Slickwater fracturing fluids are widely used in the development of unconventional oil and gas resources due to the advantages of low cost,low formation damage and high drag reduction performance.However,their performa...Slickwater fracturing fluids are widely used in the development of unconventional oil and gas resources due to the advantages of low cost,low formation damage and high drag reduction performance.However,their performance is severely affected at high temperatures.Drag reducing agent is the key to determine the drag reducing performance of slickwater.In this work,in order to further improve the temperature resistance of slickwater,a temperature-resistant polymeric drag reducing agent(PDRA)was synthesized and used as the basis for preparing the temperature-resistant slickwater.The slickwater system was prepared with the compositions of 0.2 wt%PDRA,0.05 wt%drainage aid nonylphenol polyoxyethylene ether phosphate(NPEP)and 0.5 wt%anti-expansion agent polyepichlorohydrindimethylamine(PDM).The drag reduction ability,rheology properties,temperature and shear resistance ability,and core damage property of slickwater were systematically studied and evaluated.In contrast to on-site drag reducing agent(DRA)and HPAM,the temperature-resistant slickwater demonstrates enhanced drag reduction efficacy at 90℃,exhibiting superior temperature and shear resistance ability.Notably,the drag reduction retention rate for the slickwater achieved an impressive 90.52%after a 30-min shearing period.Additionally,the core damage is only 5.53%.We expect that this study can broaden the application of slickwater in high-temperature reservoirs and provide a theoretical basis for field applications.展开更多
AIM: Gastrointestinal dysfunction is a common complication in patients with traumatic brain injury (TBI). However, the effect of traumatic brain injury on intestinal mucosa has not been studied previously. The aim of ...AIM: Gastrointestinal dysfunction is a common complication in patients with traumatic brain injury (TBI). However, the effect of traumatic brain injury on intestinal mucosa has not been studied previously. The aim of the current study was to explore the alterations of intestinal mucosa morphology and barrier function, and to determine how rapidly the impairment of gut barrier function occurs and how long it persists following traumatic brain injury.METHODS: Male Wistar rats were randomly divided into six groups (6 rats each group) including controls without brain injury and traumatic brain injury groups at hours 3,12, 24, and 72, and on day 7. The intestinal mucosa structure was detected by histopathological examination and electron microscopy. Gut barrier dysfunction was evaluated by detecting serum endotoxin and intestinal permeability. The level of serum endotoxin and intestinal permeability was measured by using chromogenic limulus amebocyte lysate and lactulose/mannitol (L/M) ratio, respectively.RESULTS: After traumatic brain injury, the histopathological alterations of gut mucosa occurred rapidly as early as 3 hours and progressed to a serious state, including shedding of epithelial cells, fracture of villi, focal ulcer, fusion of adjacent villi, dilation of central chyle duct, mucosal atrophy,and vascular dilation, congestion and edema in the villous interstitium and lamina propria. Apoptosis of epithelial cells,fracture and sparseness of microvilli, loss of tight junction between enterocytes, damage of mitochondria and endoplasm, were found by electron microscopy. The villous height, crypt depth and surface area in jejunum decreased progressively with the time of brain injury. As compared with that of control group (183.7±41.8 EU/L), serum endotoxin level was signnificantly increased at 3, 12, and 24 hours following TBI (434.8±54.9 EU/L, 324.2±61.7 EU/L and 303.3±60.2 EU/L, respectively), and peaked at 72 hours (560.5±76.2 EU/L), then declined on day 7 (306.7±62.4 EU/L,P<0.0L). Two peaks of serum endotoxin level were found at hours 3 and 72 following TBI. L/M ratio was also significantly higher in TBI groups than that in control group (control,0.0172±0.0009; 12 h, 0.0303±0.0013; 24 h, 0.0354±0.0025;72 h, 0.0736±0.0105; 7 d, 0.0588±0.0083; P<0.01).CONCLUSION: Traumatic brain injury can induce significant damages of gut structure and impairment of barrier function which occur rapidly as early as 3 hours following brain injury and lasts for more than 7 days with marked mucosal atrophy.展开更多
