期刊文献+
共找到589篇文章
< 1 2 30 >
每页显示 20 50 100
Effects of Steel Fibers and Iron Filings on Thermal and Mechanical Properties of Concrete for Energy Storage Application
1
作者 A.A. Adeyanju K. Manohar 《Journal of Minerals and Materials Characterization and Engineering》 2011年第15期1429-1448,共20页
An experimental study on the thermal properties of iron filings and steel-fiber-reinforced concrete for solar/thermal energy storage application is presented in this report. It takes into account the results of measur... An experimental study on the thermal properties of iron filings and steel-fiber-reinforced concrete for solar/thermal energy storage application is presented in this report. It takes into account the results of measurements of thermal conductivity, thermal resistivity, thermal diffusivity and the results of compressive strength, density as well as energy storage capacity calculated from the knowledge of the above measured parameters. The experimental testing method is described as well: based upon the linear heat source theory, it requires the use of a special probe to be inserted into the sample. The experimentation was forwarded to test concrete aggregate mixtures with three different sizes and same quantity of steel fibers;two different quantities of iron filings and one plain concrete. The measurements were carried out from the pouring time of cubic samples and were ended up when hardened conditions were achieved. The results indicate that the steel fibers and iron filings have influence on the thermal and mechanical properties of the concretes tested, thus the iron filings and steel fibers reinforced concrete is suitable for better solar/thermal energy storage due to an increase in storage capacity over plain concrete. 展开更多
关键词 Steel FIBER IRON filings REINFORCED CONCRETE THERMAL properties linear HEAT sourcetheory.
下载PDF
ZTE Attains Global No.1 Spot for PCT Patent Filings
2
作者 ZTE Corporation 《ZTE Communications》 2012年第1期F0002-F0002,共1页
According to the website of the World Intellectual Property Organization, ZTE filed for 2826 applications in 2011. The company moved up from its No. 2 spot in 2010 The statistics also show consistent growth in the num... According to the website of the World Intellectual Property Organization, ZTE filed for 2826 applications in 2011. The company moved up from its No. 2 spot in 2010 The statistics also show consistent growth in the number of international patents that ZTE has filed over the past five years. The number of patents ZTE filed for grew more than 50 per cent yearonyear in 2011. 展开更多
关键词 ZTE Attains Global No.1 Spot for PCT Patent filings PCT
下载PDF
PCT Reforms Its Patent Filing System
3
《中国专利与商标》 2004年第1期39-39,共1页
As of January 1,2004,the first critical steps in seekingpatent protection in multiple countries will be easier as aresult of reforms to the international patent filing system.Aseries of reforms to the World Intellectu... As of January 1,2004,the first critical steps in seekingpatent protection in multiple countries will be easier as aresult of reforms to the international patent filing system.Aseries of reforms to the World Intellectual PropertyOrganisation's(WIPO)Patent Cooperation Treaty(PCT),ranging from a new simplified system of designatingcountries in which patent protection is sought to an enhancedsearch and preliminary examination system,will simplify thecomplex procedure of obtaining patent protection in severa... 展开更多
关键词 PCT Reforms Its Patent filing System WORK THAN
下载PDF
The Function of Human Rights Protection and Its Approaches of Filing and Review——Rethinking of PAN Hongbin Case
4
作者 梁洪霞 YIN Tao(译) 《The Journal of Human Rights》 2020年第2期204-220,共17页
The PAN Hongbin case raised to the academic circles the question of how to connect with the court proceedings after the People’s Congress filed for review.The solution to this problem should focus on the functional p... The PAN Hongbin case raised to the academic circles the question of how to connect with the court proceedings after the People’s Congress filed for review.The solution to this problem should focus on the functional positioning of China’s recording and review system,whether it involves the specific rights of citizens in individual cases.From the actual situation in China,the development trend of the constitutional review systems in various countries in the world,and the attitudes of the National People’s Congress and the academic circle,the protection of civil rights should be one of the functions of record review.According to the relevant provisions of the Legislative Law and the Law on the Supervision of Standing Committees of People’s Congresses at Various Levels,our courts should construct a dual complementary mechanism for review requests from the Supreme People’s Court and review recommendations from local people’s courts at all levels in the litigation process.Meanwhile,according to the retrospective theory of the law,the filing review filed by the parties after the court ’s lawsuit should be retroactive to the parties themselves,and the law should provide for a system to initiate retrial proceedings in this case to relieve the parties’ rights. 展开更多
