At the late stage of solidification with ultrasonic treatment (UST) in Al-Si alloys, a part of semisolid overflows and climbs along the probe. The interesting phenomenon and its influence on the solidification micro...At the late stage of solidification with ultrasonic treatment (UST) in Al-Si alloys, a part of semisolid overflows and climbs along the probe. The interesting phenomenon and its influence on the solidification microstructure were investigated in order to better study the mechanism of UST. It is considered that the overflowing phenomenon occurs due to the changes of vibration and flow in the remaining semisolid. Because the overflowed portion comes from the region with intense UST effect and vibrates with the probe during solidification, great modification of primary and euteetic Si (about 10 pm in length) and refinement of primary a(Al) (about 70 μm in size) are observed in this portion.展开更多
During long-term operation,the performance of obstacles would be changed due to the material accumulating upslope the obstacle.However,the effects of retained material on impact,overflow and landing dynamics of granul...During long-term operation,the performance of obstacles would be changed due to the material accumulating upslope the obstacle.However,the effects of retained material on impact,overflow and landing dynamics of granular flow have not yet been elucidated.To address this gap,physical flume tests and discrete element simulations are conducted considering a range of normalized deposition height h0/H from 0 to 1,where h0 and H represent the deposition height and obstacle height,respectively.An analytical model is modified to evaluate the flow velocity and flow depth after interacting with the retained materials,which further serve to calculate the peak impact force on the obstacle.Notably,the computed impact forces successfully predict the experimental results when a≥25°.In addition,the results indicate that a higher h0/H leads to a lower dynamic impact force,a greater landing distance L,and a larger landing coefficient Cr,where Cr is the ratio of slope-parallel component of landing velocity to flow velocity just before landing.Compared to the existing overflow model,the measured landing distance L is underestimated by up to 30%,and therefore it is insufficient for obstacle design when there is retained material.Moreover,the recommended Cr in current design practice is found to be nonconservative for estimating the landing velocity of geophysical flow.This study provides insightful scientific basis for designing obstacles with deposition.展开更多
Drill string will sustain large uplift force during the shut-in period after gas overflow in an ultra-deep well, and in serious case, it will run out of the wellhead. A calculation model of uplift force was establishe...Drill string will sustain large uplift force during the shut-in period after gas overflow in an ultra-deep well, and in serious case, it will run out of the wellhead. A calculation model of uplift force was established to analyze dynamic change characteristics of the uplift force of drill string during the shut-in period, and then a management procedure for the uplift risk during the shut-in period after gas overflow in the ultra-deep well was formed. Cross section method and pressure area method were used to analyze the force on drill string after shut-in of well, it was found that the source of uplift force was the "fictitious force" caused by the hydrostatic pressure in the well. When the fictitious force is in the opposite direction to the gravity, it is the uplift force. By adopting the theory of annular multiphase flow, considering the effects of wellbore afterflow and gas slippage, the dynamic change of the pressure and fluid in the wellbore and the uplift force of drill string during the shut-in period were analyzed. The magnitude and direction of uplift force are related to the length of drill string in the wellbore and shut-in time, and there is the risk of uplift of drill string when the length of drill string in the wellbore is smaller than the critical drill string length or the shut in time exceeds the critical shut in time. A set of treatment method and process to prevent the uplift of drill string is advanced during the shut-in period after overflow in the ultra-deep well, which makes the risk management of the drill string uplift in the ultra-deep well more rigorous and scientific.展开更多
For a water supply system with long-distance diversion pipelines, in addition to the water hammer problems that occur beyond pumps, the safety of the water diversion pipeline in front of pumps also deserves attention....For a water supply system with long-distance diversion pipelines, in addition to the water hammer problems that occur beyond pumps, the safety of the water diversion pipeline in front of pumps also deserves attention. In this study, a water hammer protection scheme combined with an overflow surge tank and a regulating valve was developed. A mathematical model of the overflow surge tank was developed, and an analytical formula for the height of the overflow surge tank was derived. Furthermore, a practical water supply project was used to evaluate the feasibility of the combined protection scheme and analyze the sensitivity of valve regulation rules. The results showed that the combined protection scheme effectively reduced the height of the surge tank, lessened the difficulties related to construction, and reduced the necessary financial investment for the project. The two-stage closing rule articulated as fast first and then slow could minimize the overflow volume of the surge tank when the power failure occurred, while the two-stage opening rule articulated as slow first and then fast could be more conducive to the safety of the water supply system when the pump started up.展开更多
