A novel method of coupled SPH with smoothed point interpolation method (S-PIM) has been employed to simulate the 2-D problem of liquid sloshing with multiple flexible baffles. In this simulation, the exciting force en...
详细信息
Traffic congestion problem has become a bottleneck restricting the development of modern transportation systems, and accordingly the networked traffic system has drawn lots of researcher's attention. To enhance tr...
详细信息
ISBN:
(纸本)9781510868755
Traffic congestion problem has become a bottleneck restricting the development of modern transportation systems, and accordingly the networked traffic system has drawn lots of researcher's attention. To enhance transportation efficiency on scale-free networks, we proposed a hybridinformation-based(HIB) queuing strategy, where one packet's priority is related to its available transmission resource in the surplus path and current distance to destination. Numerical results show that the HIB queuing strategy perform much better than the traditional first-in-first-out(FIFO) queuing strategy in the congestion state, and the average travelling time, the rate of waiting time to travelling time Pwt and the packet arrived rate which can reflect transportation efficiency are improved remarkably. Our work should be valuable and helpful for research on networked traffic systems.
In order to improve the transmission efficiency, security and anonymity of Tor anonymous communication system, this paper analyzes the efficiency of Tor anonymous system through research and analysis of the security a...
详细信息
In order to improve the transmission efficiency, security and anonymity of Tor anonymous communication system, this paper analyzes the efficiency of Tor anonymous system through research and analysis of the security and vulnerability of transmission mechanism, encryption rules and node distribution of Tor anonymous network system, and then proposes an efficient improved model EFTAN for Tor anonymous network, and finally obtains a network system that can improve the efficiency, security and anonymity of the anonymous communication.
With the widespread application of embedded devices,embedded software vulnerabilities and oriented attacks to embedded system are also *** being wellknown,the hardware architecture of the embedded devices is heterogen...
详细信息
With the widespread application of embedded devices,embedded software vulnerabilities and oriented attacks to embedded system are also *** being wellknown,the hardware architecture of the embedded devices is heterogeneous,and the software stacks on them are customizable and flexible as *** dynamic information extraction and analysis technologies have been successfully used for general platform in vulnerability mining,malicious code detection and so on,its usage on embedded system lags behind *** paper provides(1) a CrossPlatform-Dynamic Instrumentation Framework,which,by leveraging an extensible intermediate code module and a semantic constraint database,decouples the instrumentation plugins from underlying hardware and OS;(2) a set of instrumentation interfaces which may be implemented by plugins to extract runtime state of various code granularity;(3) ability of system semantic introspection to extract processes and modules information(system semantic views),by using system attribute description files and abstract state extraction *** with TEMU and DECAF,our method shows more advantages in performance of abstract state extraction,and reducing the time and memory overhead.
The virtual block device is the data carrier of virtual machine(VM) and user information,while the file system is the ultimate goal of many *** proposed a security device named virtual block device mapping to file(VBD...
详细信息
The virtual block device is the data carrier of virtual machine(VM) and user information,while the file system is the ultimate goal of many *** proposed a security device named virtual block device mapping to file(VBD-MF) that can translate block-level operations into file-level ones by building a mapping from blocks to ***-MF could provide an out-of-VM way to monitor the file system with no modification on the code of virtual machine monitor(VMM)and guest OS,and it also provided other security tools and methods with direct interface to operate the file *** implemented a prototype on Linux and *** evaluation shows that VBD-MF has a better capability of monitoring with some loss on performance of read and *** to the traditional monitoring of host-based file system,VBD-MF has a better hidden and safety property.
Program logical controllers(PLCs) are the kernel equipment of industrial control system(ICS) as they directly monitor and control industrial processes. Recently, ICS is suffering from various cyber th
ISBN:
(纸本)9781467389808
Program logical controllers(PLCs) are the kernel equipment of industrial control system(ICS) as they directly monitor and control industrial processes. Recently, ICS is suffering from various cyber th
A periodic load balancing method is proposed according to the load imbalance of network server in a clustered system of high concurrency. It is divided into different load periods based on the load condition of server...
详细信息
A periodic load balancing method is proposed according to the load imbalance of network server in a clustered system of high concurrency. It is divided into different load periods based on the load condition of server node. Corresponding load balancing strategy is adopted for each period that the strategy of fast select is used in the period of small load while the server node with stable response time is first adopted in the period of large load. Periodic load strategy avoids the load imbalance caused by the single load strategy. It can be known from the experimental comparison that the improved periodic load balancing strategy is superior to the load balancing strategy of weighted least connection.
With the rapid development and extensive use of the Internet,network security is the key point of the current research of computer *** router is the key interconnection equipment in the Internet system,and it is neces...
详细信息
With the rapid development and extensive use of the Internet,network security is the key point of the current research of computer *** router is the key interconnection equipment in the Internet system,and it is necessary to improve the security of the router *** routing protocol is used in the packet switching *** communication is implemented by each switching node in the network to forward data *** present,most of the router intrusion detection systems are based on the machine learning *** paper proposes a Long Short Term Memory(LSTM) architecture applied to the Recurrent Neural Network(RNN),and uses the KDD Cup 1999 data set to train the IDS *** performance testing,the ability to efficiently and accurately classify network traffic into attacks and normal capabilities.
REST NBI (REST Northbound API) is the mainstream NBI implementation method of current SDN controllers, but none of them has achieved authorization management, which leads to serious privilege abuse problems. In this p...
详细信息
The 3d-transition-metal (hydro)oxides belong to a group of highly efficient, scalable and inexpensive electrocatalysts for widespread energy-related applications that feature easily tailorable crystal and electronic s...
详细信息
The 3d-transition-metal (hydro)oxides belong to a group of highly efficient, scalable and inexpensive electrocatalysts for widespread energy-related applications that feature easily tailorable crystal and electronic structures. We propose a general strategy to further boost their electrocatalytic activities by introducing organic ligands into the framework, considering that most 3d-metal (hydro)oxides usually exhibit quite strong binding with reaction intermediates and thus compromised activity due to the scaling relations. Involving weakly bonded ligands downshifts the d-band center, which narrows the band gap, and optimizes the adsorption of these intermediates. For example, the activity of the oxygen evolution reaction (OER) can be greatly promoted by ≈5.7 times over a NiCo layered double hydroxide (LDH) after a terephthalic acid (TPA)-induced conversion process, arising from the reduced energy barrier of the deprotonation of OH* to O*. Impressively, the proposed ligand-induced conversion strategy is applicable to a series of 3d-block metal (hydro)oxides, including NiFe 2 O 4 , NiCo 2 O 4 , and NiZn LDH, providing a general structural upgrading scheme for existing high-performance electrocatalytic systems.
暂无评论