关键词 filed LAW PARTIES
下载PDF
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
5
作者 Syeda Wajiha Zahra Muhammad Nadeem +6 位作者 Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2024年第1期589-616,共28页
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear... Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms. 展开更多
关键词 Replay attack MALWARE message attack file encryption CRYPTOLOGY data security
下载PDF
Enhancing PDF Malware Detection through Logistic Model Trees
6
作者 Muhammad Binsawad 《Computers, Materials & Continua》 SCIE EI 2024年第3期3645-3663,共19页
Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity,and because of its complexity and evasiveness,it is challenging to identify using traditional signature-based detection a... Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity,and because of its complexity and evasiveness,it is challenging to identify using traditional signature-based detection approaches.The study article discusses the growing danger to cybersecurity that malware hidden in PDF files poses,highlighting the shortcomings of conventional detection techniques and the difficulties presented by adversarial methodologies.The article presents a new method that improves PDF virus detection by using document analysis and a Logistic Model Tree.Using a dataset from the Canadian Institute for Cybersecurity,a comparative analysis is carried out with well-known machine learning models,such as Credal Decision Tree,Naïve Bayes,Average One Dependency Estimator,Locally Weighted Learning,and Stochastic Gradient Descent.Beyond traditional structural and JavaScript-centric PDF analysis,the research makes a substantial contribution to the area by boosting precision and resilience in malware detection.The use of Logistic Model Tree,a thorough feature selection approach,and increased focus on PDF file attributes all contribute to the efficiency of PDF virus detection.The paper emphasizes Logistic Model Tree’s critical role in tackling increasing cybersecurity threats and proposes a viable answer to practical issues in the sector.The results reveal that the Logistic Model Tree is superior,with improved accuracy of 97.46%when compared to benchmark models,demonstrating its usefulness in addressing the ever-changing threat landscape. 展开更多
关键词 Malware detection PDF files logistic model tree feature selection CYBERSECURITY
下载PDF
Scrap Iron Filings assisted nitrate and phosphate removal in low C/N waters using mixed microbial culture
7
作者 Sanjena Narayanasamydamodaran Jian’e Zuo +1 位作者 Haiteng Ren Nawnit Kumar 《Frontiers of Environmental Science & Engineering》 SCIE EI CSCD 2021年第4期215-228,共14页
This study focuses on identifying the factors under which mixed microbial seeds assist bio-chemical denitrification when Scrap Iron Filings(SIF)are used as electron donors and adsorbents in low C/N ratio waters.Batch ... This study focuses on identifying the factors under which mixed microbial seeds assist bio-chemical denitrification when Scrap Iron Filings(SIF)are used as electron donors and adsorbents in low C/N ratio waters.Batch studies were conducted in abiotic and biotic reactors containing fresh and aged SIF under different dissolved oxygen concentrations with NO_(3)^(-)−N and/or PO_(4)^(3−)influent(s)and their nitrate/phosphate removal and by-product formations were studied.Batch reactors were seeded with a homogenized mixed microbial inoculum procured from natural sludges which were enriched over 6 months under denitrifying conditions in the presence of SIF.Results indicated that when influent containing 40 mg/L of NO_(3)^(-)−N was treated with 5 g SIF,79.9%nitrate reduction was observed in 8 days abiotically and 100%removal was accomplished in 20 days when the reactor was seeded.Both abiotic and seeded reactors removed more than 92%PO_(4)^(3−)under high DO conditions in 12 days.Abiotic and biochemical removal of NO_(3)^(-)−N and abiotic removal of PO_(4)^(3−)were higher under independent NO_(3)^(-)−N/PO_(4)^(3−)loading,while 99%PO_(4)^(3−)was removed biochemically under combined NO_(3)^(-)−N and PO_(4)^(3−)loading.This study furthers the understandings of nitrate and phosphate removal in Zero Valent Iron(ZVI)assisted mixed microbial systems to encourage the application of SIF-supported bio-chemical processes in the simultaneous removals of these pollutants. 展开更多
