首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data, but these techniques and algorithms cannot be used to protect data from an attacker. Cloud cryptography is the best way to transmit data in a secure and reliable format. Various researchers have developed various mechanisms to transfer data securely, which can convert data from readable to unreadable, but these algorithms are not sufficient to provide complete data security. Each algorithm has some data security issues. If some effective data protection techniques are used, the attacker will not be able to decipher the encrypted data, and even if the attacker tries to tamper with the data, the attacker will not have access to the original data. In this paper, various data security techniques are developed, which can be used to protect the data from attackers completely. First, a customized American Standard Code for Information Interchange (ASCII) table is developed. The value of each Index is defined in a customized ASCII table. When an attacker tries to decrypt the data, the attacker always tries to apply the predefined ASCII table on the Ciphertext, which in a way, can be helpful for the attacker to decrypt the data. After that, a radix 64-bit encryption mechanism is used, with the help of which the number of cipher data is doubled from the original data. When the number of cipher values is double the original data, the attacker tries to decrypt each value. Instead of getting the original data, the attacker gets such data that has no relation to the original data. After that, a Hill Matrix algorithm is created, with the help of which a key is generated that is used in the exact plain text for which it is created, and this Key cannot be used in any other plain text. The boundaries of each Hill text work up to that text. The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms. Then, the Kasiski test is used to verify the validity of the proposed algorithm and found that, if the proposed algorithm is used for data encryption, so an attacker cannot break the proposed algorithm security using any technique or algorithm.  相似文献   

2.
Electric discharge is a common tool nowadays for machining of materials. It may be through a liquid medium or through air. Any metals, hard alloys, and nonmetals can be machined using the energy of electric discharge. In electric discharge machining (EDM), the discharge occurs between two electrodes through a liquid medium and it is applicable only for electrically conducting materials and alloys. In electrochemical discharge machining (ECDM), the medium is an aqueous electrolyte and it is of two types. In the first type, the discharge occurs between two electrodes. One of the electrodes is the workpiece, and the other is the tool. In the second type, the discharge occurs between one electrode and an electrolyte. It is used for electrically nonconducting materials and the discharge energy is utilized maintaining the nonconducting workpiece in proximity of the discharge. All these electrical discharges are transient phenomena and do not result in a stable discharge in the form of arc. The output parameters depend on the discharge energy that requires precise control to maintain the accuracy of the machining. For micromachining, the control of the discharge is paramount both in terms of energy and pattern. Using various shaped tools, machining media with additives, different types of applied potentials, and supporting mechanical motions are some of the attempts made to improve the machining output. Optimization of these parameters for machining particular materials (or alloys) is a popular field of research. The present work is directed toward the investigation of discharge initiation and development by analyzing the cell current and discharge voltage relationship for both EDM and ECDM. The rectangular direct current (DC) pulse with different frequencies and the duty factor (on-off time ratio) are used for investigation. Observations on the voltage-current relationship are made for the external potential prior to discharge at discharge and above the discharge potential. Though the external potential above the discharge voltage is useful for machining, these observations elucidate the mechanism regarding the initiation of the electric discharge under different conditions. The manner of discharge development in dielectrics and electrolytes is observed to be different. This understanding will aid in deciding the design of the discharge circuit including the external potential and its pattern for certain desired outputs in machining.The full text can be downloaded at https://link.springer.com/article/10.1007/s40436-018-0221-1  相似文献   

3.
Content authentication, integrity verification, and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology. In this paper, a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking (SFASCDW) is proposed for content authentication and tampering detection of English text. A first-level order of alphanumeric mechanism, based on hidden Markov model, is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach. The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English text. Moreover, he extracts the features of the interrelationship among the contexts of the text, utilizes the extracted features as watermark information, and validates it later with the studied English text to detect any tampering. SFASCDW has been implemented using PHP with VS code IDE. The robustness, effectiveness, and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks, namely insertion, reorder, and deletion. The SFASCDW was found to be effective and could be applicable in detecting any possible tampering.  相似文献   

