期刊文献+
共找到39篇文章
< 1 2 >
每页显示 20 50 100
“攻击性”PDC单齿结构的仿真实验研究
1
作者 胡珊珊 《科技信息》 2013年第6期170-170,171,共2页
本文利用ansys/Ls-dyna有限元显示动力学分析软件,模拟PDC单齿切削岩层的过程,提取PDC单齿上的不同切削深度所对应的切向力和轴向力,得出切削力与切削深度的关系。采用三因素三水平的正交试验,得出前倾角、侧转角、切削面的倾斜角对&qu... 本文利用ansys/Ls-dyna有限元显示动力学分析软件,模拟PDC单齿切削岩层的过程,提取PDC单齿上的不同切削深度所对应的切向力和轴向力,得出切削力与切削深度的关系。采用三因素三水平的正交试验,得出前倾角、侧转角、切削面的倾斜角对"攻击性"影响的大小顺序。并得出在平面切削时,前倾角对PDC单齿"攻击性"的影响规律是:前倾角越大,"攻击性"越差。这些分析结论为改进"攻击性"PDC钻头的切削结构提供了理论参考依据。 展开更多
关键词 有限元 “攻击性” PDC单齿 切削结构
下载PDF
Autophagy Enhances the Aggressiveness of Human Colorectal Cancer Cells and Their Ability to Adapt to Apoptotic Stimulus 被引量:9
2
作者 Hai-yang Zheng Xiao-yang Zhang +1 位作者 Xing-fen Wang Bao-cun Sun 《Clinical oncology and cancer researeh》 CAS CSCD 2012年第2期105-110,共6页
Objective To investigate LC3B-Ⅱand active caspase-3 expression in human colorectal cancer to elucidate the role of autophagy and to explore the relationship of autophagy with apoptosis in human colorectal cancer. Met... Objective To investigate LC3B-Ⅱand active caspase-3 expression in human colorectal cancer to elucidate the role of autophagy and to explore the relationship of autophagy with apoptosis in human colorectal cancer. Methods LC3B expression was detected by immunohistochemistry in 53 human colorectal cancer tissues and 20 normal colon tissues.The protein levels of LC3B-Ⅱand active caspase-3 were also determined by Western blot analysis in 23 human colorectal cancer tissues and 10 normal colon tissues. Results LC3B was expressed both in cancer cells and normal epithelial cells.LC3B expression in the peripheral area of cancer tissues was correlated with several clinicopathological factors,including tumor differentiation(P=0.002),growth pattern of the tumor margin (P=0.028),pN(P=0.002),pStage(P=0.032),as well as vessel and nerve plexus invasion(P=0.002).The protein level of LC3B-Ⅱin cancer tissue was significantly higher than in normal tissue(P=0.038),but the expression of active forms of procaspase-3 in cancer tissue was lower(P=0.041).There was a statistically significant positive correlation between the expression levels of LC3B-Ⅱand the active forms of procaspase-3(r=0.537,P=0.008). Conclusions Autophagy has a prosurvival role in human colorectal cancer.Autophagy enhances the aggressiveness of colorectal cancer cells and their ability to adapt to apoptotic stimulus. 展开更多
关键词 AUTOPHAGY apoptosis colorectal neoplasms LC3B caspase-3
下载PDF
A New Anonymity Model for Privacy-Preserving Data Publishing 被引量:5
3
作者 HUANG Xuezhen LIU Jiqiang HAN Zhen YANG Jun 《China Communications》 SCIE CSCD 2014年第9期47-59,共13页
Privacy-preserving data publishing (PPDP) is one of the hot issues in the field of the network security. The existing PPDP technique cannot deal with generality attacks, which explicitly contain the sensitivity atta... Privacy-preserving data publishing (PPDP) is one of the hot issues in the field of the network security. The existing PPDP technique cannot deal with generality attacks, which explicitly contain the sensitivity attack and the similarity attack. This paper proposes a novel model, (w,γ, k)-anonymity, to avoid generality attacks on both cases of numeric and categorical attributes. We show that the optimal (w, γ, k)-anonymity problem is NP-hard and conduct the Top-down Local recoding (TDL) algorithm to implement the model. Our experiments validate the improvement of our model with real data. 展开更多
关键词 data security privacy protection ANONYMITY data publishing
下载PDF
Attacks on adult females with infants by non-resident males in the Franois langur 被引量:2
4
作者 Qi-Hai ZHOU Bang LUO Cheng-Ming HUANG 《Zoological Research》 CAS CSCD 北大核心 2013年第1期I0014-I0017,共4页
Infanticide by males is a common phenomenon in mammals, especially primates, as lactation lasts much longer than gestation in many species. Usually, infanticidal episodes occur soon after group takeovers, and are trad... Infanticide by males is a common phenomenon in mammals, especially primates, as lactation lasts much longer than gestation in many species. Usually, infanticidal episodes occur soon after group takeovers, and are traditionally considered a male reproductive strategy (i.e., support the sexual selection hypothesis, Hrdy, 1974). To verify the validity of this conception, we observed one group of Franqois' langurs in the Nonggang Nature Reserve, China, between August 2003 and July 2004. During the study period, a Francois' langur female with the youngest infant in the group was attacked three times by immigrating males, and later disappeared by the third day after the final attack. We suggest that these attacks on the female-infant dyad represent infanticide attempts by males, and may be the cause of the adult female and her infant's disappearance. Presumably, that female dispersed with her infant to avoid infanticide and was not killed. Though these observations do not completely verify the sexual selection hypothesis, they are not inconsistent with it. 展开更多