At present,the flow table of the SDN switch is stored in the costly Ternary Content Addressable Memory(TCAM)cache.Due to the cost problem,the number of flow tables that the SDN switch can store is extremely limited,wh...At present,the flow table of the SDN switch is stored in the costly Ternary Content Addressable Memory(TCAM)cache.Due to the cost problem,the number of flow tables that the SDN switch can store is extremely limited,which is far less than the number of traffic,so it is prone to overflow problem,and leads to network paralysis.That has become a bottleneck in restricting the processing capacity of the data center,and will become a weak point focused by attackers.In this paper,we propose an algorithm for the Alarm Switch Remove(ASR)that fully loads the flow table space in SDN,and further put forward an integrated load balancing scheme in SDN.Finally,we use Mininet to verify that the scheme can ease the SDN switch flow table overflow problem and increase network throughput.展开更多
Different abnormalities are commonly encountered in computer network systems.These types of abnormalities can lead to critical data losses or unauthorized access in the systems.Buffer overflow anomaly is a prominent i...Different abnormalities are commonly encountered in computer network systems.These types of abnormalities can lead to critical data losses or unauthorized access in the systems.Buffer overflow anomaly is a prominent issue among these abnormalities,posing a serious threat to network security.The primary objective of this study is to identify the potential risks of buffer overflow that can be caused by functions frequently used in the PHP programming language and to provide solutions to minimize these risks.Static code analyzers are used to detect security vulnerabilities,among which SonarQube stands out with its extensive library,flexible customization options,and reliability in the industry.In this context,a customized rule set aimed at automatically detecting buffer overflows has been developed on the SonarQube platform.The memoization optimization technique used while creating the customized rule set enhances the speed and efficiency of the code analysis process.As a result,the code analysis process is not repeatedly run for code snippets that have been analyzed before,significantly reducing processing time and resource utilization.In this study,a memoization-based rule set was utilized to detect critical security vulnerabilities that could lead to buffer overflow in source codes written in the PHP programming language.Thus,the analysis process is not repeatedly run for code snippets that have been analyzed before,leading to a significant reduction in processing time and resource utilization.In a case study conducted to assess the effectiveness of this method,a significant decrease in the source code analysis time was observed.展开更多
A simplified integer overflow detection method based on path relaxation is described for avoiding buffer overflow triggered by integer overflow. When the integer overflow refers to the size of the buffer allocated dyn...A simplified integer overflow detection method based on path relaxation is described for avoiding buffer overflow triggered by integer overflow. When the integer overflow refers to the size of the buffer allocated dynamically, this kind of integer overflow is most likely to trigger buffer overflow. Based on this discovery, through lightly static program analysis, the solution traces the key variables referring to the size of a buffer allocated dynamically and it maintains the upper bound and lower bound of these variables. After the constraint information of these traced variables is inserted into the original program, this method tests the program with test cases through path relaxation, which means that it not only reports the errors revealed by the current runtime value of traced variables contained in the test case, but it also examines the errors possibly occurring under the same execution path with all the possible values of the traced variables. The effectiveness of this method is demonstrated in a case study. Compared with the traditional buffer overflow detection methods, this method reduces the burden of detection and improves efficiency.展开更多
Most semi-structured data are of certain structure regularity. Having beenstored as structured data in relational database (RDB), they can be effectively managed by databasemanagement system (DBMS). Some semi-structur...Most semi-structured data are of certain structure regularity. Having beenstored as structured data in relational database (RDB), they can be effectively managed by databasemanagement system (DBMS). Some semi-structured data are difficult to transform due to theirirregular structures. We design an efficient algorithm and data structure for ensuring losslesstransformation. We bring forward an approach of schema extraction through data mining, in whichdifferent kinds of elements are transformed respectively and lossless mapping from semi-structureddata to structured data can be achieved.展开更多
基金Project(50874022)supported by the National Natural Science Foundation of China
文摘At the late stage of solidification with ultrasonic treatment (UST) in Al-Si alloys, a part of semisolid overflows and climbs along the probe. The interesting phenomenon and its influence on the solidification microstructure were investigated in order to better study the mechanism of UST. It is considered that the overflowing phenomenon occurs due to the changes of vibration and flow in the remaining semisolid. Because the overflowed portion comes from the region with intense UST effect and vibrates with the probe during solidification, great modification of primary and euteetic Si (about 10 pm in length) and refinement of primary a(Al) (about 70 μm in size) are observed in this portion.
