and the source of income for rural communities all over the world.However,artisanal gold mining has potential negative and long-term effects on economy,environment,and society.This study collected soil samples from 16 sample points including a control point to examine the pollution degrees and spatial distribution of heavy metals,as well as ecological and health risks associated with heavy metal pollution in the Ijero-Ekiti mining site,Nigeria.Geographical Information System(GIS)and remote sensing technologies were used to identify regions with high concentrations of heavy metals and assess the environmental impact of gold mining activities.The results show that the mean heavy metal concentrations of 16 soil pointa are 8.94(±5.97)mg/kg for As,0.18(±0.54)mg/kg for Cd,0.11(±1.06)mg/kg for Co,14.32(±3.43)mg/kg for Cr,6.89(±0.64)mg/kg for Cu,48.92(±11.77)mg/kg for Fe,135.81(±30.75)mg/kg for Mn,5.92(±0.96)mg/kg for Ni,5.72(±1.66)mg/kg for Pb,and 13.94(±1.38)mg/kg for Zn.The study reveals that heavy metal concentration in soils follows the order of Mn>Fe>Cr>Zn>As>Cu>Ni>Pb>Co>Cd.An analysis of soil samples indicates that 3 principal components(PCs)account for 70.008%of the total variance and there are strong positive correlations between various pairs of heavy metals.The total potential ecological risk index(309.599)in the study area is high.Non-carcinogenic risk suggests that there may be long-term health impacts on people who work in the mining areas due to chronic exposure to the environment.Based on the study,the hazard index of carcinogenic health risks associated with heavy metals through ingestion is 520.00×10^(–4).Dermal contact from As and Cr also increases the risk of cancer,with the highest hazard index value of 18.40×10^(–4).The lowest exposure pathway,with the hazard index value of 0.68×10^(–4),indicates that the inhalation of heavy metals has a comparatively low risk of cancer.This study recommends the formulation of policies to monitor the Ijero-Ekiti mining site and other regions in Nigeria where indiscriminate artisanal gold mining activities exist.展开更多
This paper primarily concerns the effective coordination of the procedures and methods employed in open pit mining operations under the background of river management.The central objective of this study is to identify...This paper primarily concerns the effective coordination of the procedures and methods employed in open pit mining operations under the background of river management.The central objective of this study is to identify a viable approach for ensuring rational and efficient development of open pit mineral resources while simultaneously protecting and restoring the ecological environment of the river.This approach should facilitate the realization of a harmonious symbiosis between mining and river management.The intricate mutual influence relationship between river management and open pit mining is first analyzed in depth,which provides a solid foundation for the subsequent coordination strategy development.In light of the aforementioned considerations,a set of coordination procedures for open pit mining based on river management conditions is proposed.These procedures emphasize the integration of river protection into the overall layout of mining at the planning stage.The implementation of scientific mining schemes,accompanied by rigorous control of the scope and depth of mining operations,has proven to be an effective means of reducing the impact of mining activities on river environments.This approach has also facilitated the achievement of a balance and coordination between mining and river management.展开更多
In recent years,the rapid development of computer software has led to numerous security problems,particularly software vulnerabilities.These flaws can cause significant harm to users’privacy and property.Current secu...In recent years,the rapid development of computer software has led to numerous security problems,particularly software vulnerabilities.These flaws can cause significant harm to users’privacy and property.Current security defect detection technology relies on manual or professional reasoning,leading to missed detection and high false detection rates.Artificial intelligence technology has led to the development of neural network models based on machine learning or deep learning to intelligently mine holes,reducing missed alarms and false alarms.So,this project aims to study Java source code defect detection methods for defects like null pointer reference exception,XSS(Transform),and Structured Query Language(SQL)injection.Also,the project uses open-source Javalang to translate the Java source code,conducts a deep search on the AST to obtain the empty syntax feature library,and converts the Java source code into a dependency graph.The feature vector is then used as the learning target for the neural network.Four types of Convolutional Neural Networks(CNN),Long Short-Term Memory(LSTM),Bi-directional Long Short-Term Memory(BiLSTM),and Attention Mechanism+Bidirectional LSTM,are used to investigate various code defects,including blank pointer reference exception,XSS,and SQL injection defects.Experimental results show that the attention mechanism in two-dimensional BLSTM is the most effective for object recognition,verifying the correctness of the method.展开更多