关键词 INFANTICIDE Reproductive tactics Franqois' langur (Trachypithecusfrancoisi)
下载PDF
Nonlinear Dynamical Behavior in Neuron Model Based on Small World Network with Attack and Repair Strategy 被引量:1
5
作者 YANG Qiu-Ying ZHANG Ying-Yue ZHANG Gui-Qing CHEN Tian-Lun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第4期965-970,共6页
In this paper, we investigate the effect due to the change of topology structure of network on the nonlinear dynamical behavior, by virtue of the OFC neuron evolution model with attack and repair strategy based on the... In this paper, we investigate the effect due to the change of topology structure of network on the nonlinear dynamical behavior, by virtue of the OFC neuron evolution model with attack and repair strategy based on the small world. In particular, roles of various parameters relating to the dynamical behavior are carefully studied and analyzed. In addition, the avalanche and EEC-like wave activities with attack and repair strategy are also explored in detail in this work. 展开更多
关键词 ATTACK REPAIR self-organized criticality small world network
下载PDF
Attack Resistant Trust Management Model Based on Beta Function for Distributed Routing in Internet of Things 被引量:1
6
作者 Dong Ping Guan Jianfeng +1 位作者 Xue Xiaoping Wang Hongchao 《China Communications》 SCIE CSCD 2012年第4期89-98,共10页
With the rapid development of Internet of Things (IoT),the issue of trust in distributed routing systems has attracted more research attention.The existing trust management frameworks,however,suffer from some possible... With the rapid development of Internet of Things (IoT),the issue of trust in distributed routing systems has attracted more research attention.The existing trust management frameworks,however,suffer from some possible attacks in hostile environments,such as false accusation,collusion,on-off,and conflicting behavior.Therefore,more comprehensive models should be proposed to predict the trust level of nodes on potential routes more precisely,and to defeat several kinds of possible attacks.This paper makes an attempt to design an attack-resistant trust management model based on beta function for distributed routing strategy in IoT.Our model can evaluate and propagate reputation in distributed routing systems.We first describe possible attacks on existing systems.Our model is then proposed to establish reliable trust relations between self-organized nodes and defeat possible attacks in distributed routing systems.We also propose a theoretical basis and skeleton of our model.Finally,some performance evaluations and security analyses are provided to show the effectiveness and robustness of our model compared with the existing systems. 展开更多
关键词 trust management IOT distributed ROUTING PROBABILITY
下载PDF
A Group-Based Fingerprinting Scheme for Digital Wholesale and Retail 被引量:1
7
作者 ZHAO Yong ZHANG Aixin LU Songnian 《China Communications》 SCIE CSCD 2014年第10期126-135,共10页
Prior group-based fingerprinting achieves better detection performance when colluders are from the same group. But in digital wholesale and needs to be identified retail, the middleman as well as customers especially ... Prior group-based fingerprinting achieves better detection performance when colluders are from the same group. But in digital wholesale and needs to be identified retail, the middleman as well as customers especially against group colluding attack. The group tracing is neglected in previous works. In this paper, we propose a novel multimedia group fingerprint to trace malicious middlemen along with customers. We explore the quality of the non degenerate linear shift register sequence (NDLSRS) which is convenient in group initialization and management. The theoretic analysis and simulation experiment results show that NDLSRS has good resistance against attacks from colluding groups/ members even after its volume expanded. 展开更多
关键词 Group fingerprint non-degeneratelinear shift register sequence wholesale andretail group colluding attack
下载PDF
Certificateless Public Key Encryption with Keyword Search 被引量:23
8
