In recent years,the rapid development of computer software has led to numerous security problems,particularly software vulnerabilities.These flaws can cause significant harm to users’privacy and property.Current secu...In recent years,the rapid development of computer software has led to numerous security problems,particularly software vulnerabilities.These flaws can cause significant harm to users’privacy and property.Current security defect detection technology relies on manual or professional reasoning,leading to missed detection and high false detection rates.Artificial intelligence technology has led to the development of neural network models based on machine learning or deep learning to intelligently mine holes,reducing missed alarms and false alarms.So,this project aims to study Java source code defect detection methods for defects like null pointer reference exception,XSS(Transform),and Structured Query Language(SQL)injection.Also,the project uses open-source Javalang to translate the Java source code,conducts a deep search on the AST to obtain the empty syntax feature library,and converts the Java source code into a dependency graph.The feature vector is then used as the learning target for the neural network.Four types of Convolutional Neural Networks(CNN),Long Short-Term Memory(LSTM),Bi-directional Long Short-Term Memory(BiLSTM),and Attention Mechanism+Bidirectional LSTM,are used to investigate various code defects,including blank pointer reference exception,XSS,and SQL injection defects.Experimental results show that the attention mechanism in two-dimensional BLSTM is the most effective for object recognition,verifying the correctness of the method.展开更多
Although static program analysis methods are frequently employed to enhance software quality,their efficiency in commercial settings is limited by their high false positive rate.The EUGENE tool can effectively lower t...Although static program analysis methods are frequently employed to enhance software quality,their efficiency in commercial settings is limited by their high false positive rate.The EUGENE tool can effectively lower the false positive rate.However,in continuous integration(CI)environments,the code is always changing,and user feedback from one version of the software cannot be applied to a subsequent version.Additionally,people find it difficult to distinguish between true positives and false positives in the analytical output.In this study,we developed the EUGENE-CI technique to address the CI problem and the EUGENE-rank lightweight heuristic algorithm to rate the reports of the analysis output in accordance with the likelihood that they are true positives.On the three projects ethereum,go-cloud,and kubernetes,we assessed our methodologies.According to the trial findings,EUGENE-CI may drastically reduce false positives while EUGENE-rank can make it much easier for users to identify the real positives among a vast number of reports.We paired our techniques with GoInsight~1 and discovered a vulnerability.We also offered a patch to the community.展开更多
In this study, the influence of confined concrete models on the response of reinforced concrete structures is investigatedat member and global system levels. The commonly encountered concrete models such as Modified K...In this study, the influence of confined concrete models on the response of reinforced concrete structures is investigatedat member and global system levels. The commonly encountered concrete models such as Modified Kent-Park, Saatçioğlu-Razvi, and Mander are considered. Two moment-resisting frames designed according to thepre-modern code are taken into consideration to reflect the example of an RC moment-resisting frame in thecurrent building stock. The building is in an earthquake-prone zone located on Z3 Soil Type. The inelasticresponse of the building frame is modelled by considering the plastic hinges formed on each beam and columnelement for different concrete classes and stirrups spacings. The models are subjected to non-linear static analyses.The differences between confined concrete models are comparatively investigated at both reinforced concretemember and system levels. Based on the results of the comparative analysis, it is revealed that the column behaviouris mostly influenced by the choice of model, due to axial loads and confinement effects, while the beams areless affected, and also it is observed that the differences exhibited in the moment-curvature response of columncross-sections do not significantly affect the overall behaviour of the global system. This highlights the critical roleof model selection relative to the concrete strength and stirrup spacing of the member.展开更多
The stability problem of power grids has become increasingly serious in recent years as the size of novel power systems increases.In order to improve and ensure the stable operation of the novel power system,this stud...The stability problem of power grids has become increasingly serious in recent years as the size of novel power systems increases.In order to improve and ensure the stable operation of the novel power system,this study proposes an artificial emotional lazy Q-learning method,which combines artificial emotion,lazy learning,and reinforcement learning for static security and stability analysis of power systems.Moreover,this study compares the analysis results of the proposed method with those of the small disturbance method for a stand-alone power system and verifies that the proposed lazy Q-learning method is able to effectively screen useful data for learning,and improve the static security stability of the new type of power system more effectively than the traditional proportional-integral-differential control and Q-learning methods.展开更多
Deadlock detection is an essential aspect of concurrency control in parallel and distributed systems,as it ensures the efficient utilization of resources and prevents indefinite delays.This paper presents a comprehens...Deadlock detection is an essential aspect of concurrency control in parallel and distributed systems,as it ensures the efficient utilization of resources and prevents indefinite delays.This paper presents a comprehensive analysis of the various deadlock detection techniques,including static and dynamic approaches.We discuss the future improvements associated with deadlock detection and provide a comparative evaluation of these techniques in terms of their accuracy,complexity,and scalability.Furthermore,we outline potential future research directions to improve deadlock detection mechanisms and enhance system performance.展开更多