关键词 Scrap iron filing Nitrate removal Phosphate removal Mixed culture denitrification Zero valent iron
原文传递
更正
8
作者 《汽车电器》 2024年第3期11-11,共1页
尊敬的各位读者:因作者笔误,2024年第1期第73页《基于车载以太网的HIL实时仿真测试平台的研究及应用》前言第2行中的“FlexFile”应改成“FlexRay”。2024年第2期第33页《基于车载以太网DolP协议的研究及其在商用车中的应用》前言第3行... 尊敬的各位读者:因作者笔误,2024年第1期第73页《基于车载以太网的HIL实时仿真测试平台的研究及应用》前言第2行中的“FlexFile”应改成“FlexRay”。2024年第2期第33页《基于车载以太网DolP协议的研究及其在商用车中的应用》前言第3行中的“FlexFile”应改成“FlexRay”。 展开更多
关键词 车载以太网 商用车 仿真测试平台 FLEX 行中 FILE
下载PDF
China’s IP protection spurs growth of foreign patent filings
9
《中国专利与商标》 2020年第2期104-104,共1页
Japan,the United States and Germany topped the list of the most patent filings in China in 2019,according to the China’s National Intellectual Property Administration(CNIPA).Market entities from 186 countries and reg... Japan,the United States and Germany topped the list of the most patent filings in China in 2019,according to the China’s National Intellectual Property Administration(CNIPA).Market entities from 186 countries and regions applied for patents and trademarks in China in 2019.Japan. 展开更多
关键词 PROTECTION spurs GROWTH FOREIGN PATENT filings
原文传递
基于知识图谱的医院医疗专家档案信息化管理
10
作者 张红 周荻然 钱玉锦 《中国卫生资源》 CSCD 北大核心 2023年第6期721-724,730,共5页
随着大数据、云计算、人工智能及语义网等信息技术的日趋成熟,基于数据驱动的信息挖掘及信息资源整合成为各领域信息化探索的方向,也推动档案领域管理方法的创新。面对内容庞杂的医院医疗专家档案信息资源,研究运用人工智能及语义分析... 随着大数据、云计算、人工智能及语义网等信息技术的日趋成熟,基于数据驱动的信息挖掘及信息资源整合成为各领域信息化探索的方向,也推动档案领域管理方法的创新。面对内容庞杂的医院医疗专家档案信息资源,研究运用人工智能及语义分析等技术,进行信息挖掘,通过本体建模、知识抽取、知识融合等,构建以医院医疗专家档案为中心的知识图谱,不仅能进一步实现医疗专家档案的信息化管理,也可为顺应信息化时代智慧医院的发展趋势,推进医疗领域人才建设、医疗事业高质量发展服务。 展开更多
关键词 知识图谱knowledge graph 医疗专家档案medical expert file 信息化informatization 知识管理knowledge management 智慧医院intelligent hospital
下载PDF
长三角医疗卫生领域行政规范性文件协作备案机制的构建
11
作者 李幸祥 《中国卫生资源》 CSCD 北大核心 2023年第2期150-156,共7页
长三角医疗卫生领域行政规范性文件的协作制定,对于推动实现医疗卫生领域的一体化具有重要的现实意义。与之伴随的突出问题是,对此类跨行政区划协作制定的行政规范性文件如何进行备案审查。建议将长三角相关省市政府或卫生健康部门拟制... 长三角医疗卫生领域行政规范性文件的协作制定,对于推动实现医疗卫生领域的一体化具有重要的现实意义。与之伴随的突出问题是,对此类跨行政区划协作制定的行政规范性文件如何进行备案审查。建议将长三角相关省市政府或卫生健康部门拟制为行政联合体,将相关省市的备案机关拟制为备案联合体,由行政联合体向备案联合体报送备案。受委托的备案机关代表备案联合体对文件的制定主体、程序、内容进行审查后,由相关省市的备案机关联合出具备案审查意见。 展开更多
关键词 长三角Yangtze River Delta 医疗卫生health care 行政规范性文件administrative normative document 协作备案cooperative filing
下载PDF
文物信息系统数据管理方法研究 被引量:2
12
作者 高国庆 李光亚 +2 位作者 张超 胡雅妮 韩晓东 《工业控制计算机》 2023年第3期110-112,共3页
针对当前文物信息系统在文件上传过程中存在的文件接收不全、文字乱码、传输无法随时终止等缺陷,研究了一种效率更高的文件上传解决方案。首先,该方案基于FTP协议对文件上传的可控性,保证了目录文件的完整传输,其次,通过断点续传技术解... 针对当前文物信息系统在文件上传过程中存在的文件接收不全、文字乱码、传输无法随时终止等缺陷,研究了一种效率更高的文件上传解决方案。首先,该方案基于FTP协议对文件上传的可控性,保证了目录文件的完整传输,其次,通过断点续传技术解决了服务端大文件传输时的中断响应问题;最后利用ConcurrentQueue分段存储技术和文件复位技术优化了客户端接收文件的完整性和精准度。经过大量测试,所提方案能有效修复了文物信息系统中关于文件传输功能的漏洞,提高文件上传效率。 展开更多
关键词 file transfer protocol 文件上传 分段存储 解决方案 信息系统
下载PDF
Electronic Auction Scheme Based on Smart Contract and IPFS 被引量:1
13
作者 WU Xiaohua LIU Huan +1 位作者 WU Fengheng ZHANG Ke 《计算机工程》 CAS CSCD 北大核心 2023年第2期181-190,共10页
Sealed-bid auctions are a vital transaction tool in the e-commerce field.Traditional centralized auction schemes typically result in severe threats to data integrity,information transparency,and traceability owing to ... Sealed-bid auctions are a vital transaction tool in the e-commerce field.Traditional centralized auction schemes typically result in severe threats to data integrity,information transparency,and traceability owing to their excessive reliance on third parties,and blockchain-based auction schemes generally suffer from high storage costs and are deficient in functional and architectural design.To solve these problems,this study presents a sealed-bid auction scheme that removes the third-party based on an Ethereum smart contract,ensuring data integrity,openness,and transparency in the execution process.The commitment mechanism and distributed storage system help to significantly reduce the user’s storage cost and protect the privacy of user bids.For the functional design,this study introduces a fulltext-retrieval and dispute-processing module for commodities,which reduces the defects existing in the functional module design of existing auction systems.Furthermore,a prototype auction system on the Ethereum test chain is built to validate the proposed scheme.Experiments show that compared with traditional storage methods,indirect storage based on a distributed storage system of texts and images can reduce the storage cost by at least 50%while ensuring data integrity.Finally,the gas cost at each stage of the auction scheme and the time required for the full-text retrieval of products are recorded to evaluate the scheme performance and analyze the test results. 展开更多
关键词 sealed bid auction Ethereum smart contract commitment Interplanetary File System(IPFS)
