27 research outputs found

    Anti-periodic solutions for a class of third-order nonlinear differential equations with a deviating argument

    Get PDF
    In this paper, we study a class of third-order nonlinear differential equations with a deviating argument and establish some sufficient conditions for the existence and exponential stability of anti-periodic solutions of the equation. These conditions are new and complement to previously known results

    Comparing One with Many -- Solving Binary2source Function Matching Under Function Inlining

    Full text link
    Binary2source function matching is a fundamental task for many security applications, including Software Component Analysis (SCA). The "1-to-1" mechanism has been applied in existing binary2source matching works, in which one binary function is matched against one source function. However, we discovered that such mapping could be "1-to-n" (one query binary function maps multiple source functions), due to the existence of function inlining. To help conduct binary2source function matching under function inlining, we propose a method named O2NMatcher to generate Source Function Sets (SFSs) as the matching target for binary functions with inlining. We first propose a model named ECOCCJ48 for inlined call site prediction. To train this model, we leverage the compilable OSS to generate a dataset with labeled call sites (inlined or not), extract several features from the call sites, and design a compiler-opt-based multi-label classifier by inspecting the inlining correlations between different compilations. Then, we use this model to predict the labels of call sites in the uncompilable OSS projects without compilation and obtain the labeled function call graphs of these projects. Next, we regard the construction of SFSs as a sub-tree generation problem and design root node selection and edge extension rules to construct SFSs automatically. Finally, these SFSs will be added to the corpus of source functions and compared with binary functions with inlining. We conduct several experiments to evaluate the effectiveness of O2NMatcher and results show our method increases the performance of existing works by 6% and exceeds all the state-of-the-art works

    A generalization of the three-dimensional Bernfeld–Haddock conjecture and its proof

    Get PDF
    AbstractConsider the following system of delay differential equations {x1′(t)=−F(x1(t))+G(x2(t−r2)),x2′(t)=−F(x2(t))+G(x3(t−r3)),x3′(t)=−F(x3(t))+G(x1(t−r1)), where r1, r2 and r3 are positive constants, F, G∈C(R1), and F is nondecreasing on R1. These systems have important practical applications and also are a three-dimensional generalization of the Bernfeld–Haddock conjecture. In this paper, by using comparative technique, we obtain the asymptotic behavior of solutions that each bounded solution of the systems tends to a constant vector under a desirable condition

    Enhanced syntrophic propionate degradation and methane production by granular activated carbon in AnSBR

    No full text
    Syntrophic degradation of propionate has been regarded as a limiting factor for methane formation in anaerobic digestion (AD) processes, due to its easier production but harder degradation than other volatile fatty acids. In the present study, 20 g/L granular activated carbon (GAC) was introduced into an anaerobic sequence batch reactor (AnSBR) and the enhancement of propionate degradation and methane production was evaluated with another AnSBR without GAC as a control. Inoculated with the same excess activated sludge, both AnSBRs were synchronously started up at 35 °C with the fed propionate increased gradually from the initial 340 mg/L to the final 1700 mg/L. The results showed that the introduction of GAC made the AnSBR get steady state 6 days earlier. With the fed propionate of about 1700 mg/L in the steady state, the average specific methane production and biomass was enhanced from 0.20 to 0.25 L/L·d, and 7.72 to7.96 g/L, respectively, by the introduced GAC. The results suggested that the GAC had functioned in stimulating microbial growth and enhancing direct interspecies electron transfer between hydrogen-producing acetogens and methanogens, which had resulted in the enhanced propionate degradation and methane production

    Anti-periodic solutions for a class of third-order nonlinear differential equations with a deviating argument

    No full text
    In this paper, we study a class of third-order nonlinear differential equations with a deviating argument and establish some sufficient conditions for the existence and exponential stability of anti-periodic solutions of the equation. These conditions are new and complement to previously known results

    Cluster Analysis Based Arc Detection in Pantograph-Catenary System

    No full text
    The pantograph-catenary system, which ensures the transmission of electrical energy, is a critical component of a high-speed electric multiple unit (EMU) train. The pantograph-catenary arc directly affects the power supply quality. The Chinese Railway High-speed (CRH) is equipped with a 6C system to obtain pantograph videos. However, it is difficult to automatically identify the arc image information from the vast amount of videos. This paper proposes an effective approach with which pantograph video can be separated into continuous frame-by-frame images. Because of the interference from the complex operating environment, it is unreasonable to directly use the arc parameters to detect the arc. An environmental segmentation algorithm is developed to eliminate the interference. Time series in the same environment is analyzed via cluster analysis technique (CAT) to find the abnormal points and simplified arc model to find arc events accurately. The proposed approach is tested with real pantograph video and performs well

    Dynamic Behavior of a Precast and Partial Steel Joint under Various Shear Span-to-Depth Ratios

    No full text
    The dynamic behavior of a PPSRC beam–column joint is related to constraint effect, strength deterioration and strain rate effect. Then, it can be assessed by bearing capacity, stiffness degradation, displacement ductility and energy consumption. The results show that the increased strain rate causes growth in ring stiffness, bearing capacity and energy consumption of PPSRC beam–column joints. However, the influence of shear span-to-depth ratio on dynamic mechanical properties of PPSRC beam–column joints is more obvious than that of strain rate. Regardless of strain rate, the bearing capacity, initial stiffness, ring stiffness and energy consumption of PPSRC beam–column joints decrease as the shear span-to-depth ratio increases. Moreover, the ring stiffness under reverse direction is smaller than that the under forward direction at each displacement level. However, the stiffness degradation under a lower shear span-to-depth ratio is more obvious than that under a higher shear span-to-depth ratio. Moreover, the displacement ductility with a higher shear span-to-depth ratio is better than that with a lower shear span-to-depth ratio. Finally, the mechanical properties of PPSRC beam–column joints are affected by the extension length of partial steel plate, and the reasonable extension length of the partial steel plate in the column is affected by the shear span-to-depth ratio

    1-to-1 or 1-to-n? Investigating the effect of function inlining on binary similarity analysis

    Full text link
    Binary similarity analysis is critical to many code-reuse-related issues and "1-to-1" mechanism is widely applied, where one function in a binary file is matched against one function in a source file or binary file. However, we discover that function mapping is a more complex problem of "1-to-n" or even "n-to-n" due to the existence of function inlining. In this paper, we investigate the effect of function inlining on binary similarity analysis. We first construct 4 inlining-oriented datasets for four similarity analysis tasks, including code search, OSS reuse detection, vulnerability detection, and patch presence test. Then, we further study the extent of function inlining, the performance of existing works under function inlining, and the effectiveness of existing inlining-simulation strategies. Results show that the proportion of function inlining can reach nearly 70%, while most existing works neglect it and use "1-to-1" mechanism. The mismatches cause a 30% loss in performance during code search and a 40% loss during vulnerability detection. Moreover, two existing inlining-simulation strategies can only recover 60% of the inlined functions. We discover that inlining is usually cumulative when optimization increases. Conditional inlining and incremental inlining are suggested to design low-cost and high-coverage inlining-simulation strategies
    corecore