In wireless sensor networks (WSNs), it is essential to save energy consumption at sensor nodes (SNs). A clustering technique is one of the approaches to save energy consumption, where several neighboring SNs form a cl...In wireless sensor networks (WSNs), it is essential to save energy consumption at sensor nodes (SNs). A clustering technique is one of the approaches to save energy consumption, where several neighboring SNs form a cluster and transmit the sensed data to their cluster head (CH), and then the CH sends the aggregated data to a sink node. Under spatial non-uniform traffic environments, the clustering technique causes the non-uniformity in data gathering performance and energy consumption between clusters in WSNs. In this paper, we propose a clustering scheme for the WSNs employing IEEE802.15.4 beacon enabled mode under various non-uniform traffic environments. The proposed scheme distributes network traffic uniformly to the clusters through cluster area control by adjusting beacon transmission power, and thereby achieves uniform and improved data gathering performance. In the clusters with expanded area, however, the performance degradation arises from long distance communications. To solve this problem, the proposed scheme controls transmission power at SNs. In addition, to reduce energy consumption the proposed scheme sets the appropriate active period length in duty cycle operation to the current traffic condition. The performance evaluations by computer simulation show the effectiveness of the proposed scheme for the WSNs under various non-uniform traffic environments.展开更多
In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the...In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the quality of service,preventing application choke points,and facilitating malicious behavior identification.In this paper,we review existing network classification techniques,such as port-based identification and those based on deep packet inspection,statistical features in conjunction with machine learning,and deep learning algorithms.We also explain the implementations,advantages,and limitations associated with these techniques.Our review also extends to publicly available datasets used in the literature.Finally,we discuss existing and emerging challenges,as well as future research directions.展开更多
Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexi...Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexity,leading to practical problems in traffic identification data analytics.Since the original Dung Beetle Optimizer(DBO)algorithm,Grey Wolf Optimization(GWO)algorithm,Whale Optimization Algorithm(WOA),and Particle Swarm Optimization(PSO)algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution,an Improved Dung Beetle Optimizer(IDBO)algorithm is proposed for network traffic identification.Firstly,the Sobol sequence is utilized to initialize the dung beetle population,laying the foundation for finding the global optimal solution.Next,an integration of levy flight and golden sine strategy is suggested to give dung beetles a greater probability of exploring unvisited areas,escaping from the local optimal solution,and converging more effectively towards a global optimal solution.Finally,an adaptive weight factor is utilized to enhance the search capabilities of the original DBO algorithm and accelerate convergence.With the improvements above,the proposed IDBO algorithm is then applied to traffic identification data analytics and feature selection,as so to find the optimal subset for K-Nearest Neighbor(KNN)classification.The simulation experiments use the CICIDS2017 dataset to verify the effectiveness of the proposed IDBO algorithm and compare it with the original DBO,GWO,WOA,and PSO algorithms.The experimental results show that,compared with other algorithms,the accuracy and recall are improved by 1.53%and 0.88%in binary classification,and the Distributed Denial of Service(DDoS)class identification is the most effective in multi-classification,with an improvement of 5.80%and 0.33%for accuracy and recall,respectively.Therefore,the proposed IDBO algorithm is effective in increasing the efficiency of traffic identification and solving the problem of the original DBO algorithm that converges slowly and falls into the local optimal solution when dealing with high-dimensional data analytics and feature selection for network traffic identification.展开更多
With the increasing dimensionality of network traffic,extracting effective traffic features and improving the identification accuracy of different intrusion traffic have become critical in intrusion detection systems(...With the increasing dimensionality of network traffic,extracting effective traffic features and improving the identification accuracy of different intrusion traffic have become critical in intrusion detection systems(IDS).However,both unsupervised and semisupervised anomalous traffic detection methods suffer from the drawback of ignoring potential correlations between features,resulting in an analysis that is not an optimal set.Therefore,in order to extract more representative traffic features as well as to improve the accuracy of traffic identification,this paper proposes a feature dimensionality reduction method combining principal component analysis and Hotelling’s T^(2) and a multilayer convolutional bidirectional long short-term memory(MSC_BiLSTM)classifier model for network traffic intrusion detection.This method reduces the parameters and redundancy of the model by feature extraction and extracts the dependent features between the data by a bidirectional long short-term memory(BiLSTM)network,which fully considers the influence between the before and after features.The network traffic is first characteristically downscaled by principal component analysis(PCA),and then the downscaled principal components are used as input to Hotelling’s T^(2) to compare the differences between groups.For datasets with outliers,Hotelling’s T^(2) can help identify the groups where the outliers are located and quantitatively measure the extent of the outliers.Finally,a multilayer convolutional neural network and a BiLSTM network are used to extract the spatial and temporal features of network traffic data.The empirical consequences exhibit that the suggested approach in this manuscript attains superior outcomes in precision,recall and F1-score juxtaposed with the prevailing techniques.The results show that the intrusion detection accuracy,precision,and F1-score of the proposed MSC_BiLSTM model for the CIC-IDS 2017 dataset are 98.71%,95.97%,and 90.22%.展开更多
While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious behavior.To address the issues of traditional machine learning me...While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious behavior.To address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic,we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features,called BERT-based Spatio-Temporal Features Network(BSTFNet).At the packet-level granularity,the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers(BERT)model.At the byte-level granularity,we initially employ the Bidirectional Gated Recurrent Unit(BiGRU)model to extract temporal features from bytes,followed by the utilization of the Text Convolutional Neural Network(TextCNN)model with multi-sized convolution kernels to extract local multi-receptive field spatial features.The fusion of features from both granularities serves as the ultimate multidimensional representation of malicious traffic.Our approach achieves accuracy and F1-score of 99.39%and 99.40%,respectively,on the publicly available USTC-TFC2016 dataset,and effectively reduces sample confusion within the Neris and Virut categories.The experimental results demonstrate that our method has outstanding representation and classification capabilities for encrypted malicious traffic.展开更多
Urban traffic control is a multifaceted and demanding task that necessitates extensive decision-making to ensure the safety and efficiency of urban transportation systems.Traditional approaches require traffic signal ...Urban traffic control is a multifaceted and demanding task that necessitates extensive decision-making to ensure the safety and efficiency of urban transportation systems.Traditional approaches require traffic signal professionals to manually intervene on traffic control devices at the intersection level,utilizing their knowledge and expertise.However,this process is cumbersome,labor-intensive,and cannot be applied on a large network scale.Recent studies have begun to explore the applicability of recommendation system for urban traffic control,which offer increased control efficiency and scalability.Such a decision recommendation system is complex,with various interdependent components,but a systematic literature review has not yet been conducted.In this work,we present an up-to-date survey that elucidates all the detailed components of a recommendation system for urban traffic control,demonstrates the utility and efficacy of such a system in the real world using data and knowledgedriven approaches,and discusses the current challenges and potential future directions of this field.展开更多
