期刊文献+
共找到5,445篇文章
< 1 2 250 >
每页显示 20 50 100
Longitudinal structural vulnerability analysis of shield tunnels under adjacent excavation disturbances
1
作者 PENG Zhu SHI Cheng-hua +2 位作者 WANG Zu-xian LEI Ming-feng PENG Li-min 《Journal of Central South University》 2025年第6期2256-2272,共17页
This paper proposes a longitudinal vulnerability-based analysis method to evaluate the impact of foundation pit excavation on shield tunnels,accounting for geological uncertainties.First,the shield tunnel is modeled a... This paper proposes a longitudinal vulnerability-based analysis method to evaluate the impact of foundation pit excavation on shield tunnels,accounting for geological uncertainties.First,the shield tunnel is modeled as an Euler Bernoulli beam resting on the Pasternak foundation incorporating variability in subgrade parameters along the tunnel’s length.A random analysis method using random field theory is introduced to evaluate the tunnel’s longitudinal responses to excavation.Next,a risk assessment index system is established.The normalized relative depth between the excavation and the shield tunnel is used as a risk index,while the maximum longitudinal deformation,the maximum circumferential opening,and the maximum longitudinal bending moment serve as performance indicators.Based on these,a method for analyzing the longitudinal fragility of shield tunnels under excavation-induced disturbances is proposed.Finally,the technique is applied to a case study involving a foundation pit excavation above a shield tunnel,which is the primary application scenario of this method.Vulnerability curves for different performance indicators are derived,and the effects of tunnel stiffness and subgrade stiffness on the tunnel vulnerability are explored.The results reveal significant differences in vulnerability curves depending on the performance index used.Compared to the maximum circumferential opening and the maximum longitudinal bending moment,selecting the maximum longitudinal deformation as the control index better ensures the tunnel’s usability and safety under excavation disturbances.The longitudinal vulnerability of the shield tunnel nonlinearly decreases with the increase of the tunnel stiffness and subgrade stiffness,and the subgrade stiffness has a more pronounced effect.Parametric analyses suggest that actively reinforcing the substratum is more effective on reducing the risk of tunnel failure due to adjacent excavations than passive reinforcement of the tunnel structure. 展开更多
关键词 shield tunnel foundation pit excavation foundation variability random field vulnerability
在线阅读 下载PDF
A fast-running engineering tool for assessing structural vulnerability to blast loading
2
作者 Carlo Crispino Salvatore Annunziata +2 位作者 Alberto Contini Luca Lomazzi Andrea Manes 《Defence Technology(防务技术)》 2025年第4期244-254,共11页
Assessing the vulnerability of a platform is crucial in its design.In fact,the results obtained from vulnerability analyses provide valuable information,leading to precise design choices or corrective solutions that e... Assessing the vulnerability of a platform is crucial in its design.In fact,the results obtained from vulnerability analyses provide valuable information,leading to precise design choices or corrective solutions that enhance the platform's chances of surviving different scenarios.Such scenarios can involve various types of threats that can affect the