Salt caverns are extensively utilized for storing various substances such as fossil energy,hydrogen,compressed air,nuclear waste,and industrial solid waste.In China,when the salt cavern is leached through single-well ...Salt caverns are extensively utilized for storing various substances such as fossil energy,hydrogen,compressed air,nuclear waste,and industrial solid waste.In China,when the salt cavern is leached through single-well water solution mining with oil as a cushion,engineering challenges arise with the leaching tubing,leading to issues like damage and instability.These problems significantly hinder the progress of cavern construction and the control of cavern shape.The primary cause of this is the flowinduced vibration instability of leaching tubing within a confined space,which results in severe bending or damage to the tubing.This study presents a model experimental investigation on the dynamic characteristics of leaching tubing using a self-developed liquid-solid coupling physical model experiment apparatus.The experiment utilizes a silicone-rubber pipe(SRP)and a polycarbonate pipe(PCP)to examine the effects of various factors on the dynamic stability of cantilevered pipes conveying fluid.These factors include external space constraint,flexural rigidity,medium outside the pipe,overhanging length,and end conditions.The experiments reveal four dynamic response phenomena:water hammer,static buckling,chaotic motion,and flutter instability.The study further demonstrates that the length of the external space constraint has a direct impact on the flutter critical flow velocity of the cantilevered pipe conveying fluid.Additionally,the flutter critical flow velocity is influenced by the end conditions and different external media.展开更多
When the mining goaf is close to the cliff,rock slope subsidence induced by underground mining is significantly affected by its boundary conditions.In this study,an analytical method is proposed by considering the key...When the mining goaf is close to the cliff,rock slope subsidence induced by underground mining is significantly affected by its boundary conditions.In this study,an analytical method is proposed by considering the key strata as a semi-infinite Euler-Bernoulli beam rested on a Winkler foundation with a local subsidence area.The analytical solutions of deflection are derived by analyzing the boundary and continuity conditions of the cliff.Then,the analytical solutions are verified by the results from experimental tests,FEM and InSAR,respectively.After that,the influence of changing parameters on deflections is studied with sensitivity analysis.The results show that the distance between goaf and cliff significantly affects the deflection of semi-infinite beam.The response of semi-infinite beam is obviously determined by the length of goaf and the bending stiffness of beam.The comparisons between semi-infinite beam and infinite beam illustrate the ascendancy of the improved model in such problems.展开更多
This study was focused to assess major and trace elements in bauxitic duricrusts from Ngaoundal and its surroundings in order to establish their mining interest. To this end, fieldworks, mineralogical and geochemical ...This study was focused to assess major and trace elements in bauxitic duricrusts from Ngaoundal and its surroundings in order to establish their mining interest. To this end, fieldworks, mineralogical and geochemical analyses were carried out. Four facies of duricrust were identified and characterized from the summit to the top of the slope of the Ngaoundal mountain: scoriaceous, pisolitic, nodular and massive. Mineralogical and geochemical analyses performed on 16 samples, revealed a significant concentration of Al<sub>2</sub>O<sub>3</sub> mainly in the scoriaceous facies (over 45% in grade), moderate in Fe<sub>2</sub>O<sub>3</sub> (averaging 23.69%) and SiO<sub>2</sub> (averaging 21.7%). Trace elements were generally low, excluding Cr (421 ppm on average), Zr (327 ppm on average and V (213 ppm on average). In addition, the limited quantities of alkalis (Na<sub>2</sub>O, K<sub>2</sub>O) and alkaline earths metals (MgO, CaO) coupled with the very high values of Chemical Index of Alteration (CIA) and Mineralogical Index of Alteration (MIA), (more than 99%) attest to the intense weathering of the studied materials. Allitization and monosiallitization constituted the crystallochemical phenomena that have led to the development of bauxitic minerals. More than 90% of gibbsite in scoriaceous facies, 52.21% - 76.01% of kaolinite in pisolitic facies and more than 40% of hematite in nodular facies were quantified. The relationships between the constitutive components indicated their interdependency during the bauxitization phenomenon. The mineralogical and geochemical properties highlighted the mining interest of the studied duricrusts to be valorized.展开更多
Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to i...Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion.展开更多
文摘The mining sector historically drove the global economy but at the expense of severe environmental and health repercussions,posing sustainability challenges[1]-[3].Recent advancements on artificial intelligence(AI)are revolutionizing mining through robotic and data-driven innovations[4]-[7].While AI offers mining industry advantages,it is crucial to acknowledge the potential risks associated with its widespread use.Over-reliance on AI may lead to a loss of human control over mining operations in the future,resulting in unpredictable consequences.
