期刊文献+
共找到72篇文章
< 1 2 4 >
每页显示 20 50 100
Study of Denoising in the Electricity Anti-Stealing Detection Based on VMD-WTD Combination
1
作者 Huakun Que Guolong Lin +5 位作者 Wenchong Guo Xiaofeng Feng Zetao Jiang Yunfei Cao Jinmin Fan Zhixian Ni 《Energy Engineering》 EI 2022年第4期1453-1466,共14页
In order to solve the failure of electricity anti-stealing detection device triggered by the noise mixed in high-frequency electricity stealing signals,a denoising method based on variational mode decomposition(VMD)an... In order to solve the failure of electricity anti-stealing detection device triggered by the noise mixed in high-frequency electricity stealing signals,a denoising method based on variational mode decomposition(VMD)and wavelet threshold denoising(WTD)was applied to extract the effective high-frequency electricity stealing signals.First,the signal polluted by noise was pre-decomposed using the VMD algorithm,the instantaneous frequency means of each pre-decomposed components was analyzed,so as to determine the optimal K value.The optimal K value was used to decompose the polluted signal into K intrinsic mode components,and the sensitive mode components were determined through the cross-correlation function.Next,each sensitive mode was reconstructed.Finally,the reconstructed signal denoised using the wavelet threshold to obtain the denoised signal.The simulation analysis and experimental results show that the proposed method is superior to the traditional VMD method,FFT method and EMD method,as it can effectively eliminate the noise and enhance the reliability of high-frequency electricity stealing signal detection. 展开更多
关键词 Electricity stealing electromagnetic interference variable mode wavelet threshold instantaneous frequency mean
下载PDF
FMSA:a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems
2
作者 Kaisheng Fan Weizhe Zhang +1 位作者 Guangrui Liu Hui He 《Cybersecurity》 EI CSCD 2024年第1期110-121,共12页
Intrusion detection systems are increasingly using machine learning.While machine learning has shown excellent performance in identifying malicious traffic,it may increase the risk of privacy leakage.This paper focuse... Intrusion detection systems are increasingly using machine learning.While machine learning has shown excellent performance in identifying malicious traffic,it may increase the risk of privacy leakage.This paper focuses on imple-menting a model stealing attack on intrusion detection systems.Existing model stealing attacks are hard to imple-ment in practical network environments,as they either need private data of the victim dataset or frequent access to the victim model.In this paper,we propose a novel solution called Fast Model Stealing Attack(FMSA)to address the problem in the field of model stealing attacks.We also highlight the risks of using ML-NIDS in network security.First,meta-learning frameworks are introduced into the model stealing algorithm to clone the victim model in a black-box state.Then,the number of accesses to the target model is used as an optimization term,resulting in minimal queries to achieve model stealing.Finally,adversarial training is used to simulate the data distribution of the target model and achieve the recovery of privacy data.Through experiments on multiple public datasets,compared to existing state-of-the-art algorithms,FMSA reduces the number of accesses to the target model and improves the accuracy of the clone model on the test dataset to 88.9%and the similarity with the target model to 90.1%.We can demonstrate the successful execution of model stealing attacks on the ML-NIDS system even with protective measures in place to limit the number of anomalous queries. 展开更多
