18 research outputs found

    Experimental Research on Acoustic Emission Characteristics and Felicity Effects during Coal Fatigue Failure under Cyclic Loading

    No full text
    In order to study the acoustic emission characteristics and Felicity effect in the process of coal fatigue failure and reveal the internal relationship between the fatigue damage evolution law and the acoustic emission activity, with the help of MTS815.02 electrohydraulic servo rock mechanics test system and PCI-2 acoustic emission detection and analysis system, a triaxial cycling loading acoustic emission test was carried out on the coal samples. The results show that the higher the upper limit stress is, the more obvious the degree of fatigue damage will be caused by coal samples. At the same time, the more active acoustic emission signal will appear. The coal samples under linear loading are on the initial damage state, and slight fatigue, moderate fatigue, deep fatigue, and ultimate fatigue failure under cyclic loading. The acoustic emission shows the “L-” type development evolution law in any previous stress level range, while at the last stress level, it shows the obvious “U-” type development evolution law. The higher the frequency of the cyclic loading is, the higher the rate of initiation and expansion of the microcrack will be, while the more obvious acoustic emission phenomenon will appear. Furthermore, the ringing counting rate is basically the same as that of the energy counting rate. Under triaxial cyclic loading, a shear failure mode that extends along different directions of fracture surface will be presented. The acoustic emission in the range of different stress levels shows a different degree of Felicity effect. In contrast, it is more reasonable to use the principal stress difference as a parameter to study the Felicity effect of coal under cyclic loading

    Investigation of Shear Mechanical Behavior and Slip Weakening Characteristics of Rough Joints in Rock Mass

    No full text
    The surface morphology of a structural plane is an important factor affecting the shear mechanical behavior of a structural plane. A direct shear test of a rough structural plane is carried out, and the shear mechanical behavior and slip weakening characteristics of a structural plane under different levels of roughness and normal stress conditions are studied; the normal stress conditions ranged from 2 MPa to 14 MPa. The results show that the shear strength and shear stress drop of a rough structure increase as the normal stress and roughness levels also increase. The higher the roughness level, or the greater the normal stress level, the more elastic energy the structural plane accumulates before shear failure. Once the shear stress is great enough and shear failure occurs, the shear slip of the rough structural plane shows obvious stick slip characteristics, and it releases more energy. Under high normal stress conditions, the convex body of the structural plane is damaged earlier in the process of direct shear, and the duration of convex body damage and failure is longer. After direct shear, the roughness of the structural plane decreases exponentially as normal stress levels increase. The shear slip of the structural plane, which has a significant degree of roughness under high normal stress conditions, shows a significant number of slip weakening characteristics, which is the main reason that the stick slip of the structural plane releases a lot of energy

    Fatigue Characteristics of Limestone under Triaxial Compression with Cyclic Loading

    No full text
    This paper presents an experimental investigation of the fatigue properties of limestone subjected to triaxial compression with axial cyclic loading. Tests were conducted on intact limestone samples with a loading frequency of 0.5 Hz and a confining pressure of 10 MPa. The test results show the following five points. (1) Under triaxial conditions, the axial and circumferential deformations at the failure point induced by cyclic loading are slightly larger than the corresponding deformations at the peak stress achieved by conventional compression tests. (2) The first level cyclic loading process has a strong influence on rock deformation in the primary phase during subsequent level cyclic loading. A smaller difference in stress amplitude between the two loading stress levels leads to less deformation during the latter. (3) Circumferential and volumetric changes are more sensitive to fatigue failure in terms of deformation and strain rate than axial changes. (4) The three phases of dissipated energy evolution are consistent with a sample’s deformation such that the energy dissipation characteristics reflect the fatigue damage evolution process. (5) A new damage formula is proposed that can concisely describe a rock’s zero-cycle damage and damage evolution

    Study on the fault slip rule and the rockburst mechanism induced by mining the panel through fault

