期刊文献+
共找到33篇文章
< 1 2 >
每页显示 20 50 100
STUDY ON THE METHODS OF STRUCTURALDYNAMIC MODIFICATION OPTIMIZATION OF ROAD HEADERS
1
作者 吴淼 黄民 +1 位作者 王建军 魏任之 《Journal of China University of Mining and Technology》 1996年第2期62-68,共7页
In this paper, taking AM-50 Road Heaer as an example, the metheds of structural dynamic modification optimization for road headers are studied using experimental modal analysis and physical parameters analysis. The ma... In this paper, taking AM-50 Road Heaer as an example, the metheds of structural dynamic modification optimization for road headers are studied using experimental modal analysis and physical parameters analysis. The machine’s modal model and lumped mass model are established and the vibration response simulation is calculated for the two models with the load spectral measured. On the above basis, the dynamic parameters of the models are optimised and some useful results have been obtained.The research methods in this paper can be used for the reference to the other lager type mining machines. 展开更多
关键词 tunneling machine road headers structural dynamic medification
在线阅读 下载PDF
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques
2
作者 Maduhu Mshangi Mlyatu Camilius Sanga 《Journal of Information Security》 2023年第1期1-15,共15页
This paper investigates whether security headers are enforced to mitigate cyber-attacks in web-based systems in cyberspace. The security headers examined include X-Content-Type-Options, X-Frame-Options, Strict-Transpo... This paper investigates whether security headers are enforced to mitigate cyber-attacks in web-based systems in cyberspace. The security headers examined include X-Content-Type-Options, X-Frame-Options, Strict-Transport-Security, Referrer-Policy, Content-Security-Policy, and Permissions-Policy. The study employed a controlled experiment using a security header analysis tool. The web-based applications (websites) were analyzed to determine whether security headers have been correctly implemented. The experiment was iterated for 100 universities in Africa which are ranked high. The purposive sampling technique was employed to understand the status quo of the security headers implementations. The results revealed that 70% of the web-based applications in Africa have not enforced security headers in web-based applications. The study proposes a secure system architecture design for addressing web-based applications’ misconfiguration and insecure design. It presents security techniques for securing web-based applications through hardening security headers using automated threat modelling techniques. Furthermore, it recommends adopting the security headers in web-based applications using the proposed secure system architecture design. 展开更多
关键词 Secure Web Applications Security headers Systems Security Secure Web Architecture Design
在线阅读 下载PDF
An Analysis of the Influence of Protective Films on the Inner Surfaces of CCPP Headers and Steam Pipelines on Their Thermal Stress State
3
作者 Yury A. Radin Tatiana S. Kontorovich 《American Journal of Analytical Chemistry》 2017年第1期116-124,共9页
At present, the main attention of researchers is paid to the deterioration of heat transfer when heating the outer surface of the pipe with the liquid or steam, flowing inside it, in the presence of films or deposits ... At present, the main attention of researchers is paid to the deterioration of heat transfer when heating the outer surface of the pipe with the liquid or steam, flowing inside it, in the presence of films or deposits on its inner surface. However, when pipe is heating by heat carrier medium, flowing inside it, film on the inner pipe surface serve a dual protective function, protecting the pipe from corrosion and reducing its thermal stress. The article represents the results of the computational analysis of protective films influence on the thermal stressed state of headers and steam pipelines of combined-cycle power plants (CCPP) heat-recovery steam generators at different transient operating conditions particularly at startups from different initial temperature states and thermal shock. It is shown that protective films have a significant influence on the stresses magnitude and damage accumulation mainly for great temperature disturbances (for thermal shock). Calculations were carried out at various thicknesses of films and assuming that their thermal conductivity less than thermal conductivity of the steam pipelines metal. 展开更多