作者 PENG Yanguo CUI Jiangtao +1 位作者 PENG Changgen YING Zuobin 《China Communications》 SCIE CSCD 2014年第11期100-113,共14页
Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes ... Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component. Hence, Certificateless Public Key Cryptography (CLPKC) is efficient to remove such problem. CLPKC is introduced into PEKS, and a general model of Certificateless PEKS (CLPEKS) is formalized. In addition, a practical CLPEKS scheme is constructed with security and efficiency analyses. The proposal is secure channel free, and semantically secure against adaptive chosen keyword attack and keyword guessing attack. To illustrate the superiority, massive experiments are conducted on Enron Email dataset which is famous in information retrieval field. Compared with existed constructions, CLPEKS improves the efficiency in theory and removes the key escrow problem. 展开更多
关键词 provable secure certificateless public key encryption keyword search
下载PDF
Confidential Procedure Model:a Method for Quantifying Confidentiality Leakage 被引量:1
9
作者 Zhang Yong Li Xiangxue +2 位作者 Zhou Yuan Li Zhibin Qian Haifeng 《China Communications》 SCIE CSCD 2012年第11期117-126,共10页
In this paper, we propose a theoretical-information Confidential Procedure Model (CPM) to quantify confidentiality (or information leakage). The advantages of the CPM model include the following: 1) confidentiality lo... In this paper, we propose a theoretical-information Confidential Procedure Model (CPM) to quantify confidentiality (or information leakage). The advantages of the CPM model include the following: 1) confidentiality loss is formalized as a dynamic procedure, instead of a static function, and described via the "waterfall" diagram; 2) confidentiality loss is quantified in a relative manner, i.e., taken as a quantitative metric, the ratio of the conditional entropy being reserved after observing the entropy of the original full confidential information; 3) the optimal attacks including exhaustive attacks as well as all possible attacks that have (or have not even) been discovered, are taken into account when defining the novel concept of the confidential degree. To elucidate the proposed model, we analyze the information leakage in side-channel attacks and the anonymity of DC-net in a quantitative manner. 展开更多
关键词 CONFIDENTIALITY quantitative analysis perfect secrecy side-channel attack ANONYMITY
下载PDF
Game Theory Based False Negative Probability of Embedded Watermark Under Unintentional and Steganalysis Attacks 被引量:1
10
作者 HU Ziquan SHE Kun +1 位作者 WANG Jianghua TANG Jianguo 《China Communications》 SCIE CSCD 2014年第5期114-123,共10页
Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,how... Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack. 展开更多
关键词 digital watermarking false negative probability game theory watermark capacity steganalysis attack.
下载PDF
Physical-Chemical Aggressiveness of Solutions of Medicines as a Factor in the Rheology of the Blood inside Veins and Catheters
11
作者 Aleksandr Urakov Natalia Urakova +1 位作者 Anton Kasatkin Leisan Chernova 《Journal of Chemistry and Chemical Engineering》 2014年第1期61-65,共5页
In experiments in vitro and observations in the clinic in vivo studied the state of the lumen of subcutaneous veins and blood rheology of patients after their interaction with vascular catheters and solutions of medic... In experiments in vitro and observations in the clinic in vivo studied the state of the lumen of subcutaneous veins and blood rheology of patients after their interaction with vascular catheters and solutions of medicines based on the values of temperature, volume, concentration, osmotic activity and pH. It is shown that heparin injection in blood not prevent, but solution of 4% sodium bicarbonate injection prevents blood clotting, blood clots and blockage blood clots of veins and of catheters. It is shown that the heating to a temperature of+42 ℃ with the solution of 4% sodium bicarbonate provides softening action on old dry blood clots in 1 min, and their subsequent irrigation with a warm solution of 4% sodium bicarbonate and 3% hydrogen peroxide provides complete destruction and discoloration of the remaining spots of blood during 2 s. Proposed new medicines and hygiene products for the protection of the veins and installed in them vascular catheters from blockage of blood clots, and for removing blood stains from clothes and body surface patients. 展开更多
关键词 New drugs hygiene products physical-chemical properties rheology blood.