The method of the structural topology optimization is often used to design machine in the early stage of the mechanical design.And the mechanical structures use the topology design to produce a new still and lightweig...The method of the structural topology optimization is often used to design machine in the early stage of the mechanical design.And the mechanical structures use the topology design to produce a new still and lightweight part with the different loading.A new structure is created through overlapping these new optimized structure.展开更多
This article deals with the investigation of the effects of seismic impacts on the design and dimensioning of structures in South Kivu. The starting point is the observation of an ambivalence that can be observed in t...This article deals with the investigation of the effects of seismic impacts on the design and dimensioning of structures in South Kivu. The starting point is the observation of an ambivalence that can be observed in the province, namely the non-consideration of seismic action in the study of structures by both professionals and researchers. The main objective of the study is to show the importance of dynamic analysis of structures in South Kivu. It adopts a meta-analytical approach referring to previous researches on South Kivu and proposes an efficient and optimal method. To arrive at the results, we use Eurocode 7 and 8. In addition, we conducted static analysis using the Coulomb method and dynamic analysis using the Mononobe-Okabe method and compared the results. At Nyabibwe, the results showed that we have a deviation of 24.47% for slip stability, 12.038% for overturning stability and 9.677% for stability against punching through a weight wall.展开更多
In this paper, the authors use the finite element method to conduct a special static analysis for the loadout procedure of offshore structures. By introducing a variable Xmove (the distance between the relative coordi...In this paper, the authors use the finite element method to conduct a special static analysis for the loadout procedure of offshore structures. By introducing a variable Xmove (the distance between the relative coordinate system fixed in the moving upper structure and the absolute coordinate system fixed on slideway), adopting substructure to treat the upper structure, and using the elastic foundation beam to model the slideway, the model for the analysis of the loadoul procedure is established. On the basis of this model, DASOS-J loadout program, a program system for the static analysis of loadout offshore structures, is also developed.展开更多
Based on the method of reverberation ray matrix(MRRM), a reverberation matrix for planar framed structures composed of anisotropic Timoshenko(T) beam members containing completely hinged joints is developed for st...Based on the method of reverberation ray matrix(MRRM), a reverberation matrix for planar framed structures composed of anisotropic Timoshenko(T) beam members containing completely hinged joints is developed for static analysis of such structures.In the MRRM for dynamic analysis, amplitudes of arriving and departing waves for joints are chosen as unknown quantities. However, for the present case of static analysis, displacements and rotational angles at the ends of each beam member are directly considered as unknown quantities. The expressions for stiffness matrices for anisotropic beam members are developed. A corresponding reverberation matrix is derived analytically for exact and unified determination on the displacements and internal forces at both ends of each member and arbitrary cross sectional locations in the structure. Numerical examples are given and compared with the finite element method(FEM) results to validate the present model. The characteristic parameter analysis is performed to demonstrate accuracy of the present model with the T beam theory in contrast with errors in the usual model based on the Euler-Bernoulli(EB) beam theory. The resulting reverberation matrix can be used for exact calculation of anisotropic framed structures as well as for parameter analysis of geometrical and material properties of the framed structures.展开更多
To detect security vulnerabilities in a web application,the security analyst must choose the best performance Security Analysis Static Tool(SAST)in terms of discovering the greatest number of security vulnerabilities ...To detect security vulnerabilities in a web application,the security analyst must choose the best performance Security Analysis Static Tool(SAST)in terms of discovering the greatest number of security vulnerabilities as possible.To compare static analysis tools for web applications,an adapted benchmark to the vulnerability categories included in the known standard Open Web Application Security Project(OWASP)Top Ten project is required.The information of the security effectiveness of a commercial static analysis tool is not usually a publicly accessible research and the state of the art on static security tool analyzers shows that the different design and implementation of those tools has different effectiveness rates in terms of security performance.Given the significant cost of commercial tools,this paper studies the performance of seven static tools using a new methodology proposal and a new benchmark designed for vulnerability categories included in the known standard OWASP Top Ten project.Thus,the practitioners will have more precise information to select the best tool using a benchmark adapted to the last versions of OWASP Top Ten project.The results of this work have been obtaining using widely acceptable metrics to classify them according to three different degree of web application criticality.展开更多
I IntroductionSmartphones have become more complex in terms of functions and third-party applications, and this makes lhem a living space for malware. People store private information such as accounts and passwordson ...I IntroductionSmartphones have become more complex in terms of functions and third-party applications, and this makes lhem a living space for malware. People store private information such as accounts and passwordson their smartphones, the loss of which could have serious con- sequences.展开更多
