The homogenous Poisson process is often used to describe the event arrivals. Such Poisson process has been applied in various areas. This study focuses on the arrival pattern of storm water overflows. A set of overflo...The homogenous Poisson process is often used to describe the event arrivals. Such Poisson process has been applied in various areas. This study focuses on the arrival pattern of storm water overflows. A set of overflow data was obtained from the storm water pipeline of a municipality. The aim is to verify the overflow arrival pattern and check whether the Poisson process can be applied. The adopted method is the analysis over the inter-arrival times. The exponential distribution test is conducted on the annual data set as well as the entire data set. The results show that all data sets follow the exponential distribution. With the verification of Poisson process, specific examples are also given to show how the Poisson process properties can be used in the management of storm water pipeline management. For other data that are featured with various heterogeneities, the homogenous Poisson process might not be able to be verified and used. Under such circumstances, non-homogenous survival model can be used to simulate the arrival process.展开更多
This study investigates arrivals of sanitary sewer overflows collected from a municipality. The data set consists of recorded overflows from 2011 to 2014 during dry weather. Reliability analysis is conducted upon each...This study investigates arrivals of sanitary sewer overflows collected from a municipality. The data set consists of recorded overflows from 2011 to 2014 during dry weather. Reliability analysis is conducted upon each data set. The Weibull distribution is adopted to evaluate the data sets. The results show that the arrival of dry weather SSOs cannot be simply modeled with a Poisson process that is featured with a constant arrival rate. For annual data set, 2-parameter Weibull generally has an acceptable fitting (except 2014 data). The shape parameters are close to 1 or a little greater than 1, indicating relatively constant arrival rate or slightly increased rate. For the entire data set, the 3-parameter Weibull distribution is able to fit the data well. The shape parameter is also greater than 1. Therefore, an increased SSO arrival rate is noticed for this data set. There are needs to make more efforts in maintaining the sewer system.展开更多
The Chinese painting Flood Ouerflows Jinshan Temple draws its subject from a beautiful and well-known legend,The white Snake.In the tale Jinshan was an islet in the Yangtze River of yesteryear.Inorder to aave her husb...The Chinese painting Flood Ouerflows Jinshan Temple draws its subject from a beautiful and well-known legend,The white Snake.In the tale Jinshan was an islet in the Yangtze River of yesteryear.Inorder to aave her husband kept in a temple at the top of the isle.Bai Niangzi.incarnation of the whitesnake.bravely fought Monk Fahat.She borrowed the Yangtze River’s water to overcome Jinshan Templeand force Fahai to release her husband.展开更多
For a water supply system with long-distance diversion pipelines, in addition to the water hammer problems that occur beyond pumps, the safety of the water diversion pipeline in front of pumps also deserves attention....For a water supply system with long-distance diversion pipelines, in addition to the water hammer problems that occur beyond pumps, the safety of the water diversion pipeline in front of pumps also deserves attention. In this study, a water hammer protection scheme combined with an overflow surge tank and a regulating valve was developed. A mathematical model of the overflow surge tank was developed, and an analytical formula for the height of the overflow surge tank was derived. Furthermore, a practical water supply project was used to evaluate the feasibility of the combined protection scheme and analyze the sensitivity of valve regulation rules. The results showed that the combined protection scheme effectively reduced the height of the surge tank, lessened the difficulties related to construction, and reduced the necessary financial investment for the project. The two-stage closing rule articulated as fast first and then slow could minimize the overflow volume of the surge tank when the power failure occurred, while the two-stage opening rule articulated as slow first and then fast could be more conducive to the safety of the water supply system when the pump started up.展开更多
At present,the flow table of the SDN switch is stored in the costly Ternary Content Addressable Memory(TCAM)cache.Due to the cost problem,the number of flow tables that the SDN switch can store is extremely limited,wh...At present,the flow table of the SDN switch is stored in the costly Ternary Content Addressable Memory(TCAM)cache.Due to the cost problem,the number of flow tables that the SDN switch can store is extremely limited,which is far less than the number of traffic,so it is prone to overflow problem,and leads to network paralysis.That has become a bottleneck in restricting the processing capacity of the data center,and will become a weak point focused by attackers.In this paper,we propose an algorithm for the Alarm Switch Remove(ASR)that fully loads the flow table space in SDN,and further put forward an integrated load balancing scheme in SDN.Finally,we use Mininet to verify that the scheme can ease the SDN switch flow table overflow problem and increase network throughput.展开更多
Different abnormalities are commonly encountered in computer network systems.These types of abnormalities can lead to critical data losses or unauthorized access in the systems.Buffer overflow anomaly is a prominent i...Different abnormalities are commonly encountered in computer network systems.These types of abnormalities can lead to critical data losses or unauthorized access in the systems.Buffer overflow anomaly is a prominent issue among these abnormalities,posing a serious threat to network security.The primary objective of this study is to identify the potential risks of buffer overflow that can be caused by functions frequently used in the PHP programming language and to provide solutions to minimize these risks.Static code analyzers are used to detect security vulnerabilities,among which SonarQube stands out with its extensive library,flexible customization options,and reliability in the industry.In this context,a customized rule set aimed at automatically detecting buffer overflows has been developed on the SonarQube platform.The memoization optimization technique used while creating the customized rule set enhances the speed and efficiency of the code analysis process.As a result,the code analysis process is not repeatedly run for code snippets that have been analyzed before,significantly reducing processing time and resource utilization.In this study,a memoization-based rule set was utilized to detect critical security vulnerabilities that could lead to buffer overflow in source codes written in the PHP programming language.Thus,the analysis process is not repeatedly run for code snippets that have been analyzed before,leading to a significant reduction in processing time and resource utilization.In a case study conducted to assess the effectiveness of this method,a significant decrease in the source code analysis time was observed.展开更多
