Building attack scenario is one of the most important aspects in network security.This paper pro-posed a system which collects intrusion alerts,clusters them as sub-attacks using alerts abstraction,ag-gregates the sim...Building attack scenario is one of the most important aspects in network security.This paper pro-posed a system which collects intrusion alerts,clusters them as sub-attacks using alerts abstraction,ag-gregates the similar sub-attacks,and then correlates and generates correlation graphs.The scenarios wererepresented by alert classes instead of alerts themselves so as to reduce the required rules and have the a-bility of detecting new variations of attacks.The proposed system is capable of passing some of the missedattacks.To evaluate system effectiveness,it was tested with different datasets which contain multi-stepattacks.Compressed and easily understandable Correlation graphs which reflect attack scenarios were gen-erated.The proposed system can correlate related alerts,uncover the attack strategies,and detect newvariations of attacks.展开更多
The application of machine learning for pyrite discrimination establishes a robust foundation for constructing the ore-forming history of multi-stage deposits;however,published models face challenges related to limite...The application of machine learning for pyrite discrimination establishes a robust foundation for constructing the ore-forming history of multi-stage deposits;however,published models face challenges related to limited,imbalanced datasets and oversampling.In this study,the dataset was expanded to approximately 500 samples for each type,including 508 sedimentary,573 orogenic gold,548 sedimentary exhalative(SEDEX)deposits,and 364 volcanogenic massive sulfides(VMS)pyrites,utilizing random forest(RF)and support vector machine(SVM)methodologies to enhance the reliability of the classifier models.The RF classifier achieved an overall accuracy of 99.8%,and the SVM classifier attained an overall accuracy of 100%.The model was evaluated by a five-fold cross-validation approach with 93.8%accuracy for the RF and 94.9%for the SVM classifier.These results demonstrate the strong feasibility of pyrite classification,supported by a relatively large,balanced dataset and high accuracy rates.The classifier was employed to reveal the genesis of the controversial Keketale Pb-Zn deposit in NW China,which has been inconclusive among SEDEX,VMS,or a SEDEX-VMS transition.Petrographic investigations indicated that the deposit comprises early fine-grained layered pyrite(Py1)and late recrystallized pyrite(Py2).The majority voting classified Py1 as the VMS type,with an accuracy of RF and SVM being 72.2%and 75%,respectively,and confirmed Py2 as an orogenic type with 74.3% and 77.1%accuracy,respectively.The new findings indicated that the Keketale deposit originated from a submarine VMS mineralization system,followed by late orogenic-type overprinting of metamorphism and deformation,which is consistent with the geological and geochemical observations.This study further emphasizes the advantages of Machine learning(ML)methods in accurately and directly discriminating the deposit types and reconstructing the formation history of multi-stage deposits.展开更多
The high proportion of uncertain distributed power sources and the access to large-scale random electric vehicle(EV)charging resources further aggravate the voltage fluctuation of the distribution network,and the exis...The high proportion of uncertain distributed power sources and the access to large-scale random electric vehicle(EV)charging resources further aggravate the voltage fluctuation of the distribution network,and the existing research has not deeply explored the EV active-reactive synergistic regulating characteristics,and failed to realize themulti-timescale synergistic control with other regulatingmeans,For this reason,this paper proposes amultilevel linkage coordinated optimization strategy to reduce the voltage deviation of the distribution network.Firstly,a capacitor bank reactive power compensation voltage control model and a distributed photovoltaic(PV)activereactive power regulationmodel are established.Additionally,an external characteristicmodel of EVactive-reactive power regulation is developed considering the four-quadrant operational characteristics of the EVcharger.Amultiobjective optimization model of the distribution network is then constructed considering the time-series coupling constraints of multiple types of voltage regulators.A multi-timescale control strategy is proposed by considering the impact of voltage regulators on active-reactive EV energy consumption and PV energy consumption.Then,a four-stage voltage control optimization strategy is proposed for various types of voltage regulators with multiple time scales.Themulti-objective optimization is solved with the improvedDrosophila algorithmto realize the power fluctuation control of the distribution network and themulti-stage voltage control optimization.Simulation results validate that the proposed voltage control optimization strategy achieves the coordinated control of decentralized voltage control resources in the distribution network.It effectively reduces the voltage deviation of the distribution network while ensuring the energy demand of EV users and enhancing the stability and economic efficiency of the distribution network.展开更多
Although previous researchers have attempted to decipher ore genesis and mineralization in the Erdaokan Ag-Pb-Zn deposit,some uncertainties regarding the mineralization process and evolution of both ore-forming fluids...Although previous researchers have attempted to decipher ore genesis and mineralization in the Erdaokan Ag-Pb-Zn deposit,some uncertainties regarding the mineralization process and evolution of both ore-forming fluids and magnetite types still need to be addressed.In this study,we obtained new EPMA,LA-ICP-MS,and in situ Fe isotope data from magnetite from the Erdaokan deposit,in order to better understand the mineralization mechanism and evolution of both magnetite and the ore-forming fluids.Our results identified seven types of magnetite at Erdaokan:disseminated magnetite(Mag1),coarse-grained magnetite(Mag2a),radial magnetite(Mag2b),fragmented fine-grained magnetite(Mag2c),vermicular gel magnetite(Mag3a1 and Mag3a2),colloidal magnetite(Mag3b)and dark gray magnetite(Mag4).All of the magnetite types were hydrothermal in origin and generally low in Ti(<400 ppm)and Ni(<800 ppm),while being enriched in light Fe isotopes(δ^(56)Fe ranging from−1.54‰to−0.06‰).However,they exhibit different geochemical signatures and are thus classified into high-manganese magnetite(Mag1,MnO>5 wt%),low-silicon magnetite(Mag2a-c,SiO_(2)<1 wt%),high-silicon magnetite(Mag3a-b,SiO_(2)from 1 to 7 wt%)and high-silicon-manganese magnetite(Mag4,SiO_(2)>1 wt%,MnO>0.2 wt%),each being formed within distinct hydrothermal environments.Based on mineralogy,elemental geochemistry,Fe isotopes,temperature trends,TMg-mag and(Ti+V)vs.