关键词 AI security Model stealing attack Network intrusion detection Meta learning
原文传递
Portal vein arterialization in 25 liver transplant recipients:A Latin American single-center experience
3
作者 Nicolas Andres Cortes-Mejia Diana Fernanda Bejarano-Ramirez +3 位作者 Juan Jose Guerra-Londono Diego Rymel Trivino-Alvarez Raquel Tabares-Mesa Alonso Vera-Torres 《World Journal of Transplantation》 2024年第2期135-147,共13页
BACKGROUND Portal vein arterialization(PVA)has been used in liver transplantation(LT)to maximize oxygen delivery when arterial circulation is compromised or has been used as an alternative reperfusion technique for co... BACKGROUND Portal vein arterialization(PVA)has been used in liver transplantation(LT)to maximize oxygen delivery when arterial circulation is compromised or has been used as an alternative reperfusion technique for complex portal vein thrombosis(PVT).The effect of PVA on portal perfusion and primary graft dysfunction(PGD)has not been assessed.All patients receiving PVA and LT at the Fundacion Santa Fe de Bogota between 2011 and 2022 were analyzed.To account for the time-sensitive effects of graft perfusion,patients were classified into two groups:prereperfusion(pre-PVA),if the arterioportal anastomosis was performed before graft revascularization,and postreperfusion(post-PVA),if PVA was performed afterward.The pre-PVA rationale contemplated poor portal hemodynamics,severe vascular steal,or PVT.Post-PVA was considered if graft hypoperfusion became evident.Conservative interventions were attempted before PVA. 展开更多
关键词 Liver transplantation Portal vein arterialization Arteriovenous anastomoses Portal hypertension Portal vein thrombosis Spontaneous portosystemic shunts Vascular steal phenomenon Primary graft dysfunction Early allograft dysfunction
下载PDF
How Inflation Is Stealing Profits
4
作者 LAN XINZHEN 《Beijing Review》 2011年第9期31-31,共1页
Growth in product prices is far below that of raw material prices and other costs, leading to a decline in profits for Chinese enterprises
关键词 In How Inflation Is stealing Profits
原文传递
A Method to Defend File-Attacking
5
作者 HE Hongjun LUO Li CAO Sihua FENG Tao PAN Li ZOU Zhiji 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1419-1423,共5页
The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its ... The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its basic idea is that user explicitly authorizes program the file set it can access, and monitor all file access operations; once program requests to access file out of the authorized file set, refuse it, and this means that the program is malicious or has design errors. Computers based on this novel mechanism can protect information from attacking reliably, and have good software and hardware compatibility. A testing system is presented to validate our theory. 展开更多
关键词 information stealing information destroying MALWARE explicit authorization mechanism
下载PDF
Sharing Smart Card Authenticated Sessions Using Proxies
6
作者 Kevin E. Foltz William R. Simpson 《Computer Technology and Application》 2016年第1期28-45,共18页
