In this paper, taking AM-50 Road Heaer as an example, the metheds of structural dynamic modification optimization for road headers are studied using experimental modal analysis and physical parameters analysis. The ma...In this paper, taking AM-50 Road Heaer as an example, the metheds of structural dynamic modification optimization for road headers are studied using experimental modal analysis and physical parameters analysis. The machine’s modal model and lumped mass model are established and the vibration response simulation is calculated for the two models with the load spectral measured. On the above basis, the dynamic parameters of the models are optimised and some useful results have been obtained.The research methods in this paper can be used for the reference to the other lager type mining machines.展开更多
This paper investigates whether security headers are enforced to mitigate cyber-attacks in web-based systems in cyberspace. The security headers examined include X-Content-Type-Options, X-Frame-Options, Strict-Transpo...This paper investigates whether security headers are enforced to mitigate cyber-attacks in web-based systems in cyberspace. The security headers examined include X-Content-Type-Options, X-Frame-Options, Strict-Transport-Security, Referrer-Policy, Content-Security-Policy, and Permissions-Policy. The study employed a controlled experiment using a security header analysis tool. The web-based applications (websites) were analyzed to determine whether security headers have been correctly implemented. The experiment was iterated for 100 universities in Africa which are ranked high. The purposive sampling technique was employed to understand the status quo of the security headers implementations. The results revealed that 70% of the web-based applications in Africa have not enforced security headers in web-based applications. The study proposes a secure system architecture design for addressing web-based applications’ misconfiguration and insecure design. It presents security techniques for securing web-based applications through hardening security headers using automated threat modelling techniques. Furthermore, it recommends adopting the security headers in web-based applications using the proposed secure system architecture design.展开更多
At present, the main attention of researchers is paid to the deterioration of heat transfer when heating the outer surface of the pipe with the liquid or steam, flowing inside it, in the presence of films or deposits ...At present, the main attention of researchers is paid to the deterioration of heat transfer when heating the outer surface of the pipe with the liquid or steam, flowing inside it, in the presence of films or deposits on its inner surface. However, when pipe is heating by heat carrier medium, flowing inside it, film on the inner pipe surface serve a dual protective function, protecting the pipe from corrosion and reducing its thermal stress. The article represents the results of the computational analysis of protective films influence on the thermal stressed state of headers and steam pipelines of combined-cycle power plants (CCPP) heat-recovery steam generators at different transient operating conditions particularly at startups from different initial temperature states and thermal shock. It is shown that protective films have a significant influence on the stresses magnitude and damage accumulation mainly for great temperature disturbances (for thermal shock). Calculations were carried out at various thicknesses of films and assuming that their thermal conductivity less than thermal conductivity of the steam pipelines metal.展开更多
Phishing emails have experienced a rapid surge in cyber threats globally,especially following the emergence of the COVID-19 pandemic.This form of attack has led to substantial financial losses for numerous organizatio...Phishing emails have experienced a rapid surge in cyber threats globally,especially following the emergence of the COVID-19 pandemic.This form of attack has led to substantial financial losses for numerous organizations.Although variousmodels have been constructed to differentiate legitimate emails fromphishing attempts,attackers continuously employ novel strategies to manipulate their targets into falling victim to their schemes.This form of attack has led to substantial financial losses for numerous organizations.While efforts are ongoing to create phishing detection models,their current level of accuracy and speed in identifying phishing emails is less than satisfactory.Additionally,there has been a concerning rise in the frequency of phished emails recently.Consequently,there is a pressing need for more efficient and high-performing phishing detection models to mitigate the adverse impact of such fraudulent messages.In the context of this research,a comprehensive analysis is conducted on both components of an email message—namely,the email header and body.Sentence-level characteristics are extracted and leveraged in the construction of a new phishing detection model.This model utilizes K Nearest Neighbor(KNN)introducing the novel dimension of sentence-level analysis.Established datasets fromKagglewere employed to train and validate the model.The evaluation of this model’s effectiveness relies on key performance metrics including accuracy of 0.97,precision,recall,and F1-measure.展开更多