基金This work was supported by the National Natural Science Foundation of China(62073155,62002137,62106088,62206113)the High-End Foreign Expert Recruitment Plan(G2023144007L)the Fundamental Research Funds for the Central Universities(JUSRP221028).
文摘Evolutionary algorithms(EAs)have been used in high utility itemset mining(HUIM)to address the problem of discover-ing high utility itemsets(HUIs)in the exponential search space.EAs have good running and mining performance,but they still require huge computational resource and may miss many HUIs.Due to the good combination of EA and graphics processing unit(GPU),we propose a parallel genetic algorithm(GA)based on the platform of GPU for mining HUIM(PHUI-GA).The evolution steps with improvements are performed in central processing unit(CPU)and the CPU intensive steps are sent to GPU to eva-luate with multi-threaded processors.Experiments show that the mining performance of PHUI-GA outperforms the existing EAs.When mining 90%HUIs,the PHUI-GA is up to 188 times better than the existing EAs and up to 36 times better than the CPU parallel approach.
基金funded by the National Natural Science Foundation of China (52174096, 52304110)the Fundamental Research Funds for the Central Universities (2022YJSSB03)the Scientific and Technological Projects of Henan Province (232102320238)。
文摘The angle α between the fault strike and the axial direction of the roadway produces different damage characteristics. In this paper, the research methodology includes theoretical analyses, numerical simulations and field experiments in the context of the Daqiang coal mine located in Shenyang, China. The stability control countermeasure of "pre-splitting cutting roof + NPR anchor cable"(PSCR-NPR) is simultaneously proposed. According to the different deformation characteristics of the roadway, the faults are innovatively classified into three types, with α of type I being 0°-30°, α of type II being 30°-60°, and α of type III being 60°-90°. The full-cycle stress evolution paths during mining roadway traverses across different types of faults are investigated by numerical simulation. Different pinch angles α lead to high stress concentration areas at different locations in the surrounding rock. The non-uniform stress field formed in the shallow surrounding rock is an important reason for the instability of the roadway. The pre-cracked cut top shifted the high stress region to the deep rock mass and formed a low stress region in the shallow rock mass. The high prestressing NPR anchor cable transforms the non-uniform stress field of the shallow surrounding rock into a uniform stress field. PSCR-NPR is applied in the fault-through roadway of Daqiang mine. The low stress area of the surrounding rock was enlarged by 3-7 times, and the cumulative convergence was reduced by 45%-50%. It provides a reference for the stability control of the deep fault-through mining roadway.