    No full text
    Abstract When mining near the fault can cause the fault to slip and release energy, resulting in rockburst and posing a significant safety risk to coal mine production. This paper proposes a numerical simulation method, based on FLAC3D numerical simulation, for calculating the dynamic response of fault slip below the impact of mining. The release patterns of energy from fault slip are compared between mining via the fault from the hanging wall and mining via the fault from the footwall. The dynamic response characteristics of coal and rock mass under the disturbance of fault slip induced dynamic loading are revealed. This research suggests that the fault slip seismic moment (M 0) of the panel mined via the fault from footwall is substantially higher than from hanging wall. Moreover, the disturbance of the footwall panel mining via the fault leads to a more severe disturbance of the surrounding rock mass, resulting in a higher risk of rockburst. Plastic failure of the rock surrounded in the mining area under the strong dynamic loading of fault slip leads to a significant reduction in peak abutment stress, releasing tremendous energy. When the disturbance caused by fault slip dynamic load is relatively small, the maximum abutment stress increases, and the dynamic load increases the energy storage of surrounding rock. Based on energy theory, an energy criterion for the occurrence of fault slip type rockburst has been proposed. The results suggest that strong fault slip dynamic load has an obvious inducing effect on rockburst, and the stronger the dynamic load and greater static load of the rock, the more the manifestation of rockburst

    Unauthorized Cross-App Resource Access on MAC OS X and iOS

    No full text
    Abstract On modern operating systems, applications under the same user are separated from each other, for the purpose of protecting them against malware and compromised programs. Given the complexity of today's OSes, less clear is whether such isolation is effective against different kind of cross-app resource access attacks (called XARA in our research). To better understand the problem, on the less-studied Apple platforms, we conducted a systematic security analysis on MAC OS X and iOS. Our research leads to the discovery of a series of high-impact security weaknesses, which enable a sandboxed malicious app, approved by the Apple Stores, to gain unauthorized access to other apps' sensitive data. More specifically, we found that the inter-app interaction services, including the keychain and WebSocket on OS X and URL Scheme on OS X and iOS, can all be exploited by the malware to steal such confidential information as the passwords for iCloud, email and bank, and the secret token of Evernote. Further, the design of the App sandbox on OS X was found to be vulnerable, exposing an app's private directory to the sandboxed malware that hijacks its Apple Bundle ID. As a result, sensitive user data, like the notes and user contacts under Evernote and photos under WeChat, have all been disclosed. Fundamentally, these problems are caused by the lack of app-to-app and app-to-OS authentications. To better understand their impacts, we developed a scanner that automatically analyzes the binaries of OS X and iOS apps to determine whether proper protection is missing in their code. Running it on hundreds of binaries, we confirmed the pervasiveness of the weaknesses among high-impact Apple apps. Since the issues may not be easily fixed, we built a simple program that detects exploit attempts on OS X, helping protect vulnerable apps before the problems can be fully addressed. We further discuss the insights from this study and the lessons learnt for building a securer system

    Cloud repository as a malicious service: challenge, identification and implication

    No full text
    Abstract The popularity of cloud hosting services also brings in new security chal- lenges: it has been reported that these services are increasingly utilized by miscreants for their malicious online activities. Mitigating this emerging threat, posed by such “bad repositories” (simply Bar), is challenging due to the different hosting strategy to traditional hosting service, the lack of direct observations of the repositories by those outside the cloud, the reluctance of the cloud provider to scan its customers’ repositories without their consent, and the unique evasion strategies employed by the adversary. In this paper, we took the first step toward understanding and detecting this emerging threat. Using a small set of “seeds” (i.e., confirmed Bars), we identified a set of collective features from the websites they serve (e.g., attempts to hide Bars), which uniquely characterize the Bars. These features were utilized to build a scanner that detected over 600 Bars on leading cloud platforms like Amazon, Google, and 150 K sites, including popular ones like groupon.com , using them. Highlights of our study include the pivotal roles played by these repositories on malicious infrastructures and other important discoveries include how the adversary exploited legitimate cloud repositories and why the adversary uses Bars in the first place that has never been reported. These findings bring such malicious services to the spotlight and contribute to a better understanding and ultimately eliminating this new threat

    Your Software at my Service

    No full text
    corecore