下载PDF
Automated File Labeling for Heterogeneous Files Organization Using Machine Learning
14
作者 Sagheer Abbas Syed Ali Raza +4 位作者 MAKhan Muhammad Adnan Khan Atta-ur-Rahman Kiran Sultan Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期3263-3278,共16页
File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most ... File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most users either have to change file names manually or leave a meaningless name of the files,which increases the time to search required files and results in redundancy and duplications of user files.Currently,no significant work is done on automated file labeling during the organization of heterogeneous user files.A few attempts have been made in topic modeling.However,one major drawback of current topic modeling approaches is better results.They rely on specific language types and domain similarity of the data.In this research,machine learning approaches have been employed to analyze and extract the information from heterogeneous corpus.A different file labeling technique has also been used to get the meaningful and`cohesive topic of the files.The results show that the proposed methodology can generate relevant and context-sensitive names for heterogeneous data files and provide additional insight into automated file labeling in operating systems. 展开更多
关键词 Automated file labeling file organization machine learning topic modeling
下载PDF
Enhanced Best Fit Algorithm for Merging Small Files
15
作者 Adnan Ali Nada Masood Mirza Mohamad Khairi Ishak 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期913-928,共16页
In the Big Data era,numerous sources and environments generate massive amounts of data.This enormous amount of data necessitates specialized advanced tools and procedures that effectively evaluate the information and ... In the Big Data era,numerous sources and environments generate massive amounts of data.This enormous amount of data necessitates specialized advanced tools and procedures that effectively evaluate the information and anticipate decisions for future changes.Hadoop is used to process this kind of data.It is known to handle vast volumes of data more efficiently than tiny amounts,which results in inefficiency in the framework.This study proposes a novel solution to the problem by applying the Enhanced Best Fit Merging algorithm(EBFM)that merges files depending on predefined parameters(type and size).Implementing this algorithm will ensure that the maximum amount of the block size and the generated file size will be in the same range.Its primary goal is to dynamically merge files with the stated criteria based on the file type to guarantee the efficacy and efficiency of the established system.This procedure takes place before the files are available for the Hadoop framework.Additionally,the files generated by the system are named with specific keywords to ensure there is no data loss(file overwrite).The proposed approach guarantees the generation of the fewest possible large files,which reduces the input/output memory burden and corresponds to the Hadoop framework’s effectiveness.The findings show that the proposed technique enhances the framework’s performance by approximately 64%while comparing all other potential performance-impairing variables.The proposed approach is implementable in any environment that uses the Hadoop framework,not limited to smart cities,real-time data analysis,etc. 展开更多
关键词 Big data Hadoop MapReduce small file HDFS
下载PDF
Regional unconformities and their controls on hydrocarbon accumulation in Sichuan Basin, sW China
16
作者 YANG Weij WEI Guoqi +7 位作者 WU Saijun XIE Wuren JIN Hui ZENG Fuying HAO Cuiguo BAI Zhuangzhuang SU Yiqing LI Rong 《Petroleum Exploration and Development》 SCIE 2023年第3期573-587,共15页
Based on outcrop,seismic and drilling data,the main regional unconformities in the Sichuan Basin and their controls on hydrocarbon accumulation were systematically studied.Three findings are obtained.First,six regiona... Based on outcrop,seismic and drilling data,the main regional unconformities in the Sichuan Basin and their controls on hydrocarbon accumulation were systematically studied.Three findings are obtained.First,six regional stratigraphic unconformities are mainly developed in the Sichuan Basin,from the bottom up which are between pre-Sinian and Sinian,between Sinian and Cambrian,between pre-Permian and Permian,between middle and upper Permian,between middle and upper Triassic,and between Triassic and Jurassic.Especially,16 of 21l conventional(and tight)gas fields discovered are believed to have formed in relation to regional unconformities.Second,regional unconformity mainly controls hydrocarbon