platform's survivability.Among such,blast waves impacting the platform's structure represent critical conditions that have not yet been studied in detail.That is,frameworks for vulnerability assessment that can deal with blast loading have not been presented yet.In this context,this work presents a fast-running engineering tool that can quantify the risk that a structure fails when it is subjected to blast loading from the detonation of high explosive-driven threats detonating at various distances from the structure itself.The tool has been implemented in an in-house software that calculates vulnerability to various impacting objects,and its capabilities have been shown through a simplified,yet realistic,case study.The novelty of this research lies in the development of an integrated computational environment capable of calculating the platform's vulnerability to blast waves,without the need for running expensive finite element simulations.In fact,the proposed tool is fully based on analytical models integrated with a probabilistic approach for vulnerability calculation. 展开更多
关键词 vulnerability Blast loading Probabilistic assessment Analytical models Fast-running engineering tool
在线阅读 下载PDF
Entropy weight coefficient model and its application in evaluation of groundwater vulnerability of the Sanjiang Plain 被引量:4
3
作者 LIU Rentao FU Qiang GAI Zhaomei 《Journal of Northeast Agricultural University(English Edition)》 CAS 2007年第4期368-373,共6页
The research of groundwater vulnerability is the basic work to protect the groundwater. For utilizing groundwater resource continuably, groundwater vulnerability evaluation is necessary. Useful reference to protect, e... The research of groundwater vulnerability is the basic work to protect the groundwater. For utilizing groundwater resource continuably, groundwater vulnerability evaluation is necessary. Useful reference to protect, exploit and utilize on groundwater resource are provided rationally. According to the real condition of Sanjiang Plain, the indexes system is established based on the traditional DRASTIC model. The new system includes the following seven indexes: Depth of Water, Net Recharge, Aquifer Media, Soil Media, Conductivity of the Aquifer, Land Utilizing Ratio and Populace Density. The related analysis appears that the system is rather reasonable. Because traditional methods, such as analytic hierarchy process and fuzzy mathematics theory, can't be avoided human interference in selection of weights, they could lead to an imprecise result. In order to evaluate the groundwater vulnerability reasonably, entropy weight coefficient method is applied for the first time, which provides a new way to groundwater vulnerability evaluation. The method is a model whose weights are insured by the calculation process, so the artificial disturb can be avoided. It has been used to evaluate the groundwater vulnerability in Sanjiang Plain. The satisfied result is acquired. Comparably, the same result is acquired by the other method named projection pursuit evaluation based on real-coded accelerating genetic algorithm. It shows that entropy weight coefficient method is applicable on groundwater vulnerability evaluation. The evaluation result can provide reference on the decision-making departments. 展开更多
关键词 groundwater vulnerability entropy weight coefficient model indexes system EVALUATION
在线阅读 下载PDF
