期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Effect of ladle outlet geometry on internal porosity in gravity casting automotive brackets: An experimental investigation 被引量:3
1
作者 jaehoon choi Hoyoung Hwang Shinill Kang 《China Foundry》 SCIE 2020年第1期56-60,共5页
This study investigated whether the pouring ladle's outlet shape could reduce the porosity of aluminum alloy casting products and whether it could be applied to mass production of automotive brackets based on comp... This study investigated whether the pouring ladle's outlet shape could reduce the porosity of aluminum alloy casting products and whether it could be applied to mass production of automotive brackets based on computer simulations and experiment.The filling behaviors of the melt were simulated to compare the flow characteristics of the molten metal poured from the conventional ladle and the proposed ladle.Results show that for the conventional ladle,the pouring metal is V-shaped,while it is relatively circular and poured at a more constant rate in the proposed ladle.CT scans reveal that the proposed ladle reduces the porosity of the cast product.The proposed ladle resulted in an average of 30 fewer pores,a 299.56 mm3 smaller average total pore volume,and a 0.041% lower difference in average porosity.It is concludes that the proposed ladle can be used in the gravity casting process.By changing the ladle outlet shape can reduce the casting failure rate of massproduced automobile bracket. 展开更多
关键词 aluminum alloy pouring ladle gravity casting POROSITY
下载PDF
Mining Botnets and Their Evolution Patterns 被引量:1
2
作者 jaehoon choi Jaewoo Kang +4 位作者 Jinseung Lee Chihwan Song Qingsong Jin Sunwon Lee Jinsun Uh 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第4期605-615,共11页
The botnet is the network of compromised computers that have fallen under the control of hackers after being infected by malicious programs such as trojan viruses. The compromised machines are mobilized to perform var... The botnet is the network of compromised computers that have fallen under the control of hackers after being infected by malicious programs such as trojan viruses. The compromised machines are mobilized to perform various attacks including mass spamming, distributed denial of service (DDoS) and additional trojans. This is becoming one of the most serious threats to the Internet infrastructure at present. We introduce a method to uncover compromised machines and characterize their behaviors using large email logs. We report various spain campaign variants with different characteristics and introduce a statistical method to combine them. We also report the long-term evolution patterns of the spare campaigns. 展开更多
关键词 BOTHER botnet evolution bother spamming
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部