下载PDF
A LINEARIZATION ATTACK ON MODIFIED E_0 ALGORITHM
12
作者 Guan Jie Liu Jiandong 《Journal of Electronics(China)》 2006年第3期410-412,共3页
A linearization attack on the Key Stream Generator (KSG) of the modified Eo algorithm proposed by Hermelin [Proceedings of ICISC'99, Springer LNCS 1787, 2000, 17-29] is given in this paper. The initial value can be... A linearization attack on the Key Stream Generator (KSG) of the modified Eo algorithm proposed by Hermelin [Proceedings of ICISC'99, Springer LNCS 1787, 2000, 17-29] is given in this paper. The initial value can be recovered by a linearization attack with O(2^60.52) operations by solving a System of Linear Equations (SLE) with at most 2^20.538 unknowns. Frederik Armknecht [Cryptology ePrint Archive, 2002/191] proposed a linearization attack on the KSG olEo algorithm with O(2^70.341) operations by solving an SLE with at most 2^24.056 unknowns, so the modification proposed by Hermelin reduces the ability or E0 to resist the linearization attack by comparing with the results ofFrederik Armknecht. 展开更多
关键词 E0 encryption system Stream cipher Linearization attack
下载PDF
The Babysitter: A Feminist Interpretation
13
作者 LIU Ke-dong LI Shuang-shuang 《Journal of Literature and Art Studies》 2014年第7期521-526,共6页
Sexual violence, a prevalent problem in the spousal relationship, is closely related to the issue of female consciousness. In The Babysitter, Coover (1989) tells of a teenage girl babysitting two kids and a baby and... Sexual violence, a prevalent problem in the spousal relationship, is closely related to the issue of female consciousness. In The Babysitter, Coover (1989) tells of a teenage girl babysitting two kids and a baby and of two of her male peers and the children's father altogether exploring their obsession towards her and, moreover, traces the evaluation and devaluation of women to the presentation of TV exploring its influence on his heroines, namely Mrs. Tucker and the babysitter serving as victims of the patriarchal society. Through a close engagement with the sexual objectification theory, this paper analyzes in detail men's aggressive oppressions upon women as well as women's compromise and rebellion towards the sexual violence, and investigates that the awakening of female independent consciousness is a key factor in effectively helping women achieve the gender equality between sexes. 展开更多
关键词 Robert Coover The Babysitter OBJECTIFICATION
下载PDF
Effect of Gender and Developmental Periods on Aggression Tendencies of Turkish Students: A Study of Meta-analysis
14
作者 Mehmet Beyazsacli 《Sociology Study》 2016年第2期134-139,共6页
With this study, it is aimed at examining the effect of the gender and developmental phases on the aggression tendencies of the Turkish students. In this context, the meta-analysis of the studies existing in the liter... With this study, it is aimed at examining the effect of the gender and developmental phases on the aggression tendencies of the Turkish students. In this context, the meta-analysis of the studies existing in the literature and covering the Turkish students has been conducted. The examined researches to be included in the analysis have been identified in accordance with certain criteria. As criteria, the following conditions have been sought: inclusion of the studies published between 2004 and 2015, inclusion of child, adolescent, and young adult students in the sample, giving the validity and reliability studies of the measuring tools, the studies being obtained from sources of the published theses and articles; and in the data, the arithmetic mean, standard deviation, and sample size being given. In the research, gender has been found effective on the general aggression scores, at significant level (EDavg = .280, p 〈 .01), and against males at medium level. The general aggression scores from the moderator variables have been found to have a medium level of effect (EDavg = .402, p 〈 .01) on the childhood period, and to have the greatest effect against males. 展开更多
关键词 TURKISH META-ANALYSIS AGGRESSION CHILD ADOLESCENT young adult student
下载PDF
Research on Route Planning Method Based on Active-Attack Strategy
15
作者 刘新艳 黄显林 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第2期289-292,共4页
Aimed at modern high-density,high overlapped and powerful antipersonnel stealthy penetration environment,route planning techniques on active-attack strategy were thoroughly and further studied,in order to get good pro... Aimed at modern high-density,high overlapped and powerful antipersonnel stealthy penetration environment,route planning techniques on active-attack strategy were thoroughly and further studied,in order to get good probability of survival and perfect efficiency of task accomplishment.It provides a new thought for and a new solution to the application of route planning in new era. 展开更多
关键词 route planning stealthy penetration active-attack strategy ammunition equivalence curve/line ratio
下载PDF
Aggressive Behaviour During Breaks as a Manifestation of Different Types of Culture at School
16
作者 Marzanna Farnicka 《Sociology Study》 2014年第1期18-26,共9页