Assessment of grid inherent vulnerability considering open circuit fault under potential energy framework 被引量:3
4
作者 刘群英 刘起方 +1 位作者 黄琦 刘俊勇 《Journal of Central South University》 SCIE EI CAS 2010年第6期1300-1309,共10页
A potential energy framework for assessment of grid vulnerability was presented.In the framework,the branch potential energy function model was constructed.Two indexes,current vulnerability and forecasting vulnerabili... A potential energy framework for assessment of grid vulnerability was presented.In the framework,the branch potential energy function model was constructed.Two indexes,current vulnerability and forecasting vulnerability,were calculated.The current vulnerability was used to identify the current vulnerable area through calculating the distance between the current transmitted power and initial transmitted power;and the forecast vulnerability under variation of power injection was used to predict the vulnerable area of next step and verify the current vulnerable area.Numerical simulation was performed under variant operating conditions with IEEE-30 bus system,which shows that almost area of 90% overlaps between current vulnerable area and forecasting vulnerable area,the overlapped area is termed as inherent vulnerable area of grid.When considering N-1 contingency,the assessment results of this method proposed agree with those of optimal power flow.When considering N-2 contingency,optimal power flow fails to obtain correct results,while the method based on energy framework gives reliable results. 展开更多
关键词 inherent vulnerability branch potential energy (BPE) current vulnerability forecasting vulnerability phase angledifference
在线阅读 下载PDF
Vulnerability assessment to projectiles: Approach definition and application to helicopter platforms 被引量:4
5
作者 L.Lomazzi F.Cadini +1 位作者 M.Giglio A.Manes 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2022年第9期1523-1537,共15页
Survivability is defined as the capability of a platform to avoid or withstand a man-made hostile environment. Military aircraft in particular, but also other kinds of platforms subjected to external, impacting threat... Survivability is defined as the capability of a platform to avoid or withstand a man-made hostile environment. Military aircraft in particular, but also other kinds of platforms subjected to external, impacting threats, are commonly designed according to increasing survivability requirements. The concept of survivability was first formalized by R. Ball in 1985 in its seminal work on combat aircraft survivability.On the basis of the theory presented in his work, many computer programs have been developed which implement the modelling techniques and computations required by vulnerability assessments. However,a clear and general view of the operative computational procedures is still lacking. Moreover, to date only a limited number of applications to helicopter platforms have been investigated in the survivability field,even though these platforms experience numerous flight conditions exposing the system to different types of threats. In this context, this work aims at establishing a multi-purpose general framework for the vulnerability assessment of different types of platforms subjected to external threats, with a focus on helicopters. The in-house software specifically developed for this application is here described in detail and employed to present a case study on a representative military helicopter. 展开更多