AIM:To study the alterations of brain-gut peptides following traumatic brain injury (TBI) and to explore the underlying significance of these peptides in the complicated gastrointestinal dysfunction.METHODS:Rat models...AIM:To study the alterations of brain-gut peptides following traumatic brain injury (TBI) and to explore the underlying significance of these peptides in the complicated gastrointestinal dysfunction.METHODS:Rat models of focal traumatic brain injury were established by impact insult method,and divided into 6 groups (6 rats each group) including control group with sham operation and TBI groups at postinjury 3,12,24,72h,and d 7.Blood and proximal jejunum samples were taken at time point of each group and gross observations of gastrointestinal pathology were recorded simultaneously.The levels of vasoactive intestinal peptide (VIP) in plasma,calcitonin gene-related peptide (CGRP) and cholecystokinin (CCK) in both plasma and jejunum were measured by enzyme immunoassay (EIA). Radioimmunoassay (RIA) was used to determine the levels of VIP in jejunum.RESULTS:Gastric distension,delayed gastric emptying and intestinal dilatation with a large amount of yellowish effusion and thin edematous wall were found in TBI rats through 12h and 72h, which peaked at postinjury 72h. As compared with that of control group (247.8±29.5ng/L), plasma VIP levels were significantly decreased at postinjury 3,12 and 24h (106.7±34.1ng/L, 148.7±22.8ng/L,132.8±21.6ng/L,respectively),but significantly increased at 72h (405.0±29.8ng/L) and markedly declined on d 7 (130.7±19.3ng/L).However,Plasma levels CCK and CGRP were significantly increased through 3h and 7d following TBI (126-691% increases),with the peak at 72 h.Compared with control (VIP, 13.6±1.4ng/g;CGRP,70.6±17.7ng/g);VIP and CGRP levels in jejunum were significantly increased at 3h after TBI (VIP,35.4±5.0ng/g;CGRP,103.8±22.1ng/g),and declined gradually at 12 h and 2d h (VIP,16.5±1.8ng/g,5.5±1.4ng/g;CGRP,34.9±9.7ng/g, 18.5±7.7ng/g),but were significantly increased again at 72 h (VIP, 48.7±9.5ng/g; CGRP,142.1±24.3ng/g),then declined in various degrees on d 7 (VIP, 3.8±1.1ng/g; CGRP, 102.5±18.1ng/g).The CCK levels in jejunum were found to change in a similar trend as that in plasma with the concentrations of CCK significantly increased following TBI (99-517% increases) and peaked at 72h.CONCLUSION:Traumatic brain injury can lead to significant changes of brain-gut peptides in both plasma and small intestine, which may be involved in the pathogenesis of complicated gastrointestinal dysfunction.展开更多
AIM:To study the operativ injury,post-operative complications,the hospitalization time,the post-operative survival rate of ultrasonic aspiration hepatectomy with a domestic new type of ultrasonic surgical device in c...AIM:To study the operativ injury,post-operative complications,the hospitalization time,the post-operative survival rate of ultrasonic aspiration hepatectomy with a domestic new type of ultrasonic surgical device in comparison with that of conventional techniques of hepatectomy.METHODS:A total136patients with hepatocellular carcinoma(HCC,including 13patinents in 1991and 124consecutive patients from July1995to December2000)underwent ultrasonic aspiration in liver resection(groupT)and 179 HCCpatients received conventional hepatectomy during the corresponding period(groupC).The results of the two groups were compared statistically.RESULTS:There was no significant difference in the mean operation time between groupT(152±11min)and C(144±11min).No operation or hospital edath occurred in both groups.In groupT,the mean volumes of bleeding(463±15ml)and bolld transfusion(381±12ml)were markedly less than those in groupC(557±20ml,and507±18ml,respectively,P<0.05).The mean hospitalization time of groupT(8.9±0.6d)was markedly shorter than that of groupC(11.7d±0.6d)(P<0.05).The incidence of complications in groupTwas markedly lower than in groupC,post-operative jaundice occurred in4/136and31/179,respectively(P<0.05).liver failurein0/136and2/179,cholorrhea in0/136and6/179,hydrothoraxin21/136and39/179(P<0.05).ascices in9/136and2/179,cholrrheain0/136and6/179,hydrothorax in21/136and 39/179(P<0.05),ascices in 9/136and 54/179,respectively(P<0.05),while the 3-year survival rate of groupT(64.2%)increased markedly as compared with that of groupC(55.7%)(P<0.01).CONCLUSION:The ultrasonic aspiration hepatectomy with a domestic new type of ultrasonic surgical device could evidently reduce the operative injury and post-operative complications,shorten the hospitalization,time and prolong the survivals of HCC,patients.展开更多
The basie idea and method about determination of the feature line equations and how to apply them to the numerical control of the press bending of panei skins were introduced. Research indicates that it is feasible to...The basie idea and method about determination of the feature line equations and how to apply them to the numerical control of the press bending of panei skins were introduced. Research indicates that it is feasible to realize the self adapting incremental press bending by adopting the feature line equation. The feature line equation, which is based on the database of the status of practical processes, can be adjusted in time, and the forming precision can be improved. It is important to correctly select and reasonably predict the feature line equations to enhance the accuracy of the incremental press bending based on the feature line database and algorithm. The determination of the feature line equation settles necessary data foundation for further research on the database of self-adapting incremental press bending, and it supplies a new clue for the development of self-adapting incremental press bending.展开更多