At the late stage of solidification with ultrasonic treatment (UST) in Al-Si alloys, a part of semisolid overflows and climbs along the probe. The interesting phenomenon and its influence on the solidification micro...At the late stage of solidification with ultrasonic treatment (UST) in Al-Si alloys, a part of semisolid overflows and climbs along the probe. The interesting phenomenon and its influence on the solidification microstructure were investigated in order to better study the mechanism of UST. It is considered that the overflowing phenomenon occurs due to the changes of vibration and flow in the remaining semisolid. Because the overflowed portion comes from the region with intense UST effect and vibrates with the probe during solidification, great modification of primary and euteetic Si (about 10 pm in length) and refinement of primary a(Al) (about 70 μm in size) are observed in this portion.展开更多
A simplified integer overflow detection method based on path relaxation is described for avoiding buffer overflow triggered by integer overflow. When the integer overflow refers to the size of the buffer allocated dyn...A simplified integer overflow detection method based on path relaxation is described for avoiding buffer overflow triggered by integer overflow. When the integer overflow refers to the size of the buffer allocated dynamically, this kind of integer overflow is most likely to trigger buffer overflow. Based on this discovery, through lightly static program analysis, the solution traces the key variables referring to the size of a buffer allocated dynamically and it maintains the upper bound and lower bound of these variables. After the constraint information of these traced variables is inserted into the original program, this method tests the program with test cases through path relaxation, which means that it not only reports the errors revealed by the current runtime value of traced variables contained in the test case, but it also examines the errors possibly occurring under the same execution path with all the possible values of the traced variables. The effectiveness of this method is demonstrated in a case study. Compared with the traditional buffer overflow detection methods, this method reduces the burden of detection and improves efficiency.展开更多
Most semi-structured data are of certain structure regularity. Having beenstored as structured data in relational database (RDB), they can be effectively managed by databasemanagement system (DBMS). Some semi-structur...Most semi-structured data are of certain structure regularity. Having beenstored as structured data in relational database (RDB), they can be effectively managed by databasemanagement system (DBMS). Some semi-structured data are difficult to transform due to theirirregular structures. We design an efficient algorithm and data structure for ensuring losslesstransformation. We bring forward an approach of schema extraction through data mining, in whichdifferent kinds of elements are transformed respectively and lossless mapping from semi-structureddata to structured data can be achieved.展开更多
文摘The homogenous Poisson process is often used to describe the event arrivals. Such Poisson process has been applied in various areas. This study focuses on the arrival pattern of storm water overflows. A set of overflow data was obtained from the storm water pipeline of a municipality. The aim is to verify the overflow arrival pattern and check whether the Poisson process can be applied. The adopted method is the analysis over the inter-arrival times. The exponential distribution test is conducted on the annual data set as well as the entire data set. The results show that all data sets follow the exponential distribution. With the verification of Poisson process, specific examples are also given to show how the Poisson process properties can be used in the management of storm water pipeline management. For other data that are featured with various heterogeneities, the homogenous Poisson process might not be able to be verified and used. Under such circumstances, non-homogenous survival model can be used to simulate the arrival process.
文摘This study investigates arrivals of sanitary sewer overflows collected from a municipality. The data set consists of recorded overflows from 2011 to 2014 during dry weather. Reliability analysis is conducted upon each data set. The Weibull distribution is adopted to evaluate the data sets. The results show that the arrival of dry weather SSOs cannot be simply modeled with a Poisson process that is featured with a constant arrival rate. For annual data set, 2-parameter Weibull generally has an acceptable fitting (except 2014 data). The shape parameters are close to 1 or a little greater than 1, indicating relatively constant arrival rate or slightly increased rate. For the entire data set, the 3-parameter Weibull distribution is able to fit the data well. The shape parameter is also greater than 1. Therefore, an increased SSO arrival rate is noticed for this data set. There are needs to make more efforts in maintaining the sewer system.
文摘The Chinese painting Flood Ouerflows Jinshan Temple draws its subject from a beautiful and well-known legend,The white Snake.In the tale Jinshan was an islet in the Yangtze River of yesteryear.Inorder to aave her husband kept in a temple at the top of the isle.Bai Niangzi.incarnation of the whitesnake.bravely fought Monk Fahat.She borrowed the Yangtze River’s water to overcome Jinshan Templeand force Fahai to release her husband.
