期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
薄壁铝端管加工工艺改进
1
作者 夏春和 赵纯颖 《工具技术》 北大核心 2023年第9期143-146,共4页
针对薄壁铝端管加工中存在的问题,提出了调整装夹方式、改变加工方法、使用新材料刀具、优化工具参数和工艺参数等多个方面的改进方案,解决了加工过程中表面粗糙度不理想、生产效率低、工艺流程分散、工序内容简单和周转次数多等问题,... 针对薄壁铝端管加工中存在的问题,提出了调整装夹方式、改变加工方法、使用新材料刀具、优化工具参数和工艺参数等多个方面的改进方案,解决了加工过程中表面粗糙度不理想、生产效率低、工艺流程分散、工序内容简单和周转次数多等问题,提高了产品生产效率,缩短了加工周期,具有良好的经济性。 展开更多
关键词 铝端管 装夹胎具 PCD刀具 粗糙度 工艺改进
下载PDF
锁键零件的高效高质加工
2
作者 夏春和 赵纯颖 《金属加工(冷加工)》 2023年第11期22-26,共5页
针对锁键零件加工中存在的生产效率低、质量不稳定问题进行原因分析和技术改进,通过优化加工流程、调整装夹方式和加工方法以及应用数控设备和高效刀具等多项工艺措施,取得了很好的加工效果,有效提高了产品质量和生产效率,缩短了零件的... 针对锁键零件加工中存在的生产效率低、质量不稳定问题进行原因分析和技术改进,通过优化加工流程、调整装夹方式和加工方法以及应用数控设备和高效刀具等多项工艺措施,取得了很好的加工效果,有效提高了产品质量和生产效率,缩短了零件的生产周期。 展开更多
关键词 锁键零件 铝合金型材 工艺改进 装夹方式 加工方法 刀具
下载PDF
一种基于深度学习的恶意代码克隆检测技术 被引量:4
3
作者 沈元 严寒冰 +1 位作者 夏春和 韩志辉 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2022年第2期282-290,共9页
恶意代码克隆检测已经成为恶意代码同源分析及高级持续性威胁(APT)攻击溯源的有效方式。从公共威胁情报中收集了不同APT组织的样本,并提出了一种基于深度学习的恶意代码克隆检测框架,目的是检测新发现的恶意代码中的函数与已知APT组织... 恶意代码克隆检测已经成为恶意代码同源分析及高级持续性威胁(APT)攻击溯源的有效方式。从公共威胁情报中收集了不同APT组织的样本,并提出了一种基于深度学习的恶意代码克隆检测框架,目的是检测新发现的恶意代码中的函数与已知APT组织资源库中的恶意代码的相似性,以此高效地对恶意软件进行分析,进而快速判别APT攻击来源。通过反汇编技术对恶意代码进行静态分析,并利用其关键系统函数调用图及反汇编代码作为该恶意代码的特征。根据神经网络模型对APT组织资源库中的恶意代码进行分类。通过广泛评估和与MCrab模型的对比可知,改进模型优于MCrab模型,可以有效地进行恶意代码克隆检测与分类,且获得了较高的检测率。 展开更多
关键词 深度学习 高级持续性威胁(APT)组织 克隆检测 控制流图(CFG) 系统函数调用图
下载PDF
Scalable and Identifier/Locator-Splitting Routing Protocol for Mobile Ad Hoc Networks 被引量:3
4
作者 Wang Haiquan Chen Meng +1 位作者 Hu Junshun xia chunhe 《China Communications》 SCIE CSCD 2012年第1期102-110,共9页
In the traditional Intemet Protocol (IP) architecture, there is an overload of IP sermntic problems. Existing solutions focused mainly on the infrastructure for the fixed network, and there is a lack of support for ... In the traditional Intemet Protocol (IP) architecture, there is an overload of IP sermntic problems. Existing solutions focused mainly on the infrastructure for the fixed network, and there is a lack of support for Mobile Ad Hoc Networks (MANETs). To improve scalability, a routing protocol for MANETs is presented based on a locator named Tree-structure Locator Distance Vector (TLDV). The hard core of this routing method is the identifier/locator split by the Distributed Hash Table (DHT) method, which provides a scalable routing service. The node locator indicates its relative location in the network and should be updated whenever topology changes, kocator space ks organized as a tree-structure, and the basic routing operation of the TLDV protocol is presented. TLDV protocol is compared to some classical routing protocols for MANETs on the NS2 platform Results show that TLDV has better scalability. Key words: 展开更多
关键词 MANETS multi-hop routing identifi- er/locator split distributed hash tables
下载PDF
Semantics-Based Compliance An a lys is o f N e two rk S e cu rity Policy Hie ra rch ie s 被引量:1
5
作者 Yao Shan xia chunhe +2 位作者 Hu Junshun Jiao Jian Li xiaojian 《China Communications》 SCIE CSCD 2012年第7期22-35,共14页
Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflect... Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflects the validity of the policy hierarchies yielded by the automated policy refinement process. However, little attention has been paid to the evaluation of the compliance between the derived lower level policy and the higher level policy. We present an ontology based on Ontology Web Language (OWL) to describe the semantics of security policy and their implementation. We also propose a method of estimating the semantic similarity between a given 展开更多