This paper presents a combined method to model grain crushing effects with discrete element method.This method combines the two most commonly used concepts to model grain crushing in DEM,i.e.the replacement method and...This paper presents a combined method to model grain crushing effects with discrete element method.This method combines the two most commonly used concepts to model grain crushing in DEM,i.e.the replacement method and the agglomerate method,so that it is both accurate and efficient.The method can be easily implemented.The performance is shown by several DEM simulations of biaxial tests.Particles with different crush-abilities are modeled.DEM simulation results with and without grain crushing are compared and discussed.The change of grain size distribution due to grain crushing is also investigated.展开更多
Based on the composite modification technology of the surface of nano Silicondioxide by non-soap emulsion polymerization, it is verified that there are polymer grafted on thesurface of nano silicon dioxide. The modifi...Based on the composite modification technology of the surface of nano Silicondioxide by non-soap emulsion polymerization, it is verified that there are polymer grafted on thesurface of nano silicon dioxide. The modification mechanism and the bonding status on the surface ofnano silicon dioxide after modification were suggested via the results of the infrared spectrum,transmission electronic microscope photograph and X-ray photoelectron spectrum. The hydroxyl formedby hydrolyzing of silane coupling agent reacts with hydroxyl on the surface of nano silicon dioxideto form Si-O-Si bonds by losing water molecules and hence the double bonds are introduced onto thesurface of nano silicon dioxide. The surface of nano silicon dioxide is grafted with polymer throughfree radical polymerization between the double bonds on the surface of nano silicon dioxide andstyrene under the action of initiating agent. The dispersibility of nano silicon dioxide and thecontrollability of surface modification of nano silicon dioxide can be greatly improved by themodification process.展开更多
Based on the technology of titanium dioxide grafting modification withpolystyrene (PS), the modification mechanisms are studied and the polystyrene-grafting states on thesurface of titanium dioxide have been set up. U...Based on the technology of titanium dioxide grafting modification withpolystyrene (PS), the modification mechanisms are studied and the polystyrene-grafting states on thesurface of titanium dioxide have been set up. Under the synergistic actions of mechanical force,chemistry and heat, macromolecular free radicals of PS are created, at the same time, the O-O bondsof titanium dioxide are broken and the oxide free radicals produced, and the numbers of oxygen atomare increased and crystal lattice defects rich electrons are formed on the surface of titaniumdioxide. The radical polymerization is the main reaction between PS and titanium dioxide and C-Obonds form in the process of modification. Multi-sites chemical adsorption also exists besidesgrafting between PS and titanium dioxide.展开更多
As one of the most notorious programming errors,memory access errors still hurt modern software security.Particularly,they are hidden deeply in important software systems written in memory unsafe languages like C/C++....As one of the most notorious programming errors,memory access errors still hurt modern software security.Particularly,they are hidden deeply in important software systems written in memory unsafe languages like C/C++.Plenty of work have been proposed to detect bugs leading to memory access errors.However,all existing works lack the ability to handle two challenges.First,they are not able to tackle fine-grained memory access errors,e.g.,data overflow inside one data structure.These errors are usually overlooked for a long time since they happen inside one memory block and do not lead to program crash.Second,most existing works rely on source code or debugging information to recover memory boundary information,so they cannot be directly applied to detection of memory access errors in binary code.However,searching memory access errors in binary code is a very common scenario in software vulnerability detection and exploitation.In order to overcome these challenges,we propose Memory Access Integrity(MAI),a dynamic method to detect finegrained memory access errors in off-the-shelf binary executables.The core idea is to recover fine-grained accessing policy between memory access behaviors and memory ranges,and then detect memory access errors based on the policy.The key insight in our work is that memory accessing patterns reveal information for recovering the boundary of memory objects and the accessing policy.Based on these recovered information,our method maintains a new memory model to simulate the life cycle of memory objects and report errors when any accessing policy is violated.We evaluate our tool on popular CTF datasets and real world softwares.Compared with the state of the art detection tool,the evaluation result demonstrates that our tool can detect fine-grained memory access errors effectively and efficiently.As the practical impact,our tool has detected three 0-day memory access errors in an audio decoder.展开更多