基金supported by the Natural Science Foundation of Shandong Province,China(Grant No.ZR2021QD032)。
文摘Since the impoundment of Three Gorges Reservoir(TGR)in 2003,numerous slopes have experienced noticeable movement or destabilization owing to reservoir level changes and seasonal rainfall.One case is the Outang landslide,a large-scale and active landslide,on the south bank of the Yangtze River.The latest monitoring data and site investigations available are analyzed to establish spatial and temporal landslide deformation characteristics.Data mining technology,including the two-step clustering and Apriori algorithm,is then used to identify the dominant triggers of landslide movement.In the data mining process,the two-step clustering method clusters the candidate triggers and displacement rate into several groups,and the Apriori algorithm generates correlation criteria for the cause-and-effect.The analysis considers multiple locations of the landslide and incorporates two types of time scales:longterm deformation on a monthly basis and short-term deformation on a daily basis.This analysis shows that the deformations of the Outang landslide are driven by both rainfall and reservoir water while its deformation varies spatiotemporally mainly due to the difference in local responses to hydrological factors.The data mining results reveal different dominant triggering factors depending on the monitoring frequency:the monthly and bi-monthly cumulative rainfall control the monthly deformation,and the 10-d cumulative rainfall and the 5-d cumulative drop of water level in the reservoir dominate the daily deformation of the landslide.It is concluded that the spatiotemporal deformation pattern and data mining rules associated with precipitation and reservoir water level have the potential to be broadly implemented for improving landslide prevention and control in the dam reservoirs and other landslideprone areas.
基金financial support from the National Key Research and Development Program of China (No.2023YFC2907501)the National Natural Science Foundation of China (No.52374106)the Fundamental Research Funds for the Central Universities (No.2023ZKPYNY01)。
文摘In order to improve rib stability,failure criteria and instability mode of a thick coal seam with inter-band rock layer are analysed in this study.A three-dimensional mechanical model is established for the rib by considering the rock layer.A safety factor is defined foy the rib,and it is observed that the safety factor exhibits a positive correlation with the thickness and strength of the inter-band rock.A calculation method for determining critical parameters of the rock layer is presented to ensure the rib stability.It is revealed that incomplete propagation of the fracture at the hard rock constitutes a fundamental prerequisite for ensuring the rib stability.The influence of the position of the inter-band rock in the coal seam on failure mechanism of the rib was thoroughly investigated by developing a series of physical models for the rib at the face area.The best position for the inter-band rock in the coal seam is at a height of 1.5 m away from the roof line,which tends to provide a good stability state for the rib.For different inter-band rock positions,two ways of controlling rib by increasing supports stiffness and flexible grouting reinforcement are proposed.
基金supported in part by the Strategic Priority Research Program of the Chinese Academy of Sciences(Grant No.XDA28060201)the National Natural Science Foundation of China(Grant No.42067046)the Science and Technology Planning Project of Guiyang City(Grant No.ZKHT[2023]13-10).
文摘Mining-induced surface deformation disrupts ecological balance and impedes economic progress.This study employs SBAS-InSAR with 107-view of ascending and descending SAR data from Sentinel-1,spanning February 2017 to September 2020,to monitor surface deformation in the Fa’er Coal Mine,Guizhou Province.Analysis on the surface deformation time series reveals the relationship between underground mining and surface shifts.Considering geological conditions,mining activities,duration,and ranges,the study determines surface movement parameters for the coal mine.It asserts that mining depth significantly influences surface movement parameters in mountainous mining areas.Increasing mining depth elevates the strike movement angle on the deeper side of the burial depth by 22.84°,while decreasing by 7.74°on the shallower side.Uphill movement angles decrease by 4.06°,while downhill movement angles increase by 15.71°.This emphasizes the technology's suitability for local mining design,which lays the groundwork for resource development,disaster prevention,and ecological protection in analogous contexts.
基金partially supported by the Foundation of State Key Laboratory of Public Big Data(No.PBD2022-01).