4.
高压脉冲电容器性能参数优选实验方法研究   总被引:2,自引:0,他引:2  
韩克华  任西  周密  钱勇 《爆破器材》2011,40(3):22-25
文章针对高压脉冲电容器的参数、特性以及性能等问题,利用国内目前所用到的不同种类材料的高压脉冲电容器,提出高压脉冲电容器性能参数的优选实验方法。优选实验结果表明:作为冲击片雷管发火的储能元件高压脉冲电容器,陶瓷电容器的性能参数最优,耐压和使用寿命很难满足使用要求;云母电容器性能参数次之,体积却相对较大,能够满足目前的爆炸箔起爆器的储能元件使用要求。  相似文献   

5.
Pulsed-ionization miniature ion mobility spectrometer   总被引:3,自引:0,他引:3  
We have demonstrated a miniature ion mobility spectrometer (IMS) that employs single pulses of corona discharge ionization. IMS spectra of both positive and negative ions generated from ambient air were measured as a function of drift field under various ionization conditions. Ion mobility spectra were studied with various pulse widths for both positive and negative ions, giving insights into mechanisms and kinetics of corona discharge ionization used in the miniature IMS. A combination of a pulsed potential with a steady dc bias was used to generate ions in the miniature IMS. There was a threshold dc potential for ion generation for a given pulse height. The dc ionization threshold was found to decrease linearly with increasing pulse height.  相似文献   

6.
 低温等离子体表面处理可以有效克服液相处理法存在的环境污染、耗能大和成本高的缺点,对材料表面进行清洗、活化和接枝处理,而设计一个合理的低温等离子体放电结构能够较好地改进表面处理的质量.通过建立CRFHCP空心阴极等离子体放电的数学模型,分析影响低温等离子体放电的关键因素,并设计了不同电极配置方式、样品位置和不同远区空心阴极结构的众多方案.通过接触角测定、表面能计算、SEM照片等方式,对不同方案下处理前后的疏水性PP薄膜形态结构进行表征分析.实验结果发现:远区径向喷嘴式空心阴极等离子体放电结构处理的薄膜表面比其他处理方式具有较小的接触角和较大的表面能.这表明采用优化设计的CRFHCP空心阴极等离子体放电结构,可以较其他结构更为有效地改善材料表面的亲水性能.  相似文献   

7.
The effect of an inhomogeneous magnetic field with axial and radial components on the structure of a high-current vacuum-arc discharge (VAD) has been theoretically studied. The characteristic features of current passage in a short VAD are considered using analytical expressions for the slope of the total current lines (TCLs) relative to the discharge axis, the axial components of the electric and magnetic fields, and the effective conductivity of discharge plasma. A two-dimensional mathematical model has been used to calculate the TCL shapes and the discharge voltage for various dimensions of the region of cathode spots. Calculations showed that the voltage drop on the discharge gap as a function of the arc discharge radius on the cathode has a minimum. The shape of TCLs and the arc radius on the cathode at this minimum agree with the available experimental data.  相似文献   

8.
PARTEEK KUMAR  R K SHARMA 《Sadhana》2012,37(2):299-318
This paper reports the work for the EnConversion of input Punjabi sentences to an interlingua representation called Universal Networking Language (UNL). The UNL system consists of two main components, namely, EnConverter (used for converting the text from a source language to UNL) and DeConverter (used for converting the text from UNL to a target language). This paper discusses the framework for designing the EnConverter for Punjabi language with a special focus on generation of UNL attributes and relations from Punjabi source text. It also describes the working of Punjabi Shallow Parser used for the processing of the input sentence, which performs the tasks of Tokenizer, Morph-analyzer, Part-of-Speech Tagger and Chunker. This paper also considers the seven phases used in the process of EnConversion of input Punjabi text to UNL representation. The paper highlights the EnConversion analysis rules used for the EnConverter and indicates its usage in the generation of UNL expressions. This paper also covers the results of implementation of Punjabi EnConverter and its evaluation on sample UNL sentences available at Spanish Language Server. The accuracy of the developed system has also been presented in this paper.  相似文献   