Exploitability assessment of vulnerabilities is important for both defenders and attackers.The ultimate way to assess the exploitability is crafting a working exploit.However,it usually takes tremendous hours and sign...Exploitability assessment of vulnerabilities is important for both defenders and attackers.The ultimate way to assess the exploitability is crafting a working exploit.However,it usually takes tremendous hours and significant manual efforts.To address this issue,automated techniques can be adopted.Existing solutions usually explore in depth the crashing paths,i.e.,paths taken by proof-of-concept(PoC)inputs triggering vulnerabilities,and assess exploitability by finding exploitable states along the paths.However,exploitable states do not always exist in crashing paths.Moreover,existing solutions heavily rely on symbolic execution and are not scalable in path exploration and exploit generation.In this paper,we propose a novel solution to generate exploit for userspace programs or facilitate the process of crafting a kernel UAF exploit.Technically,we utilize oriented fuzzing to explore diverging paths from vulnerability point.For userspace programs,we adopt a control-flow stitching solution to stitch crashing paths and diverging paths together to generate exploit.For kernel UAF,we leverage a lightweight symbolic execution to identify,analyze and evaluate the system calls valuable and useful for exploiting vulnerabilities.We have developed a prototype system and evaluated it on a set of 19 CTF(capture the flag)programs and 15 realworld Linux kernel UAF vulnerabilities.Experiment results showed it could generate exploit for most of the userspace test set,and it could also facilitate security mitigation bypassing and exploitability evaluation for kernel test set.展开更多
Exploitability assessment of vulnerabilities is important for both defenders and attackers.The ultimate way to assess the exploitability is crafting a working exploit.However,it usually takes tremendous hours and sign...Exploitability assessment of vulnerabilities is important for both defenders and attackers.The ultimate way to assess the exploitability is crafting a working exploit.However,it usually takes tremendous hours and significant manual efforts.To address this issue,automated techniques can be adopted.Existing solutions usually explore in depth the crashing paths,i.e.,paths taken by proof-of-concept(PoC)inputs triggering vulnerabilities,and assess exploitability by finding exploitable states along the paths.However,exploitable states do not always exist in crashing paths.Moreover,existing solutions heavily rely on symbolic execution and are not scalable in path exploration and exploit generation.In this paper,we propose a novel solution to generate exploit for userspace programs or facilitate the process of crafting a kernel UAF exploit.Technically,we utilize oriented fuzzing to explore diverging paths from vulnerability point.For userspace programs,we adopt a control-flow stitching solution to stitch crashing paths and diverging paths together to generate exploit.For kernel UAF,we leverage a lightweight symbolic execution to identify,analyze and evaluate the system calls valuable and useful for exploiting vulnerabilities.We have developed a prototype system and evaluated it on a set of 19 CTF(capture the flag)programs and 15 realworld Linux kernel UAF vulnerabilities.Experiment results showed it could generate exploit for most of the userspace test set,and it could also facilitate security mitigation bypassing and exploitability evaluation for kernel test set.展开更多
As one of the most notorious programming errors,memory access errors still hurt modern software security.Particularly,they are hidden deeply in important software systems written in memory unsafe languages like C/C++....As one of the most notorious programming errors,memory access errors still hurt modern software security.Particularly,they are hidden deeply in important software systems written in memory unsafe languages like C/C++.Plenty of work have been proposed to detect bugs leading to memory access errors.However,all existing works lack the ability to handle two challenges.First,they are not able to tackle fine-grained memory access errors,e.g.,data overflow inside one data structure.These errors are usually overlooked for a long time since they happen inside one memory block and do not lead to program crash.Second,most existing works rely on source code or debugging information to recover memory boundary information,so they cannot be directly applied to detection of memory access errors in binary code.However,searching memory access errors in binary code is a very common scenario in software vulnerability detection and exploitation.In order to overcome these challenges,we propose Memory Access Integrity(MAI),a dynamic method to detect finegrained memory access errors in off-the-shelf binary executables.The core idea