This paper mainly studies the change rule of center temperature of welding zone in backwelding furnace under different set temperature and transfer rate conditions, and searches for appropriate temperature and rate to...
详细信息
ISBN:
(纸本)9781665438575
This paper mainly studies the change rule of center temperature of welding zone in backwelding furnace under different set temperature and transfer rate conditions, and searches for appropriate temperature and rate to obtain the optimal furnace temperature curve. Different infinite length plate models were established for the small temperature region and interval respectively, and the heat transfer of each part was considered according to Fourier heat law and Newton cooling law, and the equation about the temperature change with time was constructed based on the law of energy conservation.
Sign languages are the primary medium of communication for the deaf and hearing-impaired community, and the number of human beings with hearing impairment is increasing at a rapid rate. There is a signifîcant com...
详细信息
Adaptive JPEG steganographic schemes are difficult to preserve the image texture features in all scales and orientations when the embedding changes are constrained to the complicated texture regions, then a steganalys...
详细信息
Security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol...
详细信息
The“Principles of Computer Organization” is the core basic course for the construction of computer hardware courses. In this paper, it analyzes the characteristics of the “Principles of Computer Organization “Aimi...
详细信息
ISBN:
(数字)9781728170084
ISBN:
(纸本)9781728170091
The“Principles of Computer Organization” is the core basic course for the construction of computer hardware courses. In this paper, it analyzes the characteristics of the “Principles of Computer Organization “Aiming at the challenges faced by the traditional teaching. This paper makes a beneficial exploration on the teaching reform of the Principle of Computer Composition based on the blended learning mode from the aspects of teaching content, teaching method transformation, interactive communication, evaluation and assessment, etc. This paper proposes a framework for self-learning ability training based on a blended learning model, which is applied and formed in the course of principles. Teaching practice shows that the reform of teaching mode and teaching practice not only stimulates learning interest and motivation of students, but also improves their self-learning ability and practical ability.
Convolutional neural networks have outperformed humans in image recognition tasks, but they remain vulnerable to attacks from adversarial examples. Since these data are crafted by adding imperceptible noise to normal ...
详细信息
Port hopping is a typical technology in moving target defense which constantly changes communication port number to confuse potential attackers and protect target *** port hopping technology,time synchronization is th...
详细信息
Port hopping is a typical technology in moving target defense which constantly changes communication port number to confuse potential attackers and protect target *** port hopping technology,time synchronization is the key problem to be solved since time synchronization can ensure communication port matching and avoid data loss in port hopping ***,in software defined network(SDN),since its architecture differs from traditional network,port hopping technology hasn't been fully applied in *** on timestamp synchronization,this paper creates a port hopping model in software defined network according to its centralized control,data plane and control plane separation as well as programmable *** timestampbased port hopping model,we design a three-party port synchronization mode by utilizing SDN controller and solve the problems in time synchronization such as clock drift and *** theoretical analysis and experimental results show that this proposed timestamp-based port hopping method can effectively resist Do S attack without adding load on SDN controller in software defined network.
Network stealth events are endless,and covert timing channel is one of the most difficult means to *** order to further improve the detection rate of covert timing channel,several typical network covert timing channel...
详细信息
Network stealth events are endless,and covert timing channel is one of the most difficult means to *** order to further improve the detection rate of covert timing channel,several typical network covert timing channel construction algorithms are *** the basis of the above analysis,a detection method based on IPDs multidimensional features was proposed in this *** of covert timing channels from three dimensions:shape,change rule and data statistics are ***,polarization feature,autocorrelation feature,clustering feature are proposed,and the three features are unified into a *** threshold method is used to determine whether the channel to be detected is a normal *** show that the method can detect the existing covert timing channel with less time cost and compared with the traditional detection method has a certain rate of improvement.
Network attacks using advanced local hiding technology have not only increased, but also become a serious threat. However, attacks using these technologies can not be detected through traffic detection, and some attac...
详细信息
Network attacks using advanced local hiding technology have not only increased, but also become a serious threat. However, attacks using these technologies can not be detected through traffic detection, and some attacks imitate benign traffic to avoid detection. To solve these problems, a malware process detection method based on process behavior in possibly infected terminals is proposed. In this method, a deep neural network is introduced to classify malware processes. Firstly, the recurrent neural network is trained to extract the characteristics of process behavior. Secondly, training convolutional neural network is used to classify feature images generated by trained RNN features. The experiments results show that this method can effectively extract the features of malicious processes, and the AUC of ROC curve is 0.97 in the best case.
With the continuous development of computing technology, an increasing number of vendors have integrated SIMD extension components into processors. These components can accelerate program execution efficiency and have...
详细信息
暂无评论