关键词 vulnerability SURVIVABILITY HELICOPTER PROJECTILE THREAT
在线阅读 下载PDF
Vulnerability assessment of UAV engine to laser based on improved shotline method 被引量:1
6
作者 Le Liu Chengyang Xu +3 位作者 Changbin Zheng Sheng Cai Chunrui Wang Jin Guo 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期588-600,共13页
Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a v... Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser. 展开更多
关键词 Laser weapon Laser damage vulnerability UAV ENGINE Killing probability
在线阅读 下载PDF
Groundwater Vulnerability Assessment in Tanghai Country
7
作者 Peng Chen,Zhen Ma,Xiaoming Sun,Peixin Shi Tianjin Geology Survey Centre,Tianjin 30070,China. 《地学前缘》 EI CAS CSCD 北大核心 2009年第S1期29-29,共1页
Groundwater vulnerability assessment is one of the critical prerequisites to achieve efficient development and management of water resources in Tanghai-Caofeidian area,which has been one of the national key constructi... Groundwater vulnerability assessment is one of the critical prerequisites to achieve efficient development and management of water resources in Tanghai-Caofeidian area,which has been one of the national key constructive districts in North China.According to the influence factors of groundwater vulnerability,this study analyzed the impact of vadose zone that includes the depth to groundwater table,unsaturated zone lithology and permeability with the data achieved from field works in recent years.The evaluation model was established for estimating groundwater vulnerability using three 展开更多
关键词 vulnerability ASSESSMENT PARAMETERS DRASTIC
在线阅读 下载PDF
Image-Based Modeling for Atherosclerotic Coronary Plaque Progression and Vulnerability Research
8
作者 Rui Lv Liang Wang Dalin Tang 《医用生物力学》 EI CAS CSCD 北大核心 2019年第A01期81-82,共2页
China Cardiovascular Disease Report 2017(Summary)pointed out that at present,cardiovascular diseases(CVD)account for the highest number of deaths among urban and rural residents.In the middle or later stages of athero... China Cardiovascular Disease Report 2017(Summary)pointed out that at present,cardiovascular diseases(CVD)account for the highest number of deaths among urban and rural residents.In the middle or later stages of atherosclerosis,the plaques become increasingly unstable with high chance to rupture,which may lead acute death from coronary heart diseases.Medical imaging and image-based computational modeling have been used in recent years to quantify ather-osclerotic plaque morphological and biomechanical characteristics and predict the coronary plaque growth and rupture processes.Analyzing the vulnerability of plaques effectively could lead to better patient screening strategies and enable physicians to adopt timely and necessary intervention or conservative treatment.Earlier investigations of vulnerable plaques were mostly based on histopathological data.With the accumulation of experience in pathology and the gradual enrichment of autopsy materials,the criteria for the diagnosis of vulnerable plaques appeared in 2001,mainly manifested as the necrotic lipid nuclei,fibrous caps that are infiltrated by a large number of macrophages,and fibrous cap thickness less than 65μm.Because of the obvious importance of the thin fibrous cap in the study of plaque vulnerability,it has been a focus of attention by many investigations.Watson,M.G.et al.are concerned about the formation of early fibrous caps in recent