is to recover fine-grained accessing policy between memory access behaviors and memory ranges,and then detect memory access errors based on the policy.The key insight in our work is that memory accessing patterns reveal information for recovering the boundary of memory objects and the accessing policy.Based on these recovered information,our method maintains a new memory model to simulate the life cycle of memory objects and report errors when any accessing policy is violated.We evaluate our tool on popular CTF datasets and real world softwares.Compared with the state of the art detection tool,the evaluation result demonstrates that our tool can detect fine-grained memory access errors effectively and efficiently.As the practical impact,our tool has detected three 0-day memory access errors in an audio decoder.展开更多
基金supported by the National Natural Science Foundation of China(Nos.52222403,52074333,52120105007)Taishan Scholar Young Expert(No.tsqn202211079)。
文摘Slickwater fracturing fluids are widely used in the development of unconventional oil and gas resources due to the advantages of low cost,low formation damage and high drag reduction performance.However,their performance is severely affected at high temperatures.Drag reducing agent is the key to determine the drag reducing performance of slickwater.In this work,in order to further improve the temperature resistance of slickwater,a temperature-resistant polymeric drag reducing agent(PDRA)was synthesized and used as the basis for preparing the temperature-resistant slickwater.The slickwater system was prepared with the compositions of 0.2 wt%PDRA,0.05 wt%drainage aid nonylphenol polyoxyethylene ether phosphate(NPEP)and 0.5 wt%anti-expansion agent polyepichlorohydrindimethylamine(PDM).The drag reduction ability,rheology properties,temperature and shear resistance ability,and core damage property of slickwater were systematically studied and evaluated.In contrast to on-site drag reducing agent(DRA)and HPAM,the temperature-resistant slickwater demonstrates enhanced drag reduction efficacy at 90℃,exhibiting superior temperature and shear resistance ability.Notably,the drag reduction retention rate for the slickwater achieved an impressive 90.52%after a 30-min shearing period.Additionally,the core damage is only 5.53%.We expect that this study can broaden the application of slickwater in high-temperature reservoirs and provide a theoretical basis for field applications.
基金the Scientific Research Foundation of the Chinese PLA Key Medical Programs during the 10th Five-Year Plan Period,No.01Z011
文摘AIM: Gastrointestinal dysfunction is a common complication in patients with traumatic brain injury (TBI). However, the effect of traumatic brain injury on intestinal mucosa has not been studied previously. The aim of the current study was to explore the alterations of intestinal mucosa morphology and barrier function, and to determine how rapidly the impairment of gut barrier function occurs and how long it persists following traumatic brain injury.METHODS: Male Wistar rats were randomly divided into six groups (6 rats each group) including controls without brain injury and traumatic brain injury groups at hours 3,12, 24, and 72, and on day 7. The intestinal mucosa structure was detected by histopathological examination and electron microscopy. Gut barrier dysfunction was evaluated by detecting serum endotoxin and intestinal permeability. The level of serum endotoxin and intestinal permeability was measured by using chromogenic limulus amebocyte lysate and lactulose/mannitol (L/M) ratio, respectively.RESULTS: After traumatic brain injury, the histopathological alterations of gut mucosa occurred rapidly as early as 3 hours and progressed to a serious state, including shedding of epithelial cells, fracture of villi, focal ulcer, fusion of adjacent villi, dilation of central chyle duct, mucosal atrophy,and vascular dilation, congestion and edema in the villous interstitium and lamina propria. Apoptosis of epithelial cells,fracture and sparseness of microvilli, loss of tight junction between enterocytes, damage of mitochondria and endoplasm, were found by electron microscopy. The villous height, crypt depth and surface area in jejunum decreased progressively with the time of brain injury. As compared with that of control group (183.7±41.8 EU/L), serum endotoxin level was signnificantly increased at 3, 12, and 24 hours following TBI (434.8±54.9 EU/L, 324.2±61.7 EU/L and 303.3±60.2 EU/L, respectively), and peaked at 72 hours (560.5±76.2 EU/L), then declined on day 7 (306.7±62.4 EU/L,P<0.0L). Two peaks of serum endotoxin level were found at hours 3 and 72 following TBI. L/M ratio was also significantly higher in TBI groups than that in control group (control,0.0172±0.0009; 12 h, 0.0303±0.0013; 24 h, 0.0354±0.0025;72 h, 0.0736±0.0105; 7 d, 0.0588±0.0083; P<0.01).CONCLUSION: Traumatic brain injury can induce significant damages of gut structure and impairment of barrier function which occur rapidly as early as 3 hours following brain injury and lasts for more than 7 days with marked mucosal atrophy.