The refrigerant flow distribution in the parallel flow microchannel evaporators is experimentally investigated to study the effect of header configuration.Six different configurations are tested in the same evaporator...The refrigerant flow distribution in the parallel flow microchannel evaporators is experimentally investigated to study the effect of header configuration.Six different configurations are tested in the same evaporator by installing insertion device and partition plate in the header to ensure the consistency of the other structure parameters.The results show that the uniformity of refrigerant flow distribution and the heat transfer rate are greatly improved by reducing the sectional area of header.The heat transfer rate can increase by 67.93%by reducing the sectional area of both inlet and outlet headers.The uniformity of refrigerant flow distribution and the heat transfer rate become worse after installing the partition plate in the insertion devices and changing the inner structure of the header further.展开更多
The recent proliferation of the 3D reflection seismic method into the near-surface area of geophysical applications, especially in response to the emergence of the need to comprehensively characterize and monitor near...The recent proliferation of the 3D reflection seismic method into the near-surface area of geophysical applications, especially in response to the emergence of the need to comprehensively characterize and monitor near-surface carbon dioxide sequestration in shallow saline aquifers around the world, justifies the emphasis on cost-effective and robust quality control and assurance (QC/QA) workflow of 3D seismic data preprocessing that is suitable for near-surface applications. The main purpose of our seismic data preprocessing QC is to enable the use of appropriate header information, data that are free of noise-dominated traces, and/or flawed vertical stacking in subsequent processing steps. In this article, I provide an account of utilizing survey design specifications, noise properties, first breaks, and normal moveout for rapid and thorough graphical QC/QA diagnostics, which are easy to apply and efficient in the diagnosis of inconsistencies. A correlated vibroseis time-lapse 3D-seismic data set from a CO2-flood monitoring survey is used for demonstrating QC diagnostics. An important by-product of the QC workflow is establishing the number of layers for a refraction statics model in a data-driven graphical manner that capitalizes on the spatial coverage of the 3D seismic data.展开更多
The mechanical stress distribution and the stress concentrations of the superheater outlet header of a 600MW supercritical boiler were analyzed by the finite element method. The results showed that the stress concentr...The mechanical stress distribution and the stress concentrations of the superheater outlet header of a 600MW supercritical boiler were analyzed by the finite element method. The results showed that the stress concentrated at the inside conjunction area between the pipe and the header cylinder , and the value of the maximum mechanical stress concentration factor is 2.51.展开更多
Objective To investigate the flow distribution in plate fin heat exchangers and optimize the design of header configuration for plate fin heat exchangers. Methods A mathematical model of header was proposed. The e...Objective To investigate the flow distribution in plate fin heat exchangers and optimize the design of header configuration for plate fin heat exchangers. Methods A mathematical model of header was proposed. The effects of the header configuration on the flow distribution in plate fin heat exchangers were investigated by CFD. The second header configuration with a two stage distributing structure was brought forward to improve the performance of flow distribution. Results It is found that the flow maldistribution is very serious in the direction of header length for the conventional header used in industry. The numerical predictions indicate that the improved header configurations can effectively improve the performance of flow distribution in plate fin heat exchangers. Conclusion The numerical simulation confirms that CFD should be a suitable tool for predicting the flow distribution. The method has a wide variety of applications in the design of plate fin heat exchangers.展开更多
The difficult problem of automatically welding nipples onto the header is first analyzed in this paper, and then the overall structure and operating principle of the robot working unit are introduced. The robot and th...The difficult problem of automatically welding nipples onto the header is first analyzed in this paper, and then the overall structure and operating principle of the robot working unit are introduced. The robot and the measuring device are located by employing the traveling lorry, and this unit enables the robot to adjust the tracks according to the errors received from the measuring device, and then the nipples are welded properly. This paper emphases on the development of the master-slave control system, in which the prograrmmable Logic Controller (PLC) is used as the master computer.展开更多
A cluster-based organization with two phases to separate priority calculation and network activity operations is developed. In the election-state phase, clusters are organized by those nodes with sufficient residual e...A cluster-based organization with two phases to separate priority calculation and network activity operations is developed. In the election-state phase, clusters are organized by those nodes with sufficient residual energy level(REL) that are distributed as evenly as possible in the network. For each network round, each node decides its role(such as, cluster header(CH) or a normal node) and its priority level for activity operation. The priority level also affects the active/sleep scheduling in the node. In the steady-state phase, the positive priority levels of active nodes determine their activity order to avoid transmission collision, and to reduce redundant data transmission and sensing coverage. Since the data reporting to the sink is usually performed by a CH delivery chain, subsidiary CHs are selected to assist with data delivery and to share the loading of CHs. The formulae for computing priority levels are analyzed and verified by the examples with valid parameters. The experimental results show that the two phases efficiently consume node energy and achieve energy savings.展开更多