Backfill mining is one of the most important technical means for controlling strata movement and reducing surface subsidence and environmental damage during exploitation of underground coal resources. Ensuring the sta...Backfill mining is one of the most important technical means for controlling strata movement and reducing surface subsidence and environmental damage during exploitation of underground coal resources. Ensuring the stability of the backfill bodies is the primary prerequisite for maintaining the safety of the backfilling working face, and the loading characteristics of backfill are closely related to the deformation and subsidence of the roof. Elastic thin plate model was used to explore the non-uniform subsidence law of the roof, and then the non-uniform distribution characteristics of backfill bodies’ load were revealed. Through a self-developed non-uniform loading device combined with acoustic emission (AE) and digital image correlation (DIC) monitoring technology, the synergistic dynamic evolution law of the bearing capacity, apparent crack, and internal fracture of cemented coal gangue backfills (CCGBs) under loads with different degrees of non-uniformity was deeply explored. The results showed that: 1) The uniaxial compressive strength (UCS) of CCGB increased and then decreased with an increase in the degree of non-uniformity of load (DNL). About 40% of DNL was the inflection point of DNL-UCS curve and when DNL exceeded 40%, the strength decreased in a cliff-like manner;2) A positive correlation was observed between the AE ringing count and UCS during the loading process of the specimen, which was manifested by a higher AE ringing count of the high-strength specimen. 3) Shear cracks gradually increased and failure mode of specimens gradually changed from “X” type dominated by tension cracks to inverted “Y” type dominated by shear cracks with an increase in DNL, and the crack opening displacement at the peak stress decreased and then increased. The crack opening displacement at 40% of the DNL was the smallest. This was consistent with the judgment of crack size based on the AE b-value, i. e., it showed the typical characteristics of “small b-value-large crack and large b-value-small crack”. The research results are of significance for preventing the instability and failure of backfill.展开更多
Traffic prediction already plays a significant role in applications like traffic planning and urban management,but it is still difficult to capture the highly non-linear and complicated spatiotemporal correlations of ...Traffic prediction already plays a significant role in applications like traffic planning and urban management,but it is still difficult to capture the highly non-linear and complicated spatiotemporal correlations of traffic data.As well as to fulfil both long-termand short-termprediction objectives,a better representation of the temporal dependency and global spatial correlation of traffic data is needed.In order to do this,the Spatiotemporal Graph Neural Network(S-GNN)is proposed in this research as amethod for traffic prediction.The S-GNN simultaneously accepts various traffic data as inputs and investigates the non-linear correlations between the variables.In terms of modelling,the road network is initially represented as a spatiotemporal directed graph,with the features of the samples at the time step being captured by a convolution module.In order to assign varying attention weights to various adjacent area nodes of the target node,the adjacent areas information of nodes in the road network is then aggregated using a graph network.The data is output using a fully connected layer at the end.The findings show that S-GNN can improve short-and long-term traffic prediction accuracy to a greater extent;in comparison to the control model,the RMSE of S-GNN is reduced by about 0.571 to 9.288 and the MAE(Mean Absolute Error)by about 0.314 to 7.678.The experimental results on two real datasets,Pe MSD7(M)and PEMS-BAY,also support this claim.展开更多
This paper investigates the impacts of a bus holding strategy on the mutual interference between buses and passenger cars in a non-dedicated bus route,as well as the impacts on the characteristics of pollutant emissio...This paper investigates the impacts of a bus holding strategy on the mutual interference between buses and passenger cars in a non-dedicated bus route,as well as the impacts on the characteristics of pollutant emissions of passenger cars.The dynamic behaviors of these two types of vehicles are described using cellular automata(CA)models under open boundary conditions.Numerical simulations are carried out to obtain the phase diagrams of the bus system and the trajectories of buses and passenger cars before and after the implementation of the bus holding strategy under different probabilities of passenger cars entering a two-lane mixed traffic system.Then,we analyze the flow rate,satisfaction rate,and pollutant emission rates of passenger cars together with the performance of a mixed traffic system.The results show that the bus holding strategy can effectively alleviate bus bunching,whereas it has no significant impact on the flow rate and pollutant emission rates of passenger cars;the flow rate,satisfaction rate,and pollutant emission rates of passenger cars for either the traffic system or for each lane are influenced by the bus departure interval and the number of passengers arriving at bus stops.展开更多
Encrypted traffic plays a crucial role in safeguarding network security and user privacy.However,encrypting malicious traffic can lead to numerous security issues,making the effective classification of encrypted traff...Encrypted traffic plays a crucial role in safeguarding network security and user privacy.However,encrypting malicious traffic can lead to numerous security issues,making the effective classification of encrypted traffic essential.Existing methods for detecting encrypted traffic face two significant challenges.First,relying solely on the original byte information for classification fails to leverage the rich temporal relationships within network traffic.Second,machine learning and convolutional neural network methods lack sufficient network expression capabilities,hindering the full exploration of traffic’s potential characteristics.To address these limitations,this study introduces a traffic classification method that utilizes time relationships and a higher-order graph neural network,termed HGNN-ETC.This approach fully exploits the original byte information and chronological relationships of traffic packets,transforming traffic data into a graph structure to provide the model with more comprehensive context information.HGNN-ETC employs an innovative k-dimensional graph neural network to effectively capture the multi-scale structural features of traffic graphs,enabling more accurate classification.We select the ISCXVPN and the USTC-TK2016 dataset for our experiments.The results show that compared with other state-of-the-art methods,our method can obtain a better classification effect on different datasets,and the accuracy rate is about 97.00%.In addition,by analyzing the impact of varying input specifications on classification performance,we determine the optimal network data truncation strategy and confirm the model’s excellent generalization ability on different datasets.展开更多
Low-Earth Orbit Satellite Constellations(LEO-SCs)provide global,high-speed,and low latency Internet access services,which bridges the digital divide in the remote areas.As inter-satellite links are not supported in in...Low-Earth Orbit Satellite Constellations(LEO-SCs)provide global,high-speed,and low latency Internet access services,which bridges the digital divide in the remote areas.As inter-satellite links are not supported in initial deployment(i.e.the Starlink),the communication between satellites is based on ground stations with radio frequency signals.Due to the rapid movement of satellites,this hybrid topology of LEO-SCs and ground stations is time-varying,which imposes a major challenge to uninterrupted service provisioning and network management.In this paper,we focus on solving two notable problems in such a ground station-assisted LEO-SC topology,i.e.,traffic engineering and fast reroute,to guarantee that the packets are forwarded in a balanced and uninterrupted manner.Specifically,we employ segment routing to support the arbitrary path routing in LEO-SCs.To solve the traffic engineering problem,we proposed two source routings with traffic splitting algorithms,Delay-Bounded Traffic Splitting(DBTS)and DBTS+,where DBTS equally splits a flow and DBTS+favors shorter paths.Simu-lation results show that DBTS+can achieve about 30%lower maximum satellite load at the cost of about 10%more delay.To guarantee the fast recovery of failures,two fast reroute mechanisms,Loop-Free Alternate(LFA)and LFA+,are studied,where LFA pre-computes an alternate next-hop as a backup while LFA+finds a 2-segment backup path.We show that LFA+can increase the percentage of protection coverage by about 15%.展开更多