文摘In today’s highly competitive retail industry,offline stores face increasing pressure on profitability.They hope to improve their ability in shelf management with the help of big data technology.For this,on-shelf availability is an essential indicator of shelf data management and closely relates to customer purchase behavior.RFM(recency,frequency,andmonetary)patternmining is a powerful tool to evaluate the value of customer behavior.However,the existing RFM patternmining algorithms do not consider the quarterly nature of goods,resulting in unreasonable shelf availability and difficulty in profit-making.To solve this problem,we propose a quarterly RFM mining algorithmfor On-shelf products named OS-RFM.Our algorithmmines the high recency,high frequency,and high monetary patterns and considers the period of the on-shelf goods in quarterly units.We conducted experiments using two real datasets for numerical and graphical analysis to prove the algorithm’s effectiveness.Compared with the state-of-the-art RFM mining algorithm,our algorithm can identify more patterns and performs well in terms of precision,recall,and F1-score,with the recall rate nearing 100%.Also,the novel algorithm operates with significantly shorter running times and more stable memory usage than existing mining algorithms.Additionally,we analyze the sales trends of products in different quarters and seasonal variations.The analysis assists businesses in maintaining reasonable on-shelf availability and achieving greater profitability.
基金the financial support by the National Key Research and Development Program of China and the Natural Science Foundation of Hunan Province (2019YFC18 03600, 2019YFC1803500, 2019YFC1805200, 2020YFC1807700, 2020YFC1808300, 2021YFC29 02600, 2022YFC2904400, 2023YFC3707700, 2024JJ1012)
文摘The contamination of heavy metal(loid)s at mining&metallurgical sites has been a major environmental challenge worldwide[1].Typically,large amounts of metal(loid)s-bearing wastes are generated at these sites,such as smelting slag,combustion residues,mine tailings,wastewater,and exhaust gas[2].Due to their high mobility in the environment,the released heavy metal(loid)s can easily enter the soil and water environment,posing long-term and widespread threats to ecological and human health[3].
文摘Measles,an infectious disease caused by the measles virus,remains a significant public health concern worldwide due to its highly contagious nature and potential for severe complications[1].In addition to symptoms such as high fever,cough,Koplik spots,and rash,measles can lead to serious complications including pneumonia and myocarditis,particularly in vulnerable populations such as young children[1,2].
基金Supported by the Marine S&T Fund of Shandong Province for Qingdao Marine Science and Technology Center(No.2022QNLM030004-1)the National Natural Science Foundation of China(Nos.42276153,42030407)+2 种基金the Strategic Priority Research Program of the Chinese Academy of Sciences(No.XDB42020401)the Key Research Program of Frontier Sciences,CAS(No.ZDBS-LY-DQC032)the National Key R&D Program of China(No.2022YFC2804003)。
文摘Deep-sea mining activities can potentially release metals,which pose a toxicological threat to deep-sea ecosystems.Nevertheless,due to the remoteness and inaccessibility of the deep-sea biosphere,there is insufficient knowledge about the impact of metal exposure on its inhabitants.In this study,deep-sea mussel Gigantidas platifrons,a commonly used deep-sea toxicology model organism,was exposed to manganese(100,1000μg/L)or iron(500,5000μg/L)for 7 d,respectively.Manganese and iron were chosen for their high levels of occurrence within deep-sea deposits.Metal accumulation and a battery of biochemical biomarkers related to antioxidative stress in superoxide dismutase(SOD),catalase(CAT),malondialdehyde(MDA);immune function in alkaline phosphatase(AKP),acid phosphatase(ACP);and energy metabolism in pyruvate kinase(PK)and hexokinase(HK)were assessed in mussel gills.Results showed that deep-sea mussel G.platifrons exhibited a high capacity to accumulate Mn/Fe.In addition,most tested biochemical parameters were altered by metal exposure,demonstrating that metals could induce oxidative stress,suppress the immune system,and affect energy metabolism of deep-sea mussels.The integrated biomarker response(IBR)approach indicated that the exposure to Mn/Fe had a negative impact on deep-sea mussels,and Mn demonstrated a more harmful impact on deep-sea mussels than Fe.Additionally,SOD and CAT biomarkers had the greatest impact on IBR values in Mn treatments,while ACP and HK were most influential for the low-and high-dose Fe groups,respectively.This study represents the first application of the IBR approach to evaluate the toxicity of metals on deep-sea fauna and serves as a crucial framework for risk assessment of deep-sea mining-associated metal exposure.