基金funded by the National Natural Science Foundation of China(Grant Nos.42120104002,41941019)the Research Grants Council of the Hong Kong Special Administrative Region,China(Grant No.AoE/E-603/18).
文摘During long-term operation,the performance of obstacles would be changed due to the material accumulating upslope the obstacle.However,the effects of retained material on impact,overflow and landing dynamics of granular flow have not yet been elucidated.To address this gap,physical flume tests and discrete element simulations are conducted considering a range of normalized deposition height h0/H from 0 to 1,where h0 and H represent the deposition height and obstacle height,respectively.An analytical model is modified to evaluate the flow velocity and flow depth after interacting with the retained materials,which further serve to calculate the peak impact force on the obstacle.Notably,the computed impact forces successfully predict the experimental results when a≥25°.In addition,the results indicate that a higher h0/H leads to a lower dynamic impact force,a greater landing distance L,and a larger landing coefficient Cr,where Cr is the ratio of slope-parallel component of landing velocity to flow velocity just before landing.Compared to the existing overflow model,the measured landing distance L is underestimated by up to 30%,and therefore it is insufficient for obstacle design when there is retained material.Moreover,the recommended Cr in current design practice is found to be nonconservative for estimating the landing velocity of geophysical flow.This study provides insightful scientific basis for designing obstacles with deposition.
基金Supported by China National Science and Technology Major Project(2016ZX05020-006)
文摘Drill string will sustain large uplift force during the shut-in period after gas overflow in an ultra-deep well, and in serious case, it will run out of the wellhead. A calculation model of uplift force was established to analyze dynamic change characteristics of the uplift force of drill string during the shut-in period, and then a management procedure for the uplift risk during the shut-in period after gas overflow in the ultra-deep well was formed. Cross section method and pressure area method were used to analyze the force on drill string after shut-in of well, it was found that the source of uplift force was the "fictitious force" caused by the hydrostatic pressure in the well. When the fictitious force is in the opposite direction to the gravity, it is the uplift force. By adopting the theory of annular multiphase flow, considering the effects of wellbore afterflow and gas slippage, the dynamic change of the pressure and fluid in the wellbore and the uplift force of drill string during the shut-in period were analyzed. The magnitude and direction of uplift force are related to the length of drill string in the wellbore and shut-in time, and there is the risk of uplift of drill string when the length of drill string in the wellbore is smaller than the critical drill string length or the shut in time exceeds the critical shut in time. A set of treatment method and process to prevent the uplift of drill string is advanced during the shut-in period after overflow in the ultra-deep well, which makes the risk management of the drill string uplift in the ultra-deep well more rigorous and scientific.
基金supported by the National Natural Science Foundation of China(Grants No.52179062 and 51879087).