During the production,the fluid in the vicinity of the directional well enters the wellbore with different rates,leading to non-uniform flux distribution along the directional well.However,in all existing studies,it i...During the production,the fluid in the vicinity of the directional well enters the wellbore with different rates,leading to non-uniform flux distribution along the directional well.However,in all existing studies,it is oversimplified to a uniform flux distribution,which can result in inaccurate results for field applications.Therefore,this paper proposes a semi-analytical model of a directional well based on the assumption of non-uniform flux distribution.Specifically,the direction well is discretized into a carefully chosen series of linear sources,such that the complex well trajectory can be captured and the nonuniform flux distribution along the wellbore can be considered to model the three-dimensional flow behavior.By using the finite difference method,we can obtain the numerical solutions of the transient flow within the wellbore.With the aid of Green's function method,we can obtain the analytical solutions of the transient flow from the matrix to the wellbore.The complete flow behavior of a directional well is perfectly represented by coupling the above two types of transient flow.Subsequently,on the basis of the proposed model,we conduct a comprehensive analysis of the pressure transient behavior of a directional well.The computation results show that the flux variation along the direction well has a significant effect on pressure responses.In addition,the directional well in an infinite reservoir may exhibit the following flow regimes:wellbore afterflow,transition flow,inclined radial flow,elliptical flow,horizontal linear flow,and horizontal radial flow.The horizontal linear flow can be observed only if the formation thickness is much smaller than the well length.Furthermore,a dip region that appears on the pressure derivative curve indicates the three-dimensional flow behavior near the wellbore.展开更多
In the rapidly evolving field of cybersecurity,the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical.Traditional methods often fall short in ...In the rapidly evolving field of cybersecurity,the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical.Traditional methods often fall short in capturing the dynamic and complex nature of modern cyber threats.To address this gap,we propose a comprehensive framework designed to create authentic network environments tailored for cybersecurity exercise systems.Our framework leverages advanced simulation techniques to generate scenarios that mirror actual network conditions faced by professionals in the field.The cornerstone of our approach is the use of a conditional tabular generative adversarial network(CTGAN),a sophisticated tool that synthesizes realistic synthetic network traffic by learning fromreal data patterns.This technology allows us to handle technical components and sensitive information with high fidelity,ensuring that the synthetic data maintains statistical characteristics similar to those observed in real network environments.By meticulously analyzing the data collected from various network layers and translating these into structured tabular formats,our framework can generate network traffic that closely resembles that found in actual scenarios.An integral part of our process involves deploying this synthetic data within a simulated network environment,structured on software-defined networking(SDN)principles,to test and refine the traffic patterns.This simulation not only facilitates a direct comparison between the synthetic and real traffic but also enables us to identify discrepancies and refine the accuracy of our simulations.Our initial findings indicate an error rate of approximately 29.28%between the synthetic and real traffic data,highlighting areas for further improvement and adjustment.By providing a diverse array of network scenarios through our framework,we aim to enhance the exercise systems used by cybersecurity professionals.This not only improves their ability to respond to actual cyber threats but also ensures that the exercise is cost-effective and efficient.展开更多
Mature osteoclasts degrade bone matrix by exocytosis of active proteases from secretory lysosomes through a ruffled border.However,the molecular mechanisms underlying lysosomal trafficking and secretion in osteoclasts...Mature osteoclasts degrade bone matrix by exocytosis of active proteases from secretory lysosomes through a ruffled border.However,the molecular mechanisms underlying lysosomal trafficking and secretion in osteoclasts remain largely unknown.Here,we show with GeneChip analysis that RUN and FYVE domain-containing protein 4(RUFY4)is strongly upregulated during osteoclastogenesis.Mice lacking Rufy4 exhibited a high trabecular bone mass phenotype with abnormalities in osteoclast function in vivo.Furthermore,deleting Rufy4 did not affect osteoclast differentiation,but inhibited bone-resorbing activity due to disruption in the acidic maturation of secondary lysosomes,their trafficking to the membrane,and their secretion of cathepsin K into the extracellular space.Mechanistically,RUFY4 promotes late endosome-lysosome fusion by acting as an adaptor protein between Rab7 on late endosomes and LAMP2 on primary lysosomes.Consequently,Rufy4-deficient mice were highly protected from lipopolysaccharide-and ovariectomy-induced bone loss.Thus,RUFY4 plays as a new regulator in osteoclast activity by mediating endo-lysosomal trafficking and have a potential to be specific target for therapies against bone-loss diseases such as osteoporosis.展开更多
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and c...VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeVPNnetwork data.We present a novelVPNnetwork traffic flowclassificationmethod utilizing Artificial Neural Networks(ANN).This paper aims to provide a reliable system that can identify a virtual private network(VPN)traffic fromintrusion attempts,data exfiltration,and denial-of-service assaults.We compile a broad dataset of labeled VPN traffic flows from various apps and usage patterns.Next,we create an ANN architecture that can handle encrypted communication and distinguish benign from dangerous actions.To effectively process and categorize encrypted packets,the neural network model has input,hidden,and output layers.We use advanced feature extraction approaches to improve the ANN’s classification accuracy by leveraging network traffic’s statistical and behavioral properties.We also use cutting-edge optimizationmethods to optimize network characteristics and performance.The suggested ANN-based categorization method is extensively tested and analyzed.Results show the model effectively classifies VPN traffic types.We also show that our ANN-based technique outperforms other approaches in precision,recall,and F1-score with 98.79%accuracy.This study improves VPN security and protects against new cyberthreats.Classifying VPNtraffic flows effectively helps enterprises protect sensitive data,maintain network integrity,and respond quickly to security problems.This study advances network security and lays the groundwork for ANN-based cybersecurity solutions.展开更多
Dear Editor,This letter puts forward a novel scalable temporal dimension preserved tensor completion model based on orthogonal initialization for missing traffic data(MTD)imputation.The MTD imputation acts directly on...Dear Editor,This letter puts forward a novel scalable temporal dimension preserved tensor completion model based on orthogonal initialization for missing traffic data(MTD)imputation.The MTD imputation acts directly on accessing the traffic state,and affects the traffic management.展开更多