This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web... This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web applications that requiresmart card authentication. This also enables users to access these applications from browsers and machines that do not have the capability to use a smart card. The approach uses proxies and card reader code to provide this capability to the requesting device.Previous work with remote or shared smart card use either requires continuous access to the smart card machine or specific client software. The approach in this paper works for any device and browser that has proxy settings, creates minimal network traffic and computation on the smart card machine, and allows the client to transfer from one network to another while maintaining connectivity to a server. This paper describes the smart card sharing approach, implementation and validation of the approach using real systems, and security implications for an enterprise using smart cards. 展开更多
关键词 Smart CARD IT security authentication key management PROXY SSL TLS session stealing
下载PDF
before从句的理解和翻译
7
作者 黄积达 《语言教育》 2001年第5期25-25,共1页
作连词用的before,其基本含义是“在……之前”(earlier than the time when),但译成汉语时可作不同处理。1.常常译作“在……之前”。例如:You are expected to sitting on your seatbefore the play begins.请在话剧开演之前在自己的... 作连词用的before,其基本含义是“在……之前”(earlier than the time when),但译成汉语时可作不同处理。1.常常译作“在……之前”。例如:You are expected to sitting on your seatbefore the play begins.请在话剧开演之前在自己的座位上坐好。2.在A before B的句式中,A表示时间,B表示行动,如果硬译为“A发生在B之前”,不合汉语习惯,译成“A之后才发生B”就比较得体。例如: 展开更多
关键词 BEFORE 汉语习惯 EARLIER PROVERB 时可 HARDLY UNTIL 通讯地址 广西梧州市 steal
下载PDF
构式语法框架下英汉Steal和“偷”的对比分析
8
作者 李白清 景文博 《文教资料》 2020年第17期12-13,6,共3页
本文首先分析英汉steal和“偷”的语义、语法特征和搭配方面的要求,发现这两个词在这些方面有许多相似点,存在不少差异。其次分析它们形成的构式:双及物构式、及物构式和不及物构式。它们的双及物构式的构式义不同,及物构式和不及物构... 本文首先分析英汉steal和“偷”的语义、语法特征和搭配方面的要求,发现这两个词在这些方面有许多相似点,存在不少差异。其次分析它们形成的构式:双及物构式、及物构式和不及物构式。它们的双及物构式的构式义不同,及物构式和不及物构式的构式义相同。双及物构式是原始构式,其他两种构式由于受到语用压制和突显压制从双及物构式演变过来。及物构式和不及物构式会对进入构式的双及物动词的论元结构产生压制,迫使其减少其后的一个论元或删除其后的两个论元。 展开更多
关键词 构式语法 steal/“偷” 对比分析
下载PDF
科学家更喜欢研究外表可爱的动物(英文)
9
作者 佘巧耘 《大学英语》 2017年第4期54-54,57,共2页
The koala^1 is a cutie,but does it steal^2 too much of the limelight^3?A new study adds quantitative detail to an ongoing debate over whether such"conservation mascots^4"receive publicity and funding to the detrime... The koala^1 is a cutie,but does it steal^2 too much of the limelight^3?A new study adds quantitative detail to an ongoing debate over whether such"conservation mascots^4"receive publicity and funding to the detriment of^5 animals typically deemed less attractive. 展开更多
关键词 FUNDING ATTRACTIVE DEBATE steal CONSERVATION typically AUSTRALIA ongoing PROCEEDINGS Fleming
下载PDF
Steal one's thunder,偷了某人的雷声?
10
作者 江彬 《大学英语》 2003年第3期51-51,共1页
steal one’s thunder乍看不太合乎逻辑,thunder(雷声)怎么能会被steal(偷)呢?其实这是一条英国的成语。它的历史十分悠久。现在这条成语在英国及美国使用得都很普遍。它表达的含义为:spoil one’s attempt to impress byanticipating h... steal one’s thunder乍看不太合乎逻辑,thunder(雷声)怎么能会被steal(偷)呢?其实这是一条英国的成语。它的历史十分悠久。现在这条成语在英国及美国使用得都很普遍。它表达的含义为:spoil one’s attempt to impress byanticipating him,detracting from what he is say-ing,doing,etc.汉语就是“趁人不备,捷足先登,抢在某人之前或贬低某人的言行使之不受他人注意”。 展开更多
关键词 丹尼斯 Steal one’s thunder
下载PDF
New strategies for prevention and treatment of splenic artery steal syndrome after liver transplantation 被引量:7
11
作者 Ji-Yong Song Bing-Yi Shi +6 位作者 Zhi-Dong Zhu De-Hua Zheng Gang Li Li-Kui Feng Lin Zhou Tian-Tian Wu Guo-Sheng Du 《World Journal of Gastroenterology》 SCIE CAS 2014年第41期15367-15373,共7页
AIM: To explore a prophylactic procedure to prevent splenic artery steal syndrome (SASS), as well as a therapeutic intervention to correct it.