文摘The present study has been carried out on a total of 50 available plant species to assess their dust-capturing capacity and biochemical performances in and around open cast granite mine areas of Jhansi district and Bundelkhand University campus treated as control site. Plant species existing under a polluted environment for a long time may be considered as potentially resistant species and recommended for green belt design in mining areas, especially to cope with dust pollution. Results showed the pollution level, especially of mining-originated dust particles holding capacity of leaves and effects of different biochemical parameters (Total Chlorophyll, Protein and Carotenoid) of existing plant species both from mining areas as well as from Bundelkhand University campus. Based on their performances, Tectona grandis L., Ficus hispida L., Calotropis procera Aiton., Butea monosperma Lam. and Ficus benghalensis L., etc. are highly tolerant species while Ficus infectoria L., Artocarpus heterophyllus Lam., Ipomoea purpurea L., Allianthus excelsa Roxb. and Bauhinia variegata L. are intermediate tolerant species. T. grandis had shown the highest dust-holding capacity (2.566 ± 0.0004 mg/cm2) whereas Albizia procera (0.018 ± 0.0002 mg/cm2) was found to be the lowest dust-holding capacity. Our findings also showed that the T. grandis and F. hispida have significant dust deposition with minimal effect of dust on their leaf chlorophyll (17.447 ± 0.019 mg/g and 14.703 ± 0.201 mg/g), protein (0.699 ± 0.001 mg/g and 0.604 ± 0.002 mg/g) and carotenoid (0.372 ± 0.003 mg/g and 0.354 ± 0.003 mg/g) content respectively among all selected plant species. Therefore, in the present investigation, plant species with high tolerance to high dust-holding capacity on their leaf surfaces are preferable for green corridors as open cast granite mines and their adjacent areas.
基金funded by the“Ling Yan”Research and Development Project of Science Technology Department of Zhejiang Province of China under Grants No.2022C03122Public Welfare Technology Application and Research Projects of Science Technology Department of Zhejiang Province of China under Grants No.LGF22F020006 and LGF21F010004.
文摘The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP.
基金financially supported by the Hainan Provincial Joint Project of Sanya Yazhou Bay Science and Technology City(Grant No.520LH052)the National Natural Science Foundation of China(Grant No.51909164).
文摘Deepsea mining has been proposed since the 1960s to alleviate the lack of resources on land.Vertical hydraulic transport of collected ores from the seabed to the sea surface is considered the most promising method for industrial applications.In the present study,an indoor model test of the vertical hydraulic transport of particles was conducted.A noncontact optical method has been proposed to measure the local characteristics of the particles inside a vertical pipe,including the local concentration and particle velocity.The hydraulic gradient of ore transport was evaluated with various particle size distributions,particle densities,feeding concentrations and mixture flow velocities.During transport,the local concentration is larger than the feeding concentration,whereas the particle velocity is less than the mixture velocity.The qualitative effects of the local concentration and local fluid velocity on the particle velocity and slip velocity were investigated.The local fluid velocity contributes significantly to particle velocity and slip velocity,whereas the effect of the local concentration is marginal.A higher feeding concentration and mixture flow velocity result in an increased hydraulic gradient.The effect of the particle size gradation is slight,whereas the particle density plays a crucial role in the transport.