关键词 Heat-Recovery STEAM GENERATOR HEADER STEAM Pipeline Protective Film Stress THERMAL Shock STARTUP EQUIVALENT Operating Hours
暂未订购
Sentence Level Analysis Model for Phishing Detection Using KNN
4
作者 Lindah Sawe Joyce Gikandi +1 位作者 John Kamau David Njuguna 《Journal of Cyber Security》 2024年第1期25-39,共15页
Phishing emails have experienced a rapid surge in cyber threats globally,especially following the emergence of the COVID-19 pandemic.This form of attack has led to substantial financial losses for numerous organizatio... Phishing emails have experienced a rapid surge in cyber threats globally,especially following the emergence of the COVID-19 pandemic.This form of attack has led to substantial financial losses for numerous organizations.Although variousmodels have been constructed to differentiate legitimate emails fromphishing attempts,attackers continuously employ novel strategies to manipulate their targets into falling victim to their schemes.This form of attack has led to substantial financial losses for numerous organizations.While efforts are ongoing to create phishing detection models,their current level of accuracy and speed in identifying phishing emails is less than satisfactory.Additionally,there has been a concerning rise in the frequency of phished emails recently.Consequently,there is a pressing need for more efficient and high-performing phishing detection models to mitigate the adverse impact of such fraudulent messages.In the context of this research,a comprehensive analysis is conducted on both components of an email message—namely,the email header and body.Sentence-level characteristics are extracted and leveraged in the construction of a new phishing detection model.This model utilizes K Nearest Neighbor(KNN)introducing the novel dimension of sentence-level analysis.Established datasets fromKagglewere employed to train and validate the model.The evaluation of this model’s effectiveness relies on key performance metrics including accuracy of 0.97,precision,recall,and F1-measure. 展开更多
关键词 Sentence level analysis email header email body phishing detection KNN
在线阅读 下载PDF
新型SQL注入攻击的研究与防范 被引量:4
5
作者 赵阳 郭玉翠 《计算机系统应用》 2016年第6期225-230,共6页
针对一种以HTTP Headers为途径的新型SQL注入攻击进行了深入研究.通过分析具体的SQL注入实例,揭示了该新型SQL注入攻击的原理,并提出了针对此类攻击的防范手段.通过ip过滤,数据校验,机器学习等手段建立了一套完整的防御模型,且该模型具... 针对一种以HTTP Headers为途径的新型SQL注入攻击进行了深入研究.通过分析具体的SQL注入实例,揭示了该新型SQL注入攻击的原理,并提出了针对此类攻击的防范手段.通过ip过滤,数据校验,机器学习等手段建立了一套完整的防御模型,且该模型具有低侵入、易实现、高可用、强扩展等优点. 展开更多
关键词 新型SQL注入攻击 网络安全 HTTP headers 防御模型
在线阅读 下载PDF
模糊算法在高校教师评价系统中的应用研究 被引量:8
6
作者 谢晋 《软件》 2015年第8期22-24,共3页
高校教师教学的评价关系到教师教学水平的提升,也关系到学校乃至整个教育事业的发展,教学评价在教育领域占据非常重要的位置。为了客观有效的做好教师教学评价工作,我们针对高校教师教学评价工作的模糊性,运用模糊数学理论,研究在高校... 高校教师教学的评价关系到教师教学水平的提升,也关系到学校乃至整个教育事业的发展,教学评价在教育领域占据非常重要的位置。为了客观有效的做好教师教学评价工作,我们针对高校教师教学评价工作的模糊性,运用模糊数学理论,研究在高校教师教学评价中模糊算法的应用方法。 展开更多
关键词 模糊算法 教学评价 评价指标 ROUTING HEADER
在线阅读 下载PDF
使用JavaScript脚本为某视频网站增加下载功能
7
作者 关悦 于欣 +2 位作者 李京 苑博 董燕明 《电脑编程技巧与维护》 2014年第17期29-29,57,共2页
通过对工作中涉及的某视频网站分析以及脚本编写,实现为该网站增加视频下载功能。
关键词 视频网站 LIVE HTTP headers JavaScript技术
在线阅读 下载PDF
基于单片机的MIDI文件中delta-time的实现 被引量:1
8
作者 潘晓利 刘永志 《现代计算机》 2008年第2期144-146,共3页
在单片机与某些MIDI模块进行通信时,由单片机将MIDI文件发送给MIDI模块时,MIDI模块仅能执行MIDI命令,不能识别和执行MIDI文件中的delta-time,而delta-time又是MIDI文件中非常重要的部分,在这种情况下单片机就要根据delta-time的特征,完... 在单片机与某些MIDI模块进行通信时,由单片机将MIDI文件发送给MIDI模块时,MIDI模块仅能执行MIDI命令,不能识别和执行MIDI文件中的delta-time,而delta-time又是MIDI文件中非常重要的部分,在这种情况下单片机就要根据delta-time的特征,完成识别并执行delta-time的任务。 展开更多
关键词 HEADER CHUNK TRACK CHUNK delta-time 可变长度
在线阅读 下载PDF
Effect of Header Configuration on Refrigerant Distribution in Parallel Flow Microchannel Evaporators 被引量:3
9
作者 YU Dengjia LIU Jinwei +3 位作者 Lü Hongbin SHI Junye YOU Dian CHEN Jiangping 《Journal of Shanghai Jiaotong university(Science)》 EI 2019年第3期273-280,共8页
The refrigerant flow distribution in the parallel flow microchannel evaporators is experimentally investigated to study the effect of header configuration.Six different configurations are tested in the same evaporator... The refrigerant flow distribution in the parallel flow microchannel evaporators is experimentally investigated to study the effect of header configuration.Six different configurations are tested in the same evaporator by installing insertion device and partition plate in the header to ensure the consistency of the other structure parameters.The results show that the uniformity of refrigerant flow distribution and the heat transfer rate are greatly improved by reducing the sectional area of header.The heat transfer rate can increase by 67.93%by reducing the sectional area of both inlet and outlet headers.The uniformity of refrigerant flow distribution and the heat transfer rate become worse after installing the partition plate in the insertion devices and changing the inner structure of the header further. 展开更多