关键词 Organ transplantation Liver transplantation Splenic artery steal syndrome Vascular complication ANGIOGRAPHY
下载PDF
表现为无脉症的双侧锁骨下动脉狭窄一例
12
作者 孟凡娜 贾彩云 +3 位作者 陈慧芳 李玲 吕佩源 董艳红 《脑与神经疾病杂志》 2016年第12期778-779,共2页
轻度的锁骨下动脉狭窄(subclavian artery stenosis,SAS)一般无明显的临床症状,病变发展严重可能导致锁骨下动脉盗血综合征(subclavian steal syndrome,SSS),即一侧锁骨下动脉或无名动脉在其近心端发生椎动脉前狭窄或完全闭塞时,患... 轻度的锁骨下动脉狭窄(subclavian artery stenosis,SAS)一般无明显的临床症状,病变发展严重可能导致锁骨下动脉盗血综合征(subclavian steal syndrome,SSS),即一侧锁骨下动脉或无名动脉在其近心端发生椎动脉前狭窄或完全闭塞时,患侧椎动脉逆流至锁骨下动脉远心端,从而引起椎—基底动脉供血不足的症候群。临床上多表现为头晕、耳鸣等, 展开更多
关键词 锁骨下动脉狭窄 无名动脉 无脉症 临床症状 双上肢血压 steal STENOSIS 颈内动脉 动脉成形术 血流速度
下载PDF
A rare case of non-ST-segment elevation myocardial infarction triggered by coronary subclavian steal syndrome 被引量:3
13
作者 Xiao-Qing CAI Feng TIAN +7 位作者 Shan-Shan ZHOU Jing JING Wei HU Tao ZHANG Xi WANG Ri-Na DU Qiang XU Yun-Dai CHEN 《Journal of Geriatric Cardiology》 SCIE CAS CSCD 2019年第4期378-380,共3页
Coronary subclavian steal syndrome (CSSS) has been recognized lately as an unusual clinical entity,giving rise to angina but rarely causing an acute coronary syndrome (ACS). The prerequisites for the appearance of CSS... Coronary subclavian steal syndrome (CSSS) has been recognized lately as an unusual clinical entity,giving rise to angina but rarely causing an acute coronary syndrome (ACS). The prerequisites for the appearance of CSSS are both a patent left internal mammary artery (LIMA) graft and severe stenosis of the left subclavian artery (LSA). However,LSA is often overlooked in the diagnostic evaluation of patients with angina,who have underwent coronary artery bypass grafting (CABG). We report an unusual case of non-ST-segment elevation myocardial infarction (NSTEMI) caused by subtotal occlusion of proximal LSA. 展开更多
关键词 Acute CORONARY SYNDROME CORONARY artery BYPASS GRAFTING CORONARY SUBCLAVIAN steal SYNDROME PERCUTANEOUS CORONARY intervention
下载PDF
Rare presentation of intralobar pulmonary sequestration associated with repeated episodes of ventricular tachycardia 被引量:3
14
作者 D Sheshagiri Rao Ramachandra Barik 《World Journal of Cardiology》 CAS 2016年第7期432-435,共4页
Arterial supply of an intralobar pulmonary sequestration(IPS) from the coronary circulation is extremely rare. A significant coronary steal does not occur because of dual or triple sources of blood supply to sequestra... Arterial supply of an intralobar pulmonary sequestration(IPS) from the coronary circulation is extremely rare. A significant coronary steal does not occur because of dual or triple sources of blood supply to sequestrated lung tissue. We present a 60-year-old woman who presented to us with repeated episodes of monomorphic ventricular tachycardia(VT) in last 3 mo. Radio frequency ablation was ineffective. On evaluation, she had right lower lobe IPS with dual arterial blood supply, i.e., right pulmonary artery and the systemic arterial supply from the right coronary artery(RCA). Stress myocardial perfusion scan revealed significant inducible ischemia in the RCA territory. Coronary angiogram revealed critical stenosis of proximal RCA just after the origin of the systemic artery supplying IPS. The critical stenosis in the RCA was stented. At 12 mo follow-up, she had no further episodes of VT or angina. 展开更多
关键词 CORONARY steal CORONARY artery disease VENTRICULAR TACHYCARDIA ANGIOPLASTY Intralobar pulmonary SEQUESTRATION
下载PDF
Interventional treatment of the left subclavian in 2 patients with coronary steal syndrome 被引量:3
15
作者 Julia Heid Britta Vogel +4 位作者 Arnt Kristen Wanda Kloos Benedikt Kohler Hugo A Katus Grigorios Korosoglou 《World Journal of Cardiology》 CAS 2017年第1期65-70,共6页