(Al+Mn)diagrams,we propose that the Erdaokan Ag-Pb-Zn deposit underwent multi-stage mineralization,which can be broken down into four stages and nine sub-stages.Mag1,Mag2a-c,Mag3a-b and Mag4 were formed during the first sub-stage of each of the four stages,respectively.Additionally,fluid mixing,cooling and depressurization boiling were identified as the main mechanisms for mineral precipitation.The enrichment of Ag was significantly enhanced by the superposition of multi-stage ore-forming hydrothermal fluids in the Erdaokan Ag-Pb-Zn deposit.展开更多
Seismic data denoising is a critical process usually applied at various stages of the seismic processing workflow,as our ability to mitigate noise in seismic data affects the quality of our subsequent analyses.However...Seismic data denoising is a critical process usually applied at various stages of the seismic processing workflow,as our ability to mitigate noise in seismic data affects the quality of our subsequent analyses.However,finding an optimal balance between preserving seismic signals and effectively reducing seismic noise presents a substantial challenge.In this study,we introduce a multi-stage deep learning model,trained in a self-supervised manner,designed specifically to suppress seismic noise while minimizing signal leakage.This model operates as a patch-based approach,extracting overlapping patches from the noisy data and converting them into 1D vectors for input.It consists of two identical sub-networks,each configured differently.Inspired by the transformer architecture,each sub-network features an embedded block that comprises two fully connected layers,which are utilized for feature extraction from the input patches.After reshaping,a multi-head attention module enhances the model’s focus on significant features by assigning higher attention weights to them.The key difference between the two sub-networks lies in the number of neurons within their fully connected layers.The first sub-network serves as a strong denoiser with a small number of neurons,effectively attenuating seismic noise;in contrast,the second sub-network functions as a signal-add-back model,using a larger number of neurons to retrieve some of the signal that was not preserved in the output of the first sub-network.The proposed model produces two outputs,each corresponding to one of the sub-networks,and both sub-networks are optimized simultaneously using the noisy data as the label for both outputs.Evaluations conducted on both synthetic and field data demonstrate the model’s effectiveness in suppressing seismic noise with minimal signal leakage,outperforming some benchmark methods.展开更多
This paper presents a new criterion for determining the unloading points quantitatively and consistently in a multi-stage triaxial test.The radial strain gradient(RSG)is first introduced as an arc tangent function of ...This paper presents a new criterion for determining the unloading points quantitatively and consistently in a multi-stage triaxial test.The radial strain gradient(RSG)is first introduced as an arc tangent function of the rate of change of radial strain to time.RSG is observed to correlate closely with the stress state of a compressed sample,and reaches a horizontal asymptote as approaching failure.For a given rock type,RSG value at peak stress is almost the same,irrespective of the porosity and permeability.These findings lead to the development of RSG criterion:Unloading points can be precisely determined at the time when RSG reaches a pre-determined value that is a little smaller than or equal to the RSG at peak stress.The RSG criterion is validated against other criteria and the single-stage triaxial test on various types of rocks.Failure envelopes from the RSG criterion match well with those from single-stage tests.A practical procedure is recommended to use the RSG criterion:an unconfined compression or single-stage test is first conducted to determine the RSG at peak stress for one sample,the unloading point is then selected to be a value close to the RSG at peak stress,and the multi-stage test is finally performed on another sample using the pre-selected RSG unloading criterion.Generally,the RSG criterion is applicable for any type of rocks,especially brittle rocks,where other criteria are not suitable.Further,it can be practically implemented on the most available rock mechanical testing instruments.展开更多
A new hang-off system has been proposed to improve the security of risers in hang-off modes during typhoons.However,efficient anti-typhoon evacuation strategies have not been investigated.Optimiza-tion model and metho...A new hang-off system has been proposed to improve the security of risers in hang-off modes during typhoons.However,efficient anti-typhoon evacuation strategies have not been investigated.Optimiza-tion model and method for the anti-typhoon evacuation strategies should be researched.Therefore,multi-objective functions are proposed based on operation time,evacuation speed stability,and steering stability.An evacuation path model and a dynamic model of risers with the new hang-off system are developed for design variables and constraints.A multi-objective optimization model with high-dimensional variables and complex constraints is established.Finally,a three-stage optimization method based on genetic algorithm,least square method,and the penalty function method is proposed to solve the multi-objective optimization model.Optimization results show that the operation time can be reduced through operation parameter optimization,especially evacuation heading optimization.The optimal anti-typhoon strategy is evacuation with all risers suspended along a variable path when the direction angle is large,while evacuation with all risers suspended along a straight path at another di-rection angle.Besides,the influencing factors on anti-typhoon evacuation strategies indicate that the proposed optimization model and method have strong applicability to working conditions and remarkable optimization effects.展开更多