This paper studies the static deformation behavior of a piezoelectric micromachined ultrasonic transducer (PMUT) actuated by a strong external electric field. The transducer membrane consists of a piezoelectric laye...This paper studies the static deformation behavior of a piezoelectric micromachined ultrasonic transducer (PMUT) actuated by a strong external electric field. The transducer membrane consists of a piezoelectric layer, a passive layer and two electrode layers. The nonlinearities of the piezoelectric layer caused by electrostriction under a strong electric field are analyzed. Because the thickness of the transducer membrane is on the microscale, the size dependence of the deformation behavior is evaluated using the couple stress theory. The results show that the optimal ratio of the top electrode diameter and the membrane diameter is around 0.674. It is also found that this optimal value does not depend on any other parameters if the thicknesses of the two electrodes are negligible compared with those of the piezo- electric and passive layers. In addition, the nonlinearities of the piezoelectric layer will become stronger along with the increase of the electric field, which means that softening of the membrane stiffness occurs when a strong external electric field is applied. Meanwhile, the optimal thickness ratio for the passive layer and the piezoelectric layer is not equal to 1.0 which is usually adopted by previous researchers. Because there exists size dependence of membrane deforma-tion, the optimal value of this thickness ratio needs to be greater than 1.0 on the microscale.展开更多
The force analysis of overconstrained PMs is relatively complex and difficult, for which the methods have always been a research hotspot. However, few liter- atures analyze the characteristics and application scopes o...The force analysis of overconstrained PMs is relatively complex and difficult, for which the methods have always been a research hotspot. However, few liter- atures analyze the characteristics and application scopes of the various methods, which is not convenient for researchers and engineers to master and adopt them prop- erly. A review of the methods for force analysis of both passive and active overconstrained PMs is presented. The existing force analysis methods for these two kinds of overconstrained PMs are classified according to their main ideas. Each category is briefly demonstrated and evaluated from such aspects as the calculation amount, the compre- hensiveness of considering limbs' deformation, and the existence of explicit expressions of the solutions, which provides an important reference for researchers and engi- neers to quickly find a suitable method. The similarities and differences between the statically indeterminate prob- lem of passive overconstrained PMs and that of active overconstrained PMs are discussed, and a universal method for these two kinds of overconstrained PMs is pointed out. The existing deficiencies and development directions of the force analysis methods for overconstrained systems are indicated based on the overview.展开更多
Objective To study mechanics characteristics of two cooperative reconfigurable planetary robots when they get across an obstacle, and to find out the relationship between the maximum height of a stair with the configu...Objective To study mechanics characteristics of two cooperative reconfigurable planetary robots when they get across an obstacle, and to find out the relationship between the maximum height of a stair with the configuration of the two-robot, and to find some restrictions of kinematics for the cooperation. Methods Multirobot cooperation theory is used in the whole study process. Inverse kinematics of the robot is used to form a desired configuration in the cooperation process. Static equations are established to analyze the relations between the friction factor, the configuration of robots and the maximum height of a stair. Kinematics analysis is used to find the restrictions of the two collaborative robots in position, velocity and acceleration. Results 3D simulation shows that the two cooperative robots can climb up a stair under the condition of a certain height and a certain friction factor between robot wheel and the surface of the stair. Following the restrictions of kinematics, the climbing mission is fulfilled successfully and smoothly. Conclusion The maximum height of a stair, which the two cooperative robots can climb up, is involved in the configuration of robots, friction factor between the stair and the robots. The most strict restriction of the friction factor does not appear in the horizontal position. In any case, the maximum height is smaller than half of the distance between the centroid of robot1 with the centroid of robot2. However, the height can be higher than the radius of one robot wheel, which profit from the collaboration.展开更多
A simple method is proposed, for incremental static analysis of a set of inter-colliding particles, simulating 2D flow. Within each step of proposed algorithm, the particles perform small displacements, proportional t...A simple method is proposed, for incremental static analysis of a set of inter-colliding particles, simulating 2D flow. Within each step of proposed algorithm, the particles perform small displacements, proportional to the out-of-balance forces, acting on them. Numerical experiments show that if the liquid is confined within boundaries of a set of inter-communicating vessels, then the proposed method converges to a final equilibrium state. This incremental static analysis approximates dynamic behavior with strong damping and can provide information, as a first approximation to 2D movement of a liquid. In the initial arrangement of particles, a rhombic element is proposed, which assures satisfactory incompressibility of the fluid. Based on the proposed algorithm, a simple and short computer program (a “pocket” program) has been developed, with only about 120 Fortran instructions. This program is first applied to an amount of liquid, contained in a single vessel. A coarse and refined discretization is tried. In final equilibrium state of liquid, the distribution on hydro-static pressure on vessel boundaries, obtained by proposed computational model, is found in satisfactory approximation with corresponding theoretical data. Then, an opening is formed, at the bottom of a vertical boundary of initial vessel, and the liquid is allowed to flow gradually to an adjacent vessel. Almost whole amount of liquid is transferred, from first to second vessel, except of few drops-particles, which remain, in equilibrium, at the bottom of initial vessel. In the final equilibrium state of liquid, in the second vessel, the free surface level of the liquid confirms that the proposed rhombing element assures a satisfactory incompressibility of the fluid.展开更多
