To deal with over-shooting and gouging in high speed machining, a novel approach for velocity smooth link is proposed. Considering discrete tool path, cubic spline curve fitting is used to find dangerous points, and a...To deal with over-shooting and gouging in high speed machining, a novel approach for velocity smooth link is proposed. Considering discrete tool path, cubic spline curve fitting is used to find dangerous points, and according to spatial geometric properties of tool path and the kinematics theory, maximum optimal velocities at dangerous points are obtained. Based on method of velocity control characteristics stored in control system, a fast algorithm for velocity smooth link is analyzed and formulated. On-line implementation results show that the proposed approach makes velocity changing more smoothly compared with traditional velocity control methods and improves productivity greatly.展开更多
Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurat...Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurately detect those hidden processes by analyzing memory data.WVMI dumps in-memory data of the target Windows operating systems from hypervisor and retrieves EPROCESS structures’address of process linked list first,and then generates Data Type Confidence Table(DTCT).Next,it traverses the memory and identifies the similarities between the nodes in process linked list and the corresponding segments in the memory by utilizing DTCT.Finally,it locates the segments of Windows’EPROCESS and identifies the hidden processes by further comparison.Through extensive experiments,our experiment shows that the WVMI detects the hidden process with high identification rate,and it is independent of different versions of Windows operating system.展开更多
基金This project is supported by National Hi-tech Research and Development Program of China (863 Program, No. 2002AA421150)Specialized Re-search Fund for Doctor Program of Higher Education of China (No. 20030335091).
文摘To deal with over-shooting and gouging in high speed machining, a novel approach for velocity smooth link is proposed. Considering discrete tool path, cubic spline curve fitting is used to find dangerous points, and according to spatial geometric properties of tool path and the kinematics theory, maximum optimal velocities at dangerous points are obtained. Based on method of velocity control characteristics stored in control system, a fast algorithm for velocity smooth link is analyzed and formulated. On-line implementation results show that the proposed approach makes velocity changing more smoothly compared with traditional velocity control methods and improves productivity greatly.
基金Supported by the National Natural Science Foundation of China(61170026)
文摘Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurately detect those hidden processes by analyzing memory data.WVMI dumps in-memory data of the target Windows operating systems from hypervisor and retrieves EPROCESS structures’address of process linked list first,and then generates Data Type Confidence Table(DTCT).Next,it traverses the memory and identifies the similarities between the nodes in process linked list and the corresponding segments in the memory by utilizing DTCT.Finally,it locates the segments of Windows’EPROCESS and identifies the hidden processes by further comparison.Through extensive experiments,our experiment shows that the WVMI detects the hidden process with high identification rate,and it is independent of different versions of Windows operating system.