Nano zero-valent iron(nZVI)is a promising phosphate adsorbent for advanced phosphate removal.However,the rapid passivation of nZVI and the low activity of adsorption sites seriously limit its phosphate removal perform...Nano zero-valent iron(nZVI)is a promising phosphate adsorbent for advanced phosphate removal.However,the rapid passivation of nZVI and the low activity of adsorption sites seriously limit its phosphate removal performance,accounting for its inapplicability to meet the emission criteria of 0.1 mg P/L phosphate.In this study,we report that the oxalate modification can inhibit the passivation of nZVI and alter the multi-stage phosphate adsorption mechanism by changing the adsorption sites.As expected,the stronger antipassivation ability of oxalate modified nZVI(OX-nZVI)strongly favored its phosphate adsorption.Interestingly,the oxalate modification endowed the surface Fe(III)sites with the lowest chemisorption energy and the fastest phosphate adsorption ability than the other adsorption sites,by in situ forming a Fe(III)-phosphate-oxalate ternary complex,therefore enabling an advanced phosphate removal process.At an initial phosphate concentration of 1.00 mg P/L,pH of 6.0 and a dosage of 0.3 g/L of adsorbents,OX-nZVI exhibited faster phosphate removal rate(0.11 g/mg/min)and lower residual phosphate level(0.02 mg P/L)than nZVI(0.055 g/mg/min and 0.19 mg P/L).This study sheds light on the importance of site manipulation in the development of high-performance adsorbents,and offers a facile surface modification strategy to prepare superior iron-basedmaterials for advanced phosphate removal.展开更多
The surge in smishing attacks underscores the urgent need for robust,real-time detection systems powered by advanced deep learning models.This paper introduces PhishNet,a novel ensemble learning framework that integra...The surge in smishing attacks underscores the urgent need for robust,real-time detection systems powered by advanced deep learning models.This paper introduces PhishNet,a novel ensemble learning framework that integrates transformer-based models(RoBERTa)and large language models(LLMs)(GPT-OSS 120B,LLaMA3.370B,and Qwen332B)to enhance smishing detection performance significantly.To mitigate class imbalance,we apply synthetic data augmentation using T5 and leverage various text preprocessing techniques.Our system employs a duallayer voting mechanism:weighted majority voting among LLMs and a final ensemble vote to classify messages as ham,spam,or smishing.Experimental results show an average accuracy improvement from 96%to 98.5%compared to the best standalone transformer,and from 93%to 98.5%when compared to LLMs across datasets.Furthermore,we present a real-time,user-friendly application to operationalize our detection model for practical use.PhishNet demonstrates superior scalability,usability,and detection accuracy,filling critical gaps in current smishing detection methodologies.展开更多
Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulner...Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks.展开更多
Graph Neural Networks(GNNs)have proven highly effective for graph classification across diverse fields such as social networks,bioinformatics,and finance,due to their capability to learn complex graph structures.Howev...Graph Neural Networks(GNNs)have proven highly effective for graph classification across diverse fields such as social networks,bioinformatics,and finance,due to their capability to learn complex graph structures.However,despite their success,GNNs remain vulnerable to adversarial attacks that can significantly degrade their classification accuracy.Existing adversarial attack strategies primarily rely on label information to guide the attacks,which limits their applicability in scenarios where such information is scarce or unavailable.This paper introduces an innovative unsupervised attack method for graph classification,which operates without relying on label information,thereby enhancing its applicability in a broad range of scenarios.Specifically,our method first leverages a graph contrastive learning loss to learn high-quality graph embeddings by comparing different stochastic augmented views of the graphs.To effectively perturb the graphs,we then introduce an implicit estimator that measures the impact of various modifications on graph structures.The proposed strategy identifies and flips edges with the top-K highest scores,determined by the estimator,to maximize the degradation of the model’s performance.In addition,to defend against such attack,we propose a lightweight regularization-based defense mechanism that is specifically tailored to mitigate the structural perturbations introduced by our attack strategy.It enhances model robustness by enforcing embedding consistency and edge-level smoothness during training.We conduct experiments on six public TU graph classification datasets:NCI1,NCI109,Mutagenicity,ENZYMES,COLLAB,and DBLP_v1,to evaluate the effectiveness of our attack and defense strategies.Under an attack budget of 3,the maximum reduction in model accuracy reaches 6.67%on the Graph Convolutional Network(GCN)and 11.67%on the Graph Attention Network(GAT)across different datasets,indicating that our unsupervised method induces degradation comparable to state-of-the-art supervised attacks.Meanwhile,our defense achieves the highest accuracy recovery of 3.89%(GCN)and 5.00%(GAT),demonstrating improved robustness against structural perturbations.展开更多
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug...Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC.展开更多
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp...With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy.展开更多
The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)an...The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security.展开更多
