期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A study of multi-pass scheduling methods for die-less spinning 被引量:3
1
作者 Hai GUO Jin WANG +2 位作者 Guo-dong LU Zi-han SANG Qi-hang WANG 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2017年第6期413-429,共17页
The multi-pass scheduling method is a key issue in die-less spinning for determining the quality of the final products, including their shape deviations and wall thicknesses, and has drawn increasing interest in recen... The multi-pass scheduling method is a key issue in die-less spinning for determining the quality of the final products, including their shape deviations and wall thicknesses, and has drawn increasing interest in recent studies devoted to trying to improve the accuracy of the formed parts. In this paper, two main parameters, roller path profiles and deformation allocations in each pass, are considered in newly proposed multi-pass scheduling and optimizing methods in die-less spinning. Four processing methods with different roller path profiles and with three deformation allocation methods are proposed for investigating the influence of scheduling parameters on product qualities. The 'similar geometry principle for restraining shape deviation' and the 'small curvature principle for maintaining wall thickness' are presented for optimal design of roller path profiles; in addition, the 'uniform allocation principle for maintaining wall thickness' and the 'large deformation principle for restraining shape deviation' are brought forward as suggestions for deformation allocations. Based on these principles, a scheduling method denoted by RF+(FP & EHS) is presented to improve the comprehensive quality of a product of die-less spinning. 展开更多
关键词 Die-less spinning Pass schedules Shape deviations Roller path profiles Deformation allocations
原文传递
Active cybersecurity:vision,model,and key technologies
2
作者 Xiaosong ZHANG Yukun ZHU +6 位作者 Xiong LI Yongzhao ZHANG Weina NIU Fenghua XU Junpeng HE Ran YAN Shiping HUANG 《Frontiers of Information Technology & Electronic Engineering》 2025年第8期1243-1278,共36页
Noncooperative computer systems and network confrontation present a core challenge in cyberspace security.Traditional cybersecurity technologies predominantly rely on passive response mechanisms,which exhibit signific... Noncooperative computer systems and network confrontation present a core challenge in cyberspace security.Traditional cybersecurity technologies predominantly rely on passive response mechanisms,which exhibit significant limitations when addressing real-world complex and unknown threats.This paper introduces the concept of“active cybersecurity,”aiming to enhance network security not only through technical measures but also by leveraging strategy-level defenses.The core assumption of this concept is that attackers and defenders,in the context of network confrontations,act as rational decision-makers seeking to maximize their respective objectives.Building on this observation,this paper integrates game theory to analyze the interdependent relationships between attackers and defenders,thereby optimizing their strategies.Guided by this foundational idea,we propose an active cybersecurity model involving intelligent threat sensing,in-depth behavior analysis,comprehensive path profiling,and dynamic countermeasures,termed SAPC,designed to foster an integrated defense capability encompassing threat perception,analysis,tracing,and response.At its core,SAPC incorporates theoretical analyses of adversarial behavior and the optimization of corresponding strategies informed by game theory.By profiling adversaries and modeling confrontation as a“game,”the model establishes a comprehensive framework that provides both theoretical insights into and practical guidance for cybersecurity.The proposed active cybersecurity model marks a transformative shift from passive defense to proactive perception and confrontation.It facilitates the evolution of cybersecurity technologies toward a new paradigm characterized by active prediction,prevention,and strategic guidance. 展开更多
关键词 Active cybersecurity Intelligent threat sensing In-depth behavior analysis Comprehensive path profiling Dynamic countermeasures
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部