In current dual porosity/permeability models,there exists a fundamental assumption that the adsorption-induced swelling is distributed uniformly within the representative elementary volume (REV),irrespective of its in...In current dual porosity/permeability models,there exists a fundamental assumption that the adsorption-induced swelling is distributed uniformly within the representative elementary volume (REV),irrespective of its internal structures and transient processes.However,both internal structures and transient processes can lead to the non-uniform swelling.In this study,we hypothesize that the non-uniform swelling is responsible for why coal permeability in experimental measurements is not only controlled by the effective stress but also is affected by the adsorption-induced swelling.We propose a concept of the swelling triangle composed of swelling paths to characterize the evolution of the non-uniform swelling and serve as a core link in coupled multiphysics.A swelling path is determined by a dimensionless volumetric ratio and a dimensionless swelling ratio.Different swelling paths have the same start and end point,and each swelling path represents a unique swelling case.The swelling path as the diagonal of the triangle represents the case of the uniform swelling while that as the two perpendicular boundaries represents the case of the localized swelling.The paths of all intermediate cases populate inside the triangle.The corresponding relations between the swelling path and the response of coal multiphysics are established by a non-uniform swelling coefficient.We define this method as the triangle approach and corresponding models as swelling path-based ones.The proposed concept and models are verified against a long-term experimental measurement of permeability and strains under constant effective stress.Our results demonstrate that during gas injection,coal multiphysics responses have a close dependence on the swelling path,and that in both future experiments and field predictions,this dependence must be considered.展开更多
The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules...The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules can be translated into machine language and used by autonomous vehicles.In this paper,a translation flow is designed.Beyond the translation,a deeper examination is required,because the semantics of natural languages are rich and complex,and frequently contain hidden assumptions.The issue of how to ensure that digital rules are accurate and consistent with the original intent of the traffic rules they represent is both significant and unresolved.In response,we propose a method of formal verification that combines equivalence verification with model checking.Reasonable and reassuring digital traffic rules can be obtained by utilizing the proposed traffic rule digitization flow and verification method.In addition,we offer a number of simulation applications that employ digital traffic rules to assess vehicle violations.The experimental findings indicate that our digital rules utilizing metric temporal logic(MTL)can be easily incorporated into simulation platforms and autonomous driving systems(ADS).展开更多
As a common transportation facility, speed humps can control the speed of vehicles on special road sections to reduce traffic risks. At the same time, they also cause instantaneous traffic emissions. Based on the clas...As a common transportation facility, speed humps can control the speed of vehicles on special road sections to reduce traffic risks. At the same time, they also cause instantaneous traffic emissions. Based on the classic instantaneous traffic emission model and the limited deceleration capacity microscopic traffic flow model with slow-to-start rules, this paper has investigated the impact of speed humps on traffic flow and the instantaneous emissions of vehicle pollutants in a single lane situation. The numerical simulation results have shown that speed humps have significant effects on traffic flow and traffic emissions. In a free-flow region, the increase of speed humps leads to the continuous rise of CO_(2), NO_(X) and PM emissions. Within some density ranges, one finds that these pollutant emissions can evolve into some higher values under some random seeds. Under other random seeds, they can evolve into some lower values. In a wide moving jam region, the emission values of these pollutants sometimes appear as continuous or intermittent phenomenon. Compared to the refined Na Sch model, the present model has lower instantaneous emissions such as CO_(2), NO_(X) and PM and higher volatile organic components(VOC) emissions. Compared to the limited deceleration capacity model without slow-to-start rules, the present model also has lower instantaneous emissions such as CO_(2), NO_(X) and PM and higher VOC emissions in a wide moving jam region. These results can also be confirmed or explained by the statistical values of vehicle velocity and acceleration.展开更多
Polymer flooding in fractured wells has been extensively applied in oilfields to enhance oil recovery.In contrast to water,polymer solution exhibits non-Newtonian and nonlinear behavior such as effects of shear thinni...Polymer flooding in fractured wells has been extensively applied in oilfields to enhance oil recovery.In contrast to water,polymer solution exhibits non-Newtonian and nonlinear behavior such as effects of shear thinning and shear thickening,polymer convection,diffusion,adsorption retention,inaccessible pore volume and reduced effective permeability.Meanwhile,the flux density and fracture conductivity along the hydraulic fracture are generally non-uniform due to the effects of pressure distribution,formation damage,and proppant breakage.In this paper,we present an oil-water two-phase flow model that captures these complex non-Newtonian and nonlinear behavior,and non-uniform fracture characteristics in fractured polymer flooding.The hydraulic fracture is firstly divided into two parts:high-conductivity fracture near the wellbore and low-conductivity fracture in the far-wellbore section.A hybrid grid system,including perpendicular bisection(PEBI)and Cartesian grid,is applied to discrete the partial differential flow equations,and the local grid refinement method is applied in the near-wellbore region to accurately calculate the pressure distribution and shear rate of polymer solution.The combination of polymer behavior characterizations and numerical flow simulations are applied,resulting in the calculation for the distribution of water saturation,polymer concentration and reservoir pressure.Compared with the polymer flooding well with uniform fracture conductivity,this non-uniform fracture conductivity model exhibits the larger pressure difference,and the shorter bilinear flow period due to the decrease of fracture flow ability in the far-wellbore section.The field case of the fall-off test demonstrates that the proposed method characterizes fracture characteristics more accurately,and yields fracture half-lengths that better match engineering reality,enabling a quantitative segmented characterization of the near-wellbore section with high fracture conductivity and the far-wellbore section with low fracture conductivity.The novelty of this paper is the analysis of pressure performances caused by the fracture dynamics and polymer rheology,as well as an analysis method that derives formation and fracture parameters based on the pressure and its derivative curves.展开更多
文摘In wireless sensor networks (WSNs), it is essential to save energy consumption at sensor nodes (SNs). A clustering technique is one of the approaches to save energy consumption, where several neighboring SNs form a cluster and transmit the sensed data to their cluster head (CH), and then the CH sends the aggregated data to a sink node. Under spatial non-uniform traffic environments, the clustering technique causes the non-uniformity in data gathering performance and energy consumption between clusters in WSNs. In this paper, we propose a clustering scheme for the WSNs employing IEEE802.15.4 beacon enabled mode under various non-uniform traffic environments. The proposed scheme distributes network traffic uniformly to the clusters through cluster area control by adjusting beacon transmission power, and thereby achieves uniform and improved data gathering performance. In the clusters with expanded area, however, the performance degradation arises from long distance communications. To solve this problem, the proposed scheme controls transmission power at SNs. In addition, to reduce energy consumption the proposed scheme sets the appropriate active period length in duty cycle operation to the current traffic condition. The performance evaluations by computer simulation show the effectiveness of the proposed scheme for the WSNs under various non-uniform traffic environments.
