期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Optimization of reheating furnace rolling delay strategies based on a minimum energy consumption principle
1
作者 Jing-qi Qiu Jun-xiao Feng +1 位作者 Xian-mo Huang Zhi-feng Huang 《Journal of Iron and Steel Research International》 2025年第3期707-719,共13页
To provide an energy-efficient and slab-demand-compliant rolling delay strategy,the simulation software is utilized to calculate the rolling delay process of the reheating furnace.Based on energy consumption evaluatio... To provide an energy-efficient and slab-demand-compliant rolling delay strategy,the simulation software is utilized to calculate the rolling delay process of the reheating furnace.Based on energy consumption evaluation,two optimization methods were employed.The bisection approach uses the needs of the slab to estimate the rolling delay temperature,and the golden section search method uses the energy consumption analysis of the slab to determine the high-temperature insulation duration.Generally,the slab closest to the discharge position in the control zone is selected as the optimization target.The optimized slab does not show a significant temperature rise after the end of the rolling delay process.When comparing the optimized rolling delay strategies with the traditional ones,the optimized rolling delay strategies not only meet the output requirements for slabs but also offer significant advantages in terms of energy efficiency,and this advantage increases with rolling delay time. 展开更多
关键词 Rolling delay strategy Rolling delay process Bisection method Golden section search method Energy consumption analysis
原文传递
Acetylcholinesterase inhibitor modifications: a promising strategy to delay the progression of Alzheimer's disease 被引量:5
2
作者 Soumee Bhattacharya Dirk Montag 《Neural Regeneration Research》 SCIE CAS CSCD 2015年第1期43-45,共3页
Alzheimer's disease (AD), a fatal, progressive, neurodegener- ative disorder, is the most common cause of old-age demen- tia, accounting for 50-75% of dementia patients. Early stages of AD are marked by vocabulary ... Alzheimer's disease (AD), a fatal, progressive, neurodegener- ative disorder, is the most common cause of old-age demen- tia, accounting for 50-75% of dementia patients. Early stages of AD are marked by vocabulary shrinkage, spatial disori- entation, depression, apraxia, and deterioration of recent forms of declarative memory. In course of time, the patients require close supervision due to the loss of cognitive and functional abilities, and at the terminal stages of the disease, all forms of memory are severely impaired with the patients needing nursing home care (World Alzheimer Report, 2013). 展开更多
关键词 Acetylcholinesterase inhibitor modifications a promising strategy to delay the progression of Alzheimer’s disease ACH ORAL
暂未订购
Delay-CJ:A novel cryptojacking covert attack method based on delayed strategy and its detection 被引量:1
3
作者 Guangquan Xu Wenyu Dong +6 位作者 Jun Xing Wenqing Lei Jian Liu Lixiao Gong Meiqi Feng Xi Zheng Shaoying Liu 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1169-1179,共11页
Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once beca... Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once became the greatest threat to network security.To better prove the attack ability the harm caused by cryptojacking,this paper proposes a new covert browser-based mining attack model named Delay-CJ,this model was deployed in a simulation environment for evaluation.Based on the general framework of cryptojacking,Delay-CJ adds hybrid evasion detection techniques and applies the delayed execution strategy specifically for video websites in the prototype implementation.The results show that the existing detection methods used for testing may become invalid as result of this model.In view of this situation,to achieve a more general and robust detection scheme,we built a cryptojacking detection system named CJDetector,which is based on cryptojacking process features.Specifically,it identifies malicious mining by monitoring CPU usage and analyzing the function call information.This system not only effectively detects the attack in our example but also has universal applicability.The recognition accuracy of CJDetector reaches 99.33%.Finally,we tested the web pages in Alexa 50K websites to investigate cryptojacking activity in the real network.We found that although cryptojacking is indeed on the decline,it remains a part of network security threats that cannot be ignored. 展开更多
关键词 Cryptojacking Evasion techniques delayed strategy Cryptocurrency mining Behavior-based detection
在线阅读 下载PDF
Mathematical Model of Dynamic Operation and Optimum Control of Billet Reheating Furnace 被引量:1
4
作者 刘日新 宁宝林 《Journal of Materials Science & Technology》 SCIE EI CAS CSCD 1992年第4期279-283,共5页
This paper provides a mathematical model for the billet reheating process in furnace.A new optimum method is brought up that the objective function is the integral value of enthalpy increasing process of a billet.Diff... This paper provides a mathematical model for the billet reheating process in furnace.A new optimum method is brought up that the objective function is the integral value of enthalpy increasing process of a billet.Different delays are simulated and calculated,some proper delay strategies are ob- tained.The on-line computer control model is de- veloped.The real production conditions simulated, the temperature deviation of drop out billet from the target temperature is kept within±15℃. 展开更多
关键词 reheating furnace enthalpy increasing process delay strategy on-line computer control mathematical model
在线阅读 下载PDF
Delay Time Measurement and Comparison of Protection Strategies with One-Link Failed Domestic Optical Fiber Networks in Taiwan
5
作者 Shyh-Lin Tsao Lan-Chih Yang 《光学学报》 EI CAS CSCD 北大核心 2003年第S1期-,共2页
In this paper, we study the protection strategies of domestic optical fiber networks in Taiwan. Delay time experiment of two one-link failed cases are also reported and compared. We can get best protection strategy an... In this paper, we study the protection strategies of domestic optical fiber networks in Taiwan. Delay time experiment of two one-link failed cases are also reported and compared. We can get best protection strategy and bypass the optical transmission signal at shortest delay time. 展开更多
关键词 link work it as in delay Time Measurement and Comparison of Protection Strategies with One-Link Failed Domestic Optical Fiber Networks in Taiwan of
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部