accumulation from five aspects:(1)The porosity and permeability of reservoirs under the unconformity are improved through weathering crust karstification to form large-scale karst reservoirs;(2)Good source-reservoir-caprock assemblage can form near the unconformity,which provides a basis for forming large gas field;(3)Regional unconformity may lead to stratigraphic pinch-out and rugged ancient landform,giving rise to a large area of stratigraphic and lithologic trap groups;(4)Regional unconformity provides a dominant channel for lateral migration of oil and gas;and(5)Regional unconformity is conducive to large-scale accumulation of oil and gas.Third,the areas related to regional unconformities are the exploration focus of large gas fields in the Sichuan Basin.The pre-Sinian is found with source rocks,reservoir rocks and other favorable conditions for the formation of large gas fields,and presents a large exploration potential.Thus,it is expected to be an important strategic replacement. 展开更多
关键词 UNCONFORMITY large gas filed Sichuan Basin karst reservoir hydrocarbon accumulation control exploration potential
下载PDF
A Wrapping Encryption Based on Double Randomness Mechanism
17
作者 Yi-Li Huang Fang-Yie Leu +2 位作者 Ruey-Kai Sheu Jung-Chun Liu Chi-Jan Huang 《Computers, Materials & Continua》 SCIE EI 2023年第10期1143-1164,共22页
Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite commun... Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite communications,and so on.In these environments,a fixed password or channel key(e.g.,PW/SKCH)is often adopted to encrypt different data,resulting in security risks since thisPW/SKCH may be solved after hackers collect a huge amount of encrypted data.Actually,the most popularly used security mechanism Advanced Encryption Standard(AES)has its own problems,e.g.,several rounds have been solved.On the other hand,if data protected by the same PW/SKCH at different time points can derive different data encryption parameters,the system’s security level will be then greatly enhanced.Therefore,in this study,a security scheme,named Wrapping Encryption Based on Double Randomness Mechanism(WEBDR),is proposed by integrating a password key(or a system channel key)and an Initialization Vector(IV)to generate an Initial Encryption Key(IEK).Also,an Accumulated Shifting Substitution(ASS)function and a three-dimensional encryption method are adopted to produce a set of keys.Two randomness encryption mechanisms are developed.The first generates system sub-keys and calculates the length of the first pseudo-random numbers by employing IEK for providing subsequent encryption/decryption.The second produces a random encryption key and a sequence of internal feedback codes and computes the length of the second pseudo-random numbers for encrypting delivered messages.A wrapped mechanism is further utilized to pack a ciphertext file so that a wrapped ciphertext file,rather than the ciphertext,will be produced and then transmitted to its destination.The findings are as follows.Our theoretic analyses and simulations demonstrate that the security of the WEBDR in cloud communication has achieved its practical security.Also,AES requires 176 times exclusive OR(XOR)operations for both encryption and decryption,while the WEBDR consumes only 3 operations.That is why the WEBDR is 6.7∼7.09 times faster than the AES,thus more suitable for replacing the AES to protect data transmitted between a cloud system and its users. 展开更多
关键词 Initial encryption key accumulated shifting substitution three-dimensional operation wrapped ciphertext file
下载PDF
Phish Block:A Blockchain Framework for Phish Detection in Cloud
18
作者 R.N.Karthika C.Valliyammai M.Naveena 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期777-795,共19页
The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy.But,deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes.In Spite of m... The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy.But,deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes.In Spite of much techno-logical advancement,phishing acts as thefirst step in a series of attacks.With technological advancements,availability and access to the phishing kits has improved drastically,thus making it an ideal tool for the hackers to execute the attacks.The phishing cases indicate use of foreign characters to disguise the ori-ginal Uniform Resource Locator(URL),typosquatting the popular domain names,using reserved characters for re directions and multi-chain phishing.Such phishing URLs can be stored as a part of the document and uploaded in the cloud,providing a nudge to hackers in cloud storage.The cloud servers are becoming the trusted tool for executing these attacks.The prevailing software for blacklisting phishing URLs lacks the security for multi-level phishing and expects security from the client’s end(browser).At the same time,the avalanche effect and immut-ability of block-chain proves to be a strong source of security.Considering these trends in technology,a block-chain basedfiltering implementation for preserving the integrity of user data stored in the cloud is proposed.The proposed Phish Block detects the homographic phishing URLs with accuracy of 91%which assures the security in cloud storage. 展开更多