文摘Artisanal gold mining,a labor-intensive and antiquated technique,is a growing industry and the source of income for rural communities all over the world.However,artisanal gold mining has potential negative and long-term effects on economy,environment,and society.This study collected soil samples from 16 sample points including a control point to examine the pollution degrees and spatial distribution of heavy metals,as well as ecological and health risks associated with heavy metal pollution in the Ijero-Ekiti mining site,Nigeria.Geographical Information System(GIS)and remote sensing technologies were used to identify regions with high concentrations of heavy metals and assess the environmental impact of gold mining activities.The results show that the mean heavy metal concentrations of 16 soil pointa are 8.94(±5.97)mg/kg for As,0.18(±0.54)mg/kg for Cd,0.11(±1.06)mg/kg for Co,14.32(±3.43)mg/kg for Cr,6.89(±0.64)mg/kg for Cu,48.92(±11.77)mg/kg for Fe,135.81(±30.75)mg/kg for Mn,5.92(±0.96)mg/kg for Ni,5.72(±1.66)mg/kg for Pb,and 13.94(±1.38)mg/kg for Zn.The study reveals that heavy metal concentration in soils follows the order of Mn>Fe>Cr>Zn>As>Cu>Ni>Pb>Co>Cd.An analysis of soil samples indicates that 3 principal components(PCs)account for 70.008%of the total variance and there are strong positive correlations between various pairs of heavy metals.The total potential ecological risk index(309.599)in the study area is high.Non-carcinogenic risk suggests that there may be long-term health impacts on people who work in the mining areas due to chronic exposure to the environment.Based on the study,the hazard index of carcinogenic health risks associated with heavy metals through ingestion is 520.00×10^(–4).Dermal contact from As and Cr also increases the risk of cancer,with the highest hazard index value of 18.40×10^(–4).The lowest exposure pathway,with the hazard index value of 0.68×10^(–4),indicates that the inhalation of heavy metals has a comparatively low risk of cancer.This study recommends the formulation of policies to monitor the Ijero-Ekiti mining site and other regions in Nigeria where indiscriminate artisanal gold mining activities exist.
文摘This paper primarily concerns the effective coordination of the procedures and methods employed in open pit mining operations under the background of river management.The central objective of this study is to identify a viable approach for ensuring rational and efficient development of open pit mineral resources while simultaneously protecting and restoring the ecological environment of the river.This approach should facilitate the realization of a harmonious symbiosis between mining and river management.The intricate mutual influence relationship between river management and open pit mining is first analyzed in depth,which provides a solid foundation for the subsequent coordination strategy development.In light of the aforementioned considerations,a set of coordination procedures for open pit mining based on river management conditions is proposed.These procedures emphasize the integration of river protection into the overall layout of mining at the planning stage.The implementation of scientific mining schemes,accompanied by rigorous control of the scope and depth of mining operations,has proven to be an effective means of reducing the impact of mining activities on river environments.This approach has also facilitated the achievement of a balance and coordination between mining and river management.
基金This work is supported by the Provincial Key Science and Technology Special Project of Henan(No.221100240100)。
文摘In recent years,the rapid development of computer software has led to numerous security problems,particularly software vulnerabilities.These flaws can cause significant harm to users’privacy and property.Current security defect detection technology relies on manual or professional reasoning,leading to missed detection and high false detection rates.Artificial intelligence technology has led to the development of neural network models based on machine learning or deep learning to intelligently mine holes,reducing missed alarms and false alarms.So,this project aims to study Java source code defect detection methods for defects like null pointer reference exception,XSS(Transform),and Structured Query Language(SQL)injection.Also,the project uses open-source Javalang to translate the Java source code,conducts a deep search on the AST to obtain the empty syntax feature library,and converts the Java source code into a dependency graph.The feature vector is then used as the learning target for the neural network.Four types of Convolutional Neural Networks(CNN),Long Short-Term Memory(LSTM),Bi-directional Long Short-Term Memory(BiLSTM),and Attention Mechanism+Bidirectional LSTM,are used to investigate various code defects,including blank pointer reference exception,XSS,and SQL injection defects.Experimental results show that the attention mechanism in two-dimensional BLSTM is the most effective for object recognition,verifying the correctness of the method.