Mobile sensor nodes such as hopping sensors are of critical importance in data collection.However,the occurrence of sensing holes is unavoidable due to the energy limitation of the nodes.Thus,it is evident that the re...Mobile sensor nodes such as hopping sensors are of critical importance in data collection.However,the occurrence of sensing holes is unavoidable due to the energy limitation of the nodes.Thus,it is evident that the relocation of mobile sensors is the most desirable method to recover the sensing holes.The previous research conducted by the authors so far demonstrated the most realistic hopping sensor relocation scheme,which is suitable for the distributed environment.In previous studies,the cluster header plays an essential role in detecting the sensing hole and requesting the neighboring cluster to recover the sensing hole that occurred in the sensor node.However,the limitations of the cluster header in the previously proposed relocation protocol are not fully considered.Because the cluster header jumps more frequently than non-header nodes,its energy con-sumption is relatively high compared to other nodes.Therefore,it is most likely to lead to header node failure and can lead to data loss on the network.In this paper,the jumping ability and energy consumption of the cluster header are seriously considered.Additional ability to replace cluster headers in case of failure is also implemented.Simulation results show that the data collection time can be further increased,which demonstrates the validity of the proposed algorithms.展开更多
One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious...One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious files.In this study,an exclusive set of 29 features was collected from trusted implementations,this set was used as a baseline to analyze the presented work in this research.A Decision Tree(DT)and Neural Network Multi-Layer Perceptron(NN-MLPC)algorithms were utilized during this work.Both algorithms were chosen after testing a few diverse procedures.This work implements a method of subgrouping features to answer questions such as,which feature has a positive impact on accuracy when added?Is it possible to determine a reliable feature set to distinguish a malicious PE file from a benign one?when combining features,would it have any effect on malware detection accuracy in a PE file?Results obtained using the proposed method were improved and carried few observations.Generally,the obtained results had practical and numerical parts,for the practical part,the number of features and which features included are the main factors impacting the calculated accuracy,also,the combination of features is as crucial in these calculations.Numerical results included,finding accuracies with enhanced values,for example,NN_MLPC attained 0.979 and 0.98;for DT an accuracy of 0.9825 and 0.986 was attained.展开更多
In discussing coal mine entry construction with rock bolt technology, examinedthe craft and machinery problems as well as the conditions in which to use each kind ofmachine and tool.It exposed the intrinsic flaws of t...In discussing coal mine entry construction with rock bolt technology, examinedthe craft and machinery problems as well as the conditions in which to use each kind ofmachine and tool.It exposed the intrinsic flaws of the widely used road header.The problemis that it was designed according to early timbering support state but is not suitable forrock bolt technology.The way to improve the function of existing road headers is notthrough parallel operations but using the SUDM (Shield Union Driving Machine), which isa new machine that improves construction.This article proposed a few solutions in designto solve this problem.展开更多
文摘In this paper, taking AM-50 Road Heaer as an example, the metheds of structural dynamic modification optimization for road headers are studied using experimental modal analysis and physical parameters analysis. The machine’s modal model and lumped mass model are established and the vibration response simulation is calculated for the two models with the load spectral measured. On the above basis, the dynamic parameters of the models are optimised and some useful results have been obtained.The research methods in this paper can be used for the reference to the other lager type mining machines.
文摘This paper investigates whether security headers are enforced to mitigate cyber-attacks in web-based systems in cyberspace. The security headers examined include X-Content-Type-Options, X-Frame-Options, Strict-Transport-Security, Referrer-Policy, Content-Security-Policy, and Permissions-Policy. The study employed a controlled experiment using a security header analysis tool. The web-based applications (websites) were analyzed to determine whether security headers have been correctly implemented. The experiment was iterated for 100 universities in Africa which are ranked high. The purposive sampling technique was employed to understand the status quo of the security headers implementations. The results revealed that 70% of the web-based applications in Africa have not enforced security headers in web-based applications. The study proposes a secure system architecture design for addressing web-based applications’ misconfiguration and insecure design. It presents security techniques for securing web-based applications through hardening security headers using automated threat modelling techniques. Furthermore, it recommends adopting the security headers in web-based applications using the proposed secure system architecture design.