In patients with history of coronary artery disease angina pectoris is usually attributed to the progression of atherosclerotic lesions. However,in patients with previous coronary artery bypass graft operation(CABG) u... In patients with history of coronary artery disease angina pectoris is usually attributed to the progression of atherosclerotic lesions. However,in patients with previous coronary artery bypass graft operation(CABG) using internal mammary artery grafts,great vessel disease should also be considered. Herein we present two patients with history of CABG whose symptoms were suspicious for coronary ischemia. During cardiac catheterization reverse blood flow was observed from the left artery disease to the left internal mammary artery(LIMA) graft in both cases. After angioplasty and stent implantation of the left subclavian artery antegrade flow was restored in the LIMA grafts and both patients had complete resolution of symptoms. 展开更多
关键词 Coronary steal syndrome Coronary artery bypass graft Left subclavian artery Reverse blood flow Cardiac catheterization
下载PDF
利用课外报刊,让初中英语教学更精彩 被引量:1
16
作者 王婷 《中学生英语》 2016年第16期47-47,共1页
阅读是人们进行社会文化交流的一个重要形式,也是人们获取各种信息的重要途径。在初中英语教学阶段,教师不仅要使学生拥有对进行英语基础运用的能力,还要为学生以后的英语学习奠定基础。英语课外报刊内容丰富,知识涉及面广,可以作为初... 阅读是人们进行社会文化交流的一个重要形式,也是人们获取各种信息的重要途径。在初中英语教学阶段,教师不仅要使学生拥有对进行英语基础运用的能力,还要为学生以后的英语学习奠定基础。英语课外报刊内容丰富,知识涉及面广,可以作为初中英语学习的补充材料,有助于学生英语的学习,使初中英语教学更加精彩。1.培养学生良好的阅读习惯许多学生一遇到陌生的词汇,不懂的词组就立刻去查字典,找出具体的意思。 展开更多
关键词 英语报刊 记忆法 文化交流 补充材料 报刊阅读 逻辑记忆 DRAGON steal 动物类 收藏夹
下载PDF
MODELLING OF MICROSTRUCTURE EVOLUTION ANDPROPERTIES OF LOW-CARBON STEELS 被引量:1
17
作者 M. Militzer The Centre for Metallurgical Process Engineering, University of British Columbia, Vancouver, BC, Canada V6T 1Z4 《Acta Metallurgica Sinica(English Letters)》 SCIE EI CAS CSCD 2000年第2期574-580,共7页
The microstructure evolution has been investigated for hot rolling of advanced low carbon steels containing Nb, Ti, V and Cu. The critical processing step to develop the properties of hot rolled steels is cooling afte... The microstructure evolution has been investigated for hot rolling of advanced low carbon steels containing Nb, Ti, V and Cu. The critical processing step to develop the properties of hot rolled steels is cooling after rolling when the austenite-to-ferrite transformation as well as precipitation takes place thereby determining the final mi- crostructure. Thus, the modelling work emphasizes the kinetics of errite formation. Ferrite growth rates can adequately be described by taking into account a solute-drag- like effect of Mn and Nb. The emphasis of the model is to predict the phase transfor- mation kinetics for the industrial practice of accelerated cooling. The ferrite grain size is essentially determined at the early stages of transformation and can be correlated to the trunsformation start temperature. Pcarbides and nitrides of Nb, Ti and V is controlled by Ostwald ripening of these particles. The ageing behaviour can then be described based on the Shercliff-Ashby model for precipitation hardening. The situa- tion is more complex for Cu precipitation where the ageing response is also related to a sequence of different precipitation types. 展开更多
关键词 low carbon steal microstructure evolution MODELLING phase transformation
下载PDF
STUDY ON SUB-DRY CUTTING GCr12 被引量:1
18
作者 Ren Jialong Department of Mechanical Engineering,East China Shipbuilding Institute, Zhengjiang 212003,China 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2002年第1期40-42,共3页
Through the comparison study on cutting force, cutting temperature andmachined surface quality with the sub-dry cutting traditional cooling method, it is shown thatsub-dry cutting can retard the wear of the tooled par... Through the comparison study on cutting force, cutting temperature andmachined surface quality with the sub-dry cutting traditional cooling method, it is shown thatsub-dry cutting can retard the wear of the tooled parts. It is beneficial to realize the productionwithout pollution and meet the demand of clean environment. 展开更多