9.
A new approach to the real-time diagnostics of the erosion of walls in the discharge chamber of a plasma accelerator (thruster) with closed electron drift (CED) is described. The proposed method is based on the measurement of intensities of (i) the spectral lines of atoms sputtered from the discharge chamber walls and (ii) the reference lines of the neutral working gas component. The rate of erosion of the dielectric walls in a discharge chamber of a CED thruster has been measured for the discharge voltage increased from 300 to 700 V. An experimental relationship is established that takes into account changes in the velocities and charge states of the sputtered species and allows the proposed method to be used for various discharge voltages.  相似文献   

10.
11.
带有弹性介质电磁成形落料的研究   总被引:2,自引:0,他引:2  
本文在自行研制的电磁成形机上利用试验方法,研究了带有传力介质的电磁成形落料的传力介质厚度、凸棋直径,搭边值及凸模安装型式等,对电磁成形落料最小放电能量的影响。所得研究结果可供实际使用参考。  相似文献   

12.
It was reported that a plasma display panel with hump electrode in the long gap has improved discharge characteristics such as luminous efficacy, addressing jitter than long gap electrode structure. In this paper, as an extended study of previous work, we report properties of long gap discharge with hump electrode for various Xe concentration ratio in a Ne-Xe binary gas mixture. Due to the hump electrodes between long gap, discharge voltage is reduced by 20-30 V and high luminous efficacy is obtained at low voltages in high Xe percentage. For more detailed observation of discharge, ICCD images of infrared light emission from excited Xe in discharge cell are taken. The results show that the discharge is initiated between short gap of hump electrodes and the main part of the discharge is maintained between long gap electrodes. In addition, 3-dimensional simulation study shows that hump electrode shape has higher number of excited Xe and Xe2 than the conventional one. This is well correlated with the experimental result showing higher luminance in the hump structure.  相似文献   

13.
基于模糊层次分析法的自动排泄处理器设计评估   总被引:1,自引:1,他引:0  
陆宁  徐伯初  支锦亦  胡杰 《包装工程》2018,39(8):151-155
目的利用模糊层次理论将产品设计中的定性问题与用户需求结合起来,对自动排泄处理器进行了综合分析评价,以设计出符合用户心理需求及具有良好使用性的产品。方法采用德菲尔调研法对用户及市场进行需求分析,构建自动排泄处理器的评价因素集,建立层次分析模型,结合模糊综合评价法对其进行评价,定量计算各设计因素评价指标。结果通过实例验证,表明该方法在自动排泄处理器设计元素综合评价中具有较强的可靠性和可行性。结论该方法可对产品设计中的各项因素进行定量计算,并对设计方案进行全面、客观评价,为产品方案的选择提供了量化的决策依据。  相似文献   

14.
本文提出了一种测定高压喷嘴流量系数的新型测试系统,利用这套测试系统可以测定高压液流通过不同类型喷嘴,喷入具有一定反压的气体环境中喷嘴的流量系数.本文提供了部分实验结果.实验表明.这套测试系统具有很好的实用价值.  相似文献   