文摘For a water supply system with long-distance diversion pipelines, in addition to the water hammer problems that occur beyond pumps, the safety of the water diversion pipeline in front of pumps also deserves attention. In this study, a water hammer protection scheme combined with an overflow surge tank and a regulating valve was developed. A mathematical model of the overflow surge tank was developed, and an analytical formula for the height of the overflow surge tank was derived. Furthermore, a practical water supply project was used to evaluate the feasibility of the combined protection scheme and analyze the sensitivity of valve regulation rules. The results showed that the combined protection scheme effectively reduced the height of the surge tank, lessened the difficulties related to construction, and reduced the necessary financial investment for the project. The two-stage closing rule articulated as fast first and then slow could minimize the overflow volume of the surge tank when the power failure occurred, while the two-stage opening rule articulated as slow first and then fast could be more conducive to the safety of the water supply system when the pump started up.
基金supported supported by the National Key Research and Development Program of China(No.2020YFE0200500)CERNET Innovation Project(NGII20190806)。
文摘At present,the flow table of the SDN switch is stored in the costly Ternary Content Addressable Memory(TCAM)cache.Due to the cost problem,the number of flow tables that the SDN switch can store is extremely limited,which is far less than the number of traffic,so it is prone to overflow problem,and leads to network paralysis.That has become a bottleneck in restricting the processing capacity of the data center,and will become a weak point focused by attackers.In this paper,we propose an algorithm for the Alarm Switch Remove(ASR)that fully loads the flow table space in SDN,and further put forward an integrated load balancing scheme in SDN.Finally,we use Mininet to verify that the scheme can ease the SDN switch flow table overflow problem and increase network throughput.
文摘Different abnormalities are commonly encountered in computer network systems.These types of abnormalities can lead to critical data losses or unauthorized access in the systems.Buffer overflow anomaly is a prominent issue among these abnormalities,posing a serious threat to network security.The primary objective of this study is to identify the potential risks of buffer overflow that can be caused by functions frequently used in the PHP programming language and to provide solutions to minimize these risks.Static code analyzers are used to detect security vulnerabilities,among which SonarQube stands out with its extensive library,flexible customization options,and reliability in the industry.In this context,a customized rule set aimed at automatically detecting buffer overflows has been developed on the SonarQube platform.The memoization optimization technique used while creating the customized rule set enhances the speed and efficiency of the code analysis process.As a result,the code analysis process is not repeatedly run for code snippets that have been analyzed before,significantly reducing processing time and resource utilization.In this study,a memoization-based rule set was utilized to detect critical security vulnerabilities that could lead to buffer overflow in source codes written in the PHP programming language.Thus,the analysis process is not repeatedly run for code snippets that have been analyzed before,leading to a significant reduction in processing time and resource utilization.In a case study conducted to assess the effectiveness of this method,a significant decrease in the source code analysis time was observed.
基金The National Natural Science Foundation of China (No.60873050,60703086)the Opening Foundation of State Key Laboratory of Software Engineering in Wuhan University (No.SKLSE20080717)
文摘A simplified integer overflow detection method based on path relaxation is described for avoiding buffer overflow triggered by integer overflow. When the integer overflow refers to the size of the buffer allocated dynamically, this kind of integer overflow is most likely to trigger buffer overflow. Based on this discovery, through lightly static program analysis, the solution traces the key variables referring to the size of a buffer allocated dynamically and it maintains the upper bound and lower bound of these variables. After the constraint information of these traced variables is inserted into the original program, this method tests the program with test cases through path relaxation, which means that it not only reports the errors revealed by the current runtime value of traced variables contained in the test case, but it also examines the errors possibly occurring under the same execution path with all the possible values of the traced variables. The effectiveness of this method is demonstrated in a case study. Compared with the traditional buffer overflow detection methods, this method reduces the burden of detection and improves efficiency.
文摘Most semi-structured data are of certain structure regularity. Having beenstored as structured data in relational database (RDB), they can be effectively managed by databasemanagement system (DBMS). Some semi-structured data are difficult to transform due to theirirregular structures. We design an efficient algorithm and data structure for ensuring losslesstransformation. We bring forward an approach of schema extraction through data mining, in whichdifferent kinds of elements are transformed respectively and lossless mapping from semi-structureddata to structured data can be achieved.