years.The presentation of local maximum stress on plaque further confirmed the importance of thin fibrous cap.The development of medical images has greatly promoted the study of coronary atherosclerosis.Compared with autopsy ex vivo,medical image could provide plaque data under in vivo conditions and greatly promote the study of coronary atherosclerosis.Huang XY et al.used ex vivo magnetic resonance imaging(MRI)to study the relationship between plaque wall stress(PWS)and death caused by coronary artery disease.Due to technical limitations and the accessibility of the coronary artery in the body,MRI is not widely used for in vivo coronary studies.Interventional intravascular ultrasound(IVUS),with an image resolution of 150-200μm,has been used in research and clinical practice to identify plaques,quantify plaque morphology,and characterize plaque components.More recently,optical coherence tomography(OCT),with its resolution of 5-10μm,has emerged as an imaging modality which can be used to detect thin fibrous caps and improve diagnostic accuracy.It is commonly believed that mechanical forces play an important role in plaque progression and rupture.Image-based biomechanical plaque models have been developed and used to quantify plaque mechanical conditions and seek their linkage to plaque progression and vulnerability development activities.Based on recent advances in imaging and modeling,this paper attempts to provide a brief review on plaque research,including histological classification,image preparation,biomechanical modeling and analysis methods including medical imaging techniques represented by intravascular ultrasound(IVUS)and optical coherence tomography(OCT),computational modeling and their applications in plaque progression and vulnerability analyses and predictions.The clinical application and future development direction are also briefly described.We focus more on human coronary plaque modeling and mainly included results from our group for illustration purpose.We apologize in advance for our limitations. 展开更多
关键词 IVUS OCT CORONARY PLAQUE vulnerABLE PLAQUE
在线阅读 下载PDF
Impairment of LTP in insular cortex is correlated to resilience and vulnerability to chronic stress for PTSD
9
作者 JIA Jing-jing SHI Tian-yao ZHOU Wen-xia 《中国药理学与毒理学杂志》 CAS CSCD 北大核心 2018年第9期727-728,共2页
OBJECTIVE Exposure to stressful events can be differently perceived by individuals depending on the level of stress resilience or vulnerability.The neural processes that underlie such clinical y and social y important... OBJECTIVE Exposure to stressful events can be differently perceived by individuals depending on the level of stress resilience or vulnerability.The neural processes that underlie such clinical y and social y important differences are largely unknown.As insula cortex is important in emotional processing,we have examined whether the changes in synaptic plasticity in the insula cortex involved in stress resilience or vulnerability.METHODS Mice were divided into two groups:control and stress group.Stress group was treated by foot electric shock twice daily(0.8 mA,2 s,ten times in 1 min) in continuous two weeks.Then we used fear conditioning test to detect re-experiencing of traumatic experience,open field test to detect avoidance,pre-pulse inhibition experiment to detect hyper arousal.The changes of synaptic plasticity in the insular cortex were recorded by the multiple channels