Triangular Au-Ag framework nanostructures (TFN) were synthesized via a multi-step galvanic replacement reaction (MGRR) of single-crystalline triangular silver nanoplates in a chlorauric acid (HAuCl4) solution at...Triangular Au-Ag framework nanostructures (TFN) were synthesized via a multi-step galvanic replacement reaction (MGRR) of single-crystalline triangular silver nanoplates in a chlorauric acid (HAuCl4) solution at room temperature. The morphological, compositional, and crystal structural changes involved with reaction steps were analyzed by using transmission electron microscopy(TEM), energy-dispersive X-ray spectrometry (EDX), and X-ray diffraction. TEM combined with EDX and selected area electron diffraction confirmed the replacement of Ag with Au. The in-plane dipolar surface plasmon resonance (SPR) absorption band of the Ag nanoplates locating initially at around 700 nm gradually redshifted to 1 100 nm via a multi-stage replacement manner after 7 stages. The adding amount of HAuCl4 per stage influenced the average redshift value per stage, thus enabled a fine tuning of the in-plane dipolar band. A proposed formation mechanism of the original Ag nanoplates developing pores while growing Au nanoparticles covering this underlying structure at more reaction steps was confirmed by exploiting surface-enhanced Raman scattering (SERS).展开更多
Sichuan Basin is one of the uppermost petroliferous basins in China. It experienced three evolutionary phases which were marine carbonate platform (Ediacaran to Late Triassic), Indosinian-Yanshanian orogeny foreland...Sichuan Basin is one of the uppermost petroliferous basins in China. It experienced three evolutionary phases which were marine carbonate platform (Ediacaran to Late Triassic), Indosinian-Yanshanian orogeny foreland basin (Late Triassic to Late Cretaceous) and uplift and tectonic modification (Late Cretaceous to Quaternary). The present-day tectonics of the Sichuan Ba- sin and its periphery are characterized by three basic elements which are topography, basement type and surface structure, and two settings (plate margin and interior). Therefore, be subdivided into five units which have different structure and tectonic history. The basin contains five different sets of source rocks with thickness up to 2 500 m. These source rocks were well preserved due to the presence of Middel-Lower Triassic evaporites (〉-200 m) and thick terrestrial sediments filling in the Indosinian-Yanshanian foreland basin (〉3 000 m). The uplift and erosion since Late Cretaceous has significant influence on cross-strata migration and accumulation of oil and gas. The multi-phase evolution of the basin and its superimposed tectonic elements, good petroleum geologic conditions and diverse petroleum systems reveal its bright exploration prospects.展开更多
Springback of a SUS321 complex geometry part formed by the multi-stage rigid-flexible compound process was studied through numerical simulations and laboratory experiments in this work.The sensitivity analysis was pro...Springback of a SUS321 complex geometry part formed by the multi-stage rigid-flexible compound process was studied through numerical simulations and laboratory experiments in this work.The sensitivity analysis was provided to have an insight in the effect of the evaluated process parameters.Furthermore,in order to minimize the springback problem,an accurate springback simulation model of the part was established and validated.The effects of the element size and timesteps on springback model were further investigated.Results indicate that the custom mesh size is beneficial for the springback simulation,and the four timesteps are found suited for the springback analysis for the complex geometry part.Finally,a strategy for reducing the springback by changing the geometry of the blank is proposed.The optimal blank geometry is obtained and used for manufacturing the part.展开更多
A multi-stage influence diagram is used to model the pilot's sequential decision making in one on one air combat. The model based on the multi-stage influence diagram graphically describes the elements of decision pr...A multi-stage influence diagram is used to model the pilot's sequential decision making in one on one air combat. The model based on the multi-stage influence diagram graphically describes the elements of decision process, and contains a point-mass model for the dynamics of an aircraft and takes into account the decision maker's preferences under uncertain conditions. Considering an active opponent, the opponent's maneuvers can be modeled stochastically. The solution of multistage influence diagram can be obtained by converting the multistage influence diagram into a two-level optimization problem. The simulation results show the model is effective.展开更多
The mechanical behavior and microstructures of an Al-Zn-Mg-Cu-Cr aluminum alloy during multi-stage hot deformation were investigated by thermal stimulation test, optical microscopy, and transmission electron microscop...The mechanical behavior and microstructures of an Al-Zn-Mg-Cu-Cr aluminum alloy during multi-stage hot deformation were investigated by thermal stimulation test, optical microscopy, and transmission electron microscopy. The true stress vs true strain curves and the microstructure evolution of two hot deformation procedures were gained. The flow stress of the alloy studied decreases with increasing the deforming passes and declining the temperature, and the larger the temperature decline between adjacent stages, the larger the peak stress fall is. The stress-strain behavior mainly result from the dynamic recovery during deformation, the static recovery and recrystallization in the delay time, and the second phases precipitated from the matrix at high temperature.展开更多
基金the National High Technology Research and Development Programme of China(2006AA01Z452)
文摘Building attack scenario is one of the most important aspects in network security.This paper pro-posed a system which collects intrusion alerts,clusters them as sub-attacks using alerts abstraction,ag-gregates the similar sub-attacks,and then correlates and generates correlation graphs.The scenarios wererepresented by alert classes instead of alerts themselves so as to reduce the required rules and have the a-bility of detecting new variations of attacks.The proposed system is capable of passing some of the missedattacks.To evaluate system effectiveness,it was tested with different datasets which contain multi-stepattacks.Compressed and easily understandable Correlation graphs which reflect attack scenarios were gen-erated.The proposed system can correlate related alerts,uncover the attack strategies,and detect newvariations of attacks.