In the present study,the static and dynamic analyses of elliptical functionally graded sandwich(FGS)plates are investigated.The constituent materials of the sandwich plates are ceramic and metal so that the core is ma...In the present study,the static and dynamic analyses of elliptical functionally graded sandwich(FGS)plates are investigated.The constituent materials of the sandwich plates are ceramic and metal so that the core is made of pure metal,while the face sheets consist of a combination of metal and ceramic according to a four-parameter power-law distribution.Different material profiles such as classic,symmetric,and asymmetric can be obtained using the applied generalized power-law distribution relation.The analysis is performed based on the classical laminated plate theory(CLPT)and the Ritz method.The effects of four parameters in the material distribution relation as well as different geometric parameters on the deflection and natural frequencies of elliptical FGS plates are studied.The results of this study show that with a proper distribution of materials,the optimal static and dynamic behavior can be achieved.The results also indicate that the generalized power-law distribution has significant effects on the natural frequencies of elliptical FGS plates.For example,although the frequency parameter of a plate with ceramic face sheets is more than the one with metal face sheets,the use of larger amounts of ceramic does not necessarily increase the natural frequency of the structure.展开更多
Fuzzing is an effective technique to find security bugs in programs by quickly exploring the input space of programs.To further discover vulnerabilities hidden in deep execution paths,the hybrid fuzzing combines fuzzi...Fuzzing is an effective technique to find security bugs in programs by quickly exploring the input space of programs.To further discover vulnerabilities hidden in deep execution paths,the hybrid fuzzing combines fuzzing and concolic execution for going through complex branch conditions.In general,we observe that the execution path which comes across more and complex basic blocks may have a higher chance of containing a security bug.Based on this observation,we propose a hybrid fuzzing method assisted by static analysis for binary programs.The basic idea of our method is to prioritize seed inputs according to the complexity of their associated execution paths.For this purpose,we utilize static analysis to evaluate the complexity of each basic block and employ the hardware trace mechanism to dynamically extract the execution path for calculating the seed inputs’weights.The key advantage of our method is that our system can test binary programs efficiently by using the hardware trace and hybrid fuzzing.To evaluate the effectiveness of our method,we design and implement a prototype system,namely SHFuzz.The evaluation results show SHFuzz discovers more unique crashes on several real-world applications and the LAVA-M dataset when compared to the previous solutions.展开更多
The article proposes an Equivalent Single Layer(ESL)formulation for the linear static analysis of arbitrarily-shaped shell structures subjected to general surface loads and boundary conditions.A parametrization of the...The article proposes an Equivalent Single Layer(ESL)formulation for the linear static analysis of arbitrarily-shaped shell structures subjected to general surface loads and boundary conditions.A parametrization of the physical domain is provided by employing a set of curvilinear principal coordinates.The generalized blendingmethodology accounts for a distortion of the structure so that disparate geometries can be considered.Each layer of the stacking sequence has an arbitrary orientation and is modelled as a generally anisotropic continuum.In addition,re-entrant auxetic three-dimensional honeycomb cells with soft-core behaviour are considered in the model.The unknown variables are described employing a generalized displacement field and pre-determined through-the-thickness functions assessed in a unified formulation.Then,a weak assessment of the structural problem accounts for shape functions defined with an isogeometric approach starting fromthe computational grid.Ageneralizedmethodology has been proposed to define two-dimensional distributions of static surface loads.In the same way,boundary conditions with three-dimensional features are implemented along the shell edges employing linear springs.The fundamental relations are obtained from the stationary configuration of the total potential energy,and they are numerically tackled by employing the Generalized Differential Quadrature(GDQ)method,accounting for nonuniform computational grids.In the post-processing stage,an equilibrium-based recovery procedure allows the determination of the three-dimensional dispersion of the kinematic and static quantities.Some case studies have been presented,and a successful benchmark of different structural responses has been performed with respect to various refined theories.展开更多
The Android platform is the most popular mobile operating system.With the increase of the number of Android users,a lot of security issues have occurred.In order to detect the malicious behaviors for the installed And...The Android platform is the most popular mobile operating system.With the increase of the number of Android users,a lot of security issues have occurred.In order to detect the malicious behaviors for the installed Android Apps,in this paper,we propose an Android malware detecting scheme by integrating static and dynamic analysis methods.We use Androguard and Droid Box to extract the features,and then remove the irrelevant features.Then we employ the support vector machine(SVM) to classify the Android malware and benignware.From the result of our proposed scheme,the proposed integrated static and dynamic analysis scheme with SVM can effectively detect the Android malware.展开更多