关键词 refrigerant distribution HEADER microchannel evaporator two-phase flow
原文传递
Land 3D-Seismic Data: Preprocessing Quality Control Utilizing Survey Design Specifications, Noise Properties, Normal Moveout, First Breaks, and Offset 被引量:2
10
作者 Abdelmoneam Raef 《Journal of China University of Geosciences》 SCIE CSCD 2009年第3期640-648,共9页
The recent proliferation of the 3D reflection seismic method into the near-surface area of geophysical applications, especially in response to the emergence of the need to comprehensively characterize and monitor near... The recent proliferation of the 3D reflection seismic method into the near-surface area of geophysical applications, especially in response to the emergence of the need to comprehensively characterize and monitor near-surface carbon dioxide sequestration in shallow saline aquifers around the world, justifies the emphasis on cost-effective and robust quality control and assurance (QC/QA) workflow of 3D seismic data preprocessing that is suitable for near-surface applications. The main purpose of our seismic data preprocessing QC is to enable the use of appropriate header information, data that are free of noise-dominated traces, and/or flawed vertical stacking in subsequent processing steps. In this article, I provide an account of utilizing survey design specifications, noise properties, first breaks, and normal moveout for rapid and thorough graphical QC/QA diagnostics, which are easy to apply and efficient in the diagnosis of inconsistencies. A correlated vibroseis time-lapse 3D-seismic data set from a CO2-flood monitoring survey is used for demonstrating QC diagnostics. An important by-product of the QC workflow is establishing the number of layers for a refraction statics model in a data-driven graphical manner that capitalizes on the spatial coverage of the 3D seismic data. 展开更多
关键词 PREPROCESSING quality control 3D seismic 4D seismic trace header geometry vertical stacking.
原文传递
Mechanical Stress Analysis of a 600MW Supercritical Boiler Superheater Outlet Header 被引量:2
11
作者 Dongyi Li Zhongguang Fu +1 位作者 Qiang Zhang Ting He 《Engineering(科研)》 2013年第1期66-68,共3页
The mechanical stress distribution and the stress concentrations of the superheater outlet header of a 600MW supercritical boiler were analyzed by the finite element method. The results showed that the stress concentr... The mechanical stress distribution and the stress concentrations of the superheater outlet header of a 600MW supercritical boiler were analyzed by the finite element method. The results showed that the stress concentrated at the inside conjunction area between the pipe and the header cylinder , and the value of the maximum mechanical stress concentration factor is 2.51. 展开更多
关键词 SUPERHEATER OUTLET HEADER FINITE ELEMENT Method Stress CONCENTRATION
在线阅读 下载PDF
浅谈IPv6的安全机制
12
作者 梁勇 《福建电脑》 2006年第5期61-62,共2页
目前Internet中广泛使用的IPv4协议,也就是人们常说的IP协议,已经有几十年的历史了。自20世纪90年代起,互联网和个人计算机得到广泛普及,IPv4地址资源严重不足,安全问题日益突出。1994年后IETF提出一种新IP地址解决方案,被称为IPv6。IPv... 目前Internet中广泛使用的IPv4协议,也就是人们常说的IP协议,已经有几十年的历史了。自20世纪90年代起,互联网和个人计算机得到广泛普及,IPv4地址资源严重不足,安全问题日益突出。1994年后IETF提出一种新IP地址解决方案,被称为IPv6。IPv6不但解决了IP地址匮乏的问题,并且由于它引入了加密和认证机制.实现了基于网络层的身份认证,确保了数据包的完整性和机密性。 展开更多
关键词 IP SECURITY 传送模式 隧道模式 AH(Authentication Header) ESP(Encapsulating SECURITY Payload)
在线阅读 下载PDF
AP1000核电站系统清洗方法的实践与探索 被引量:1
13
作者 韩培迪 魏义存 《能源与节能》 2015年第2期63-64,89,共3页
针对AP1000工艺系统冲洗过程中较多管线无法形成闭合回路的情况,采用合理的冲洗方案,以特有的高压水枪机械清洗方法配合传统的一次通过式、循环冲洗和手工擦拭等方式,针对碳钢管道使用高效的CUNO过滤器,能够在冲洗时间、质量控制方面取... 针对AP1000工艺系统冲洗过程中较多管线无法形成闭合回路的情况,采用合理的冲洗方案,以特有的高压水枪机械清洗方法配合传统的一次通过式、循环冲洗和手工擦拭等方式,针对碳钢管道使用高效的CUNO过滤器,能够在冲洗时间、质量控制方面取得良好效果。 展开更多
关键词 AP1000系统清洗 除盐水水质 Flush Header冲洗方案 高压水枪
在线阅读 下载PDF
NUMERICAL STUDY ON FLOW DISTRIBUTION IN PLATE-FIN HEAT EXCHANGERS
14
作者 张哲 厉彦忠 《Journal of Pharmaceutical Analysis》 SCIE CAS 2003年第2期162-165,共4页