基金the National Key Research and Development Program of China(2021YFC2900300)the Natural Science Foundation of Guangdong Province(2024A1515030216)+2 种基金MOST Special Fund from State Key Laboratory of Geological Processes and Mineral Resources,China University of Geosciences(GPMR202437)the Guangdong Province Introduced of Innovative R&D Team(2021ZT09H399)the Third Xinjiang Scientific Expedition Program(2022xjkk1301).
文摘The application of machine learning for pyrite discrimination establishes a robust foundation for constructing the ore-forming history of multi-stage deposits;however,published models face challenges related to limited,imbalanced datasets and oversampling.In this study,the dataset was expanded to approximately 500 samples for each type,including 508 sedimentary,573 orogenic gold,548 sedimentary exhalative(SEDEX)deposits,and 364 volcanogenic massive sulfides(VMS)pyrites,utilizing random forest(RF)and support vector machine(SVM)methodologies to enhance the reliability of the classifier models.The RF classifier achieved an overall accuracy of 99.8%,and the SVM classifier attained an overall accuracy of 100%.The model was evaluated by a five-fold cross-validation approach with 93.8%accuracy for the RF and 94.9%for the SVM classifier.These results demonstrate the strong feasibility of pyrite classification,supported by a relatively large,balanced dataset and high accuracy rates.The classifier was employed to reveal the genesis of the controversial Keketale Pb-Zn deposit in NW China,which has been inconclusive among SEDEX,VMS,or a SEDEX-VMS transition.Petrographic investigations indicated that the deposit comprises early fine-grained layered pyrite(Py1)and late recrystallized pyrite(Py2).The majority voting classified Py1 as the VMS type,with an accuracy of RF and SVM being 72.2%and 75%,respectively,and confirmed Py2 as an orogenic type with 74.3% and 77.1%accuracy,respectively.The new findings indicated that the Keketale deposit originated from a submarine VMS mineralization system,followed by late orogenic-type overprinting of metamorphism and deformation,which is consistent with the geological and geochemical observations.This study further emphasizes the advantages of Machine learning(ML)methods in accurately and directly discriminating the deposit types and reconstructing the formation history of multi-stage deposits.
基金funded by the State Grid Corporation Science and Technology Project(5108-202218280A-2-391-XG).
文摘The high proportion of uncertain distributed power sources and the access to large-scale random electric vehicle(EV)charging resources further aggravate the voltage fluctuation of the distribution network,and the existing research has not deeply explored the EV active-reactive synergistic regulating characteristics,and failed to realize themulti-timescale synergistic control with other regulatingmeans,For this reason,this paper proposes amultilevel linkage coordinated optimization strategy to reduce the voltage deviation of the distribution network.Firstly,a capacitor bank reactive power compensation voltage control model and a distributed photovoltaic(PV)activereactive power regulationmodel are established.Additionally,an external characteristicmodel of EVactive-reactive power regulation is developed considering the four-quadrant operational characteristics of the EVcharger.Amultiobjective optimization model of the distribution network is then constructed considering the time-series coupling constraints of multiple types of voltage regulators.A multi-timescale control strategy is proposed by considering the impact of voltage regulators on active-reactive EV energy consumption and PV energy consumption.Then,a four-stage voltage control optimization strategy is proposed for various types of voltage regulators with multiple time scales.Themulti-objective optimization is solved with the improvedDrosophila algorithmto realize the power fluctuation control of the distribution network and themulti-stage voltage control optimization.Simulation results validate that the proposed voltage control optimization strategy achieves the coordinated control of decentralized voltage control resources in the distribution network.It effectively reduces the voltage deviation of the distribution network while ensuring the energy demand of EV users and enhancing the stability and economic efficiency of the distribution network.
基金financially supported by the Heilongjiang Provincial Key R&D Program Project(No.GA21A204)Heilongjiang Provincial Natural Science Foundation of China(No.LH2022D031)the Research Project of Heilongjiang Province Bureau of Geology and Mineral Resources(No.HKY202302).