文摘In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the quality of service,preventing application choke points,and facilitating malicious behavior identification.In this paper,we review existing network classification techniques,such as port-based identification and those based on deep packet inspection,statistical features in conjunction with machine learning,and deep learning algorithms.We also explain the implementations,advantages,and limitations associated with these techniques.Our review also extends to publicly available datasets used in the literature.Finally,we discuss existing and emerging challenges,as well as future research directions.
基金supported by the National Natural Science Foundation of China under Grant 61602162the Hubei Provincial Science and Technology Plan Project under Grant 2023BCB041.
文摘Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexity,leading to practical problems in traffic identification data analytics.Since the original Dung Beetle Optimizer(DBO)algorithm,Grey Wolf Optimization(GWO)algorithm,Whale Optimization Algorithm(WOA),and Particle Swarm Optimization(PSO)algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution,an Improved Dung Beetle Optimizer(IDBO)algorithm is proposed for network traffic identification.Firstly,the Sobol sequence is utilized to initialize the dung beetle population,laying the foundation for finding the global optimal solution.Next,an integration of levy flight and golden sine strategy is suggested to give dung beetles a greater probability of exploring unvisited areas,escaping from the local optimal solution,and converging more effectively towards a global optimal solution.Finally,an adaptive weight factor is utilized to enhance the search capabilities of the original DBO algorithm and accelerate convergence.With the improvements above,the proposed IDBO algorithm is then applied to traffic identification data analytics and feature selection,as so to find the optimal subset for K-Nearest Neighbor(KNN)classification.The simulation experiments use the CICIDS2017 dataset to verify the effectiveness of the proposed IDBO algorithm and compare it with the original DBO,GWO,WOA,and PSO algorithms.The experimental results show that,compared with other algorithms,the accuracy and recall are improved by 1.53%and 0.88%in binary classification,and the Distributed Denial of Service(DDoS)class identification is the most effective in multi-classification,with an improvement of 5.80%and 0.33%for accuracy and recall,respectively.Therefore,the proposed IDBO algorithm is effective in increasing the efficiency of traffic identification and solving the problem of the original DBO algorithm that converges slowly and falls into the local optimal solution when dealing with high-dimensional data analytics and feature selection for network traffic identification.
基金supported by Tianshan Talent Training Project-Xinjiang Science and Technology Innovation Team Program(2023TSYCTD).
文摘With the increasing dimensionality of network traffic,extracting effective traffic features and improving the identification accuracy of different intrusion traffic have become critical in intrusion detection systems(IDS).However,both unsupervised and semisupervised anomalous traffic detection methods suffer from the drawback of ignoring potential correlations between features,resulting in an analysis that is not an optimal set.Therefore,in order to extract more representative traffic features as well as to improve the accuracy of traffic identification,this paper proposes a feature dimensionality reduction method combining principal component analysis and Hotelling’s T^(2) and a multilayer convolutional bidirectional long short-term memory(MSC_BiLSTM)classifier model for network traffic intrusion detection.This method reduces the parameters and redundancy of the model by feature extraction and extracts the dependent features between the data by a bidirectional long short-term memory(BiLSTM)network,which fully considers the influence between the before and after features.The network traffic is first characteristically downscaled by principal component analysis(PCA),and then the downscaled principal components are used as input to Hotelling’s T^(2) to compare the differences between groups.For datasets with outliers,Hotelling’s T^(2) can help identify the groups where the outliers are located and quantitatively measure the extent of the outliers.Finally,a multilayer convolutional neural network and a BiLSTM network are used to extract the spatial and temporal features of network traffic data.The empirical consequences exhibit that the suggested approach in this manuscript attains superior outcomes in precision,recall and F1-score juxtaposed with the prevailing techniques.The results show that the intrusion detection accuracy,precision,and F1-score of the proposed MSC_BiLSTM model for the CIC-IDS 2017 dataset are 98.71%,95.97%,and 90.22%.
基金This research was funded by National Natural Science Foundation of China under Grant No.61806171Sichuan University of Science&Engineering Talent Project under Grant No.2021RC15+2 种基金Open Fund Project of Key Laboratory for Non-Destructive Testing and Engineering Computer of Sichuan Province Universities on Bridge Inspection and Engineering under Grant No.2022QYJ06Sichuan University of Science&Engineering Graduate Student Innovation Fund under Grant No.Y2023115The Scientific Research and Innovation Team Program of Sichuan University of Science and Technology under Grant No.SUSE652A006.
文摘While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious behavior.To address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic,we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features,called BERT-based Spatio-Temporal Features Network(BSTFNet).At the packet-level granularity,the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers(BERT)model.At the byte-level granularity,we initially employ the Bidirectional Gated Recurrent Unit(BiGRU)model to extract temporal features from bytes,followed by the utilization of the Text Convolutional Neural Network(TextCNN)model with multi-sized convolution kernels to extract local multi-receptive field spatial features.The fusion of features from both granularities serves as the ultimate multidimensional representation of malicious traffic.Our approach achieves accuracy and F1-score of 99.39%and 99.40%,respectively,on the publicly available USTC-TFC2016 dataset,and effectively reduces sample confusion within the Neris and Virut categories.The experimental results demonstrate that our method has outstanding representation and classification capabilities for encrypted malicious traffic.
基金supported by the National Key Research and Development Program of China(2021YFB2900200)the Key Research and Development Program of Science and Technology Department of Zhejiang Province(2022C01121)Zhejiang Provincial Department of Transport Research Project(ZJXL-JTT-202223).
文摘Urban traffic control is a multifaceted and demanding task that necessitates extensive decision-making to ensure the safety and efficiency of urban transportation systems.Traditional approaches require traffic signal professionals to manually intervene on traffic control devices at the intersection level,utilizing their knowledge and expertise.However,this process is cumbersome,labor-intensive,and cannot be applied on a large network scale.Recent studies have begun to explore the applicability of recommendation system for urban traffic control,which offer increased control efficiency and scalability.Such a decision recommendation system is complex,with various interdependent components,but a systematic literature review has not yet been conducted.In this work,we present an up-to-date survey that elucidates all the detailed components of a recommendation system for urban traffic control,demonstrates the utility and efficacy of such a system in the real world using data and knowledgedriven approaches,and discusses the current challenges and potential future directions of this field.