基金supported by the National Natural Science Foundation of China(Grants No.52179062 and 51879087).
文摘For a water supply system with long-distance diversion pipelines, in addition to the water hammer problems that occur beyond pumps, the safety of the water diversion pipeline in front of pumps also deserves attention. In this study, a water hammer protection scheme combined with an overflow surge tank and a regulating valve was developed. A mathematical model of the overflow surge tank was developed, and an analytical formula for the height of the overflow surge tank was derived. Furthermore, a practical water supply project was used to evaluate the feasibility of the combined protection scheme and analyze the sensitivity of valve regulation rules. The results showed that the combined protection scheme effectively reduced the height of the surge tank, lessened the difficulties related to construction, and reduced the necessary financial investment for the project. The two-stage closing rule articulated as fast first and then slow could minimize the overflow volume of the surge tank when the power failure occurred, while the two-stage opening rule articulated as slow first and then fast could be more conducive to the safety of the water supply system when the pump started up.
基金supported supported by the National Key Research and Development Program of China(No.2020YFE0200500)CERNET Innovation Project(NGII20190806)。
文摘At present,the flow table of the SDN switch is stored in the costly Ternary Content Addressable Memory(TCAM)cache.Due to the cost problem,the number of flow tables that the SDN switch can store is extremely limited,which is far less than the number of traffic,so it is prone to overflow problem,and leads to network paralysis.That has become a bottleneck in restricting the processing capacity of the data center,and will become a weak point focused by attackers.In this paper,we propose an algorithm for the Alarm Switch Remove(ASR)that fully loads the flow table space in SDN,and further put forward an integrated load balancing scheme in SDN.Finally,we use Mininet to verify that the scheme can ease the SDN switch flow table overflow problem and increase network throughput.
文摘Different abnormalities are commonly encountered in computer network systems.These types of abnormalities can lead to critical data losses or unauthorized access in the systems.Buffer overflow anomaly is a prominent issue among these abnormalities,posing a serious threat to network security.The primary objective of this study is to identify the potential risks of buffer overflow that can be caused by functions frequently used in the PHP programming language and to provide solutions to minimize these risks.Static code analyzers are used to detect security vulnerabilities,among which SonarQube stands out with its extensive library,flexible customization options,and reliability in the industry.In this context,a customized rule set aimed at automatically detecting buffer overflows has been developed on the SonarQube platform.The memoization optimization technique used while creating the customized rule set enhances the speed and efficiency of the code analysis process.As a result,the code analysis process is not repeatedly run for code snippets that have been analyzed before,significantly reducing processing time and resource utilization.In this study,a memoization-based rule set was utilized to detect critical security vulnerabilities that could lead to buffer overflow in source codes written in the PHP programming language.Thus,the analysis process is not repeatedly run for code snippets that have been analyzed before,leading to a significant reduction in processing time and resource utilization.In a case study conducted to assess the effectiveness of this method,a significant decrease in the source code analysis time was observed.
基金Project(50874022)supported by the National Natural Science Foundation of China
文摘At the late stage of solidification with ultrasonic treatment (UST) in Al-Si alloys, a part of semisolid overflows and climbs along the probe. The interesting phenomenon and its influence on the solidification microstructure were investigated in order to better study the mechanism of UST. It is considered that the overflowing phenomenon occurs due to the changes of vibration and flow in the remaining semisolid. Because the overflowed portion comes from the region with intense UST effect and vibrates with the probe during solidification, great modification of primary and euteetic Si (about 10 pm in length) and refinement of primary a(Al) (about 70 μm in size) are observed in this portion.
基金The National Natural Science Foundation of China (No.60873050,60703086)the Opening Foundation of State Key Laboratory of Software Engineering in Wuhan University (No.SKLSE20080717)
文摘A simplified integer overflow detection method based on path relaxation is described for avoiding buffer overflow triggered by integer overflow. When the integer overflow refers to the size of the buffer allocated dynamically, this kind of integer overflow is most likely to trigger buffer overflow. Based on this discovery, through lightly static program analysis, the solution traces the key variables referring to the size of a buffer allocated dynamically and it maintains the upper bound and lower bound of these variables. After the constraint information of these traced variables is inserted into the original program, this method tests the program with test cases through path relaxation, which means that it not only reports the errors revealed by the current runtime value of traced variables contained in the test case, but it also examines the errors possibly occurring under the same execution path with all the possible values of the traced variables. The effectiveness of this method is demonstrated in a case study. Compared with the traditional buffer overflow detection methods, this method reduces the burden of detection and improves efficiency.
文摘Most semi-structured data are of certain structure regularity. Having beenstored as structured data in relational database (RDB), they can be effectively managed by databasemanagement system (DBMS). Some semi-structured data are difficult to transform due to theirirregular structures. We design an efficient algorithm and data structure for ensuring losslesstransformation. We bring forward an approach of schema extraction through data mining, in whichdifferent kinds of elements are transformed respectively and lossless mapping from semi-structureddata to structured data can be achieved.