关键词 Sub-dry cutting Production without pollution Bearing steal
下载PDF
Bilateral common carotid artery common trunk with aberrant right subclavian artery combined with right subclavian steal syndrome: A case report 被引量:1
19
作者 Yuan-Yuan Sun Guo-Ming Zhang +2 位作者 You-Bin Zhang Xin Du Mao-Long Su 《World Journal of Clinical Cases》 SCIE 2019年第21期3639-3648,共10页
BACKGROUND We report a rare case of numbness in the right hand,finally diagnosed as bilateral common carotid artery common trunk with aberrant right subclavian artery combined with right subclavian steal syndrome and ... BACKGROUND We report a rare case of numbness in the right hand,finally diagnosed as bilateral common carotid artery common trunk with aberrant right subclavian artery combined with right subclavian steal syndrome and explain the cause of these diseases.CASE SUMMARY The patient was a 65-year-old woman.She complained of dizziness,numbness and weakness of the right hand for 6 mo.She was diagnosed with bilateral common carotid artery common trunk with aberrant right subclavian artery combined with right subclavian steal syndrome by ultrasound,enhanced computed tomography,computed tomography angiography and other examinations.Considering the surgical risks,the patient refused the aberrant right subclavian artery stent implantation and was discharged.We hypothesize that these two kinds of deformity and right subclavian steal syndrome may not occur by accident and result from multiple malformations.CONCLUSION Bilateral common carotid artery common trunk with aberrant right subclavian artery combined with right subclavian steal syndrome is rare.This case reminds interventional radiologists of the possibility of these abnormalities before surgery. 展开更多
关键词 BILATERAL COMMON carotid artery COMMON TRUNK ABERRANT RIGHT subclavianartery RIGHT SUBCLAVIAN steal syndrome Case report
下载PDF
EXPERIMENTAL-NUMERICAL AND MICROSTRUCTURAL CONTROL OF HOT STRIP ROLLING 被引量:1
20
作者 R. Turk M. Knap and R. Robic (Department of Materials and Metallurgy, Faculty of Natural Sciences and Engineering, University of Ljubljana, Askerceva 12, Ljubljana 1000, SI, Slovenia) 《Acta Metallurgica Sinica(English Letters)》 SCIE EI CAS CSCD 2000年第1期369-378,共10页
On a local level, thermomechanical states during the passing of hot metallic material through the de- formation volume in a process of plane rolling with smooth rools were analysed by an experimental-nu- merical met... On a local level, thermomechanical states during the passing of hot metallic material through the de- formation volume in a process of plane rolling with smooth rools were analysed by an experimental-nu- merical method. These states,which are markedly inhomogeneous in the length as well as in the height of the deformation zone,were taken as the basis for physical simulation of rolling the material at a certain lavel(i. e. stream line) of the deformation zone.Their influences on local yield stresses and on the development of the microstructure were checked.The efficiency of physical simulation of rolling with the Gleeble 1500 simulating equipment was examined.The states at which the transport of metallic material through the deformation zone between smooth rolls takes place were analysed by a visioplastic method,while physical simulation of rolling was made by thermomechanically controlled cylindrical compression tests.The tests were made with industrially manufactrued X5Grni8.9 austenitic stainless steel. 展开更多
关键词 there omechanical state deformation shiulation austanitic stainless steal
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部