基金Project(51925402) supported by the National Natural Science Foundation for Distinguished Young Scholars of ChinaProject(202303021211060) supported by the Natural Science Research General Program for Shanxi Provincial Basic Research Program,China+1 种基金Project(U22A20169) supported by the Joint Fund Project of National Natural Science Foundation of ChinaProjects(2021SX-TD001, 2021SX-TD002) supported by the Shanxi-Zheda Institute of Advanced Materials and Chemical Engineering,China。
文摘Backfill mining is one of the most important technical means for controlling strata movement and reducing surface subsidence and environmental damage during exploitation of underground coal resources. Ensuring the stability of the backfill bodies is the primary prerequisite for maintaining the safety of the backfilling working face, and the loading characteristics of backfill are closely related to the deformation and subsidence of the roof. Elastic thin plate model was used to explore the non-uniform subsidence law of the roof, and then the non-uniform distribution characteristics of backfill bodies’ load were revealed. Through a self-developed non-uniform loading device combined with acoustic emission (AE) and digital image correlation (DIC) monitoring technology, the synergistic dynamic evolution law of the bearing capacity, apparent crack, and internal fracture of cemented coal gangue backfills (CCGBs) under loads with different degrees of non-uniformity was deeply explored. The results showed that: 1) The uniaxial compressive strength (UCS) of CCGB increased and then decreased with an increase in the degree of non-uniformity of load (DNL). About 40% of DNL was the inflection point of DNL-UCS curve and when DNL exceeded 40%, the strength decreased in a cliff-like manner;2) A positive correlation was observed between the AE ringing count and UCS during the loading process of the specimen, which was manifested by a higher AE ringing count of the high-strength specimen. 3) Shear cracks gradually increased and failure mode of specimens gradually changed from “X” type dominated by tension cracks to inverted “Y” type dominated by shear cracks with an increase in DNL, and the crack opening displacement at the peak stress decreased and then increased. The crack opening displacement at 40% of the DNL was the smallest. This was consistent with the judgment of crack size based on the AE b-value, i. e., it showed the typical characteristics of “small b-value-large crack and large b-value-small crack”. The research results are of significance for preventing the instability and failure of backfill.
基金supported by Science and Technology Plan Project of Zhejiang Provincial Department of Transportation“Research and System Development of Highway Asset Digitalization Technology inUse Based onHigh-PrecisionMap”(Project Number:202203)in part by Science and Technology Plan Project of Zhejiang Provincial Department of Transportation:Research and Demonstration Application of Key Technologies for Precise Sensing of Expressway Thrown Objects(No.202204).
文摘Traffic prediction already plays a significant role in applications like traffic planning and urban management,but it is still difficult to capture the highly non-linear and complicated spatiotemporal correlations of traffic data.As well as to fulfil both long-termand short-termprediction objectives,a better representation of the temporal dependency and global spatial correlation of traffic data is needed.In order to do this,the Spatiotemporal Graph Neural Network(S-GNN)is proposed in this research as amethod for traffic prediction.The S-GNN simultaneously accepts various traffic data as inputs and investigates the non-linear correlations between the variables.In terms of modelling,the road network is initially represented as a spatiotemporal directed graph,with the features of the samples at the time step being captured by a convolution module.In order to assign varying attention weights to various adjacent area nodes of the target node,the adjacent areas information of nodes in the road network is then aggregated using a graph network.The data is output using a fully connected layer at the end.The findings show that S-GNN can improve short-and long-term traffic prediction accuracy to a greater extent;in comparison to the control model,the RMSE of S-GNN is reduced by about 0.571 to 9.288 and the MAE(Mean Absolute Error)by about 0.314 to 7.678.The experimental results on two real datasets,Pe MSD7(M)and PEMS-BAY,also support this claim.
基金Project supported by the National Natural Science Foundation of China(Grant No.52172314)the Natural Science Foundation of Liaoning Province,China(Grant No.2022-MS-150)the Special Funding Project of Taishan Scholar Engineering.
文摘This paper investigates the impacts of a bus holding strategy on the mutual interference between buses and passenger cars in a non-dedicated bus route,as well as the impacts on the characteristics of pollutant emissions of passenger cars.The dynamic behaviors of these two types of vehicles are described using cellular automata(CA)models under open boundary conditions.Numerical simulations are carried out to obtain the phase diagrams of the bus system and the trajectories of buses and passenger cars before and after the implementation of the bus holding strategy under different probabilities of passenger cars entering a two-lane mixed traffic system.Then,we analyze the flow rate,satisfaction rate,and pollutant emission rates of passenger cars together with the performance of a mixed traffic system.The results show that the bus holding strategy can effectively alleviate bus bunching,whereas it has no significant impact on the flow rate and pollutant emission rates of passenger cars;the flow rate,satisfaction rate,and pollutant emission rates of passenger cars for either the traffic system or for each lane are influenced by the bus departure interval and the number of passengers arriving at bus stops.
基金supported in part by the National Key Research and Development Program of China(No.2022YFB4500800)the National Science Foundation of China(No.42071431).
文摘Encrypted traffic plays a crucial role in safeguarding network security and user privacy.However,encrypting malicious traffic can lead to numerous security issues,making the effective classification of encrypted traffic essential.Existing methods for detecting encrypted traffic face two significant challenges.First,relying solely on the original byte information for classification fails to leverage the rich temporal relationships within network traffic.Second,machine learning and convolutional neural network methods lack sufficient network expression capabilities,hindering the full exploration of traffic’s potential characteristics.To address these limitations,this study introduces a traffic classification method that utilizes time relationships and a higher-order graph neural network,termed HGNN-ETC.This approach fully exploits the original byte information and chronological relationships of traffic packets,transforming traffic data into a graph structure to provide the model with more comprehensive context information.HGNN-ETC employs an innovative k-dimensional graph neural network to effectively capture the multi-scale structural features of traffic graphs,enabling more accurate classification.We select the ISCXVPN and the USTC-TK2016 dataset for our experiments.The results show that compared with other state-of-the-art methods,our method can obtain a better classification effect on different datasets,and the accuracy rate is about 97.00%.In addition,by analyzing the impact of varying input specifications on classification performance,we determine the optimal network data truncation strategy and confirm the model’s excellent generalization ability on different datasets.