A macro-model of a reinforced concrete (RC) shear wall is developed for static inelastic analysis.The model is composed of RC column elements and RC membrane elements.The column elements are used to model the boundary...A macro-model of a reinforced concrete (RC) shear wall is developed for static inelastic analysis.The model is composed of RC column elements and RC membrane elements.The column elements are used to model the boundary zone and the membrane elements are used to model the wall panel.Various types of constitutive relationships of concrete could be adopted for the two kinds of elements.To perform analysis,the wall is divided into layers along its height.Two adjacent layers are connected with a rigid beam.There are only three unknown displacement components for each layer.A method called single degree of freedom compensation is adopted to solve the peak value of the capacity curve.The post-peak stage analysis is performed using a forced iteration approach.The macro-model developed in the study and the complete process analysis methodology are verified by the experimental and static inelastic analytical results of four RC shear wall specimens.展开更多
基金This work is supported by the Provincial Key Science and Technology Special Project of Henan(No.221100240100)。
文摘In recent years,the rapid development of computer software has led to numerous security problems,particularly software vulnerabilities.These flaws can cause significant harm to users’privacy and property.Current security defect detection technology relies on manual or professional reasoning,leading to missed detection and high false detection rates.Artificial intelligence technology has led to the development of neural network models based on machine learning or deep learning to intelligently mine holes,reducing missed alarms and false alarms.So,this project aims to study Java source code defect detection methods for defects like null pointer reference exception,XSS(Transform),and Structured Query Language(SQL)injection.Also,the project uses open-source Javalang to translate the Java source code,conducts a deep search on the AST to obtain the empty syntax feature library,and converts the Java source code into a dependency graph.The feature vector is then used as the learning target for the neural network.Four types of Convolutional Neural Networks(CNN),Long Short-Term Memory(LSTM),Bi-directional Long Short-Term Memory(BiLSTM),and Attention Mechanism+Bidirectional LSTM,are used to investigate various code defects,including blank pointer reference exception,XSS,and SQL injection defects.Experimental results show that the attention mechanism in two-dimensional BLSTM is the most effective for object recognition,verifying the correctness of the method.
基金the Project"Research on the protection technology of endogenous safety for industrial control system"supported by National Science and Technology Major Project(2016YFB08002)。
文摘Although static program analysis methods are frequently employed to enhance software quality,their efficiency in commercial settings is limited by their high false positive rate.The EUGENE tool can effectively lower the false positive rate.However,in continuous integration(CI)environments,the code is always changing,and user feedback from one version of the software cannot be applied to a subsequent version.Additionally,people find it difficult to distinguish between true positives and false positives in the analytical output.In this study,we developed the EUGENE-CI technique to address the CI problem and the EUGENE-rank lightweight heuristic algorithm to rate the reports of the analysis output in accordance with the likelihood that they are true positives.On the three projects ethereum,go-cloud,and kubernetes,we assessed our methodologies.According to the trial findings,EUGENE-CI may drastically reduce false positives while EUGENE-rank can make it much easier for users to identify the real positives among a vast number of reports.We paired our techniques with GoInsight~1 and discovered a vulnerability.We also offered a patch to the community.
文摘In this study, the influence of confined concrete models on the response of reinforced concrete structures is investigatedat member and global system levels. The commonly encountered concrete models such as Modified Kent-Park, Saatçioğlu-Razvi, and Mander are considered. Two moment-resisting frames designed according to thepre-modern code are taken into consideration to reflect the example of an RC moment-resisting frame in thecurrent building stock. The building is in an earthquake-prone zone located on Z3 Soil Type. The inelasticresponse of the building frame is modelled by considering the plastic hinges formed on each beam and columnelement for different concrete classes and stirrups spacings. The models are subjected to non-linear static analyses.The differences between confined concrete models are comparatively investigated at both reinforced concretemember and system levels. Based on the results of the comparative analysis, it is revealed that the column behaviouris mostly influenced by the choice of model, due to axial loads and confinement effects, while the beams areless affected, and also it is observed that the differences exhibited in the moment-curvature response of columncross-sections do not significantly affect the overall behaviour of the global system. This highlights the critical roleof model selection relative to the concrete strength and stirrup spacing of the member.
基金the Technology Project of China Southern Power Grid Digital Grid Research Institute Corporation,Ltd.(670000KK52220003)the National Key R&D Program of China(2020YFB0906000).
文摘The stability problem of power grids has become increasingly serious in recent years as the size of novel power systems increases.In order to improve and ensure the stable operation of the novel power system,this study proposes an artificial emotional lazy Q-learning method,which combines artificial emotion,lazy learning,and reinforcement learning for static security and stability analysis of power systems.Moreover,this study compares the analysis results of the proposed method with those of the small disturbance method for a stand-alone power system and verifies that the proposed lazy Q-learning method is able to effectively screen useful data for learning,and improve the static security stability of the new type of power system more effectively than the traditional proportional-integral-differential control and Q-learning methods.
文摘Deadlock detection is an essential aspect of concurrency control in parallel and distributed systems,as it ensures the efficient utilization of resources and prevents indefinite delays.This paper presents a comprehensive analysis of the various deadlock detection techniques,including static and dynamic approaches.We discuss the future improvements associated with deadlock detection and provide a comparative evaluation of these techniques in terms of their accuracy,complexity,and scalability.Furthermore,we outline potential future research directions to improve deadlock detection mechanisms and enhance system performance.
文摘The method of the structural topology optimization is often used to design machine in the early stage of the mechanical design.And the mechanical structures use the topology design to produce a new still and lightweight part with the different loading.A new structure is created through overlapping these new optimized structure.
文摘This article deals with the investigation of the effects of seismic impacts on the design and dimensioning of structures in South Kivu. The starting point is the observation of an ambivalence that can be observed in the province, namely the non-consideration of seismic action in the study of structures by both professionals and researchers. The main objective of the study is to show the importance of dynamic analysis of structures in South Kivu. It adopts a meta-analytical approach referring to previous researches on South Kivu and proposes an efficient and optimal method. To arrive at the results, we use Eurocode 7 and 8. In addition, we conducted static analysis using the Coulomb method and dynamic analysis using the Mononobe-Okabe method and compared the results. At Nyabibwe, the results showed that we have a deviation of 24.47% for slip stability, 12.038% for overturning stability and 9.677% for stability against punching through a weight wall.
文摘In this paper, the authors use the finite element method to conduct a special static analysis for the loadout procedure of offshore structures. By introducing a variable Xmove (the distance between the relative coordinate system fixed in the moving upper structure and the absolute coordinate system fixed on slideway), adopting substructure to treat the upper structure, and using the elastic foundation beam to model the slideway, the model for the analysis of the loadoul procedure is established. On the basis of this model, DASOS-J loadout program, a program system for the static analysis of loadout offshore structures, is also developed.
基金Project supported by the Program for New Century Excellent Talents in Universities(NCET)by the Ministry of Education of China(No.NCET-04-0373)
文摘Based on the method of reverberation ray matrix(MRRM), a reverberation matrix for planar framed structures composed of anisotropic Timoshenko(T) beam members containing completely hinged joints is developed for static analysis of such structures.In the MRRM for dynamic analysis, amplitudes of arriving and departing waves for joints are chosen as unknown quantities. However, for the present case of static analysis, displacements and rotational angles at the ends of each beam member are directly considered as unknown quantities. The expressions for stiffness matrices for anisotropic beam members are developed. A corresponding reverberation matrix is derived analytically for exact and unified determination on the displacements and internal forces at both ends of each member and arbitrary cross sectional locations in the structure. Numerical examples are given and compared with the finite element method(FEM) results to validate the present model. The characteristic parameter analysis is performed to demonstrate accuracy of the present model with the T beam theory in contrast with errors in the usual model based on the Euler-Bernoulli(EB) beam theory. The resulting reverberation matrix can be used for exact calculation of anisotropic framed structures as well as for parameter analysis of geometrical and material properties of the framed structures.
文摘To detect security vulnerabilities in a web application,the security analyst must choose the best performance Security Analysis Static Tool(SAST)in terms of discovering the greatest number of security vulnerabilities as possible.To compare static analysis tools for web applications,an adapted benchmark to the vulnerability categories included in the known standard Open Web Application Security Project(OWASP)Top Ten project is required.The information of the security effectiveness of a commercial static analysis tool is not usually a publicly accessible research and the state of the art on static security tool analyzers shows that the different design and implementation of those tools has different effectiveness rates in terms of security performance.Given the significant cost of commercial tools,this paper studies the performance of seven static tools using a new methodology proposal and a new benchmark designed for vulnerability categories included in the known standard OWASP Top Ten project.Thus,the practitioners will have more precise information to select the best tool using a benchmark adapted to the last versions of OWASP Top Ten project.The results of this work have been obtaining using widely acceptable metrics to classify them according to three different degree of web application criticality.
基金supported in part by the Fundamental Research Funds for the Central Universities of China (Grant No.WK0110000007)the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No.20113402120026)+2 种基金the Natural Science Foundation of Anhui Province,China (Grant No. 1208085QF112)the Foundation for Young Talents in College of Anhui Province,China (GrantNo.2012SQRL001ZD)the Research Fund of ZTE Corpo ration
文摘I IntroductionSmartphones have become more complex in terms of functions and third-party applications, and this makes lhem a living space for malware. People store private information such as accounts and passwordson their smartphones, the loss of which could have serious con- sequences.
基金supported by the National Natural Science Foundation of China (11172138, 10727201)
文摘This paper studies the static deformation behavior of a piezoelectric micromachined ultrasonic transducer (PMUT) actuated by a strong external electric field. The transducer membrane consists of a piezoelectric layer, a passive layer and two electrode layers. The nonlinearities of the piezoelectric layer caused by electrostriction under a strong electric field are analyzed. Because the thickness of the transducer membrane is on the microscale, the size dependence of the deformation behavior is evaluated using the couple stress theory. The results show that the optimal ratio of the top electrode diameter and the membrane diameter is around 0.674. It is also found that this optimal value does not depend on any other parameters if the thicknesses of the two electrodes are negligible compared with those of the piezo- electric and passive layers. In addition, the nonlinearities of the piezoelectric layer will become stronger along with the increase of the electric field, which means that softening of the membrane stiffness occurs when a strong external electric field is applied. Meanwhile, the optimal thickness ratio for the passive layer and the piezoelectric layer is not equal to 1.0 which is usually adopted by previous researchers. Because there exists size dependence of membrane deforma-tion, the optimal value of this thickness ratio needs to be greater than 1.0 on the microscale.
基金Supported by National Natural Science Foundation of China(Grant Nos.51675458,51275439)Youth Top Talent Project of Hebei Province Higher Education of China(Grant No.BJ2017060)
文摘The force analysis of overconstrained PMs is relatively complex and difficult, for which the methods have always been a research hotspot. However, few liter- atures analyze the characteristics and application scopes of the various methods, which is not convenient for researchers and engineers to master and adopt them prop- erly. A review of the methods for force analysis of both passive and active overconstrained PMs is presented. The existing force analysis methods for these two kinds of overconstrained PMs are classified according to their main ideas. Each category is briefly demonstrated and evaluated from such aspects as the calculation amount, the compre- hensiveness of considering limbs' deformation, and the existence of explicit expressions of the solutions, which provides an important reference for researchers and engi- neers to quickly find a suitable method. The similarities and differences between the statically indeterminate prob- lem of passive overconstrained PMs and that of active overconstrained PMs are discussed, and a universal method for these two kinds of overconstrained PMs is pointed out. The existing deficiencies and development directions of the force analysis methods for overconstrained systems are indicated based on the overview.
基金This workis supported in part by the Hi-tech Research and Development Programof China (2002AA422130) .
文摘Objective To study mechanics characteristics of two cooperative reconfigurable planetary robots when they get across an obstacle, and to find out the relationship between the maximum height of a stair with the configuration of the two-robot, and to find some restrictions of kinematics for the cooperation. Methods Multirobot cooperation theory is used in the whole study process. Inverse kinematics of the robot is used to form a desired configuration in the cooperation process. Static equations are established to analyze the relations between the friction factor, the configuration of robots and the maximum height of a stair. Kinematics analysis is used to find the restrictions of the two collaborative robots in position, velocity and acceleration. Results 3D simulation shows that the two cooperative robots can climb up a stair under the condition of a certain height and a certain friction factor between robot wheel and the surface of the stair. Following the restrictions of kinematics, the climbing mission is fulfilled successfully and smoothly. Conclusion The maximum height of a stair, which the two cooperative robots can climb up, is involved in the configuration of robots, friction factor between the stair and the robots. The most strict restriction of the friction factor does not appear in the horizontal position. In any case, the maximum height is smaller than half of the distance between the centroid of robot1 with the centroid of robot2. However, the height can be higher than the radius of one robot wheel, which profit from the collaboration.
文摘A simple method is proposed, for incremental static analysis of a set of inter-colliding particles, simulating 2D flow. Within each step of proposed algorithm, the particles perform small displacements, proportional to the out-of-balance forces, acting on them. Numerical experiments show that if the liquid is confined within boundaries of a set of inter-communicating vessels, then the proposed method converges to a final equilibrium state. This incremental static analysis approximates dynamic behavior with strong damping and can provide information, as a first approximation to 2D movement of a liquid. In the initial arrangement of particles, a rhombic element is proposed, which assures satisfactory incompressibility of the fluid. Based on the proposed algorithm, a simple and short computer program (a “pocket” program) has been developed, with only about 120 Fortran instructions. This program is first applied to an amount of liquid, contained in a single vessel. A coarse and refined discretization is tried. In final equilibrium state of liquid, the distribution on hydro-static pressure on vessel boundaries, obtained by proposed computational model, is found in satisfactory approximation with corresponding theoretical data. Then, an opening is formed, at the bottom of a vertical boundary of initial vessel, and the liquid is allowed to flow gradually to an adjacent vessel. Almost whole amount of liquid is transferred, from first to second vessel, except of few drops-particles, which remain, in equilibrium, at the bottom of initial vessel. In the final equilibrium state of liquid, in the second vessel, the free surface level of the liquid confirms that the proposed rhombing element assures a satisfactory incompressibility of the fluid.
文摘In the present study,the static and dynamic analyses of elliptical functionally graded sandwich(FGS)plates are investigated.The constituent materials of the sandwich plates are ceramic and metal so that the core is made of pure metal,while the face sheets consist of a combination of metal and ceramic according to a four-parameter power-law distribution.Different material profiles such as classic,symmetric,and asymmetric can be obtained using the applied generalized power-law distribution relation.The analysis is performed based on the classical laminated plate theory(CLPT)and the Ritz method.The effects of four parameters in the material distribution relation as well as different geometric parameters on the deflection and natural frequencies of elliptical FGS plates are studied.The results of this study show that with a proper distribution of materials,the optimal static and dynamic behavior can be achieved.The results also indicate that the generalized power-law distribution has significant effects on the natural frequencies of elliptical FGS plates.For example,although the frequency parameter of a plate with ceramic face sheets is more than the one with metal face sheets,the use of larger amounts of ceramic does not necessarily increase the natural frequency of the structure.
基金the National Key Research and Development Program of China under Grant No.2016QY07X1404National Natural Science Foundation of China(NSFC)under Grant No.61602035 and 61772078+1 种基金Beijing Science and Technology Project under Grant No.Z191100007119010,CCF-NSFOCUS Kun-Peng Scientific Research FoundationOpen Found of Key Laboratory of Network Assessment Technology,Institute of Information Engineering,Chinese Academy of Sciences.
文摘Fuzzing is an effective technique to find security bugs in programs by quickly exploring the input space of programs.To further discover vulnerabilities hidden in deep execution paths,the hybrid fuzzing combines fuzzing and concolic execution for going through complex branch conditions.In general,we observe that the execution path which comes across more and complex basic blocks may have a higher chance of containing a security bug.Based on this observation,we propose a hybrid fuzzing method assisted by static analysis for binary programs.The basic idea of our method is to prioritize seed inputs according to the complexity of their associated execution paths.For this purpose,we utilize static analysis to evaluate the complexity of each basic block and employ the hardware trace mechanism to dynamically extract the execution path for calculating the seed inputs’weights.The key advantage of our method is that our system can test binary programs efficiently by using the hardware trace and hybrid fuzzing.To evaluate the effectiveness of our method,we design and implement a prototype system,namely SHFuzz.The evaluation results show SHFuzz discovers more unique crashes on several real-world applications and the LAVA-M dataset when compared to the previous solutions.
文摘The article proposes an Equivalent Single Layer(ESL)formulation for the linear static analysis of arbitrarily-shaped shell structures subjected to general surface loads and boundary conditions.A parametrization of the physical domain is provided by employing a set of curvilinear principal coordinates.The generalized blendingmethodology accounts for a distortion of the structure so that disparate geometries can be considered.Each layer of the stacking sequence has an arbitrary orientation and is modelled as a generally anisotropic continuum.In addition,re-entrant auxetic three-dimensional honeycomb cells with soft-core behaviour are considered in the model.The unknown variables are described employing a generalized displacement field and pre-determined through-the-thickness functions assessed in a unified formulation.Then,a weak assessment of the structural problem accounts for shape functions defined with an isogeometric approach starting fromthe computational grid.Ageneralizedmethodology has been proposed to define two-dimensional distributions of static surface loads.In the same way,boundary conditions with three-dimensional features are implemented along the shell edges employing linear springs.The fundamental relations are obtained from the stationary configuration of the total potential energy,and they are numerically tackled by employing the Generalized Differential Quadrature(GDQ)method,accounting for nonuniform computational grids.In the post-processing stage,an equilibrium-based recovery procedure allows the determination of the three-dimensional dispersion of the kinematic and static quantities.Some case studies have been presented,and a successful benchmark of different structural responses has been performed with respect to various refined theories.
基金partially supported by MOST under Grant No.105-2221-E-327-036
文摘The Android platform is the most popular mobile operating system.With the increase of the number of Android users,a lot of security issues have occurred.In order to detect the malicious behaviors for the installed Android Apps,in this paper,we propose an Android malware detecting scheme by integrating static and dynamic analysis methods.We use Androguard and Droid Box to extract the features,and then remove the irrelevant features.Then we employ the support vector machine(SVM) to classify the Android malware and benignware.From the result of our proposed scheme,the proposed integrated static and dynamic analysis scheme with SVM can effectively detect the Android malware.
基金National Natural Science Foundation of China,Grant number 59895410
文摘A macro-model of a reinforced concrete (RC) shear wall is developed for static inelastic analysis.The model is composed of RC column elements and RC membrane elements.The column elements are used to model the boundary zone and the membrane elements are used to model the wall panel.Various types of constitutive relationships of concrete could be adopted for the two kinds of elements.To perform analysis,the wall is divided into layers along its height.Two adjacent layers are connected with a rigid beam.There are only three unknown displacement components for each layer.A method called single degree of freedom compensation is adopted to solve the peak value of the capacity curve.The post-peak stage analysis is performed using a forced iteration approach.The macro-model developed in the study and the complete process analysis methodology are verified by the experimental and static inelastic analytical results of four RC shear wall specimens.