The aim of this article is to analyse aggressive behaviour of pupils during school breaks. The main emphasis has been put on the importance of teachers' expectations concerning behaviour violating norms. The role of ... The aim of this article is to analyse aggressive behaviour of pupils during school breaks. The main emphasis has been put on the importance of teachers' expectations concerning behaviour violating norms. The role of these expectations as predictors of pro-social and anti-social behaviour has been analysed. The research is based on the assumption that every culture develops specific benchmarks in reference to which people judge various social phenomena. Creation of an individual conception of oneself and making a plan for one's life is based, to some extent, on social values which constitute the crucial element of every culture. The hypothesis to be verified in this study was the presence of a significant link between the occurrence of anti-social and pro-social behaviour and the adopted axiological assumptions concerning students and their behaviour. The subjects of the study were students and teachers from 18 schools representing three types of culture and three educational levels (primary, lower secondary, and upper secondary). The total number of 1,212 students were observed (Goldsmith's Observational Questionnaire), and 36 teachers were interviewed. The results indicate a link between the adopted school culture and teachers' functioning, and open perspectives of further research on the connection between the values in school curricula and the occurrence of behaviour violating social norms and bounds. 展开更多
关键词 AGGRESSION social behaviour SCHOOL school culture values in education
下载PDF
FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER
17
作者 Ma Weiju Feng Dengguo 《Journal of Electronics(China)》 2006年第6期888-891,共4页
A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover... A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the secu-rity of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced. 展开更多
关键词 Bluetooth combiner Combiner with memory Correlation attacks
下载PDF
HTTP-sCAN:Detecting HTTP-Flooding Attack by Modeling Multi-Features of Web Browsing Behavior from Noisy Web-Logs 被引量:3
18
作者 WANG Jin ZHANG Min +2 位作者 YANG Xiaolong LONG Keping XU Jie 《China Communications》 SCIE CSCD 2015年第2期118-128,共11页
HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by ... HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by modeling the behavior of normal web surfers.However,most of the existing anomaly-based detection approaches usually cannot filter the web-crawling traces from unknown searching bots mixed in normal web browsing logs.These web-crawling traces can bias the base-line profile of anomaly-based schemes in their training phase,and further degrade their detection performance.This paper proposes a novel web-crawling tracestolerated method to build baseline profile,and designs a new anomaly-based HTTP-flooding detection scheme(abbr.HTTP-sCAN).The simulation results show that HTTP-sCAN is immune to the interferences of unknown webcrawling traces,and can detect all HTTPflooding attacks. 展开更多
关键词 IP network DDoS relative entropy cluster algorithm
下载PDF
Analysis on Lmplicitly Aggressive Discourse
19
作者 Yanling Xu Yang Wenxiu 《International Journal of Technology Management》 2014年第6期76-78,共3页
Implicitly aggressive discourse belongs to one kind of aggressive discourses, which is an impolite phenomenon. However, implicitly aggressive discourse not only can threat and attack listeners, but also can avoid conf... Implicitly aggressive discourse belongs to one kind of aggressive discourses, which is an impolite phenomenon. However, implicitly aggressive discourse not only can threat and attack listeners, but also can avoid conflicting in public. So it is a worthy studying linguistic phenomenon. Based on Goal-direction principle, this article analyzes the language performance of implicitly aggressive discourse, which aims to reveal socially pragmatic constraints of implicit trigger of conflict talk and interpersonal function in interpersonal conflict. 展开更多
关键词 IMPLICIT aggressive discourse: goal-direction principle
下载PDF
DCFl-Checker: Checking Kernel Dynamic Control Flow Integrity with Performance Monitoring Counter 被引量:2
20
作者 SHI Wenchang ZHOU Hongwei +1 位作者 YUAN Jinhui LIANG Bin 《China Communications》 SCIE CSCD 2014年第9期31-46,共16页
It is a challenge to verify integrity of dynamic control flows due to their dynamic and volatile nature. To meet the challenge, existing solutions usually implant an "attachment" in each control transfer. However, t... It is a challenge to verify integrity of dynamic control flows due to their dynamic and volatile nature. To meet the challenge, existing solutions usually implant an "attachment" in each control transfer. However, the attachment introduces additional cost except performance penalty. For example, the attachment must be unique or restrictedly modified. In this paper, we propose a novel approach to detect integrity of dynamic control flows by counting executed branch instructions without involving any attachment. Our solution is based on the following observation. If a control flow is compromised, the number of executed branch instructions will be abnormally increased. The cause is that intruders usually hijack control flows for malicious execution which absolutely introduces additional branch instructions. Inspired by the above observation, in this paper, we devise a novel system named DCFI- Checker, which detect integrity corruption of dynamic control flows with the support of Performance Monitoring Counter (PMC). We have developed a proof-of-concept prototype system of DCFI-Checker on Linux fedora 5. Our experiments with existing kemel rootkits and buffer overflow attack show that DCFI- Checker is effective to detect compromised dynamic control transfer, and performance evaluations indicate that performance penaltyinduced by DCFI-Checker is acceptable. 展开更多
关键词 INTEGRITY dynamic control flow KERNEL branch performance monitoringcounter
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部