Objective To investigate the flow distribution in plate fin heat exchangers and optimize the design of header configuration for plate fin heat exchangers. Methods A mathematical model of header was proposed. The e... Objective To investigate the flow distribution in plate fin heat exchangers and optimize the design of header configuration for plate fin heat exchangers. Methods A mathematical model of header was proposed. The effects of the header configuration on the flow distribution in plate fin heat exchangers were investigated by CFD. The second header configuration with a two stage distributing structure was brought forward to improve the performance of flow distribution. Results It is found that the flow maldistribution is very serious in the direction of header length for the conventional header used in industry. The numerical predictions indicate that the improved header configurations can effectively improve the performance of flow distribution in plate fin heat exchangers. Conclusion The numerical simulation confirms that CFD should be a suitable tool for predicting the flow distribution. The method has a wide variety of applications in the design of plate fin heat exchangers. 展开更多
关键词 plate fin heat exchanger flow distribution header configuration CFD
在线阅读 下载PDF
An Automatic Test System in Robot Welding Station
15
作者 李瑞峰 陶谦 +1 位作者 蔡鹤皋 候琳祺 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1996年第4期26-29,共4页
AnAutomaticTestSysteminRobotWeldingStationLIRuifeng;TAOQian;CAIHegao;HOULinqi(李瑞峰)(陶谦)(蔡鹤皋)(候琳祺)(RobotResear... AnAutomaticTestSysteminRobotWeldingStationLIRuifeng;TAOQian;CAIHegao;HOULinqi(李瑞峰)(陶谦)(蔡鹤皋)(候琳祺)(RobotResearchInstitute,Harbi... 展开更多
关键词 ss: ROBOT WELDING HEADER TEST
在线阅读 下载PDF
A Study on Control System of Robot Working Unit for Automatically Welding Nipples onto Header of Boiler
16
作者 陶谦 于树锋 +1 位作者 姜山 曹佩军 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1996年第2期64-68,共5页
The difficult problem of automatically welding nipples onto the header is first analyzed in this paper, and then the overall structure and operating principle of the robot working unit are introduced. The robot and th... The difficult problem of automatically welding nipples onto the header is first analyzed in this paper, and then the overall structure and operating principle of the robot working unit are introduced. The robot and the measuring device are located by employing the traveling lorry, and this unit enables the robot to adjust the tracks according to the errors received from the measuring device, and then the nipples are welded properly. This paper emphases on the development of the master-slave control system, in which the prograrmmable Logic Controller (PLC) is used as the master computer. 展开更多
关键词 ss:Header nipple PLC ROBOT CONTROL WELDING working UNIT master-slave CONTROL
在线阅读 下载PDF
Priority Based Data Reporting Algorithm in Wireless Sensor Networks
17
作者 曾斌 姚路 胡炜 《Journal of Shanghai Jiaotong university(Science)》 EI 2017年第1期60-65,共6页
A cluster-based organization with two phases to separate priority calculation and network activity operations is developed. In the election-state phase, clusters are organized by those nodes with sufficient residual e... A cluster-based organization with two phases to separate priority calculation and network activity operations is developed. In the election-state phase, clusters are organized by those nodes with sufficient residual energy level(REL) that are distributed as evenly as possible in the network. For each network round, each node decides its role(such as, cluster header(CH) or a normal node) and its priority level for activity operation. The priority level also affects the active/sleep scheduling in the node. In the steady-state phase, the positive priority levels of active nodes determine their activity order to avoid transmission collision, and to reduce redundant data transmission and sensing coverage. Since the data reporting to the sink is usually performed by a CH delivery chain, subsidiary CHs are selected to assist with data delivery and to share the loading of CHs. The formulae for computing priority levels are analyzed and verified by the examples with valid parameters. The experimental results show that the two phases efficiently consume node energy and achieve energy savings. 展开更多
关键词 wireless sensor network (WSN) data reporting energy efficient cluster header (CH) TP 393 A
原文传递
Hopping-Aware Cluster Header Capability for Sensor Relocation in Mobile IoT Networks
18
作者 Moonseong Kim Jaeyoung Park +1 位作者 Young-Joon Kim Woochan Lee 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1613-1625,共13页