electrophysiology and whole cell patch.RESULTS According to the behavioral scores,it was divided into resilient and vulnerable group.In the fear conditioning test,the vulnerable group showed the significant freezing time decreased than that of the resilient group(P<0.01).In the open field test,the time that enter the center zone of vulnerable group is increased than that resilient group(P<0.01);In the pre-pulse inhibition experiment,there are not significant difference of PPI value in both groups(P=0.4239).And then electrophysiological experiments are performed to detect the synaptic plasticity of the insular cortex.Compared with the resilient group,the LTP level was decreased(P<0.05) and the mEPSC was increased(P<0.01) in vulnerable group.CONCLUSION The impairment of synaptic plasticity in the insular cortex may be one of the neural mechanisms for the vulnerability to chronic stress. 展开更多
关键词 LTP insular cortex SYNAPTIC plasticity PTSD RESILIENCE vulnerability
在线阅读 下载PDF
Assessing Vulnerability of Hard Rock Granitic Aquifer Through the Application of DRASTIC Model and GIS
10
作者 R.K.Prasad V.S.Singh S.K.G.Krishnamacharyulu 《地学前缘》 EI CAS CSCD 北大核心 2009年第S1期27-27,共1页
Groundwater is a finite resource which is being overexploited due to increase in demand over the years leading to decrease in its potentiality.As it is known that ground water is the only major source of drinking wate... Groundwater is a finite resource which is being overexploited due to increase in demand over the years leading to decrease in its potentiality.As it is known that ground water is the only major source of drinking water for both urban and rural India its proper management is very essential for its sustainability. In the present study,DRASTIC model is 展开更多
关键词 spatial ANALYST GIS DRASTIC model groundwater vulnerABLE zone hard rock AQUIFER
在线阅读 下载PDF
Topological optimization of ballistic protective structures through genetic algorithms in a vulnerability-driven environment
11
作者 Salvatore Annunziata Luca Lomazzi +1 位作者 Marco Giglio Andrea Manes 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第10期125-137,共13页
Reducing the vulnerability of a platform,i.e.,the risk of being affected by hostile objects,is of paramount importance in the design process of vehicles,especially aircraft.A simple and effective way to decrease vulne... Reducing the vulnerability of a platform,i.e.,the risk of being affected by hostile objects,is of paramount importance in the design process of vehicles,especially aircraft.A simple and effective way to decrease vulnerability is to introduce protective structures to intercept and possibly stop threats.However,this type of solution can lead to a significant increase in weight,affecting the performance of the aircraft.For this reason,it is crucial to study possible solutions that allow reducing the vulnerability of the aircraft while containing the increase in structural weight.One possible strategy is to optimize the topology of protective solutions to find the optimal balance between vulnerability and the weight of the added structures.Among the many optimization techniques available in the literature for this purpose,multiobjective genetic algorithms stand out as promising tools.In this context,this work proposes the use of a in-house software for vulnerability calculation to guide the process of topology optimization through multi-objective genetic