文摘Although previous researchers have attempted to decipher ore genesis and mineralization in the Erdaokan Ag-Pb-Zn deposit,some uncertainties regarding the mineralization process and evolution of both ore-forming fluids and magnetite types still need to be addressed.In this study,we obtained new EPMA,LA-ICP-MS,and in situ Fe isotope data from magnetite from the Erdaokan deposit,in order to better understand the mineralization mechanism and evolution of both magnetite and the ore-forming fluids.Our results identified seven types of magnetite at Erdaokan:disseminated magnetite(Mag1),coarse-grained magnetite(Mag2a),radial magnetite(Mag2b),fragmented fine-grained magnetite(Mag2c),vermicular gel magnetite(Mag3a1 and Mag3a2),colloidal magnetite(Mag3b)and dark gray magnetite(Mag4).All of the magnetite types were hydrothermal in origin and generally low in Ti(<400 ppm)and Ni(<800 ppm),while being enriched in light Fe isotopes(δ^(56)Fe ranging from−1.54‰to−0.06‰).However,they exhibit different geochemical signatures and are thus classified into high-manganese magnetite(Mag1,MnO>5 wt%),low-silicon magnetite(Mag2a-c,SiO_(2)<1 wt%),high-silicon magnetite(Mag3a-b,SiO_(2)from 1 to 7 wt%)and high-silicon-manganese magnetite(Mag4,SiO_(2)>1 wt%,MnO>0.2 wt%),each being formed within distinct hydrothermal environments.Based on mineralogy,elemental geochemistry,Fe isotopes,temperature trends,TMg-mag and(Ti+V)vs.(Al+Mn)diagrams,we propose that the Erdaokan Ag-Pb-Zn deposit underwent multi-stage mineralization,which can be broken down into four stages and nine sub-stages.Mag1,Mag2a-c,Mag3a-b and Mag4 were formed during the first sub-stage of each of the four stages,respectively.Additionally,fluid mixing,cooling and depressurization boiling were identified as the main mechanisms for mineral precipitation.The enrichment of Ag was significantly enhanced by the superposition of multi-stage ore-forming hydrothermal fluids in the Erdaokan Ag-Pb-Zn deposit.
基金supported by the King Abdullah University of Science and Technology(KAUST)。
文摘Seismic data denoising is a critical process usually applied at various stages of the seismic processing workflow,as our ability to mitigate noise in seismic data affects the quality of our subsequent analyses.However,finding an optimal balance between preserving seismic signals and effectively reducing seismic noise presents a substantial challenge.In this study,we introduce a multi-stage deep learning model,trained in a self-supervised manner,designed specifically to suppress seismic noise while minimizing signal leakage.This model operates as a patch-based approach,extracting overlapping patches from the noisy data and converting them into 1D vectors for input.It consists of two identical sub-networks,each configured differently.Inspired by the transformer architecture,each sub-network features an embedded block that comprises two fully connected layers,which are utilized for feature extraction from the input patches.After reshaping,a multi-head attention module enhances the model’s focus on significant features by assigning higher attention weights to them.The key difference between the two sub-networks lies in the number of neurons within their fully connected layers.The first sub-network serves as a strong denoiser with a small number of neurons,effectively attenuating seismic noise;in contrast,the second sub-network functions as a signal-add-back model,using a larger number of neurons to retrieve some of the signal that was not preserved in the output of the first sub-network.The proposed model produces two outputs,each corresponding to one of the sub-networks,and both sub-networks are optimized simultaneously using the noisy data as the label for both outputs.Evaluations conducted on both synthetic and field data demonstrate the model’s effectiveness in suppressing seismic noise with minimal signal leakage,outperforming some benchmark methods.
文摘This paper presents a new criterion for determining the unloading points quantitatively and consistently in a multi-stage triaxial test.The radial strain gradient(RSG)is first introduced as an arc tangent function of the rate of change of radial strain to time.RSG is observed to correlate closely with the stress state of a compressed sample,and reaches a horizontal asymptote as approaching failure.For a given rock type,RSG value at peak stress is almost the same,irrespective of the porosity and permeability.These findings lead to the development of RSG criterion:Unloading points can be precisely determined at the time when RSG reaches a pre-determined value that is a little smaller than or equal to the RSG at peak stress.The RSG criterion is validated against other criteria and the single-stage triaxial test on various types of rocks.Failure envelopes from the RSG criterion match well with those from single-stage tests.A practical procedure is recommended to use the RSG criterion:an unconfined compression or single-stage test is first conducted to determine the RSG at peak stress for one sample,the unloading point is then selected to be a value close to the RSG at peak stress,and the multi-stage test is finally performed on another sample using the pre-selected RSG unloading criterion.Generally,the RSG criterion is applicable for any type of rocks,especially brittle rocks,where other criteria are not suitable.Further,it can be practically implemented on the most available rock mechanical testing instruments.
基金supported by the National Natural Science Foundation of China(Grant No:52271300,52071337)National Key Research and Development Program of China(2022YFC2806501)+1 种基金High-tech Ship Research Projects Sponsored by MIIT(CBG2N21-4-25)Program for Changjiang Scholars and Innovative Research Team in University(Grant No.IRT14R58).