基金financial support received from the Open Research Fund of the State Key Laboratory of Geomechanics and Geotechnical Engineering,Institute of Rock and Soil Mechanics,Chinese Academy of Sciences (Grant No.Z019011)the Shandong Provincial Natural Science Foundation (Grant No.ZR2020QE112)+1 种基金the National Natural Science Foundation of China (No.51874273)the Excellent Young Scientists Fund Program of National Natural Science Foundation of China (No.52122403)。
文摘Salt caverns are extensively utilized for storing various substances such as fossil energy,hydrogen,compressed air,nuclear waste,and industrial solid waste.In China,when the salt cavern is leached through single-well water solution mining with oil as a cushion,engineering challenges arise with the leaching tubing,leading to issues like damage and instability.These problems significantly hinder the progress of cavern construction and the control of cavern shape.The primary cause of this is the flowinduced vibration instability of leaching tubing within a confined space,which results in severe bending or damage to the tubing.This study presents a model experimental investigation on the dynamic characteristics of leaching tubing using a self-developed liquid-solid coupling physical model experiment apparatus.The experiment utilizes a silicone-rubber pipe(SRP)and a polycarbonate pipe(PCP)to examine the effects of various factors on the dynamic stability of cantilevered pipes conveying fluid.These factors include external space constraint,flexural rigidity,medium outside the pipe,overhanging length,and end conditions.The experiments reveal four dynamic response phenomena:water hammer,static buckling,chaotic motion,and flutter instability.The study further demonstrates that the length of the external space constraint has a direct impact on the flutter critical flow velocity of the cantilevered pipe conveying fluid.Additionally,the flutter critical flow velocity is influenced by the end conditions and different external media.
基金supported by the National Natural Science Foundation of China(No.52074042)National Key R&D Program of China(No.2018YFC1504802).
文摘When the mining goaf is close to the cliff,rock slope subsidence induced by underground mining is significantly affected by its boundary conditions.In this study,an analytical method is proposed by considering the key strata as a semi-infinite Euler-Bernoulli beam rested on a Winkler foundation with a local subsidence area.The analytical solutions of deflection are derived by analyzing the boundary and continuity conditions of the cliff.Then,the analytical solutions are verified by the results from experimental tests,FEM and InSAR,respectively.After that,the influence of changing parameters on deflections is studied with sensitivity analysis.The results show that the distance between goaf and cliff significantly affects the deflection of semi-infinite beam.The response of semi-infinite beam is obviously determined by the length of goaf and the bending stiffness of beam.The comparisons between semi-infinite beam and infinite beam illustrate the ascendancy of the improved model in such problems.
文摘This study was focused to assess major and trace elements in bauxitic duricrusts from Ngaoundal and its surroundings in order to establish their mining interest. To this end, fieldworks, mineralogical and geochemical analyses were carried out. Four facies of duricrust were identified and characterized from the summit to the top of the slope of the Ngaoundal mountain: scoriaceous, pisolitic, nodular and massive. Mineralogical and geochemical analyses performed on 16 samples, revealed a significant concentration of Al<sub>2</sub>O<sub>3</sub> mainly in the scoriaceous facies (over 45% in grade), moderate in Fe<sub>2</sub>O<sub>3</sub> (averaging 23.69%) and SiO<sub>2</sub> (averaging 21.7%). Trace elements were generally low, excluding Cr (421 ppm on average), Zr (327 ppm on average and V (213 ppm on average). In addition, the limited quantities of alkalis (Na<sub>2</sub>O, K<sub>2</sub>O) and alkaline earths metals (MgO, CaO) coupled with the very high values of Chemical Index of Alteration (CIA) and Mineralogical Index of Alteration (MIA), (more than 99%) attest to the intense weathering of the studied materials. Allitization and monosiallitization constituted the crystallochemical phenomena that have led to the development of bauxitic minerals. More than 90% of gibbsite in scoriaceous facies, 52.21% - 76.01% of kaolinite in pisolitic facies and more than 40% of hematite in nodular facies were quantified. The relationships between the constitutive components indicated their interdependency during the bauxitization phenomenon. The mineralogical and geochemical properties highlighted the mining interest of the studied duricrusts to be valorized.
文摘Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion.