To study the collapse of imperfect subsea pipelinos, a 2D high-order nonlinear model is developed. In this model, the large deformation of the pipes is considered by raiaining the high-order nonlinear terms of strain....To study the collapse of imperfect subsea pipelinos, a 2D high-order nonlinear model is developed. In this model, the large deformation of the pipes is considered by raiaining the high-order nonlinear terms of strain. In addi-tion, the J2 plastic flow theory is adopted to describe the elasioplastic constitutive relations of material. The quasi-static process of collapse is analyzed by the increment method. For each load step, the equations based on the principle of virtual work are presented and solved by the discrete Newton's method. Furthermore, finite element simulations and full-scale experiments were preformed to validate the results of the model. Research on the major influencing factors of collapse pressure, including D/t, material type and initial ovality, is also presented.展开更多
The preservation of a historical building, whatever its architectural and/or artistic value, is more successful when undertaken with a deep understanding of the building's history, development, materials and construc...The preservation of a historical building, whatever its architectural and/or artistic value, is more successful when undertaken with a deep understanding of the building's history, development, materials and construction techniques. The preliminary phase of any restoration intervention must start with data acquisition regarding the characteristics and conditions of the building, including a survey of significant alterations. In a great number of cases, restorations are not respectful of the building's static efficiency, so its static requirement is weakened. In fact, a very high percentage of instances in which a restoration effort results in building damage is attributable to such modification's indifference to the structural balance of a structure, as consolidated over time. This study focuses on the restoration intervention on two trilobate pillars that separate the central space from the presbytery in the Cathedral of Matera, located in southern Italy. Through the use of sonic tests - carried out despite the complexity of the shape of the building and constructive elements that characterize these pillars -- it was possible to show the effectiveness of the implemented intervention, highlighting critical points and weaknesses. The research aims to show how -- despite the complexity of some structural elements of a building -- in-depth knowledge of a structure's structure and history is essential to for the success of restoration interventions, which are respectful of a building's type and material peculiarities.展开更多
We propose a scheme to generate atomic cluster states of arbitrary configuration in the cavity quantumelectrodynamics (QED) system.The process is achieved via adiabatic evolution of dark states,which only requiresadia...We propose a scheme to generate atomic cluster states of arbitrary configuration in the cavity quantumelectrodynamics (QED) system.The process is achieved via adiabatic evolution of dark states,which only requiresadiabatically increasing or decreasing Rabi frequencies of laser.Thus it allows the robust implementation of entanglementagainst certain types of errors.Our scheme is relatively decoherence-free in the sense that excited atomic states are neverpopulated and excited cavity photon states can be made negligible in certain conditions.展开更多
Analysis of the problem of predicting bankruptcy shows that foreign and domestic models included only internal factors of enterprises. But the same indicators of internal factors in the rapidly changing external envir...Analysis of the problem of predicting bankruptcy shows that foreign and domestic models included only internal factors of enterprises. But the same indicators of internal factors in the rapidly changing external environment can lead to bankruptcy, and not in others. External factors are the most dangerous, because the possible influence on them is minimal and the impact of their implementation can be devastating. This paper focuses on the same factors to assess the impact of the macroeconomic indicators (extemal factors) on the parameters of static models predicting a local approximation of the crisis at the plant. To accomplish the purpose, a Spark set of 100 companies was compiled, including 50 companies which officially declared bankruptcy in the period of 2000-2009 and 50 stable operating companies with a random sample of the same time period. External factors were extracted from the Joint Economic and Social Data Archive1 The author compared two data sets: (1) microeconomic indicators--money to the total liabilities, retained earnings to total assets, net profit to revenue, Earnings Before Interest and Taxes (EBIT) to assets, net income to equity, net profit to total liabilities, current liabilities to total assets, the totality of short-term and long-term loans to total assets, current assets to current liabilities, assets to revenue, equity to total assets, and current assets to revenue; and (2) external factors--index of real gross domestic product (GDP), industrial production index, the index of real cash incomes, an index of real investments, consumer price index, the refinancing rate, unemployment rate, the price of electricity, gas prices, oil price, gas price, dollar to ruble, ruble euro Standard & Poor (S&P) index, the Russian Trading System (RTS) index, and region. The aim of the comparison results paging classes "insolvent" and "non-bankrupt" is achieved using two methods: classification and discrimination. In both methods, computational procedures are realized with the use of algorithms linear regression, artificial neural network, and genetic algorithm. In the 2-m model, data set includes both internal and external factors. The results showed that the inclusion of only the microeconomic indicators, excluding external factors, impedes models about two times.展开更多
Behavior-based malware analysis is an important technique for automatically analyzing and detecting malware, and it has received considerable attention from both academic and industrial communities. By considering how...Behavior-based malware analysis is an important technique for automatically analyzing and detecting malware, and it has received considerable attention from both academic and industrial communities. By considering how malware behaves, we can tackle the malware obfuscation problem, which cannot be processed by traditional static analysis approaches, and we can also derive the as-built behavior specifications and cover the entire behavior space of the malware samples. Although there have been several works focusing on malware behavior analysis, such research is far from mature, and no overviews have been put forward to date to investigate current developments and challenges. In this paper, we conduct a survey on malware behavior description and analysis considering three aspects: malware behavior description, behavior analysis methods, and visualization techniques. First, existing behavior data types and emerging techniques for malware behavior description are explored, especially the goals, prin- ciples, characteristics, and classifications of behavior analysis techniques proposed in the existing approaches. Second, the in- adequacies and challenges in malware behavior analysis are summarized from different perspectives. Finally, several possible directions are discussed for future research.展开更多
基金Supported by the National Science and Technology Major Project of the Ministry of Science and Technology of China(No.2011ZX05026-005)the National Natural Science Foundation of China(No.51239008)the National Basic Research Program of China("973"Program,No.2014CB046800)
文摘To study the collapse of imperfect subsea pipelinos, a 2D high-order nonlinear model is developed. In this model, the large deformation of the pipes is considered by raiaining the high-order nonlinear terms of strain. In addi-tion, the J2 plastic flow theory is adopted to describe the elasioplastic constitutive relations of material. The quasi-static process of collapse is analyzed by the increment method. For each load step, the equations based on the principle of virtual work are presented and solved by the discrete Newton's method. Furthermore, finite element simulations and full-scale experiments were preformed to validate the results of the model. Research on the major influencing factors of collapse pressure, including D/t, material type and initial ovality, is also presented.
文摘The preservation of a historical building, whatever its architectural and/or artistic value, is more successful when undertaken with a deep understanding of the building's history, development, materials and construction techniques. The preliminary phase of any restoration intervention must start with data acquisition regarding the characteristics and conditions of the building, including a survey of significant alterations. In a great number of cases, restorations are not respectful of the building's static efficiency, so its static requirement is weakened. In fact, a very high percentage of instances in which a restoration effort results in building damage is attributable to such modification's indifference to the structural balance of a structure, as consolidated over time. This study focuses on the restoration intervention on two trilobate pillars that separate the central space from the presbytery in the Cathedral of Matera, located in southern Italy. Through the use of sonic tests - carried out despite the complexity of the shape of the building and constructive elements that characterize these pillars -- it was possible to show the effectiveness of the implemented intervention, highlighting critical points and weaknesses. The research aims to show how -- despite the complexity of some structural elements of a building -- in-depth knowledge of a structure's structure and history is essential to for the success of restoration interventions, which are respectful of a building's type and material peculiarities.
基金National Natural Science Foundation of China under Grant No.1050402
文摘We propose a scheme to generate atomic cluster states of arbitrary configuration in the cavity quantumelectrodynamics (QED) system.The process is achieved via adiabatic evolution of dark states,which only requiresadiabatically increasing or decreasing Rabi frequencies of laser.Thus it allows the robust implementation of entanglementagainst certain types of errors.Our scheme is relatively decoherence-free in the sense that excited atomic states are neverpopulated and excited cavity photon states can be made negligible in certain conditions.
文摘Analysis of the problem of predicting bankruptcy shows that foreign and domestic models included only internal factors of enterprises. But the same indicators of internal factors in the rapidly changing external environment can lead to bankruptcy, and not in others. External factors are the most dangerous, because the possible influence on them is minimal and the impact of their implementation can be devastating. This paper focuses on the same factors to assess the impact of the macroeconomic indicators (extemal factors) on the parameters of static models predicting a local approximation of the crisis at the plant. To accomplish the purpose, a Spark set of 100 companies was compiled, including 50 companies which officially declared bankruptcy in the period of 2000-2009 and 50 stable operating companies with a random sample of the same time period. External factors were extracted from the Joint Economic and Social Data Archive1 The author compared two data sets: (1) microeconomic indicators--money to the total liabilities, retained earnings to total assets, net profit to revenue, Earnings Before Interest and Taxes (EBIT) to assets, net income to equity, net profit to total liabilities, current liabilities to total assets, the totality of short-term and long-term loans to total assets, current assets to current liabilities, assets to revenue, equity to total assets, and current assets to revenue; and (2) external factors--index of real gross domestic product (GDP), industrial production index, the index of real cash incomes, an index of real investments, consumer price index, the refinancing rate, unemployment rate, the price of electricity, gas prices, oil price, gas price, dollar to ruble, ruble euro Standard & Poor (S&P) index, the Russian Trading System (RTS) index, and region. The aim of the comparison results paging classes "insolvent" and "non-bankrupt" is achieved using two methods: classification and discrimination. In both methods, computational procedures are realized with the use of algorithms linear regression, artificial neural network, and genetic algorithm. In the 2-m model, data set includes both internal and external factors. The results showed that the inclusion of only the microeconomic indicators, excluding external factors, impedes models about two times.
基金Project supported by the National Natural Science Foundation of China(No.61472437)
文摘Behavior-based malware analysis is an important technique for automatically analyzing and detecting malware, and it has received considerable attention from both academic and industrial communities. By considering how malware behaves, we can tackle the malware obfuscation problem, which cannot be processed by traditional static analysis approaches, and we can also derive the as-built behavior specifications and cover the entire behavior space of the malware samples. Although there have been several works focusing on malware behavior analysis, such research is far from mature, and no overviews have been put forward to date to investigate current developments and challenges. In this paper, we conduct a survey on malware behavior description and analysis considering three aspects: malware behavior description, behavior analysis methods, and visualization techniques. First, existing behavior data types and emerging techniques for malware behavior description are explored, especially the goals, prin- ciples, characteristics, and classifications of behavior analysis techniques proposed in the existing approaches. Second, the in- adequacies and challenges in malware behavior analysis are summarized from different perspectives. Finally, several possible directions are discussed for future research.