文摘At present, the main attention of researchers is paid to the deterioration of heat transfer when heating the outer surface of the pipe with the liquid or steam, flowing inside it, in the presence of films or deposits on its inner surface. However, when pipe is heating by heat carrier medium, flowing inside it, film on the inner pipe surface serve a dual protective function, protecting the pipe from corrosion and reducing its thermal stress. The article represents the results of the computational analysis of protective films influence on the thermal stressed state of headers and steam pipelines of combined-cycle power plants (CCPP) heat-recovery steam generators at different transient operating conditions particularly at startups from different initial temperature states and thermal shock. It is shown that protective films have a significant influence on the stresses magnitude and damage accumulation mainly for great temperature disturbances (for thermal shock). Calculations were carried out at various thicknesses of films and assuming that their thermal conductivity less than thermal conductivity of the steam pipelines metal.
文摘Phishing emails have experienced a rapid surge in cyber threats globally,especially following the emergence of the COVID-19 pandemic.This form of attack has led to substantial financial losses for numerous organizations.Although variousmodels have been constructed to differentiate legitimate emails fromphishing attempts,attackers continuously employ novel strategies to manipulate their targets into falling victim to their schemes.This form of attack has led to substantial financial losses for numerous organizations.While efforts are ongoing to create phishing detection models,their current level of accuracy and speed in identifying phishing emails is less than satisfactory.Additionally,there has been a concerning rise in the frequency of phished emails recently.Consequently,there is a pressing need for more efficient and high-performing phishing detection models to mitigate the adverse impact of such fraudulent messages.In the context of this research,a comprehensive analysis is conducted on both components of an email message—namely,the email header and body.Sentence-level characteristics are extracted and leveraged in the construction of a new phishing detection model.This model utilizes K Nearest Neighbor(KNN)introducing the novel dimension of sentence-level analysis.Established datasets fromKagglewere employed to train and validate the model.The evaluation of this model’s effectiveness relies on key performance metrics including accuracy of 0.97,precision,recall,and F1-measure.
基金the Key Industry Common Key-Technology Innovation Project of Chongqing Municipal Science and Committee(No.cstc2015zdcy-ztzx60001)
文摘The refrigerant flow distribution in the parallel flow microchannel evaporators is experimentally investigated to study the effect of header configuration.Six different configurations are tested in the same evaporator by installing insertion device and partition plate in the header to ensure the consistency of the other structure parameters.The results show that the uniformity of refrigerant flow distribution and the heat transfer rate are greatly improved by reducing the sectional area of header.The heat transfer rate can increase by 67.93%by reducing the sectional area of both inlet and outlet headers.The uniformity of refrigerant flow distribution and the heat transfer rate become worse after installing the partition plate in the insertion devices and changing the inner structure of the header further.
基金supported by the U.S. Department of Energy (No. DE-FC26-03NT15414)
文摘The recent proliferation of the 3D reflection seismic method into the near-surface area of geophysical applications, especially in response to the emergence of the need to comprehensively characterize and monitor near-surface carbon dioxide sequestration in shallow saline aquifers around the world, justifies the emphasis on cost-effective and robust quality control and assurance (QC/QA) workflow of 3D seismic data preprocessing that is suitable for near-surface applications. The main purpose of our seismic data preprocessing QC is to enable the use of appropriate header information, data that are free of noise-dominated traces, and/or flawed vertical stacking in subsequent processing steps. In this article, I provide an account of utilizing survey design specifications, noise properties, first breaks, and normal moveout for rapid and thorough graphical QC/QA diagnostics, which are easy to apply and efficient in the diagnosis of inconsistencies. A correlated vibroseis time-lapse 3D-seismic data set from a CO2-flood monitoring survey is used for demonstrating QC diagnostics. An important by-product of the QC workflow is establishing the number of layers for a refraction statics model in a data-driven graphical manner that capitalizes on the spatial coverage of the 3D seismic data.
文摘The mechanical stress distribution and the stress concentrations of the superheater outlet header of a 600MW supercritical boiler were analyzed by the finite element method. The results showed that the stress concentrated at the inside conjunction area between the pipe and the header cylinder , and the value of the maximum mechanical stress concentration factor is 2.51.