基金Supported by the Scientific Research Foundation of the Chinese PLA Key Medical Programs during the 10~(th) Five-Year Plan Period,No.01Z011
文摘AIM:To study the alterations of brain-gut peptides following traumatic brain injury (TBI) and to explore the underlying significance of these peptides in the complicated gastrointestinal dysfunction.METHODS:Rat models of focal traumatic brain injury were established by impact insult method,and divided into 6 groups (6 rats each group) including control group with sham operation and TBI groups at postinjury 3,12,24,72h,and d 7.Blood and proximal jejunum samples were taken at time point of each group and gross observations of gastrointestinal pathology were recorded simultaneously.The levels of vasoactive intestinal peptide (VIP) in plasma,calcitonin gene-related peptide (CGRP) and cholecystokinin (CCK) in both plasma and jejunum were measured by enzyme immunoassay (EIA). Radioimmunoassay (RIA) was used to determine the levels of VIP in jejunum.RESULTS:Gastric distension,delayed gastric emptying and intestinal dilatation with a large amount of yellowish effusion and thin edematous wall were found in TBI rats through 12h and 72h, which peaked at postinjury 72h. As compared with that of control group (247.8±29.5ng/L), plasma VIP levels were significantly decreased at postinjury 3,12 and 24h (106.7±34.1ng/L, 148.7±22.8ng/L,132.8±21.6ng/L,respectively),but significantly increased at 72h (405.0±29.8ng/L) and markedly declined on d 7 (130.7±19.3ng/L).However,Plasma levels CCK and CGRP were significantly increased through 3h and 7d following TBI (126-691% increases),with the peak at 72 h.Compared with control (VIP, 13.6±1.4ng/g;CGRP,70.6±17.7ng/g);VIP and CGRP levels in jejunum were significantly increased at 3h after TBI (VIP,35.4±5.0ng/g;CGRP,103.8±22.1ng/g),and declined gradually at 12 h and 2d h (VIP,16.5±1.8ng/g,5.5±1.4ng/g;CGRP,34.9±9.7ng/g, 18.5±7.7ng/g),but were significantly increased again at 72 h (VIP, 48.7±9.5ng/g; CGRP,142.1±24.3ng/g),then declined in various degrees on d 7 (VIP, 3.8±1.1ng/g; CGRP, 102.5±18.1ng/g).The CCK levels in jejunum were found to change in a similar trend as that in plasma with the concentrations of CCK significantly increased following TBI (99-517% increases) and peaked at 72h.CONCLUSION:Traumatic brain injury can lead to significant changes of brain-gut peptides in both plasma and small intestine, which may be involved in the pathogenesis of complicated gastrointestinal dysfunction.
文摘AIM:To study the operativ injury,post-operative complications,the hospitalization time,the post-operative survival rate of ultrasonic aspiration hepatectomy with a domestic new type of ultrasonic surgical device in comparison with that of conventional techniques of hepatectomy.METHODS:A total136patients with hepatocellular carcinoma(HCC,including 13patinents in 1991and 124consecutive patients from July1995to December2000)underwent ultrasonic aspiration in liver resection(groupT)and 179 HCCpatients received conventional hepatectomy during the corresponding period(groupC).The results of the two groups were compared statistically.RESULTS:There was no significant difference in the mean operation time between groupT(152±11min)and C(144±11min).No operation or hospital edath occurred in both groups.In groupT,the mean volumes of bleeding(463±15ml)and bolld transfusion(381±12ml)were markedly less than those in groupC(557±20ml,and507±18ml,respectively,P<0.05).The mean hospitalization time of groupT(8.9±0.6d)was markedly shorter than that of groupC(11.7d±0.6d)(P<0.05).The incidence of complications in groupTwas markedly lower than in groupC,post-operative jaundice occurred in4/136and31/179,respectively(P<0.05).liver failurein0/136and2/179,cholorrhea in0/136and6/179,hydrothoraxin21/136and39/179(P<0.05).ascices in9/136and2/179,cholrrheain0/136and6/179,hydrothorax in21/136and 39/179(P<0.05),ascices in 9/136and 54/179,respectively(P<0.05),while the 3-year survival rate of groupT(64.2%)increased markedly as compared with that of groupC(55.7%)(P<0.01).CONCLUSION:The ultrasonic aspiration hepatectomy with a domestic new type of ultrasonic surgical device could evidently reduce the operative injury and post-operative complications,shorten the hospitalization,time and prolong the survivals of HCC,patients.
