期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Investigation of the effect of argon protection behavior in the ingot casting process 被引量:2
1
作者 ZHOU Tongjun 《Baosteel Technical Research》 CAS 2015年第4期20-25,共6页
With the continuous improvement of product quality and function,the quality control of mold steel is becoming increasingly stricter. Argon protection is essential for ensuring casting quality during ingot casting. The... With the continuous improvement of product quality and function,the quality control of mold steel is becoming increasingly stricter. Argon protection is essential for ensuring casting quality during ingot casting. The development of argon protection in ingot casting and the production process of enclosed argon protection in 40 t line is discussed,w ith particular focus given the factors affecting the flow of oxygen in the argon protection cover are discussed. The influence of some related factors on the oxygen content is analyzed. On the basis of the online measurements of the oxygen content,the optimized operational approaches for improving the effect of argon protection are developed. This can decrease the liquid steel via secondary oxidation,and improve the quality of the ingots. 展开更多
关键词 argon protection ingot casting oxygen content quality
下载PDF
Data Hiding in AMBTC Images Using Selective XOR Hiding Scheme
2
作者 Yung-Yao Chen Yu-Chen Hu +1 位作者 Ting-Kai Yang You-An Wang 《Computers, Materials & Continua》 SCIE EI 2022年第6期5167-5182,共16页
Nowadays since the Internet is ubiquitous,the frequency of data transfer through the public network is increasing.Hiding secure data in these transmitted data has emerged broad security issue,such as authentication an... Nowadays since the Internet is ubiquitous,the frequency of data transfer through the public network is increasing.Hiding secure data in these transmitted data has emerged broad security issue,such as authentication and copyright protection.On the other hand,considering the transmission efficiency issue,image transmission usually involves image compression in Internet-based applications.To address both issues,this paper presents a data hiding scheme for the image compression method called absolute moment block truncation coding(AMBTC).First,an image is divided into nonoverlapping blocks through AMBTC compression,the blocks are classified four types,namely smooth,semi-smooth,semi-complex,and complex.The secret data are embedded into the smooth blocks by using a simple replacement strategy.The proposed method respectively embeds nine bits(and five bits)of secret data into the bitmap of the semi-smooth blocks(and semicomplex blocks)through the exclusive-or(XOR)operation.The secret data are embedded into the complex blocks by using a hidden function.After the embedding phase,the direct binary search(DBS)method is performed to improve the image qualitywithout damaging the secret data.The experimental results demonstrate that the proposed method yields higher quality and hiding capacity than other reference methods. 展开更多
关键词 content protection technology security for image data absolute moment block truncation coding(AMBTC) direct binary search(DBS)
下载PDF
PathMarker:protecting web contents against inside crawlers
3
作者 Shengye Wan Yue Li Kun Sun 《Cybersecurity》 CSCD 2019年第1期100-116,共17页
Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator.Moreover,armoured crawlers are evolving against new anti-crawler mechanis... Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator.Moreover,armoured crawlers are evolving against new anti-crawler mechanisms in the arm races between crawler developers and crawler defenders.In this paper,based on one observation that normal users and malicious crawlers have different short-term and long-term download behaviours,we develop a new anti-crawler mechanism called PathMarker to detect and constrain persistent distributed crawlers.By adding a marker to each Uniform Resource Locator(URL),we can trace the page that leads to the access of this URL and the user identity who accesses this URL.With this supporting information,we can not only perform more accurate heuristic detection using the path related features,but also develop a Support Vector Machine based machine learning detection model to distinguish malicious crawlers from normal users via inspecting their different patterns of URL visiting paths and URL visiting timings.In addition to effectively detecting crawlers at the earliest stage,PathMarker can dramatically suppress the scraping efficiency of crawlers before they are detected.We deploy our approach on an online forum website,and the evaluation results show that PathMarker can quickly capture all 6 open-source and in-house crawlers,plus two external crawlers(i.e.,Googlebots and Yahoo Slurp). 展开更多
关键词 Anti-Crawler mechanism Stealthy distributed inside crawler Confidential Website content protection
原文传递
PathMarker:protecting web contents against inside crawlers
4
作者 Shengye Wan Yue Li Kun Sun 《Cybersecurity》 2018年第1期375-391,共17页
Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator.Moreover,armoured crawlers are evolving against new anti-crawler mechanis... Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator.Moreover,armoured crawlers are evolving against new anti-crawler mechanisms in the arm races between crawler developers and crawler defenders.In this paper,based on one observation that normal users and malicious crawlers have different short-term and long-term download behaviours,we develop a new anti-crawler mechanism called PathMarker to detect and constrain persistent distributed crawlers.By adding a marker to each Uniform Resource Locator(URL),we can trace the page that leads to the access of this URL and the user identity who accesses this URL.With this supporting information,we can not only perform more accurate heuristic detection using the path related features,but also develop a Support Vector Machine based machine learning detection model to distinguish malicious crawlers from normal users via inspecting their different patterns of URL visiting paths and URL visiting timings.In addition to effectively detecting crawlers at the earliest stage,PathMarker can dramatically suppress the scraping efficiency of crawlers before they are detected.We deploy our approach on an online forum website,and the evaluation results show that PathMarker can quickly capture all 6 open-source and in-house crawlers,plus two external crawlers(i.e.,Googlebots and Yahoo Slurp). 展开更多
关键词 Anti-Crawler mechanism Stealthy distributed inside crawler Confidential Website content protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部