As the basic protective element, steel plate had attracted world-wide attention because of frequent threats of explosive loads. This paper reports the relationships between microscopic defects of Q345 steel plate unde...As the basic protective element, steel plate had attracted world-wide attention because of frequent threats of explosive loads. This paper reports the relationships between microscopic defects of Q345 steel plate under the explosive load and its macroscopic dynamics simulation. Firstly, the defect characteristics of the steel plate were investigated by stereoscopic microscope(SM) and scanning electron microscope(SEM). At the macroscopic level, the defect was the formation of cave which was concentrated in the range of 0-3.0 cm from the explosion center, while at the microscopic level, the cavity and void formation were the typical damage characteristics. It also explains that the difference in defect morphology at different positions was the combining results of high temperature and high pressure. Secondly, the variation rules of mechanical properties of steel plate under explosive load were studied. The Arbitrary Lagrange-Euler(ALE) algorithm and multi-material fluid-structure coupling method were used to simulate the explosion process of steel plate. The accuracy of the method was verified by comparing the deformation of the simulation results with the experimental results, the pressure and stress at different positions on the surface of the steel plate were obtained. The simulation results indicated that the critical pressure causing the plate defects may be approximately 2.01 GPa. On this basis, it was found that the variation rules of surface pressure and microscopic defect area of the Q345 steel plate were strikingly similar, and the corresponding mathematical relationship between them was established. Compared with Monomolecular growth fitting models(MGFM) and Logistic fitting models(LFM), the relationship can be better expressed by cubic polynomial fitting model(CPFM). This paper illustrated that the explosive defect characteristics of metal plate at the microscopic level can be explored by analyzing its macroscopic dynamic mechanical response.展开更多
Effects of performing an R-factor analysis of observed variables based on population models comprising R- and Q-factors were investigated. Although R-factor analysis of data based on a population model comprising R- a...Effects of performing an R-factor analysis of observed variables based on population models comprising R- and Q-factors were investigated. Although R-factor analysis of data based on a population model comprising R- and Q-factors is possible, this may lead to model error. Accordingly, loading estimates resulting from R-factor analysis of sample data drawn from a population based on a combination of R- and Q-factors will be biased. It was shown in a simulation study that a large amount of Q-factor variance induces an increase in the variation of R-factor loading estimates beyond the chance level. Tests of the multivariate kurtosis of observed variables are proposed as an indicator of possible Q-factor variance in observed variables as a prerequisite for R-factor analysis.展开更多
Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is ...Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is considered practically impossible. The advent of quantum computers (QC) will worsen cybersecurity. QC will be a boon for data-intensive industries by drastically reducing the computing time from years to minutes. But QC will render our current cryptography vulnerable to quantum attacks, breaking nearly all modern cryptographic systems. Before QCs with sufficient qubits arrive, we must be ready with quantum-safe strategies to protect our ICT infrastructures. Post-quantum cryptography (PQC) is being aggressively pursued worldwide as a defence from the potential Q-day threat. NIST (National Institute of Standards and Technology), in a rigorous process, tested 82 PQC schemes, 80 of which failed after the final round in 2022. Recently the remaining two PQCs were also cracked by a Swedish and a French team of cryptographers, placing NIST’s PQC standardization process in serious jeopardy. With all the NIST-evaluated PQCs failing, there’s an urgent need to explore alternate strategies. Although cybersecurity heavily relies on cryptography, recent evidence indicates that it can indeed transcend beyond encryption using Zero Vulnerability Computing (ZVC) technology. ZVC is an encryption-agnostic absolute zero trust (AZT) approach that can potentially render computers quantum resistant by banning all third-party permissions, a root cause of most vulnerabilities. Unachievable in legacy systems, AZT is pursued by an experienced consortium of European partners to build compact, solid-state devices that are robust, resilient, energy-efficient, and with zero attack surface, rendering them resistant to malware and future Q-Day threats.展开更多
基金Science and Technology Project of Fire Rescue Bureau of Ministry of Emergency Management(Grant No.2022XFZD05)S&T Program of Hebei(Grant No.22375419D)National Natural Science Foundation of China(Grant No.11802160).
文摘As the basic protective element, steel plate had attracted world-wide attention because of frequent threats of explosive loads. This paper reports the relationships between microscopic defects of Q345 steel plate under the explosive load and its macroscopic dynamics simulation. Firstly, the defect characteristics of the steel plate were investigated by stereoscopic microscope(SM) and scanning electron microscope(SEM). At the macroscopic level, the defect was the formation of cave which was concentrated in the range of 0-3.0 cm from the explosion center, while at the microscopic level, the cavity and void formation were the typical damage characteristics. It also explains that the difference in defect morphology at different positions was the combining results of high temperature and high pressure. Secondly, the variation rules of mechanical properties of steel plate under explosive load were studied. The Arbitrary Lagrange-Euler(ALE) algorithm and multi-material fluid-structure coupling method were used to simulate the explosion process of steel plate. The accuracy of the method was verified by comparing the deformation of the simulation results with the experimental results, the pressure and stress at different positions on the surface of the steel plate were obtained. The simulation results indicated that the critical pressure causing the plate defects may be approximately 2.01 GPa. On this basis, it was found that the variation rules of surface pressure and microscopic defect area of the Q345 steel plate were strikingly similar, and the corresponding mathematical relationship between them was established. Compared with Monomolecular growth fitting models(MGFM) and Logistic fitting models(LFM), the relationship can be better expressed by cubic polynomial fitting model(CPFM). This paper illustrated that the explosive defect characteristics of metal plate at the microscopic level can be explored by analyzing its macroscopic dynamic mechanical response.
文摘Effects of performing an R-factor analysis of observed variables based on population models comprising R- and Q-factors were investigated. Although R-factor analysis of data based on a population model comprising R- and Q-factors is possible, this may lead to model error. Accordingly, loading estimates resulting from R-factor analysis of sample data drawn from a population based on a combination of R- and Q-factors will be biased. It was shown in a simulation study that a large amount of Q-factor variance induces an increase in the variation of R-factor loading estimates beyond the chance level. Tests of the multivariate kurtosis of observed variables are proposed as an indicator of possible Q-factor variance in observed variables as a prerequisite for R-factor analysis.
文摘Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is considered practically impossible. The advent of quantum computers (QC) will worsen cybersecurity. QC will be a boon for data-intensive industries by drastically reducing the computing time from years to minutes. But QC will render our current cryptography vulnerable to quantum attacks, breaking nearly all modern cryptographic systems. Before QCs with sufficient qubits arrive, we must be ready with quantum-safe strategies to protect our ICT infrastructures. Post-quantum cryptography (PQC) is being aggressively pursued worldwide as a defence from the potential Q-day threat. NIST (National Institute of Standards and Technology), in a rigorous process, tested 82 PQC schemes, 80 of which failed after the final round in 2022. Recently the remaining two PQCs were also cracked by a Swedish and a French team of cryptographers, placing NIST’s PQC standardization process in serious jeopardy. With all the NIST-evaluated PQCs failing, there’s an urgent need to explore alternate strategies. Although cybersecurity heavily relies on cryptography, recent evidence indicates that it can indeed transcend beyond encryption using Zero Vulnerability Computing (ZVC) technology. ZVC is an encryption-agnostic absolute zero trust (AZT) approach that can potentially render computers quantum resistant by banning all third-party permissions, a root cause of most vulnerabilities. Unachievable in legacy systems, AZT is pursued by an experienced consortium of European partners to build compact, solid-state devices that are robust, resilient, energy-efficient, and with zero attack surface, rendering them resistant to malware and future Q-Day threats.