Mobile sensor nodes such as hopping sensors are of critical importance in data collection.However,the occurrence of sensing holes is unavoidable due to the energy limitation of the nodes.Thus,it is evident that the re... Mobile sensor nodes such as hopping sensors are of critical importance in data collection.However,the occurrence of sensing holes is unavoidable due to the energy limitation of the nodes.Thus,it is evident that the relocation of mobile sensors is the most desirable method to recover the sensing holes.The previous research conducted by the authors so far demonstrated the most realistic hopping sensor relocation scheme,which is suitable for the distributed environment.In previous studies,the cluster header plays an essential role in detecting the sensing hole and requesting the neighboring cluster to recover the sensing hole that occurred in the sensor node.However,the limitations of the cluster header in the previously proposed relocation protocol are not fully considered.Because the cluster header jumps more frequently than non-header nodes,its energy con-sumption is relatively high compared to other nodes.Therefore,it is most likely to lead to header node failure and can lead to data loss on the network.In this paper,the jumping ability and energy consumption of the cluster header are seriously considered.Additional ability to replace cluster headers in case of failure is also implemented.Simulation results show that the data collection time can be further increased,which demonstrates the validity of the proposed algorithms. 展开更多
关键词 Hopping sensor mobileinternetofthings relocationprotocol header node numericalsimulation
在线阅读 下载PDF
Impact of Portable Executable Header Features on Malware Detection Accuracy
19
作者 Hasan H.Al-Khshali Muhammad Ilyas 《Computers, Materials & Continua》 SCIE EI 2023年第1期153-178,共26页
One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious... One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious files.In this study,an exclusive set of 29 features was collected from trusted implementations,this set was used as a baseline to analyze the presented work in this research.A Decision Tree(DT)and Neural Network Multi-Layer Perceptron(NN-MLPC)algorithms were utilized during this work.Both algorithms were chosen after testing a few diverse procedures.This work implements a method of subgrouping features to answer questions such as,which feature has a positive impact on accuracy when added?Is it possible to determine a reliable feature set to distinguish a malicious PE file from a benign one?when combining features,would it have any effect on malware detection accuracy in a PE file?Results obtained using the proposed method were improved and carried few observations.Generally,the obtained results had practical and numerical parts,for the practical part,the number of features and which features included are the main factors impacting the calculated accuracy,also,the combination of features is as crucial in these calculations.Numerical results included,finding accuracies with enhanced values,for example,NN_MLPC attained 0.979 and 0.98;for DT an accuracy of 0.9825 and 0.986 was attained. 展开更多
关键词 AI driven cybersecurity artificial intelligence CYBERSECURITY Decision Tree Neural Network Multi-Layer Perceptron Classifier portable executable(PE)file header features
在线阅读 下载PDF
The trend of mechanizing road header for coal mine entry
20
作者 HUI Xing-tian 《Journal of Coal Science & Engineering(China)》 2010年第1期99-103,共5页
In discussing coal mine entry construction with rock bolt technology, examinedthe craft and machinery problems as well as the conditions in which to use each kind ofmachine and tool.It exposed the intrinsic flaws of t... In discussing coal mine entry construction with rock bolt technology, examinedthe craft and machinery problems as well as the conditions in which to use each kind ofmachine and tool.It exposed the intrinsic flaws of the widely used road header.The problemis that it was designed according to early timbering support state but is not suitable forrock bolt technology.The way to improve the function of existing road headers is notthrough parallel operations but using the SUDM (Shield Union Driving Machine), which isa new machine that improves construction.This article proposed a few solutions in designto solve this problem. 展开更多
关键词 coalmine gateway mine entry construction road header mechanization suggestion
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部