文摘A new hang-off system has been proposed to improve the security of risers in hang-off modes during typhoons.However,efficient anti-typhoon evacuation strategies have not been investigated.Optimiza-tion model and method for the anti-typhoon evacuation strategies should be researched.Therefore,multi-objective functions are proposed based on operation time,evacuation speed stability,and steering stability.An evacuation path model and a dynamic model of risers with the new hang-off system are developed for design variables and constraints.A multi-objective optimization model with high-dimensional variables and complex constraints is established.Finally,a three-stage optimization method based on genetic algorithm,least square method,and the penalty function method is proposed to solve the multi-objective optimization model.Optimization results show that the operation time can be reduced through operation parameter optimization,especially evacuation heading optimization.The optimal anti-typhoon strategy is evacuation with all risers suspended along a variable path when the direction angle is large,while evacuation with all risers suspended along a straight path at another di-rection angle.Besides,the influencing factors on anti-typhoon evacuation strategies indicate that the proposed optimization model and method have strong applicability to working conditions and remarkable optimization effects.
基金supported by the National Key Research and Development Program of China(Nos.2022YFA1205602,and 2023YFC3707801)the National Natural Science Foundation of China(Nos.U22A20402,22376073,21936003 and 22306119)China Postdoctoral Science Foundation(No.2023T160419).
文摘Nano zero-valent iron(nZVI)is a promising phosphate adsorbent for advanced phosphate removal.However,the rapid passivation of nZVI and the low activity of adsorption sites seriously limit its phosphate removal performance,accounting for its inapplicability to meet the emission criteria of 0.1 mg P/L phosphate.In this study,we report that the oxalate modification can inhibit the passivation of nZVI and alter the multi-stage phosphate adsorption mechanism by changing the adsorption sites.As expected,the stronger antipassivation ability of oxalate modified nZVI(OX-nZVI)strongly favored its phosphate adsorption.Interestingly,the oxalate modification endowed the surface Fe(III)sites with the lowest chemisorption energy and the fastest phosphate adsorption ability than the other adsorption sites,by in situ forming a Fe(III)-phosphate-oxalate ternary complex,therefore enabling an advanced phosphate removal process.At an initial phosphate concentration of 1.00 mg P/L,pH of 6.0 and a dosage of 0.3 g/L of adsorbents,OX-nZVI exhibited faster phosphate removal rate(0.11 g/mg/min)and lower residual phosphate level(0.02 mg P/L)than nZVI(0.055 g/mg/min and 0.19 mg P/L).This study sheds light on the importance of site manipulation in the development of high-performance adsorbents,and offers a facile surface modification strategy to prepare superior iron-basedmaterials for advanced phosphate removal.
基金funded by the Deanship of Scientific Research(DSR)at King Abdulaziz University,Jeddah,under Grant No.(GPIP:1074-612-2024).
文摘The surge in smishing attacks underscores the urgent need for robust,real-time detection systems powered by advanced deep learning models.This paper introduces PhishNet,a novel ensemble learning framework that integrates transformer-based models(RoBERTa)and large language models(LLMs)(GPT-OSS 120B,LLaMA3.370B,and Qwen332B)to enhance smishing detection performance significantly.To mitigate class imbalance,we apply synthetic data augmentation using T5 and leverage various text preprocessing techniques.Our system employs a duallayer voting mechanism:weighted majority voting among LLMs and a final ensemble vote to classify messages as ham,spam,or smishing.Experimental results show an average accuracy improvement from 96%to 98.5%compared to the best standalone transformer,and from 93%to 98.5%when compared to LLMs across datasets.Furthermore,we present a real-time,user-friendly application to operationalize our detection model for practical use.PhishNet demonstrates superior scalability,usability,and detection accuracy,filling critical gaps in current smishing detection methodologies.
文摘Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks.
基金funded by the National Key Research and Development Program of China(Grant No.2024YFE0209000)the NSFC(Grant No.U23B2019).
文摘Graph Neural Networks(GNNs)have proven highly effective for graph classification across diverse fields such as social networks,bioinformatics,and finance,due to their capability to learn complex graph structures.However,despite their success,GNNs remain vulnerable to adversarial attacks that can significantly degrade their classification accuracy.Existing adversarial attack strategies primarily rely on label information to guide the attacks,which limits their applicability in scenarios where such information is scarce or unavailable.This paper introduces an innovative unsupervised attack method for graph classification,which operates without relying on label information,thereby enhancing its applicability in a broad range of scenarios.Specifically,our method first leverages a graph contrastive learning loss to learn high-quality graph embeddings by comparing different stochastic augmented views of the graphs.To effectively perturb the graphs,we then introduce an implicit estimator that measures the impact of various modifications on graph structures.The proposed strategy identifies and flips edges with the top-K highest scores,determined by the estimator,to maximize the degradation of the model’s performance.In addition,to defend against such attack,we propose a lightweight regularization-based defense mechanism that is specifically tailored to mitigate the structural perturbations introduced by our attack strategy.It enhances model robustness by enforcing embedding consistency and edge-level smoothness during training.We conduct experiments on six public TU graph classification datasets:NCI1,NCI109,Mutagenicity,ENZYMES,COLLAB,and DBLP_v1,to evaluate the effectiveness of our attack and defense strategies.Under an attack budget of 3,the maximum reduction in model accuracy reaches 6.67%on the Graph Convolutional Network(GCN)and 11.67%on the Graph Attention Network(GAT)across different datasets,indicating that our unsupervised method induces degradation comparable to state-of-the-art supervised attacks.Meanwhile,our defense achieves the highest accuracy recovery of 3.89%(GCN)and 5.00%(GAT),demonstrating improved robustness against structural perturbations.