文摘Low-Earth Orbit Satellite Constellations(LEO-SCs)provide global,high-speed,and low latency Internet access services,which bridges the digital divide in the remote areas.As inter-satellite links are not supported in initial deployment(i.e.the Starlink),the communication between satellites is based on ground stations with radio frequency signals.Due to the rapid movement of satellites,this hybrid topology of LEO-SCs and ground stations is time-varying,which imposes a major challenge to uninterrupted service provisioning and network management.In this paper,we focus on solving two notable problems in such a ground station-assisted LEO-SC topology,i.e.,traffic engineering and fast reroute,to guarantee that the packets are forwarded in a balanced and uninterrupted manner.Specifically,we employ segment routing to support the arbitrary path routing in LEO-SCs.To solve the traffic engineering problem,we proposed two source routings with traffic splitting algorithms,Delay-Bounded Traffic Splitting(DBTS)and DBTS+,where DBTS equally splits a flow and DBTS+favors shorter paths.Simu-lation results show that DBTS+can achieve about 30%lower maximum satellite load at the cost of about 10%more delay.To guarantee the fast recovery of failures,two fast reroute mechanisms,Loop-Free Alternate(LFA)and LFA+,are studied,where LFA pre-computes an alternate next-hop as a backup while LFA+finds a 2-segment backup path.We show that LFA+can increase the percentage of protection coverage by about 15%.
基金the financial support provided by the National Natural Science Foundation of China(No.52104043)。
文摘During the production,the fluid in the vicinity of the directional well enters the wellbore with different rates,leading to non-uniform flux distribution along the directional well.However,in all existing studies,it is oversimplified to a uniform flux distribution,which can result in inaccurate results for field applications.Therefore,this paper proposes a semi-analytical model of a directional well based on the assumption of non-uniform flux distribution.Specifically,the direction well is discretized into a carefully chosen series of linear sources,such that the complex well trajectory can be captured and the nonuniform flux distribution along the wellbore can be considered to model the three-dimensional flow behavior.By using the finite difference method,we can obtain the numerical solutions of the transient flow within the wellbore.With the aid of Green's function method,we can obtain the analytical solutions of the transient flow from the matrix to the wellbore.The complete flow behavior of a directional well is perfectly represented by coupling the above two types of transient flow.Subsequently,on the basis of the proposed model,we conduct a comprehensive analysis of the pressure transient behavior of a directional well.The computation results show that the flux variation along the direction well has a significant effect on pressure responses.In addition,the directional well in an infinite reservoir may exhibit the following flow regimes:wellbore afterflow,transition flow,inclined radial flow,elliptical flow,horizontal linear flow,and horizontal radial flow.The horizontal linear flow can be observed only if the formation thickness is much smaller than the well length.Furthermore,a dip region that appears on the pressure derivative curve indicates the three-dimensional flow behavior near the wellbore.
基金supported in part by the Korea Research Institute for Defense Technology Planning and Advancement(KRIT)funded by the Korean Government’s Defense Acquisition Program Administration(DAPA)under Grant KRIT-CT-21-037in part by the Ministry of Education,Republic of Koreain part by the National Research Foundation of Korea under Grant RS-2023-00211871.
文摘In the rapidly evolving field of cybersecurity,the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical.Traditional methods often fall short in capturing the dynamic and complex nature of modern cyber threats.To address this gap,we propose a comprehensive framework designed to create authentic network environments tailored for cybersecurity exercise systems.Our framework leverages advanced simulation techniques to generate scenarios that mirror actual network conditions faced by professionals in the field.The cornerstone of our approach is the use of a conditional tabular generative adversarial network(CTGAN),a sophisticated tool that synthesizes realistic synthetic network traffic by learning fromreal data patterns.This technology allows us to handle technical components and sensitive information with high fidelity,ensuring that the synthetic data maintains statistical characteristics similar to those observed in real network environments.By meticulously analyzing the data collected from various network layers and translating these into structured tabular formats,our framework can generate network traffic that closely resembles that found in actual scenarios.An integral part of our process involves deploying this synthetic data within a simulated network environment,structured on software-defined networking(SDN)principles,to test and refine the traffic patterns.This simulation not only facilitates a direct comparison between the synthetic and real traffic but also enables us to identify discrepancies and refine the accuracy of our simulations.Our initial findings indicate an error rate of approximately 29.28%between the synthetic and real traffic data,highlighting areas for further improvement and adjustment.By providing a diverse array of network scenarios through our framework,we aim to enhance the exercise systems used by cybersecurity professionals.This not only improves their ability to respond to actual cyber threats but also ensures that the exercise is cost-effective and efficient.
基金supported by grants from the National Research Foundation of Korea(RS-2023-00217798 and 2021R1A2C3003675 to S.Y.L.)by the Korea Basic Science Institute National Research Facilities&Equipment Center grant(2019R1A6C1010020).M.K.was supported in part by scholarship from Ewha Womans University.
文摘Mature osteoclasts degrade bone matrix by exocytosis of active proteases from secretory lysosomes through a ruffled border.However,the molecular mechanisms underlying lysosomal trafficking and secretion in osteoclasts remain largely unknown.Here,we show with GeneChip analysis that RUN and FYVE domain-containing protein 4(RUFY4)is strongly upregulated during osteoclastogenesis.Mice lacking Rufy4 exhibited a high trabecular bone mass phenotype with abnormalities in osteoclast function in vivo.Furthermore,deleting Rufy4 did not affect osteoclast differentiation,but inhibited bone-resorbing activity due to disruption in the acidic maturation of secondary lysosomes,their trafficking to the membrane,and their secretion of cathepsin K into the extracellular space.Mechanistically,RUFY4 promotes late endosome-lysosome fusion by acting as an adaptor protein between Rab7 on late endosomes and LAMP2 on primary lysosomes.Consequently,Rufy4-deficient mice were highly protected from lipopolysaccharide-and ovariectomy-induced bone loss.Thus,RUFY4 plays as a new regulator in osteoclast activity by mediating endo-lysosomal trafficking and have a potential to be specific target for therapies against bone-loss diseases such as osteoporosis.
文摘VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeVPNnetwork data.We present a novelVPNnetwork traffic flowclassificationmethod utilizing Artificial Neural Networks(ANN).This paper aims to provide a reliable system that can identify a virtual private network(VPN)traffic fromintrusion attempts,data exfiltration,and denial-of-service assaults.We compile a broad dataset of labeled VPN traffic flows from various apps and usage patterns.Next,we create an ANN architecture that can handle encrypted communication and distinguish benign from dangerous actions.To effectively process and categorize encrypted packets,the neural network model has input,hidden,and output layers.We use advanced feature extraction approaches to improve the ANN’s classification accuracy by leveraging network traffic’s statistical and behavioral properties.We also use cutting-edge optimizationmethods to optimize network characteristics and performance.The suggested ANN-based categorization method is extensively tested and analyzed.Results show the model effectively classifies VPN traffic types.We also show that our ANN-based technique outperforms other approaches in precision,recall,and F1-score with 98.79%accuracy.This study improves VPN security and protects against new cyberthreats.Classifying VPNtraffic flows effectively helps enterprises protect sensitive data,maintain network integrity,and respond quickly to security problems.This study advances network security and lays the groundwork for ANN-based cybersecurity solutions.