关键词 Cloud server phishing URLs phish detection blockchain safe files smart contract
下载PDF
High-Imperceptibility Data Hiding Scheme for JPEG Images Based on Direction Modification
19
作者 Li Liu Jing Li +2 位作者 Yingchun Wu Chin-Chen Chang Anhong Wang 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1415-1431,共17页
Data hiding(DH)is an important technology for securely transmitting secret data in networks,and has increasing become a research hotspot throughout the world.However,for Joint photographic experts group(JPEG)images,it... Data hiding(DH)is an important technology for securely transmitting secret data in networks,and has increasing become a research hotspot throughout the world.However,for Joint photographic experts group(JPEG)images,it is difficult to balance the contradiction among embedded capacity,visual quality and the file size increment in existing data hiding schemes.Thus,to deal with this problem,a high-imperceptibility data hiding for JPEG images is proposed based on direction modification.First,this proposed scheme sorts all of the quantized discrete cosine transform(DCT)block in ascending order according to the number of non-consecutive-zero alternating current(AC)coefficients.Then it selects non-consecutive-zero AC coefficients with absolute values less than or equal to 1 at the same frequency position in two adjacent blocks for pairing.Finally,the 2-bit secret data can be embedded into a coefficient-pair by using the filled reference matrix and the designed direction modification rules.The experiment was conducted on 5 standard test images and 1000 images of BOSSbase dataset,respectively.The experimental results showed that the visual quality of the proposed scheme was improved by 1∼4 dB compared with the comparison schemes,and the file size increment was reduced at most to 15%of the comparison schemes. 展开更多
关键词 Data hiding JPEG images coefficient-pair direction modification file size increment
下载PDF
Performance Improvement through Novel Adaptive Node and Container Aware Scheduler with Resource Availability Control in Hadoop YARN
20
作者 J.S.Manjaly T.Subbulakshmi 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期3083-3108,共26页
The default scheduler of Apache Hadoop demonstrates operational inefficiencies when connecting external sources and processing transformation jobs.This paper has proposed a novel scheduler for enhancement of the perfo... The default scheduler of Apache Hadoop demonstrates operational inefficiencies when connecting external sources and processing transformation jobs.This paper has proposed a novel scheduler for enhancement of the performance of the Hadoop Yet Another Resource Negotiator(YARN)scheduler,called the Adaptive Node and Container Aware Scheduler(ANACRAC),that aligns cluster resources to the demands of the applications in the real world.The approach performs to leverage the user-provided configurations as a unique design to apportion nodes,or containers within the nodes,to application thresholds.Additionally,it provides the flexibility to the applications for selecting and choosing which node’s resources they want to manage and adds limits to prevent threshold breaches by adding additional jobs as needed.Node or container awareness can be utilized individually or in combination to increase efficiency.On top of this,the resource availability within the node and containers can also be investigated.This paper also focuses on the elasticity of the containers and self-adaptiveness depending on the job type.The results proved that 15%–20%performance improvement was achieved compared with the node and container awareness feature of the ANACRAC.It has been validated that this ANACRAC scheduler demonstrates a 70%–90%performance improvement compared with the default Fair scheduler.Experimental results also demonstrated the success of the enhancement and a performance improvement in the range of 60%to 200%when applications were connected with external interfaces and high workloads. 展开更多
关键词 Big data HADOOP YARN hadoop distributed file system(HDFS) MapReduce scheduling fair scheduler
下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部