文摘Objective To investigate the flow distribution in plate fin heat exchangers and optimize the design of header configuration for plate fin heat exchangers. Methods A mathematical model of header was proposed. The effects of the header configuration on the flow distribution in plate fin heat exchangers were investigated by CFD. The second header configuration with a two stage distributing structure was brought forward to improve the performance of flow distribution. Results It is found that the flow maldistribution is very serious in the direction of header length for the conventional header used in industry. The numerical predictions indicate that the improved header configurations can effectively improve the performance of flow distribution in plate fin heat exchangers. Conclusion The numerical simulation confirms that CFD should be a suitable tool for predicting the flow distribution. The method has a wide variety of applications in the design of plate fin heat exchangers.
文摘The difficult problem of automatically welding nipples onto the header is first analyzed in this paper, and then the overall structure and operating principle of the robot working unit are introduced. The robot and the measuring device are located by employing the traveling lorry, and this unit enables the robot to adjust the tracks according to the errors received from the measuring device, and then the nipples are welded properly. This paper emphases on the development of the master-slave control system, in which the prograrmmable Logic Controller (PLC) is used as the master computer.
基金the National Natural Science Foundation of China(No.71201172)
文摘A cluster-based organization with two phases to separate priority calculation and network activity operations is developed. In the election-state phase, clusters are organized by those nodes with sufficient residual energy level(REL) that are distributed as evenly as possible in the network. For each network round, each node decides its role(such as, cluster header(CH) or a normal node) and its priority level for activity operation. The priority level also affects the active/sleep scheduling in the node. In the steady-state phase, the positive priority levels of active nodes determine their activity order to avoid transmission collision, and to reduce redundant data transmission and sensing coverage. Since the data reporting to the sink is usually performed by a CH delivery chain, subsidiary CHs are selected to assist with data delivery and to share the loading of CHs. The formulae for computing priority levels are analyzed and verified by the examples with valid parameters. The experimental results show that the two phases efficiently consume node energy and achieve energy savings.
基金supported by Incheon National University Research Grant in 2020(2020–0437)。
文摘Mobile sensor nodes such as hopping sensors are of critical importance in data collection.However,the occurrence of sensing holes is unavoidable due to the energy limitation of the nodes.Thus,it is evident that the relocation of mobile sensors is the most desirable method to recover the sensing holes.The previous research conducted by the authors so far demonstrated the most realistic hopping sensor relocation scheme,which is suitable for the distributed environment.In previous studies,the cluster header plays an essential role in detecting the sensing hole and requesting the neighboring cluster to recover the sensing hole that occurred in the sensor node.However,the limitations of the cluster header in the previously proposed relocation protocol are not fully considered.Because the cluster header jumps more frequently than non-header nodes,its energy con-sumption is relatively high compared to other nodes.Therefore,it is most likely to lead to header node failure and can lead to data loss on the network.In this paper,the jumping ability and energy consumption of the cluster header are seriously considered.Additional ability to replace cluster headers in case of failure is also implemented.Simulation results show that the data collection time can be further increased,which demonstrates the validity of the proposed algorithms.
文摘One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious files.In this study,an exclusive set of 29 features was collected from trusted implementations,this set was used as a baseline to analyze the presented work in this research.A Decision Tree(DT)and Neural Network Multi-Layer Perceptron(NN-MLPC)algorithms were utilized during this work.Both algorithms were chosen after testing a few diverse procedures.This work implements a method of subgrouping features to answer questions such as,which feature has a positive impact on accuracy when added?Is it possible to determine a reliable feature set to distinguish a malicious PE file from a benign one?when combining features,would it have any effect on malware detection accuracy in a PE file?Results obtained using the proposed method were improved and carried few observations.Generally,the obtained results had practical and numerical parts,for the practical part,the number of features and which features included are the main factors impacting the calculated accuracy,also,the combination of features is as crucial in these calculations.Numerical results included,finding accuracies with enhanced values,for example,NN_MLPC attained 0.979 and 0.98;for DT an accuracy of 0.9825 and 0.986 was attained.
文摘In discussing coal mine entry construction with rock bolt technology, examinedthe craft and machinery problems as well as the conditions in which to use each kind ofmachine and tool.It exposed the intrinsic flaws of the widely used road header.The problemis that it was designed according to early timbering support state but is not suitable forrock bolt technology.The way to improve the function of existing road headers is notthrough parallel operations but using the SUDM (Shield Union Driving Machine), which isa new machine that improves construction.This article proposed a few solutions in designto solve this problem.