algorithms,aiming to simultaneously minimize the weight of protective structures and vulnerability.In addition to the use of the in-house software,which itself represents a novelty in the field of topology optimization of structures,the method incorporates a custom mutation function within the genetic algorithm,specifically developed using a graph-based approach to ensure the continuity of the generated structures.The tool developed for this work is capable of generating protections with optimized layouts considering two different types of impacting objects,namely bullets and fragments from detonating objects.The software outputs a set of non-dominated solutions describing different topologies that the user can choose from. 展开更多
关键词 Topological optimization Protective structure Genetic algorithm SURVIVABILITY vulnerability
在线阅读 下载PDF
Study on Quadratic Effect Assessment of Vulnerability of Military Aircraft Under Multiple Hits
12
作者 侯志强 孟维杰 《Defence Technology(防务技术)》 SCIE EI CAS 2008年第1期72-76,共5页
Under the conditions of multiple hits and quadratic effects,the aircraft vulnerability assessment method is proposed by means of kill-tree diagram and state transition matrix.Four instances of the quadratic effects ar... Under the conditions of multiple hits and quadratic effects,the aircraft vulnerability assessment method is proposed by means of kill-tree diagram and state transition matrix.Four instances of the quadratic effects are investigated:non-redundant components to non-redundant components,non-redundant to redundant,redundant to non-redundant and redundant to redundant.The application of the proposed method to the calculation of quadratic effects is also studied. 展开更多
关键词 航行器 概率 多重构件 攻击性评估
在线阅读 下载PDF
Vulnerability Curve of Ice Flashover Trips in Regional Grid and Its Appfication
13
作者 SUN Yu WANG Xiuli WANG Jianxue WANG Xifan WU Xiong XIE Shaoyu 《中国电机工程学报》 EI CSCD 北大核心 2012年第22期I0008-I0008,共1页
关键词 地区电网 覆冰 跳闸 闪络 曲线 故障风险 绝缘系统 数据显示
在线阅读 下载PDF
基于反脆弱发展理论的我国基层医疗卫生服务干预策略研究——以慢性病管理为例
14
作者 姜睿 常广明 +6 位作者 徐玲玲 周雨涵 魏馨睿 杨敏 岳露 黄吕桩 王永晨 《中国全科医学》 北大核心 2026年第1期17-23,共7页
慢性病的高发病率和持续增长的患病率是我国面临的重大健康问题和严峻挑战。本文基于反脆弱发展理论,探讨我国基层医疗卫生服务干预策略,为进一步优化慢性病防控管理提供重要参考。本文系统梳理了基层医疗卫生服务体系在应对慢性病管理... 慢性病的高发病率和持续增长的患病率是我国面临的重大健康问题和严峻挑战。本文基于反脆弱发展理论,探讨我国基层医疗卫生服务干预策略,为进一步优化慢性病防控管理提供重要参考。本文系统梳理了基层医疗卫生服务体系在应对慢性病管理时呈现的脆弱性,包括医疗资源不均衡、政策落地难、信息化建设有待加强和专业人员匮乏等问题。创新性引入反脆弱发展理论,强调基层医疗卫生服务系统在面对不确定性和压力时,应通过适应和改进不断增强自身能力,并提出一系列基于反脆弱发展理论的干预措施,如通过跨学科团队协作和信息技术集成提供个性化健康服务,强化风险识别与健康教育,通过多层次干预措施全面降低慢性病风险,提高家庭医生签约服务的灵活性和适应性,优化政策支持与资源配置,建立科学的评估和改进机制。本文旨在通过构建灵活适应、持续优化的基层医疗卫生服务体系,提高慢性病管理质量,进而改善居民健康水平和生活质量。 展开更多
关键词 疾病管理 慢性病 基层医疗卫生服务 慢性病管理 反脆弱发展理论 干预策略 脆弱性
在线阅读 下载PDF
哈密盆地绿洲区地下水污染预警研究
15
作者 姜凤 周金龙 +4 位作者 周殷竹 刘江涛 曾妍妍 刘钰 丁启振 《地学前缘》 北大核心 2026年第1期179-192,共14页
地下水污染预警对于识别重点防控区域、保障地下水资源安全具有重要意义。以新疆哈密盆地绿洲区为研究对象,构建涵盖地下水固有脆弱性、污染荷载与功能价值的污染风险综合评价体系,并采用敏感度分析验证模型合理性。在此基础上,采用熵权... 地下水污染预警对于识别重点防控区域、保障地下水资源安全具有重要意义。以新疆哈密盆地绿洲区为研究对象,构建涵盖地下水固有脆弱性、污染荷载与功能价值的污染风险综合评价体系,并采用敏感度分析验证模型合理性。在此基础上,采用熵权TOPSIS方法评估地下水水质现状,结合典型监测井数据分析水质变化趋势。进一步引入博弈论综合权重法,耦合水质现状、变化趋势与污染风险三类指标,划分预警等级。结果表明:(1)研究区地下水污染风险整体较低,较高与高风险区域占比为9.7%,高风险区包气带岩性以砂砾石为主、透水性强,人类活动密集、地下水开采强度大且受到面源与点源污染的共同作用;(2)水质现状结果显示,Ⅳ类与Ⅴ类水占比为10.1%,地下水质量主要受到水文地质条件与人类活动双重因素影响。水质变化整体呈改善趋势,水质恶化区域仅占5.4%,工农业污染及生活污水排放是其主要驱动因素;(3)预警等级以无警和轻警等级为主,高警及重警区域占比为5.3%,可归纳为自然因素主导型、人类活动主导型和复合影响型。研究所构建的基于博弈论综合权重的地下水污染预警方法有效提升了预警等级划分的客观性与空间连续性,可为区域地下水污染分区防控与重点治理区识别提供理论依据与方法支撑。 展开更多
关键词 地下水污染预警 污染风险 脆弱性 博弈论 新疆哈密盆地
在线阅读 下载PDF