15.
偏心卸料下大直径浅圆仓侧压力计算   总被引:1,自引:0,他引:1  
为了研究偏心卸料下浅圆仓侧压力的计算方法,该文基于Coulomb土压力理论,结合《钢筋混凝土筒仓设计规范》(GB50077-2003)中附录C关于满仓时浅圆仓的侧压力计算方法,给出并分析了可能出现的5种工况,针对各工况下的计算公式进行详细的推导。考虑偏心卸料下筒仓仓壁的侧压力沿环向分布的不均匀性,提出了侧压力环向分布的力学模型。最后结合两个计算实例,将公式计算结果与有限元结果进行了对比,分析了偏心卸料对筒仓内力的不利影响。理论解与有限元结果吻合较好,检验了该文所推公式的正确性;偏心卸料下筒仓仓壁的水平弯矩较满载下更为不利,而环向轴力也有可能出现比满载下更不利的结果,结果验证了筒仓设计考虑偏心卸料作用的必要性。所提计算方法可供相关实际工程参考。  相似文献   

16.
Text information is principally dependent on the natural languages. Therefore, improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researchers encounter. Content authentication and tampering detection of digital contents have become a major concern in the area of communication and information exchange via the Internet. In this paper, an intelligent text Zero-Watermarking approach SETZWMWMM (Smart English Text Zero-Watermarking Approach Based on Mid-Level Order and Word Mechanism of Markov Model) has been proposed for the content authentication and tampering detection of English text contents. The SETZWMWMM approach embeds and detects the watermark logically without altering the original English text document. Based on Hidden Markov Model (HMM), Third level order of word mechanism is used to analyze the interrelationship between contexts of given English texts. The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques. To detect eventual tampering, SETZWMWMM has been implemented and validated with attacked English text. Experiments were performed on four datasets of varying lengths under multiple random locations of insertion, reorder and deletion attacks. The experimental results show that our method is more sensitive and efficient for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods.  相似文献   

17.
In this paper, a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authentication and tampering detection of Arabic text contents. The proposed approach known as Second order of Alphanumeric Mechanism of Markov model and Zero-Watermarking Approach (SAMMZWA). Second level order of alphanumeric mechanism based on hidden Markov model is integrated with text zero-watermarking techniques to improve the overall performance and tampering detection accuracy of the proposed approach. The SAMMZWA approach embeds and detects the watermark logically without altering the original text document. The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques. To detect eventual tampering, SAMMZWA has been implemented and validated with attacked Arabic text. Experiments were performed on four datasets of varying lengths under multiple random locations of insertion, reorder and deletion attacks. The experimental results show that our method is more sensitive for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods.  相似文献   

18.
提出了一种基于同质映射域的纹理特征的文本检测方法,并通过实验验证了该方法的性能.该方法与传统的文本检测方法的不同之处在于,首先将图像映射到同质性空间域中,在此空间域中计算纹理特征,然后通过支持向量机(SVM)分类器确定文本区域.与直接在图像空间域中提取纹理特征的方法相比,该方法对复杂背景下的文本检测更为有效,能有效地解决场景纹理特征与文本区域相近似造成的文本检测错误.  相似文献   

19.
Wormell  Irene 《Scientometrics》2000,48(2):237-250
The paper examines the applicability of informetric methods to trace the pattern of debate about the three main critical issues of the modern Welfare State in Denmark: economic aspects, legitimacy and functionality. The methodology of issue tracking is used to follow the developments of these issues in periods through national databases of various types covering information about the research, implementation, press and legislation aspects. The approach taken is novel in that it implements and tests issue tracking in this area of social sciences, and tries to reduce subjectivity in the analysis of trends influencing social policy and public opinion. The study aims to show how the emerging data and text mining techniques can be applied to integrate downloaded bibliographic data with other types of information in a strategic mix.  相似文献   

20.
锂离子电池正极材料热稳定性研究进展   总被引:1,自引:0,他引:1  
综述了锂离子电池正极材料热稳定性的研究现状及其进展。针对正极材料LiCcO2、LiNiO3、LiMn2O4及其衍生物的热稳定性,众多研究者提出了不同的反应机理,认为正极材料的热稳定性与颗粒大小、晶体结构、充/放电状态、脱锂程度及电解质性质等因素有关。可以利用掺杂技术、涂层技术及优化合成条件等手段来改善正极材料的热稳定性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号