基金supported by the Young Top Talent of Young Eagle Program of Fujian Province,China(F21E 0011202B01).
文摘Dear Editor,This letter puts forward a novel scalable temporal dimension preserved tensor completion model based on orthogonal initialization for missing traffic data(MTD)imputation.The MTD imputation acts directly on accessing the traffic state,and affects the traffic management.
基金supported by the Australian Research Council(Grant No.DP200101293)supported by the UWA-China Joint Scholarships(201906430030).
文摘In current dual porosity/permeability models,there exists a fundamental assumption that the adsorption-induced swelling is distributed uniformly within the representative elementary volume (REV),irrespective of its internal structures and transient processes.However,both internal structures and transient processes can lead to the non-uniform swelling.In this study,we hypothesize that the non-uniform swelling is responsible for why coal permeability in experimental measurements is not only controlled by the effective stress but also is affected by the adsorption-induced swelling.We propose a concept of the swelling triangle composed of swelling paths to characterize the evolution of the non-uniform swelling and serve as a core link in coupled multiphysics.A swelling path is determined by a dimensionless volumetric ratio and a dimensionless swelling ratio.Different swelling paths have the same start and end point,and each swelling path represents a unique swelling case.The swelling path as the diagonal of the triangle represents the case of the uniform swelling while that as the two perpendicular boundaries represents the case of the localized swelling.The paths of all intermediate cases populate inside the triangle.The corresponding relations between the swelling path and the response of coal multiphysics are established by a non-uniform swelling coefficient.We define this method as the triangle approach and corresponding models as swelling path-based ones.The proposed concept and models are verified against a long-term experimental measurement of permeability and strains under constant effective stress.Our results demonstrate that during gas injection,coal multiphysics responses have a close dependence on the swelling path,and that in both future experiments and field predictions,this dependence must be considered.
文摘The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules can be translated into machine language and used by autonomous vehicles.In this paper,a translation flow is designed.Beyond the translation,a deeper examination is required,because the semantics of natural languages are rich and complex,and frequently contain hidden assumptions.The issue of how to ensure that digital rules are accurate and consistent with the original intent of the traffic rules they represent is both significant and unresolved.In response,we propose a method of formal verification that combines equivalence verification with model checking.Reasonable and reassuring digital traffic rules can be obtained by utilizing the proposed traffic rule digitization flow and verification method.In addition,we offer a number of simulation applications that employ digital traffic rules to assess vehicle violations.The experimental findings indicate that our digital rules utilizing metric temporal logic(MTL)can be easily incorporated into simulation platforms and autonomous driving systems(ADS).
基金funded by the National Natural Science Foundation of China (Grant No. 11875031)the key research projects of Natural Science of Anhui Provincial Colleges and Universities (Grant No. 2022AH050252)。
文摘As a common transportation facility, speed humps can control the speed of vehicles on special road sections to reduce traffic risks. At the same time, they also cause instantaneous traffic emissions. Based on the classic instantaneous traffic emission model and the limited deceleration capacity microscopic traffic flow model with slow-to-start rules, this paper has investigated the impact of speed humps on traffic flow and the instantaneous emissions of vehicle pollutants in a single lane situation. The numerical simulation results have shown that speed humps have significant effects on traffic flow and traffic emissions. In a free-flow region, the increase of speed humps leads to the continuous rise of CO_(2), NO_(X) and PM emissions. Within some density ranges, one finds that these pollutant emissions can evolve into some higher values under some random seeds. Under other random seeds, they can evolve into some lower values. In a wide moving jam region, the emission values of these pollutants sometimes appear as continuous or intermittent phenomenon. Compared to the refined Na Sch model, the present model has lower instantaneous emissions such as CO_(2), NO_(X) and PM and higher volatile organic components(VOC) emissions. Compared to the limited deceleration capacity model without slow-to-start rules, the present model also has lower instantaneous emissions such as CO_(2), NO_(X) and PM and higher VOC emissions in a wide moving jam region. These results can also be confirmed or explained by the statistical values of vehicle velocity and acceleration.
基金This work is supported by the National Natural Science Foundation of China(No.52104049)the Young Elite Scientist Sponsorship Program by Beijing Association for Science and Technology(No.BYESS2023262)Science Foundation of China University of Petroleum,Beijing(No.2462022BJRC004).
文摘Polymer flooding in fractured wells has been extensively applied in oilfields to enhance oil recovery.In contrast to water,polymer solution exhibits non-Newtonian and nonlinear behavior such as effects of shear thinning and shear thickening,polymer convection,diffusion,adsorption retention,inaccessible pore volume and reduced effective permeability.Meanwhile,the flux density and fracture conductivity along the hydraulic fracture are generally non-uniform due to the effects of pressure distribution,formation damage,and proppant breakage.In this paper,we present an oil-water two-phase flow model that captures these complex non-Newtonian and nonlinear behavior,and non-uniform fracture characteristics in fractured polymer flooding.The hydraulic fracture is firstly divided into two parts:high-conductivity fracture near the wellbore and low-conductivity fracture in the far-wellbore section.A hybrid grid system,including perpendicular bisection(PEBI)and Cartesian grid,is applied to discrete the partial differential flow equations,and the local grid refinement method is applied in the near-wellbore region to accurately calculate the pressure distribution and shear rate of polymer solution.The combination of polymer behavior characterizations and numerical flow simulations are applied,resulting in the calculation for the distribution of water saturation,polymer concentration and reservoir pressure.Compared with the polymer flooding well with uniform fracture conductivity,this non-uniform fracture conductivity model exhibits the larger pressure difference,and the shorter bilinear flow period due to the decrease of fracture flow ability in the far-wellbore section.The field case of the fall-off test demonstrates that the proposed method characterizes fracture characteristics more accurately,and yields fracture half-lengths that better match engineering reality,enabling a quantitative segmented characterization of the near-wellbore section with high fracture conductivity and the far-wellbore section with low fracture conductivity.The novelty of this paper is the analysis of pressure performances caused by the fracture dynamics and polymer rheology,as well as an analysis method that derives formation and fracture parameters based on the pressure and its derivative curves.