基于模糊测试的Java反序列化漏洞挖掘 被引量:1
16
作者 王鹃 张勃显 +3 位作者 张志杰 谢海宁 付金涛 王洋 《信息网络安全》 北大核心 2025年第1期1-12,共12页
随着反序列化技术在Java Web应用开发中的广泛应用,针对Java反序列化机制的攻击也日益增多,已严重威胁Java Web应用的安全性。当前主流的黑名单防范机制无法有效防御未知的反序列化漏洞利用,而现有的Java反序列化漏洞挖掘工具大多依赖... 随着反序列化技术在Java Web应用开发中的广泛应用,针对Java反序列化机制的攻击也日益增多,已严重威胁Java Web应用的安全性。当前主流的黑名单防范机制无法有效防御未知的反序列化漏洞利用,而现有的Java反序列化漏洞挖掘工具大多依赖静态分析方法,检测精确度较低。文章提出一种基于模糊测试的Java反序列化漏洞挖掘工具DSM-Fuzz,该工具首先通过对字节码进行双向追踪污点分析,提取所有可能与反序列化相关的函数调用链。然后,利用基于TrustRank算法的函数权值分配策略,评估函数与反序列化调用链的关联性,并根据相关性权值对模糊测试种子分配能量。为进一步优化测试用例的语法结构和语义特征,文章设计并实现了一种基于反序列化特征的种子变异算法。该算法利用反序列化的Java对象内部特征优化种子变异过程,并引导模糊测试策略对反序列化漏洞调用链进行路径突破。实验结果表明,DSM-Fuzz在漏洞相关代码覆盖量方面较其他工具提高了约90%。此外,该工具还在多个主流Java库中成功检测出50%的已知反序列化漏洞,检测精确度显著优于其他漏洞检测工具。因此,DSM-Fuzz可有效辅助Java反序列化漏洞的检测和防护。 展开更多
关键词 Java反序列化漏洞 模糊测试 污点分析 漏洞挖掘 程序调用图
在线阅读 下载PDF
复杂网络视角下世界粮食贸易网络脆弱性研究 被引量:3
17
作者 韩建军 崔欣苗 +2 位作者 侯婧祎 程玉 张佳豪 《粮油食品科技》 北大核心 2025年第2期198-205,共8页
为探究世界粮食贸易网络的脆弱性,为国际粮食贸易市场做出合理预判提供参考,基于1990—2020年的世界粮食贸易数据,结合复杂网络理论与脆弱性理论,从模体的角度探究世界粮食贸易网络局部结构脆弱性变化情况,并模拟世界粮食贸易网络在随... 为探究世界粮食贸易网络的脆弱性,为国际粮食贸易市场做出合理预判提供参考,基于1990—2020年的世界粮食贸易数据,结合复杂网络理论与脆弱性理论,从模体的角度探究世界粮食贸易网络局部结构脆弱性变化情况,并模拟世界粮食贸易网络在随机攻击和蓄意攻击模式下的失效过程,将网络中的节点分级。结果表明:世界粮食贸易网络的局部结构中,V型结构占比较高,网络的稳定性较弱,但这种现象有减缓趋势;对比真实网络与随机网络,真实网络的结构更加稳定且贸易关系更复杂;世界粮食贸易网络在面对随机攻击时具有良好的强韧性,面对蓄意攻击时表现出较强的脆弱性,蓄意攻击对网络的破坏力远大于随机攻击;在蓄意攻击模式下,世界粮食贸易网络的节点根据失效过程可以分为三个层级,其中第一层级节点对网络稳定性影响最大。 展开更多
关键词 粮食安全 世界粮食贸易 复杂网络 脆弱性 格局与趋势
在线阅读 下载PDF
人工智能赋能教学的伦理审视 被引量:6
18
作者 胡金木 张珺 《课程·教材·教法》 北大核心 2025年第2期64-71,共8页
人工智能寄予教学未来转型的期待,为个性化学习、精准化教学、虚拟仿真教学环境等提供了可能。然而,人工智能也带来了主体性伦理隐忧,如过度依赖“思维机器”导致的认知能力退化、一味适应机器引发的反主体性危机与数字控制、沉湎于虚... 人工智能寄予教学未来转型的期待,为个性化学习、精准化教学、虚拟仿真教学环境等提供了可能。然而,人工智能也带来了主体性伦理隐忧,如过度依赖“思维机器”导致的认知能力退化、一味适应机器引发的反主体性危机与数字控制、沉湎于虚拟现实导致人与人之间情感淡漠等。面对隐忧,我们应该审视人、技术与教学之间的关系,警惕教学的技术增强对人的主体性的伤害。教学中的脆弱、不确定与风险蕴含着生命成长的美丽可能,接受风险不仅是对教育本质的承认,更意味着选择“非力量”技术,守护“弱性教育”。人工智能赋能教学过程中应当被谨慎而合理地应用,以确保其增强而非替代传统教学过程,促进师生、生生间的社会融合和情感联结,同时教师应对智能技术使用作出教育性判断,培养学生的主体性与批判性思维,确保教与学过程的教育性、安全性与公正性。 展开更多
关键词 人工智能 教学伦理 伦理隐忧 美丽风险 弱性教育
在线阅读 下载PDF
基于回声状态网络的智能合约漏洞检测方法 被引量:1
19
作者 刘春霞 徐晗颖 +2 位作者 高改梅 党伟超 李子路 《计算机应用》 北大核心 2025年第1期153-161,共9页
区块链平台上的智能合约是为链上各方提供安全可信赖服务的去中心化应用程序,而智能合约漏洞检测能确保智能合约的安全性。然而,现有的智能合约漏洞检测方法在样本数量不均衡和语义信息挖掘不全面时,会出现特征学习不足和漏洞检测准确... 区块链平台上的智能合约是为链上各方提供安全可信赖服务的去中心化应用程序,而智能合约漏洞检测能确保智能合约的安全性。然而,现有的智能合约漏洞检测方法在样本数量不均衡和语义信息挖掘不全面时,会出现特征学习不足和漏洞检测准确率低的问题,而且,这些方法无法对新的合约漏洞进行检测。针对上述问题,提出一种基于回声状态网络(ESN)的智能合约漏洞检测方法。首先,根据合约图,对不同语义、语法边进行学习,并利用Skip-Gram模型训练得到特征向量;其次,结合ESN和迁移学习,实现对新合约漏洞的迁移扩展,以提高漏洞检测率;最后,在Etherscan平台搜集的智能合约数据集上进行实验。实验结果表明,所提方法的准确率、精确率、召回率和F1分数分别达到了94.30%、97.54%、91.68%和94.52%,与双向长短时记忆(BLSTM)网络、自注意力机制的双向长短时记忆(BLSTM-ATT)相比,所提方法的准确率分别提高了5.93和11.75个百分点,漏洞检测性能更优。消融实验也进一步验证了ESN对智能合约漏洞检测的有效性。 展开更多
关键词 漏洞检测 智能合约 回声状态网络 迁移学习 区块链
在线阅读 下载PDF
北方农牧交错区干旱胁迫下的农户生计脆弱性及影响因素研究——以陕西省榆阳区为例 被引量:1
20
作者 李玉恒 左文洁 +2 位作者 成汶璟 STANNY Monika 杜国明 《农业资源与环境学报》 北大核心 2025年第4期1115-1124,共10页
为了揭示干旱胁迫下北方农牧交错区不同类型农户生计脆弱性的差异,本研究以陕西省榆阳区为例,基于暴露水平、敏感程度和适应能力,构建了农户生计脆弱性评价指标体系,采用421份农户问卷调查数据,解析了2022年榆阳区不同类型农户生计脆弱... 为了揭示干旱胁迫下北方农牧交错区不同类型农户生计脆弱性的差异,本研究以陕西省榆阳区为例,基于暴露水平、敏感程度和适应能力,构建了农户生计脆弱性评价指标体系,采用421份农户问卷调查数据,解析了2022年榆阳区不同类型农户生计脆弱性及其差异特征,并利用障碍度模型识别了影响因素。结果显示:调查农户的生计脆弱性整体处于较高水平,其中户主未上过学、户主仅上过小学及纯农户三种类型的农户生计脆弱性水平较高,分别为1.767、1.009和0.967。农户生计脆弱性与生计非农化程度、农户学历呈反比,与农户年龄呈正比;自然灾害造成农作物损失、农产品销售得不到保障分别是农户生计暴露水平和敏感程度较高的主要诱因,户主教育背景和家庭社会关系是农户生计适应能力的主要影响因素。研究表明,不同类型农户的生计脆弱性差异显著,农户生计策略越多样、户主学历越高、平均年龄越小,其生计脆弱性越低,反之越高。基于研究结果,本文提出了旨在提升北方农牧交错区农户气候变化韧性的政策及措施建议。 展开更多
关键词 北方农牧交错区 农户生计脆弱性 气候变化 干旱
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部