文摘The basie idea and method about determination of the feature line equations and how to apply them to the numerical control of the press bending of panei skins were introduced. Research indicates that it is feasible to realize the self adapting incremental press bending by adopting the feature line equation. The feature line equation, which is based on the database of the status of practical processes, can be adjusted in time, and the forming precision can be improved. It is important to correctly select and reasonably predict the feature line equations to enhance the accuracy of the incremental press bending based on the feature line database and algorithm. The determination of the feature line equation settles necessary data foundation for further research on the database of self-adapting incremental press bending, and it supplies a new clue for the development of self-adapting incremental press bending.
文摘This paper presents a combined method to model grain crushing effects with discrete element method.This method combines the two most commonly used concepts to model grain crushing in DEM,i.e.the replacement method and the agglomerate method,so that it is both accurate and efficient.The method can be easily implemented.The performance is shown by several DEM simulations of biaxial tests.Particles with different crush-abilities are modeled.DEM simulation results with and without grain crushing are compared and discussed.The change of grain size distribution due to grain crushing is also investigated.
文摘Based on the composite modification technology of the surface of nano Silicondioxide by non-soap emulsion polymerization, it is verified that there are polymer grafted on thesurface of nano silicon dioxide. The modification mechanism and the bonding status on the surface ofnano silicon dioxide after modification were suggested via the results of the infrared spectrum,transmission electronic microscope photograph and X-ray photoelectron spectrum. The hydroxyl formedby hydrolyzing of silane coupling agent reacts with hydroxyl on the surface of nano silicon dioxideto form Si-O-Si bonds by losing water molecules and hence the double bonds are introduced onto thesurface of nano silicon dioxide. The surface of nano silicon dioxide is grafted with polymer throughfree radical polymerization between the double bonds on the surface of nano silicon dioxide andstyrene under the action of initiating agent. The dispersibility of nano silicon dioxide and thecontrollability of surface modification of nano silicon dioxide can be greatly improved by themodification process.
文摘Based on the technology of titanium dioxide grafting modification withpolystyrene (PS), the modification mechanisms are studied and the polystyrene-grafting states on thesurface of titanium dioxide have been set up. Under the synergistic actions of mechanical force,chemistry and heat, macromolecular free radicals of PS are created, at the same time, the O-O bondsof titanium dioxide are broken and the oxide free radicals produced, and the numbers of oxygen atomare increased and crystal lattice defects rich electrons are formed on the surface of titaniumdioxide. The radical polymerization is the main reaction between PS and titanium dioxide and C-Obonds form in the process of modification. Multi-sites chemical adsorption also exists besidesgrafting between PS and titanium dioxide.
文摘As one of the most notorious programming errors,memory access errors still hurt modern software security.Particularly,they are hidden deeply in important software systems written in memory unsafe languages like C/C++.Plenty of work have been proposed to detect bugs leading to memory access errors.However,all existing works lack the ability to handle two challenges.First,they are not able to tackle fine-grained memory access errors,e.g.,data overflow inside one data structure.These errors are usually overlooked for a long time since they happen inside one memory block and do not lead to program crash.Second,most existing works rely on source code or debugging information to recover memory boundary information,so they cannot be directly applied to detection of memory access errors in binary code.However,searching memory access errors in binary code is a very common scenario in software vulnerability detection and exploitation.In order to overcome these challenges,we propose Memory Access Integrity(MAI),a dynamic method to detect finegrained memory access errors in off-the-shelf binary executables.The core idea is to recover fine-grained accessing policy between memory access behaviors and memory ranges,and then detect memory access errors based on the policy.The key insight in our work is that memory accessing patterns reveal information for recovering the boundary of memory objects and the accessing policy.Based on these recovered information,our method maintains a new memory model to simulate the life cycle of memory objects and report errors when any accessing policy is violated.We evaluate our tool on popular CTF datasets and real world softwares.Compared with the state of the art detection tool,the evaluation result demonstrates that our tool can detect fine-grained memory access errors effectively and efficiently.As the practical impact,our tool has detected three 0-day memory access errors in an audio decoder.
基金This work is supported by the Key Laboratory of Network Assessment Technology,Chinese Academy of Sciences and Beijing Key Laboratory of Network Security and Protection Technology,as well as Beijing Municipal Science and Technology Project(No.Z181100002718002)National Natural Science Foundation of China(No.61572481 and 61602470,61772308,61472209,61502536,and U1736209)and Young Elite Scientists Sponsorship Program by CAST(No.2016QNRC001).