基金supported by Key Laboratory of Cyberspace Security,Ministry of Education,China。
文摘Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.RS-2023-00235509Development of security monitoring technology based network behavior against encrypted cyber threats in ICT convergence environment).
文摘With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy.
基金supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2025R97)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security.
基金Project(10804101)supported by the National Natural Science Foundation of ChinaProject(2007CB815102)supported by the National Basic Research Program of ChinaProject(2007B08007)supported by the Science and Technology Development Foundation of Chinese Academy of Engineering Physics,China
文摘Triangular Au-Ag framework nanostructures (TFN) were synthesized via a multi-step galvanic replacement reaction (MGRR) of single-crystalline triangular silver nanoplates in a chlorauric acid (HAuCl4) solution at room temperature. The morphological, compositional, and crystal structural changes involved with reaction steps were analyzed by using transmission electron microscopy(TEM), energy-dispersive X-ray spectrometry (EDX), and X-ray diffraction. TEM combined with EDX and selected area electron diffraction confirmed the replacement of Ag with Au. The in-plane dipolar surface plasmon resonance (SPR) absorption band of the Ag nanoplates locating initially at around 700 nm gradually redshifted to 1 100 nm via a multi-stage replacement manner after 7 stages. The adding amount of HAuCl4 per stage influenced the average redshift value per stage, thus enabled a fine tuning of the in-plane dipolar band. A proposed formation mechanism of the original Ag nanoplates developing pores while growing Au nanoparticles covering this underlying structure at more reaction steps was confirmed by exploiting surface-enhanced Raman scattering (SERS).
基金supported by the National Basic Research Program of China (No. 2012CB214805)the National Natural Science Foundation of China (Nos. 41230313, 41402119, 2017JQ0025, 41472017, 41572111)
文摘Sichuan Basin is one of the uppermost petroliferous basins in China. It experienced three evolutionary phases which were marine carbonate platform (Ediacaran to Late Triassic), Indosinian-Yanshanian orogeny foreland basin (Late Triassic to Late Cretaceous) and uplift and tectonic modification (Late Cretaceous to Quaternary). The present-day tectonics of the Sichuan Ba- sin and its periphery are characterized by three basic elements which are topography, basement type and surface structure, and two settings (plate margin and interior). Therefore, be subdivided into five units which have different structure and tectonic history. The basin contains five different sets of source rocks with thickness up to 2 500 m. These source rocks were well preserved due to the presence of Middel-Lower Triassic evaporites (〉-200 m) and thick terrestrial sediments filling in the Indosinian-Yanshanian foreland basin (〉3 000 m). The uplift and erosion since Late Cretaceous has significant influence on cross-strata migration and accumulation of oil and gas. The multi-phase evolution of the basin and its superimposed tectonic elements, good petroleum geologic conditions and diverse petroleum systems reveal its bright exploration prospects.
基金Project(2014ZX04002041)supported by the National Science and Technology Major Project,ChinaProject(51175024)supported by the National Natural Science Foundation of China
文摘Springback of a SUS321 complex geometry part formed by the multi-stage rigid-flexible compound process was studied through numerical simulations and laboratory experiments in this work.The sensitivity analysis was provided to have an insight in the effect of the evaluated process parameters.Furthermore,in order to minimize the springback problem,an accurate springback simulation model of the part was established and validated.The effects of the element size and timesteps on springback model were further investigated.Results indicate that the custom mesh size is beneficial for the springback simulation,and the four timesteps are found suited for the springback analysis for the complex geometry part.Finally,a strategy for reducing the springback by changing the geometry of the blank is proposed.The optimal blank geometry is obtained and used for manufacturing the part.
文摘A multi-stage influence diagram is used to model the pilot's sequential decision making in one on one air combat. The model based on the multi-stage influence diagram graphically describes the elements of decision process, and contains a point-mass model for the dynamics of an aircraft and takes into account the decision maker's preferences under uncertain conditions. Considering an active opponent, the opponent's maneuvers can be modeled stochastically. The solution of multistage influence diagram can be obtained by converting the multistage influence diagram into a two-level optimization problem. The simulation results show the model is effective.
基金supported by the National Key Basic Research and Development Program of China(No.G1999064908)
文摘The mechanical behavior and microstructures of an Al-Zn-Mg-Cu-Cr aluminum alloy during multi-stage hot deformation were investigated by thermal stimulation test, optical microscopy, and transmission electron microscopy. The true stress vs true strain curves and the microstructure evolution of two hot deformation procedures were gained. The flow stress of the alloy studied decreases with increasing the deforming passes and declining the temperature, and the larger the temperature decline between adjacent stages, the larger the peak stress fall is. The stress-strain behavior mainly result from the dynamic recovery during deformation, the static recovery and recrystallization in the delay time, and the second phases precipitated from the matrix at high temperature.