关键词 policy refinement network security policy semantic similarity ontology
下载PDF
Trust Type Based Trust Bootstrapping Model of Computer Network Collaborative Defense 被引量:2
6
作者 YU Yang xia chunhe +1 位作者 LI Shiying LI Zhong 《China Communications》 SCIE CSCD 2015年第12期133-146,共14页
In the system of Computer Network Collaborative Defense(CNCD),it is difficult to evaluate the trustworthiness of defense agents which are newly added to the system,since they lack historical interaction for trust eval... In the system of Computer Network Collaborative Defense(CNCD),it is difficult to evaluate the trustworthiness of defense agents which are newly added to the system,since they lack historical interaction for trust evaluation.This will lead that the newly added agents could not get reasonable initial trustworthiness,and affect the whole process of trust evaluation.To solve this problem in CNCD,a trust type based trust bootstrapping model was introduced in this research.First,the division of trust type,trust utility and defense cost were discussed.Then the constraints of defense tasks were analyzed based on game theory.According to the constraints obtained,the trust type of defense agents was identified and the initial trustworthiness was assigned to defense agents.The simulated experiment shows that the methods proposed have lower failure rate of defense tasks and better adaptability in the respect of defense task execution. 展开更多
关键词 trust defense constraints adaptability behave execution interactive reputation Collaborative utility
下载PDF
Modeling and Global Conflict Analysis of Firewall Policy 被引量:2
7
作者 LIANG xiaoyan xia chunhe +2 位作者 JIAO Jian HU Junshun LI xiaojian 《China Communications》 SCIE CSCD 2014年第5期124-135,共12页
The global view of firewall policy conflict is important for administrators to optimize the policy.It has been lack of appropriate firewall policy global conflict analysis,existing methods focus on local conflict dete... The global view of firewall policy conflict is important for administrators to optimize the policy.It has been lack of appropriate firewall policy global conflict analysis,existing methods focus on local conflict detection.We research the global conflict detection algorithm in this paper.We presented a semantic model that captures more complete classifications of the policy using knowledge concept in rough set.Based on this model,we presented the global conflict formal model,and represent it with OBDD(Ordered Binary Decision Diagram).Then we developed GFPCDA(Global Firewall Policy Conflict Detection Algorithm) algorithm to detect global conflict.In experiment,we evaluated the usability of our semantic model by eliminating the false positives and false negatives caused by incomplete policy semantic model,of a classical algorithm.We compared this algorithm with GFPCDA algorithm.The results show that GFPCDA detects conflicts more precisely and independently,and has better performance. 展开更多
关键词 firewall policy semantic model conflict analysis conflict detection
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部