文摘Exploitability assessment of vulnerabilities is important for both defenders and attackers.The ultimate way to assess the exploitability is crafting a working exploit.However,it usually takes tremendous hours and significant manual efforts.To address this issue,automated techniques can be adopted.Existing solutions usually explore in depth the crashing paths,i.e.,paths taken by proof-of-concept(PoC)inputs triggering vulnerabilities,and assess exploitability by finding exploitable states along the paths.However,exploitable states do not always exist in crashing paths.Moreover,existing solutions heavily rely on symbolic execution and are not scalable in path exploration and exploit generation.In this paper,we propose a novel solution to generate exploit for userspace programs or facilitate the process of crafting a kernel UAF exploit.Technically,we utilize oriented fuzzing to explore diverging paths from vulnerability point.For userspace programs,we adopt a control-flow stitching solution to stitch crashing paths and diverging paths together to generate exploit.For kernel UAF,we leverage a lightweight symbolic execution to identify,analyze and evaluate the system calls valuable and useful for exploiting vulnerabilities.We have developed a prototype system and evaluated it on a set of 19 CTF(capture the flag)programs and 15 realworld Linux kernel UAF vulnerabilities.Experiment results showed it could generate exploit for most of the userspace test set,and it could also facilitate security mitigation bypassing and exploitability evaluation for kernel test set.
基金supported by the Key Laboratory of Network Assessment TechnologyChinese Academy of Sciences and Beijing Key Laboratory of Network Security and Protection Technology+2 种基金Beijing Municipal Science and Technology Project(No.Z181100002718002)National Natural Science Foundation of China(No.61572481 and 61602470,61772308,61472209,61502536,and U1736209)Young Elite Scientists Sponsorship Program by CAST(No.2016QNRC001).
文摘Exploitability assessment of vulnerabilities is important for both defenders and attackers.The ultimate way to assess the exploitability is crafting a working exploit.However,it usually takes tremendous hours and significant manual efforts.To address this issue,automated techniques can be adopted.Existing solutions usually explore in depth the crashing paths,i.e.,paths taken by proof-of-concept(PoC)inputs triggering vulnerabilities,and assess exploitability by finding exploitable states along the paths.However,exploitable states do not always exist in crashing paths.Moreover,existing solutions heavily rely on symbolic execution and are not scalable in path exploration and exploit generation.In this paper,we propose a novel solution to generate exploit for userspace programs or facilitate the process of crafting a kernel UAF exploit.Technically,we utilize oriented fuzzing to explore diverging paths from vulnerability point.For userspace programs,we adopt a control-flow stitching solution to stitch crashing paths and diverging paths together to generate exploit.For kernel UAF,we leverage a lightweight symbolic execution to identify,analyze and evaluate the system calls valuable and useful for exploiting vulnerabilities.We have developed a prototype system and evaluated it on a set of 19 CTF(capture the flag)programs and 15 realworld Linux kernel UAF vulnerabilities.Experiment results showed it could generate exploit for most of the userspace test set,and it could also facilitate security mitigation bypassing and exploitability evaluation for kernel test set.
文摘As one of the most notorious programming errors,memory access errors still hurt modern software security.Particularly,they are hidden deeply in important software systems written in memory unsafe languages like C/C++.Plenty of work have been proposed to detect bugs leading to memory access errors.However,all existing works lack the ability to handle two challenges.First,they are not able to tackle fine-grained memory access errors,e.g.,data overflow inside one data structure.These errors are usually overlooked for a long time since they happen inside one memory block and do not lead to program crash.Second,most existing works rely on source code or debugging information to recover memory boundary information,so they cannot be directly applied to detection of memory access errors in binary code.However,searching memory access errors in binary code is a very common scenario in software vulnerability detection and exploitation.In order to overcome these challenges,we propose Memory Access Integrity(MAI),a dynamic method to detect finegrained memory access errors in off-the-shelf binary executables.The core idea is to recover fine-grained accessing policy between memory access behaviors and memory ranges,and then detect memory access errors based on the policy.The key insight in our work is that memory accessing patterns reveal information for recovering the boundary of memory objects and the accessing policy.Based on these recovered information,our method maintains a new memory model to simulate the life cycle of memory objects and report errors when any accessing policy is violated.We evaluate our tool on popular CTF datasets and real world softwares.Compared with the state of the art detection tool,the evaluation result demonstrates that our tool can detect fine-grained memory access errors effectively and efficiently.As the practical impact,our tool has detected three 0-day memory access errors in an audio decoder.